Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Displaying articles for: 04-29-2012 - 05-05-2012

The recent trend toward IT “consumerization” has flooded corporate IT with a host of new apps and personal devices, forcing businesses to re-think their network access strategies.  While these apps and devices raise valid concerns about security, compliance and management complexity, do they actually put your business at risk?

 

The solution is a “unified policy”—a holistic approach to coordinated security for enterprise network access, regardless of who owns a given device. 

Read more...

Does VDI save money? Does it save time? Is it cheaper than regular desktops? Is it less secure? Is it more secure? The debate has been going for some time as to whether VDI is worth the investment—in terms of money and risk. Perhaps the best question to start with is: Why are you considering VDI? Why do you really want to use it?

 

For now, yes, there’s still some uncertainty around the ROI of VDI. Or, at minimum, it is less apparent than that of server virtualization. Same goes for security. Kinda. A VDI environment is not automatically more secure, but it is possible to make it more secure. And so if the ability to augment security and facilitate regulatory compliance is your biggest motivator toward adopting VDI, you may very well find it well worth the investment on that benefit alone. The key is finding the right solution for managing laptop security. It’s got to be comprehensive, high quality, high performing, and hypervisor-based so you can be best prepared to avoid any risks associated with synchronizing laptop contents inside the heart of your data center where so much sensitive data resides.

 

You’ll need a solution that gives you complete visibility into your virtual desktop environment so you can see what your users are installing. You’ll need a solution that enforces a gold image so that configuration standards are upheld and that any deviation triggers an alert or quarantine. You’ll need virtualization-specific antivirus protection that helps to prevent, detect, and remove malware, but does not compromise performance because, let’s face it, VDI users are expecting an experience that exceeds that of traditional PCs. They want fast. They want flexible. They want secure.

 

Read more about how Juniper Networks vGW Virtual Gateway delivers on these needs by enabling high quality, high performing security for VDI.

There has been a surge in smart phone adoption and Internet usage through mobile devices, according to recently released figures by Nielsen and IDC, both global providers of market intelligence.

 

According to Nielsen, as of February 2012, “Almost half (49.7%) of U.S. mobile subscribers now own smart phones…an increase of 38 percent over last year”, and according to IDC ,“By 2015, more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices”.

 

Many smart phone owners use these devices not just to make phones calls and/or exchange SMS messages, but also to check email, surf the Web and download and use mobile apps for information gathering, social media (e.g., Facebook) and entertainment (e.g., YouTube, playing games, etc.). Subscribers expect that when using their mobile devices, they will be able to exchange information relatively quickly and easily, play games, as well as download/upload files with a reasonable quality of service. However, what they might not realize is the mobile operator who is enabling mobile data services has made infrastructure and personnel investments for assuring subscribers an expected level of service quality as well as protecting subscribers from threats introduced to the mobile network.

 

In a mobile network, one of the vulnerable points is the Gi (for 3G network) or SGi (for 4G network) interface, which is the public data network/Internet facing interface that allows subscribers to use Internet-dependent features of their device (with an activated data plan or wireless service in place). This interface is subject to the same types of Internet borne threats seen in terrestrial networks and could result in loss of service to the wireless data subscriber. In order to extend a positive customer experience with high quality of service and to minimize customer churn, mobile operators should and do protect this interface. To learn about the key threats to the Gi/SGi interface and how Juniper Networks SRX security solutions can help mitigate these threats, read the White Paper.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Paul Bristow
Senior Director
Product Management

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Henrik Davidsson
Director
Security Sales

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Steve Hanna
Distinguished Engineer

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.