Enterprises have undergone a substantial change over the last decade. At one time headquarters were a central point for the business. But today, in order to remain competitive, the enterprise has to be located close to where business is conducted. These globally distributed enterprises often consist of a campus or headquarters, branch locations, satellite offices, regional offices, home-office workers and road warriors.
This paradigm shift in how businesses are housed has resulted in significant challenges - one of which is the ability to maintain the network and end-point security of the enterprise. Attacks on enterprises have become more sophisticated, are being launched by a wider set of cyber-criminals and often target the weakest link in the organization, which has increasingly become branch and satellite locations. These highly sophisticated attacks are successful because they fall "between the cracks" of point security products.
Many security products on the market deliver security with varying degrees of success. In winning individual security battles, however, we may be losing the war.
In order to close the security gap organizations must consider a solution-based approach that leverages adaptive threat management technologies. All devices and sites must cooperate in rooting out sophisticated polymorphic attacks that may attack multiple locations at the same time or attacks that are sophisticated and fly below the radar of point security products.
To meet this need, Juniper recently introduced the industry's only open solution set to deliver intelligent security and performance across all enterprise locations - Juniper Networks Adaptive Threat Management Solutions. These solutions, which will empower customers to reduce risks threatening their distributed enterprise, include our WX client for application acceleration, a new release of UAC, IPS technology, new market-leading SA Series SSL VPN and new releases of Security Threat Response Manager and Network and Security Manager. More information about Adaptive Threat Management Solutions can be found in our announcement here.
To win the war on security threats, security solutions cannot be delivered in a vacuum. Part of cooperative security includes application acceleration to ensure "business as usual" even while under attack. This can only be accomplished with a security solution which utilizes identity aware and application aware services to ensure flawless and secure application delivery that enables the employee, subcontractor, partner or customer to get the applications they need to do their job and complete their tasks. Doing so empowers the enterprise to chase business which contributes to the bottom line rather than chasing security threats.
Like to know more? Leave a comment or feel free to email me.
Discussing a wide range of topics impacting enterprises and data center security.