Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Displaying articles for: 09-16-2012 - 09-22-2012

Ashwin

Is it really you out there ?

by Juniper Employee on ‎09-19-2012 03:09 PM

How can you be sure of the identity of the person at the other end of the wire ? Trust no one but still get business done is the mantra of the day !

Read more...

skathuria

Blog series - Part 2: The Where and How of Security SaaS

by Juniper Employee ‎09-18-2012 10:26 PM - edited ‎09-19-2012 10:25 AM

                                                                          

Blog 1 of this 3-part series covered some of the key drivers for why Security SaaS.

 

Today, I’ll focus on where and how service providers (SPs) place security controls so they can best leverage existing investments as well as easily scale and extend value-added services to customers via the cloud.

 

SPs typically store their customers’ data in a shared public cloud environment, specifically data centers spanning multiple locations for faster availability and data recovery. Because this data is often business critical, customers are understandably concerned about security and privacy. Wouldn’t it be ideal if they could get both security and storage services from the same cloud environment?

 

That’s where a cloud-based security SaaS solution comes in. Rather than deploying hardware-based security on their own premise, customers can benefit from a managed hosting cloud provider that offers a software-based security approach that’s more flexible, scalable, and easier to maintain and upgrade as new features and advanced threat protections become available. And one better would be an SP that offers a purpose-built security solution, meaning it’s been specifically designed to protect virtualized data centers and clouds.

 

How might this work? At minimum, the SP must ensure isolation of each customer’s data and associated security policies so that traffic does not get intermingled. From a deployment perspective, the SP could configure, say, one “security VM” instance per customer that is associated with that customer’s cloud-hosted data. From an administrative standpoint, the SP can either manage security policies for customers via a central management console or provide controlled access (e.g., through a customized Web portal) so customers can configure and manage their own policies, based on their unique business requirements. Either way, SPs and their customers alike can benefit from the cost-effective, highly scalable Security SaaS model. 

 

To learn more, stay tuned for part 3, where I’ll talk more about the importance of isolating customer data in the public cloud, as well as potential solutions for doing so.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.