01. Martin Brown, Independent Technology Group, Visits #theCUBE!. (00:20)
02. Kevin Barker, Independent Technology Group, Visits #theCUBE!. (00:26)
03. How Do You Provide More Capacity For Telco's. (00:49)
04. Tell Us What Your Role Is And What You Do. (01:34)
05. Are There A Couple Of Books That You Wrote. (02:17)
06. Kevin Tell Us What You Do. (03:11)
07. Can You Explain The Juniper Ambassador Program. (04:03)
08. How Do You Talk About Security To Customers. (05:47)
09. Kevin Where Do You See Juniper Winning. (07:30)
10. Martin How Do Certifications Fit Into Your Role. (08:44)
11. Is The Security Piece Important To The Certification Process. (10:12)
12. Martin How Is Juniper Winning. (10:54)
13. Kevin How Are Telco's Using Juniper For Security. (11:52)
14. Give Us A Quick Plug For The Ambassador Program. (14:22)
Track List created with http://www.vinjavideo.com.
--- ---
Hard around the edges: The difficulty of securing multiple network envirionments | #NXTWORK
by R. Danes | Oct 4, 2016
Enterprise data protection is a game with a moving target, nay, targets. Even the model of protecting “the data center and the edge” is looking quaint these days. Which data center? Which edge? As data stores continue growing, splitting and migrating to numerous locations, how is a company supposed to protect it all without an expensive and impractical checkerboard of firewalls?
Kevin Barker, founder of Independent Technology Group, says that times have changed for enterprises and the vendors protecting their valuable data. In bygone years “we said our job was to protect you from the edge to the end point. And the reality is there is no longer an edge,” he told John Furrier (@furrier) and Stu Miniman (@stu), cohosts of theCUBE, from the SiliconANGLE Media team during the Juniper NXTWORK 2016 event.
“The network now spans from your phone to your house to your desktop to your laptop to the data center and everything in between,” Barker said.
Gentrifying virtual sprawl
Barker said he works with customers on a brand agnostic basis, but he does have an ambassador relationship with Juniper and says they are attacking this sprawl more efficiently than many competitors.
“We’re moving to a virtualized environment, so Software as a Service is becoming more and more important — delivering network function virtualization. And Juniper is showing a leadership role, not only in virtualizing their software,” he said, “but also with tools like Juniper Contrail that provide the underpinnings for people to build these overlay networks.”
Meta version
Martin Brown, who works with a tier one service provider, also took part in the interview. He is no stranger to the new security risks. One thing he appreciates about Juniper is its strict certification standards for partners, which add a meta-layer of security in his view.
“If you’re implementing a change, you want to make sure that you’re doing it correctly — you’ve not suddenly left a gaping hole in your network that an attacker can come in and start taking control,” he said.
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper NXTWORK 2016 | Santa Clara. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Juniper NXTWORK 2016 | Santa Clara
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Juniper NXTWORK 2016 | Santa Clara.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Juniper NXTWORK 2016 | Santa Clara. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Juniper NXTWORK 2016 | Santa Clara
Please sign in with LinkedIn to continue to Juniper NXTWORK 2016 | Santa Clara. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Martin Brown & Kevin Barker, Independent Technology Group | Juniper NXTWORK 2016
01. Martin Brown, Independent Technology Group, Visits #theCUBE!. (00:20)
02. Kevin Barker, Independent Technology Group, Visits #theCUBE!. (00:26)
03. How Do You Provide More Capacity For Telco's. (00:49)
04. Tell Us What Your Role Is And What You Do. (01:34)
05. Are There A Couple Of Books That You Wrote. (02:17)
06. Kevin Tell Us What You Do. (03:11)
07. Can You Explain The Juniper Ambassador Program. (04:03)
08. How Do You Talk About Security To Customers. (05:47)
09. Kevin Where Do You See Juniper Winning. (07:30)
10. Martin How Do Certifications Fit Into Your Role. (08:44)
11. Is The Security Piece Important To The Certification Process. (10:12)
12. Martin How Is Juniper Winning. (10:54)
13. Kevin How Are Telco's Using Juniper For Security. (11:52)
14. Give Us A Quick Plug For The Ambassador Program. (14:22)
Track List created with http://www.vinjavideo.com.
--- ---
Hard around the edges: The difficulty of securing multiple network envirionments | #NXTWORK
by R. Danes | Oct 4, 2016
Enterprise data protection is a game with a moving target, nay, targets. Even the model of protecting “the data center and the edge” is looking quaint these days. Which data center? Which edge? As data stores continue growing, splitting and migrating to numerous locations, how is a company supposed to protect it all without an expensive and impractical checkerboard of firewalls?
Kevin Barker, founder of Independent Technology Group, says that times have changed for enterprises and the vendors protecting their valuable data. In bygone years “we said our job was to protect you from the edge to the end point. And the reality is there is no longer an edge,” he told John Furrier (@furrier) and Stu Miniman (@stu), cohosts of theCUBE, from the SiliconANGLE Media team during the Juniper NXTWORK 2016 event.
“The network now spans from your phone to your house to your desktop to your laptop to the data center and everything in between,” Barker said.
Gentrifying virtual sprawl
Barker said he works with customers on a brand agnostic basis, but he does have an ambassador relationship with Juniper and says they are attacking this sprawl more efficiently than many competitors.
“We’re moving to a virtualized environment, so Software as a Service is becoming more and more important — delivering network function virtualization. And Juniper is showing a leadership role, not only in virtualizing their software,” he said, “but also with tools like Juniper Contrail that provide the underpinnings for people to build these overlay networks.”
Meta version
Martin Brown, who works with a tier one service provider, also took part in the interview. He is no stranger to the new security risks. One thing he appreciates about Juniper is its strict certification standards for partners, which add a meta-layer of security in his view.
“If you’re implementing a change, you want to make sure that you’re doing it correctly — you’ve not suddenly left a gaping hole in your network that an attacker can come in and start taking control,” he said.