Recent focus in cybersecurity has been how to remain ahead of advanced attacks. Whilst this is important, 2016 proved that many organisations had missed fundamental security controls with ransomware seeping through email gateways, weak passwords in
OpenStack Summit is coming to Boston in May 2017 and we at Juniper Networks are excited and proud to be a co-sponsor for the event. If you are planning to attend the event we will be located in the expo hall at booth # A1. We are also participating in the Open Source Days at the Summit where we will be featuring use cases, product features, and progress related to OpenContrail.
Lots of people today are taking advantage of services such as Uber and Lyft. Instead of owning or renting a car, users can request one quickly in almost any location, and be driven directly to their destination. Today, it’s all about getting CapEX costs down and only paying for what you need. Cloud providers, like AWS, offer a similar experience, providing infrastructure to their customers with metered billing option
The network fabric is an integral element of the NFV Infrastructure (NFVI), as defined by the ETSI architectural framework for building NFV clouds. In my previous blog in this series, I mentioned that the arc
Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. The general excitement around IoT has led to market consumerisation faster than security standards have kept pace.
In this blog we will discuss growth in IoT, and the risk of not considering security during design,
The march towards Network Functions Virtualization (NFV) is well underway, with a majority of service providers in some stage of evaluating or deploying virtualized network functions which were traditionally delivered with dedicated hardware appliances. The full potential for NFV will take many years to materialize, but service providers have ce
Networks have changed significantly over the past decade. Businesses are moving to the cloud and adopting new technologies such as Internet of Things (IoT) and block chain, all of which are heavily network-dependent.
These same enterprises are also spending more on security to protect new and existing infrastructure. Unfortunately, breaches continue unabated. Internal records and customer data are being stole