{"id":5029,"date":"2014-03-19T14:00:11","date_gmt":"2014-03-19T21:00:11","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=5029"},"modified":"2014-03-19T11:00:12","modified_gmt":"2014-03-19T18:00:12","slug":"migrating-from-juniper-to-palo-alto-networks-easy","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2014\/03\/migrating-from-juniper-to-palo-alto-networks-easy\/","title":{"rendered":"Tip of the Week: Migrating from Juniper to Palo Alto Networks Is Easy"},"content":{"rendered":"<p>You can't afford to have a security platform that lacks a clearly-defined future. In a <a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkzMg==\/?utm_source=Social_Media\" target=\"_blank\">one-hour webinar<\/a> <b>Tuesday, March 25<\/b>, we'll show you how easy it is to migrate from Juniper to Palo Alto Networks next-generation security platform.\u00a0<!--more--><\/p>\n<p>Our product experts and consulting services professionals will walk through fundamental differences between the Juniper and Palo Alto Networks approach, including:<\/p>\n<ul>\n<li>Differences between port-based and application-based policies<\/li>\n<li>Tips and tricks for writing next-generation security policies<\/li>\n<li>Available tools for migration<\/li>\n<li>Best practices, examples and customer case studies<\/li>\n<\/ul>\n<p><a href=\"http:\/\/events.paloaltonetworks.com\/dmVyaXRlMTkzMg==\/?utm_source=Social_Media\" target=\"_blank\">Register now<\/a> for \"Migrating from Juniper to Palo Alto Networks,\" taking place Tuesday, March 25, from 9:00 am to 10:00 am Pacific.<\/p>\n<p>While you're at it, check out our <a href=\"https:\/\/www.paloaltonetworks.com\/customers.html\" target=\"_blank\">main Customers page<\/a>, to learn how organizations throughout the world are leaving Juniper, Cisco and others behind and embracing the full potential of a Palo Alto Networks platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can't afford to have a security platform that lacks a clearly-defined future. In a one-hour webinar Tuesday, March 25, we'll show you how easy it is to migrate from Juniper to &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,195],"tags":[367,97],"coauthors":[],"class_list":["post-5029","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-tip-of-the-week","tag-next-generation-security","tag-webinar"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=5029"}],"version-history":[{"count":2,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5029\/revisions"}],"predecessor-version":[{"id":5031,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/5029\/revisions\/5031"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=5029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=5029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=5029"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=5029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}