Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT
Showing results for 
Search instead for 
Do you mean 

Bo Diddley and the LTE Security Debate – Who Do You Trust?

by Juniper Employee ‎10-31-2013 04:03 AM - edited ‎10-31-2013 05:46 AM

LTE offers mobile operators a chance to fight back against the “cost-per-bit” culture that has come to dominate a market with falling ARPU. But Patrick Donegan, writing in a paper by Heavy Reading, feels there will be a close correlation between financial performance and the adoption of end-to-end IP Security. Why then, do many operators find it an acceptable risk not to adopt end-to-end IPSec?

Read more...

Paul Gainham (Senior Director of Service Provider Marketing, EMEA) examines some of the challenges facing mobile network operators as they seek to scale their networks with All IP technologies.

 

In a short video (less than 20 minutes) Paul identifies how LTE networks can address the sometimes conflicting issues of IP Security, resiliency and session scale. The video can be viewed directly from the link in the blog.  

Read more...

The Security Vulnerabilities of LTE: Opportunity and Risks for Operators

by Juniper Employee ‎10-29-2013 03:05 AM - edited ‎11-19-2013 06:19 AM

By 2016 over half the forecast 2,500,000 LTE cell sites will be without IPSecurity says a new white paper by Heavy Reading. 

 

You can download the white paper for free right here. The paper is titled The Security Vulnerabilities of LTE: Opportunity and Risks for Operators and is written by Heavy Reading's Patrick Donegan.

Read more...

The Danger Of Assumptions

by Juniper Employee ‎09-24-2013 03:08 AM - edited ‎09-24-2013 09:56 AM

The recent security attacks on 2 UK banks where criminals were able to pose at IT technicians and literally walk into the banks and install Keyboard and Video monitoring equipment reminds us that the security threat faced by organisations can often be as physical as it is virtual.

 

Clearly in both cases, bank staff assumed they were legitimate technicians and gave them full access to the desktop PC’s allowing the criminals to install equipment that allowed them to remotely access and transfer account funds.

 

The lesson to be learned from this is that the only assumption that should ever be made in security planning and thinking is to assume everything is un-trusted unless proven otherwise.

Read more...

About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Announcements
Juniper Networks Technical Books
Labels