Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
KyleAdams

7 Smart Ways to Ensure Data Privacy

by Juniper Employee ‎01-28-2015 03:11 PM - edited ‎01-28-2015 03:22 PM

Today, user privacy is a huge concern. Check out the seven ways to protect yourself and your identity while connected to the network. 

Read more...

NIST says that random number generators in many current FIPS certifications will be disallowed at the end of 2015.  So what is the impact on Juniper Networks products?

Read more...

KyleAdams

Seven Security Predictions for 2015

by Juniper Employee ‎01-05-2015 12:38 PM - edited ‎01-07-2015 03:00 PM

2015 Security Predictions2015 will be an interesting year for security. As companies work to secure their systems and users, adopting new technologies like mobile payments, two factor authentication, and advanced machine learning solutions, the bar of experience and skill required to breach these environments will increase dramatically.

Read more...

When we officially launched Firefly Perimeter in January 2014, it came with a stateful firewall in a virtual machine format supporting both VMware and KVM, along with NAT, IPSec VPN, and advanced routing features. Now with the latest 12.1X47-D15 release, Firefly Perimeter customers can take advantage of advanced security features such as IPS (Intrusion Prevention Systems) and UTM (Unified Threat Management) and deploy them in the virtualized datacenter and cloud infrastructure. 

 

UTM and IPS are used to identify malicious activity between security zones. When a threat is found, we first attempt to block/stop it then we log this activity for reporting. At a high level, IPS works by scrutinizing all of the bits contained within packets to look for known attacks. Juniper provided downloadable predefined application signatures that detect TCP and UDP applications running on nonstandard ports. The Firefly Perimeter IPS module monitors passing through network traffic, detects suspicious and anomalous traffic based on specific IPS rules, then selectively enforces various attack detection and prevention techniques.

 

On the other hand, UTM is an industry term that was coined to define Layer 7 protection against client-side threats. It utilizes technologies such as network-based antivirus protection, URL filtering, anti-spam solutions, and content filtering. While IPS is primarily focused on network-based attacks on protocols and is stream based (it processes traffic inline without modifying it as a stream), UTM is meant to protect against malicious files (malware) and URL’s as well as enforce local policies for Internet usage.

 

Both IPS and UTM (Sophos Anti Virus, Sophos Anti-Spam, WebSense Enhanced Web Filtering) licenses are based on an annual subscription model, available in one-, three-, or five-year increments. The licenses can be purchased a la carte, or bundled, depending on customer’s specific needs. UTM Content Filtering and basic URL Filtering features are free and require no additional license.

 

Please visit the listed links for more technical details on IPS features as well as UTM features. If you cannot wait to see how these advanced security features and Firefly Perimeter works in general, you can start evaluating today by downloading the latest Firefly Perimeter 12.1X47-D15 release image here (no license required for evaluation). Installation and configuration instructions are also available from the same link.

atyagi

December 2014 Microsoft Patch Tuesday Summary

by Juniper Employee ‎12-09-2014 04:35 PM - edited ‎12-09-2014 11:10 PM

It’s Microsoft Patch Tuesday! In the December edition there are 7 updates; three are marked "Critical" and four are rated "Important". A total of 25 vulnerabilities were fixed over 7 bulletins this month. One of the Critical update MS14-080 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 14 CVE's (Common Vulnerability and Exposure).

 

Here is a list of Security bulletins which were rolled out in today's Patch Tuesday release.

Read more...

SRX5k New Hardware Release (SCBE & RE-1800) boosts performance per slot to 120G with latest 12.1X47-D15 software release

Read more...

If there’s one truth about the cybercrime dynamic, it is this: by their very nature, the adversary is always ahead of defender.
 
The adversaries are fast, smart, and they develop new techniques every day to steal, manipulate, or wreak havoc on our lives, businesses, and the economy at large.
 
When trying to defend your network, time has not been on your side. The time it takes between identifying a threat (such as malware, a malicious IP, or a new vulnerability) and putting the right defense in place to mitigate that threat is still much, much too long.
 
That’s why Juniper created its Spotlight Secure Threat Intelligence Platform. It’s designed to do just one thing: Take threat intelligence from any source, and immediately allow all SRX firewalls to stop that threat before it take action on network. In the past, this could take weeks or months. With Juniper’s Spotlight Secure, it takes just minutes.
 
Take a look at Spotlight Secure overview, and find out how a threat intelligence platform for SRX can keep your network more secure than ever before. Or check out more information on the Juniper.net Spotlight Secure page.

There are many ways in which Juniper can help secure your environment, but there are two innovations that we believe are particularly relevant to the flexible, agile IT environments that we know you are building. The first is our strategy of building firewalls that help you to manage security in virtualised cloud environments, and the second is our commitment to an open platform for enforcement of threat intelligence.

Read more...

Microsoft released an out-of-band update, MS14-068, yesterday to patch a critical bug in its Kerberos implementation. This bug could allow a remote, unprivileged, authenticated attacker to elevate their privileges to that of any other domain user. Such an attack could also enable the attacker to obtain domain administrator privileges and completely compromise the security restrictions enforced on the targeted domain.

Read more...

prashantk

November 2014 Microsoft Patch Tuesday Summary

by Juniper Employee ‎11-11-2014 09:22 PM - edited ‎11-11-2014 09:27 PM

Welcome to the November edition of Microsoft Patch Tuesday Summary. In this edition there are 14 updates; four are marked "Critical", eight are rated "Important" and two are rated "Moderate”. A total of 33 CVE's (Common Vulnerability and Exposure) were fixed over 14 bulletins this month. One of the Critical update MS14-064 addresses Sandworm related attack CVE-2014-6352 which was seen being exploited in the wild.

 

Here is a list of Security bulletins which were rolled out in today's Patch Tuesday release.

 

 

Read more...

Cowritten by Mark Belk, National Government Chief Architect and Rebecca Lawson, Senior Director Security

   

SecIntel_Imprative_GIS

 

The pace of change seen in the adoption of new methods and technology deployed by nefarious characters in cyberspace continues to place new demands on government information systems. There are multiple persistent cybersecurity threats targeting governments, critical infrastructure, economic institutions and commercial property. The government has recognized these threats. In fact, the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) program increases network defense through the modernization of information system infrastructure.

Read more...

Blog image II.jpgThe war between law enforcement and cyber crime has evolved dramatically in the past decade. Law enforcement tries to find new ways to track down criminals, while criminals try to find new ways to evade law enforcement.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.