01. Chris McCurdy, IBM, Visits #theCUBE!. (00:20)
02. Is Security In The Top Of The Line Conversations. (00:39)
03. Is This A Big Data Problem Meets Networking. (01:54)
04. Do You Feed All Events Into Watson To Get A Predictive Perscriptive Solution. (03:26)
05. How Does Software In Cloud Defined Fit Into The Services You Offer. (04:29)
06. Talk About SAS And Security. (06:010)
07. How Do You Advise Customers On Security For ISV's. (07:57)
08. What Are The Conversations You're Having With Your Customers About Security. (09:12)
09. What Does IBM Say About Malware Getting Smart. (10:32)
10. What Is Your Take On Software Defined. (12:13)
11. What Do You Say To Customers That Have Software Defined Fatigue. (14:17)
12. Is Automation Trustworthy. (15:33)
13. Is Their Social Networking Among Security Companies. (17:59)
Track List created with http://www.vinjavideo.com.
--- ---
Expanding new views on security with network transparency | #NXTWORK
by Nelson Williams | Oct 4, 2016
If data is king, then cybersecurity is the royal guard. In this world of viruses and ransomware, data must be protected or a company can lose its most vital assets in a single attack. This has created an arms race between security researchers and the dark minions of evil across the Internet. New views on design, networking and system management are shifting the game toward built-in security.
To gain some understanding of these new security technologies, John Furrier (@furrier) and Stu Miniman (@stu), cohosts of theCUBE, from the SiliconANGLE Media team, visited the Juniper NXTWORK conference in Santa Clara, CA. There, they sat down with Chris McCurdy, VP of Global Security Services at IBM.
Customer conversations on security
The discussion opened with a look at what customers have been asking for in regards to security. McCurdy related that IBM likes to talk with its clients about security by design. Customers expect their systems to be secure from the start. IBM can’t provide solutions that don’t include security because customers expect it to be there.
McCurdy explained that as a security service provider, IBM is doing network design, deployment and management services. Between those, IBM is also looking at the Cloud, hybrid cloud and private data centers. It’s important to provide a risk framework that’s measured the same way across all these infrastructures, he explained.
Visibility across the Cloud
“The conversation is very much that companies should adopt the Cloud,” McCurdy said. He mentioned that IBM is able to provide Infrastructure as a Service through the Cloud, which gives companies a great opportunity to transform their security structures. Cloud providers, as well, are looking for new ways to include security in their solutions.
McCurdy stressed that a company must look at security from end to end. They must have visibility on events that are happening across the network and in the Cloud. The key is being able to look at different protection strategies and layer those strategies into the system. Identity access management is also a concern. If an attacker with credentials can be cut off at the user level, that’s a great capability for customers, he said.
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper NXTWORK 2016 | Santa Clara. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Juniper NXTWORK 2016 | Santa Clara
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Juniper NXTWORK 2016 | Santa Clara.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper NXTWORK 2016 | Santa Clara. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Juniper NXTWORK 2016 | Santa Clara
Please sign in with LinkedIn to continue to Juniper NXTWORK 2016 | Santa Clara. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Chris McCurdy, IBM | Juniper NXTWORK 2016
01. Chris McCurdy, IBM, Visits #theCUBE!. (00:20)
02. Is Security In The Top Of The Line Conversations. (00:39)
03. Is This A Big Data Problem Meets Networking. (01:54)
04. Do You Feed All Events Into Watson To Get A Predictive Perscriptive Solution. (03:26)
05. How Does Software In Cloud Defined Fit Into The Services You Offer. (04:29)
06. Talk About SAS And Security. (06:010)
07. How Do You Advise Customers On Security For ISV's. (07:57)
08. What Are The Conversations You're Having With Your Customers About Security. (09:12)
09. What Does IBM Say About Malware Getting Smart. (10:32)
10. What Is Your Take On Software Defined. (12:13)
11. What Do You Say To Customers That Have Software Defined Fatigue. (14:17)
12. Is Automation Trustworthy. (15:33)
13. Is Their Social Networking Among Security Companies. (17:59)
Track List created with http://www.vinjavideo.com.
--- ---
Expanding new views on security with network transparency | #NXTWORK
by Nelson Williams | Oct 4, 2016
If data is king, then cybersecurity is the royal guard. In this world of viruses and ransomware, data must be protected or a company can lose its most vital assets in a single attack. This has created an arms race between security researchers and the dark minions of evil across the Internet. New views on design, networking and system management are shifting the game toward built-in security.
To gain some understanding of these new security technologies, John Furrier (@furrier) and Stu Miniman (@stu), cohosts of theCUBE, from the SiliconANGLE Media team, visited the Juniper NXTWORK conference in Santa Clara, CA. There, they sat down with Chris McCurdy, VP of Global Security Services at IBM.
Customer conversations on security
The discussion opened with a look at what customers have been asking for in regards to security. McCurdy related that IBM likes to talk with its clients about security by design. Customers expect their systems to be secure from the start. IBM can’t provide solutions that don’t include security because customers expect it to be there.
McCurdy explained that as a security service provider, IBM is doing network design, deployment and management services. Between those, IBM is also looking at the Cloud, hybrid cloud and private data centers. It’s important to provide a risk framework that’s measured the same way across all these infrastructures, he explained.
Visibility across the Cloud
“The conversation is very much that companies should adopt the Cloud,” McCurdy said. He mentioned that IBM is able to provide Infrastructure as a Service through the Cloud, which gives companies a great opportunity to transform their security structures. Cloud providers, as well, are looking for new ways to include security in their solutions.
McCurdy stressed that a company must look at security from end to end. They must have visibility on events that are happening across the network and in the Cloud. The key is being able to look at different protection strategies and layer those strategies into the system. Identity access management is also a concern. If an attacker with credentials can be cut off at the user level, that’s a great capability for customers, he said.