John Furrier sits down with Mark Bauhaus Executive Vice President and General Manager of the Service Layer Technology Business at Juniper Networks to talk about the new Juniper Mobile Security Suite. He is responsible for the strategy, execution, and innovation of the company's security, application acceleration, Unified Access Control, and enterprise routing product lines.
1. Big Data -- Those 2.5 quintillion daily bytes of data are there somewhere. You just may not remember where you put them. Such is the big data dilemma. Information overload at the consumer level has been a problem for a long time. At the business level, it can cause the business process to grind to a halt.
Organizations with large amounts of data need effective ways to store, access, retrieve, and analyze that data without taking hours, days, or even weeks. Big data solutions, such as the open source Apache Hadoop, are intended to provide that effective method big data management.
2. Converged Infrastructure - The concept of converged infrastructure is not a particularly new concept. Various solutions such as compute, storage, and networking components are packaged together to created a unified IT system that is manageable and easier to scale. According to Wikibon.org, the converged infrastructure market will reach $402 billion total available market (TAM) by 2017. Noteably, HP announced several new converged infrastructure solutions, particularly its Converged Storage solutions, which compete directly with converged storage systems from EMC, NetApp, and IBM.
3. Mobile devices in enterprise -- Once upon a time, going to work meant sitting at a desk all day, essentially cut off from the outside world. Today, mobile devices allow business professionals to be constantly connected, and in some cases, they remain connected, even outside of the office.
In terms of infrastructure, mobile devices present a number of concerns. The first is access. Mobile users still need access to the same applications and data as traditional computer users. In some cases, that may mean a company must create application interfaces for multiple mobile platforms (i.e. iOS, Android, and others). Alternatively, they may employ the use of universal web-based interfaces catered to mobile devices. Either way, companies will have to operate on an "always-on" mentality, giving their employees access away from the office at all hours of the day and night.
That concept of remote access presents the second major concern, which is security. It is more difficult and sometimes more expensive to regulate device security when users can bring their own. Therefore, organizations with BYOD policies must implement security strategies that are comprehensive and applicable to a wide variety of platforms and access methods.
4. Flash Storage -- Flash has begun is gradual ascendancy into storage supremacy.The idea of hard disk drives (HDD) with movable parts and speed limited to the number of rotations per minute a system can churn out without overheating may soon be over. Flash has already taken root at the server level, with on-server cache in the form of flash IO cards. This type of caching could also even be implemented on existing storage controllers.
In some cases, organizations have additionally implemented flash storage to replace HDD arrays. Solid state drives (SSD) may eventually replace hard disk drives as the standard form of storage. As it stands, there are still some cost and technical disadvantages, but those barriers to adoption are rapidly eroding.
5. Cloud storage for backup -- Even a few years ago, the idea of backing up data to the cloud may have seemed unattainable and even counterproductive. Today, with hybrid cloud implementations, increased bandwidth, and vendors who offer complete backup storage solutions, cloud backup is a reality.
Another important development in cloud backup is the advent of long-term gradual backup storage, such as Amazon's new Glacier project. These tools are designed for extended archiving of large amounts of data.
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper Mobile Security Suite Launch 2010 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to Juniper Mobile Security Suite Launch 2010 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Juniper Mobile Security Suite Launch 2010 | San Francisco
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Juniper Mobile Security Suite Launch 2010 | San Francisco.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper Mobile Security Suite Launch 2010 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to Juniper Mobile Security Suite Launch 2010 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Juniper Mobile Security Suite Launch 2010 | San Francisco
Please sign in with LinkedIn to continue to Juniper Mobile Security Suite Launch 2010 | San Francisco. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Mark Bauhaus, Juniper Networks EVP & GM - Juniper Mobile Security Suite Launch 2010 - theCUBE
John Furrier sits down with Mark Bauhaus Executive Vice President and General Manager of the Service Layer Technology Business at Juniper Networks to talk about the new Juniper Mobile Security Suite. He is responsible for the strategy, execution, and innovation of the company's security, application acceleration, Unified Access Control, and enterprise routing product lines.
1. Big Data -- Those 2.5 quintillion daily bytes of data are there somewhere. You just may not remember where you put them. Such is the big data dilemma. Information overload at the consumer level has been a problem for a long time. At the business level, it can cause the business process to grind to a halt.
Organizations with large amounts of data need effective ways to store, access, retrieve, and analyze that data without taking hours, days, or even weeks. Big data solutions, such as the open source Apache Hadoop, are intended to provide that effective method big data management.
2. Converged Infrastructure - The concept of converged infrastructure is not a particularly new concept. Various solutions such as compute, storage, and networking components are packaged together to created a unified IT system that is manageable and easier to scale. According to Wikibon.org, the converged infrastructure market will reach $402 billion total available market (TAM) by 2017. Noteably, HP announced several new converged infrastructure solutions, particularly its Converged Storage solutions, which compete directly with converged storage systems from EMC, NetApp, and IBM.
3. Mobile devices in enterprise -- Once upon a time, going to work meant sitting at a desk all day, essentially cut off from the outside world. Today, mobile devices allow business professionals to be constantly connected, and in some cases, they remain connected, even outside of the office.
In terms of infrastructure, mobile devices present a number of concerns. The first is access. Mobile users still need access to the same applications and data as traditional computer users. In some cases, that may mean a company must create application interfaces for multiple mobile platforms (i.e. iOS, Android, and others). Alternatively, they may employ the use of universal web-based interfaces catered to mobile devices. Either way, companies will have to operate on an "always-on" mentality, giving their employees access away from the office at all hours of the day and night.
That concept of remote access presents the second major concern, which is security. It is more difficult and sometimes more expensive to regulate device security when users can bring their own. Therefore, organizations with BYOD policies must implement security strategies that are comprehensive and applicable to a wide variety of platforms and access methods.
4. Flash Storage -- Flash has begun is gradual ascendancy into storage supremacy.The idea of hard disk drives (HDD) with movable parts and speed limited to the number of rotations per minute a system can churn out without overheating may soon be over. Flash has already taken root at the server level, with on-server cache in the form of flash IO cards. This type of caching could also even be implemented on existing storage controllers.
In some cases, organizations have additionally implemented flash storage to replace HDD arrays. Solid state drives (SSD) may eventually replace hard disk drives as the standard form of storage. As it stands, there are still some cost and technical disadvantages, but those barriers to adoption are rapidly eroding.
5. Cloud storage for backup -- Even a few years ago, the idea of backing up data to the cloud may have seemed unattainable and even counterproductive. Today, with hybrid cloud implementations, increased bandwidth, and vendors who offer complete backup storage solutions, cloud backup is a reality.
Another important development in cloud backup is the advent of long-term gradual backup storage, such as Amazon's new Glacier project. These tools are designed for extended archiving of large amounts of data.