Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Displaying articles for: 09-30-2012 - 10-06-2012

ktom

Say Cheese, Your Smartphone is Spying on You

by Juniper Employee ‎10-04-2012 12:28 PM - edited ‎10-05-2012 02:03 PM

Picture this, a world where hackers can use smartphone cameras to take 2D pictures for the purpose of creating a 3D model of the phone’s surroundings.  Now imagine if the hacker can look into that detailed 3D space for the purpose of stealing confidential information. This smartphone technology, in the wrong hands, can spell big trouble.  It’s already here.

Read more...

JUNOSRob

My Junos: Making the SRX a more familiar environment

by Juniper Employee ‎10-03-2012 11:00 AM - edited ‎10-03-2012 09:53 AM

We just passed the four-year anniversary for the launch of the SRX product line. During this time we have seen amazing adoption for this Junos-based security platform. Through this journey we still have many people that love the little things from ScreenOS. When you’re operating a network on a day-to-day basis the familiar output from a command or the process of how you would troubleshoot something is critical to your workflow. 

Read more...

The big bad wolf is out there. If you show a door then he will come and try to blow your house in. While this is from the fairy tale “Three Little Pigs” the idea applies to the condition of today’s Internet. If you have a service that offers access to any data resources then people will always try to break into it. While this is something that seems like common sense it’s a burden that plagues many organizations both large and small. If you have an application of interest then odds are someone is going to be knocking on that door. 

Read more...

skathuria

Blog series - Part 3: Multi-tenant Segmentation in the Cloud

by Juniper Employee ‎10-01-2012 12:22 PM - edited ‎10-01-2012 03:02 PM

                                Multi-tenant_cloud.png

 

In Blog 1 of this 3-part series, I covered some key drivers for why service providers (SPs) offer Security Software as a Service (SaaS) including to be able to extend security for tenants of the cloud and to monetize these services.  In Blog2,  I described where and how SPs place security controls.

 

In the final blog, I’ll focus on the importance of isolating customer data in the public cloud, as well as potential solutions for doing so.

 

In a public cloud, multiple tenants share a common set of resources (e.g., data-driven applications and services) that they access over a network. From a security perspective, the first requirement is that the entry point into the cloud must be protected using a Policy Enforcement Point (PEP), such as a perimeter/edge firewall for infrastructure protection. This may be a dedicated/purpose-built hardware device. A second requirement is that policies for different tenants should not overlap. For instance, a change in a security policy for one tenant shouldn’t affect another tenant. It is critical that these tenants’ policies are isolated from one another. To achieve the latter multi-tenant segmentation requirement, SPs have a choice of methods:

 

1)      Virtual LANs (VLANs) - While many cloud deployments are using L2 networks, since they offer VLANs for multi-tenant isolation, the shortcoming of L2 networks is that VLANs have an upper limit of ~4096 (according to IEEE Std 802.1Q 2011), which many large deployments exceed. Also, beyond the scaling limitation, VLANs can be unruly to manage in a hosted/cloud environment.

 

2)      Dedicated hardware firewall platform that supports multiple “logical” systems (independent firewalls with completely separate security policies and logs) - As with VLANs, there is a scaling limitation with this approach.

 

3)      Software-based security virtual machine (VM) running on an x86-based VM host – A key advantage of this method over the other two is that the SP can scale security VMs on demand. Furthermore, the SP can also easily offer customizable firewall controls to customers as an additional managed service, providing new potential revenue sources built on existing infrastructure. 

 

Software-based security VMs could offer SPs a scalable and flexible method for implementing multi-tenant segmentation, a key requirement for securing customers’ resources hosted in the public cloud.

Read more...

jkonstantas

Edge, Say Hello to Security At Scale

by Juniper Employee ‎09-30-2012 08:03 AM - edited ‎10-02-2012 12:17 PM

Today Juniper announced a new suite of network solutions for service providers, allowing them to deliver and expand new services to their customers and better monetize their existing network infrastructure investment. From a security perspective we are introducing JunosV Firefly, an exciting software security solution which gives Service Providers who’ve made an investment in virtualization, the option to offer comprehensive security solutions as virtual machines (VMs).

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Paul Bristow
Senior Director
Product Management

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Henrik Davidsson
Director
Security Sales

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Steve Hanna
Distinguished Engineer

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.