Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Blog image II.jpgThe war between law enforcement and cyber crime has evolved dramatically in the past decade. Law enforcement tries to find new ways to track down criminals, while criminals try to find new ways to evade law enforcement.

Read more...

As a Chief Information Security Officer, I get a lot of questions about the cyber security threats and what worries me most. I field questions about Anonymous, geo-political hackers, cyber-extortionists, malware, and the like.

Read more...

It’s Microsoft Patch Tuesday! In the October edition there are 8 updates; three are marked "Critical" and five are rated "Important". A total of 24 vulnerabilities were fixed over 8 bulletins this month. One of the Critical update MS14-056 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 14 CVE's (Common Vulnerability and Exposure).

Read more...

KyleAdams

Safeguarding cloud security before it’s too late

by Juniper Employee ‎10-14-2014 12:34 PM - edited ‎10-15-2014 11:09 AM

vault.pngEarlier this month, many of the world’s biggest cloud-service providers quietly cooperated to update the open-source Xen hypervisor software. What wasn’t publicly revealed until after the update was safely completed, however, was that it actually was a carefully coordinated operation intended to head off a major security breach, as identified in the Xen patch advisory.

Read more...

The moment personal photos of Jennifer Lawrence, Kim Kardashian and other celebrities were leaked from iCloud it became global breaking news and suddenly everyone had questions and opinions about cloud security.

Read more...

NCSAM2014.png

Serious concerns have emerged in the past several years about the integrity and trustworthiness of IT products and the ability of an adversary to compromise or insert vulnerabilities into IT products through infiltration of the supply chain. In particular, federal and critical IT customers have expressed concerns about adversaries intercepting products while in transit and reselling or hacking them. 

Read more...

skathuria

Marrying the Firewall with the Threat Intelligence You Need

by Juniper Employee ‎10-08-2014 02:27 PM - edited ‎10-08-2014 03:45 PM

threatintelligence.pngTo avoid becoming the next victim in the long line of data breach impacted organizations, many have started using a diverse and wide array of threat intelligence sources such as honeypots, social media monitoring, malware reverse engineering approaches, or others, as described by Anton Chuvakin in this blog.

Read more...

The age of Internet of Things (IoT) is upon us, which enables greater connectivity that goes well beyond the common use of smartphones, tablets, and PCs.

Read more...

The move to the cloud has seen a rise in the complexity and number of cyber attacks. To help deal with this problem, Juniper Networks SRX firewall series has become far more powerful. An Adaptive Intelligent Firewall with features that goes beyond the capabilities of todays much touted Next Generation Firewall (NGFW).

Read more...

Christofer Hoff

Focus.

by Juniper Employee on ‎10-02-2014 06:30 AM

In today's ever-changing IT security landscape, focused execution is critical.

Read more...

Bob Dix

Four Ways to Stay Safe Online

by Juniper Employee ‎10-01-2014 01:06 PM - edited ‎10-02-2014 02:28 PM

staystafeonline.pngDon't get spooked by cyber threats...October might be more commonly known for football, Halloween and kids trick-or-treating, but in the U.S. it is also National Cyber Security Awareness Month

 

Read more...

Mora Gozani

Black Hat Amsterdam 2014

by Juniper Employee ‎09-30-2014 11:47 AM - edited ‎10-01-2014 07:04 AM

blackhat.pngLooking for an excuse to visit the charming city of Amsterdam? Then look no further - your excuse is Black Hat Europe 2014.

 

Read more...

The Department of Defense (DoD) Unified Capabilities Approved Product List (UC APL) may be the most challenging certification in networking. 

Read more...

banksek

Juniper Firefly Perimeter 12.1x47 D10.2 Release

by Juniper Employee ‎09-23-2014 02:28 PM - edited ‎09-23-2014 02:31 PM

Several weeks ago, Juniper Networks officially released an updated version of Firefly Perimeter. The version is 12.1x47 D10.2. We provided a lot of new and amazing updates in to the product. I wanted to take this opportunity to provide you with an understanding of what is currently available in this code. 

lightning-bugs.jpg

 

  • Unified Threat Management ( UTM ) ( VMware and KVM ) 
  • Intrusion Prevention System ( IPS ) ( VMware and KVM ) 
  • vSphere 5.5 support ( VMware ) 
  • Transparent Mode ( VMware and KVM ) 
  • Transparent Mode Chassis Cluster Support  ( VMware and KVM ) 
  • Chassis Cluster Support for VirtIO driver ( KVM only )
  • Deterministic NAT ( VMware and KVM ) 
  • Port Block Allocation ( PBA ) NAT ( VMware and KVM ) 
A lot of these new features are self explanatory but I think that UTM needs some extra special explaining.
 
UTM is an industry term identifying a traditional firewall with security functions.
In the Firefly Perimeter realm UTM means
 
  • Web Filtering ( included Enhanced Web Filter )
  • Anti-virus
  • Anti-spam
  • Content Filtering
Anti-virus helps you with blocking malware, trojans, and viruses.
Anti-spam helps you with… wait for it… spam. That is right, the anti-spam feature in UTM, blocks spam.
Content filtering blocks or permits traffic based on MIME type, file extension, protocol command, and embedded object type. For instance, content filtering would block files that end in .exe or zip files. 
Web filtering and enhanced web filtering allow to block or permit access to particular websites. For instance, if you wanted to block access to Facebook, you could use this capability ( past experience has proven that this does not make for happy employees but I think you get the idea ).
 
Now I have just given you a snippet of what these enhanced security features are capable of but I think it is important to understand what this means for you and your virtual environment. You now have the capability of implementing these security features in a virtual machine that is already capable of firewall protection, NAT, VPN, etc. and you still manage this from a single interface ( Junos Space ). Having the ability to manage everything in one virtual machine saves frustration, saves you time, improves your security capabilities through easier management. It is all around an amazing opportunity in your hand. 
 
If you are interested in evaluating Firefly Perimeter 12.1x47, feel free to download here
If you are interested in Firefly Perimeter documentation, click here

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.