Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
HenrikDavid

CoIT: balancing risk and reward

by Juniper Employee ‎12-17-2013 04:22 AM - edited ‎12-17-2013 09:50 AM

risk and reward.jpgIn Juniper’s Consumerisation Study 2013, three out of four companies consider that when users pull data into consumer apps, it’s a security threat. The same proportion was concerned about data control.

 

It’s understandable to be concerned, even wise. But there’s a difference between taking the appropriate action and locking security down. My concern when I saw the survey results is that to be competitive, organisations considered that they should be more data risk averse (73 per cent skewed to “data control”, rather than “data agile”) and an even bigger proportion (80 per cent) skewed to “control” as the way to exploit the benefits of Consumerisation of IT (CoIT).

Read more...

HenrikDavid

Build-in or Bolt-on? - What kit cars and networks have in common

by Juniper Employee ‎11-05-2013 05:47 AM - edited ‎11-05-2013 12:57 PM

model car.jpgSome people love kit cars. They get a real thrill from buying the bodywork and chassis in the colour they want. They seek out the right engine and transmission and spend hours cleaning and rebuilding them.

 

They carefully research and select all the other components they need – the brakes, wheels, lights, seats and other interior items. Hours and hours are spent lovingly integrating and assembling them. When the project is finished they have the perfect car for them. And they get a great sense of achievement from doing it.

Read more...

I as in Boston a couple of weeks ago with my family. As we got into a taxi to go to the restaurant for dinner, I found an iPhone on the seat, and gave it to the driver. Turns out the taxi driver had just dropped a friend off at the airport for a flight, and his buddy left his iPhone in the cab. The driver wanted to get in touch with his friend’s girlfriend, in case his friend called her from the airport worried about where his iPhone may have ended up. But, his friend’s iPhone was locked. The cabbie complained about the iPhone being locked, and wondered aloud why anyone would need a password on their mobile phone.

 

It was the wrong question to ask with me in the cab. I started listing for him all the reasons why anyone – better yet, EVERYone – should have a passcode set on their mobile device.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.