Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
skathuria

Marrying the Firewall with the Threat Intelligence You Need

by Juniper Employee ‎10-08-2014 02:27 PM - edited ‎10-08-2014 03:45 PM

threatintelligence.pngTo avoid becoming the next victim in the long line of data breach impacted organizations, many have started using a diverse and wide array of threat intelligence sources such as honeypots, social media monitoring, malware reverse engineering approaches, or others, as described by Anton Chuvakin in this blog.

Read more...

skathuria

Security for the Cloud Data Center

by Juniper Employee ‎08-19-2014 05:05 AM - edited ‎08-19-2014 05:07 AM

Image_SecuringCloudDC.png

 

Securing cloud data centers is an ongoing challenge. Your adversaries—cyber criminals, nation state attackers, hacktivists—continue to develop sophisticated, invasive techniques, resulting in a continually evolving threat landscape.

 

Because clouds are dynamic in nature, with new application and services being spun up or taken down and virtual workloads being moved, security for the cloud should be dynamic also. That poses the question, are traditional firewalls that are focused on layer 3 and 4 inspection sufficient in today’s threat environment? Also, next-gen firewalls are powerful, yet not designed to protect from the velocity and variety of new attacks being created every day. In today’s world, shouldn’t firewalls be able to take immediate action based on known or emerging intelligence?

 

With the shift to cloud architectures, traditional firewall administration has become burdensome and fraught with human error due to the sheer complexity of distributed security. What’s needed is an effective network security solution that fights cyber criminals head-on and can adapt to emerging threats without exerting excessive load on the enforcement point.

  1.      Do you know if your infrastructure is under attack at this very moment, and by whom?
  2.      Are you concerned about the performance impact to the cloud if you use advanced security services available from your firewall?
  3.      Are you expanding your network and able to ensure there are no security gaps that can make the network susceptible to exploitation?

What other fears or concerns about securing the cloud data center keep you up at night?

 

Stay tuned to my blog for ideas on how to address these challenges.

Read more...

ngfw pod.jpgIf you’re on the fence about whether to attend this year’s RSA Conference and Expo, we've got five great reasons to help you decide. Here's why we think you should definitely drop by and meet and greet our Juniper staff next week at San Francisco’s Moscone Convention Center, North Exhibit Hall D, Booth #3105 . . . .

Read more...

skathuria

Data Privacy and Convenience: Can We Have Both?

by Juniper Employee ‎01-27-2014 09:00 AM - edited ‎01-27-2014 09:54 AM

As we are nPrivacy_Convenience.pngearing Data Privacy Day, I was keenly amused by and surprised to see the results of a recent Privacy related survey conducted by McCann Truth Central.

 

According to the survey, in which 6,525 people in the USA and five other global regions participated, many perceive social sites like Facebook (54%) and Twitter (41%) a threat to their privacy. By contrast, a majority (nearly 71%) are okay with sharing shopping data with brands online, primarily because they find it useful when companies subsequently suggest things they actually want.

 

As someone who enjoys online shopping, I am okay with vendors suggesting and pointing me to items I might like to purchase based on my purchase history. It’s convenient and prevents me from having to manually search for the same which can be time-consuming.

 

However, both when shopping and using social network sites such as Facebook, I would NOT want any of the sites to expose my personally identifiable information (PII) such as name, financial information, home address, phone numbers, and email addresses. I trust the brands I buy from and expect them to safeguard my data at all times.

Read more...

skathuria

Placing Our Bets on Network Security in 2014

by Juniper Employee ‎01-16-2014 03:01 PM - edited ‎01-25-2014 03:13 PM

                                           Blog_NetworkSecGrowth_Pic.png

As a marketer, it’s reassuring to be able to point to third-party data that reinforces industry trends and customer needs, rather than us, the vendor, “tooting our own horn.” Hence, a recent report on ZDNet.com caught my eye. In it, the author shares that, according to a Forrester Research Survey conducted in 2013 of more than 2,000 security pros:

  • Almost 50% of companies plan to spend more on network security in 2014.
  • About 60% of companies want to buy from one vendor because they have enough best-of-breed applications and want to simplify management and integration.
  • Firewalls and threat intelligence are the most popular security as a service products.
  • Nearly 30% of companies plan to invest in security analytics.

Customers continue to seek out and will invest in security solutions that are intelligent – those that understand and accurately identify threats from “noise” and quickly provide feedback to IT personnel to help remediate threats and thwart attacks. They would like to see integration between products from the same vendor for consistent protection from the device to the data center, regardless of where they are accessing network resources from.

 

Investing Where It Counts

Juniper continues to invest heavily in R&D and bring to market innovative security technologies. We rely on our intelligent engineers who develop cutting-edge solutions that meet our customers’ needs.

 

For example, Juniper’s SRX firewall integrates with WebApp Secure (the industry’s first Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time) and Spotlight Secure (the new cloud-based hacker device intelligence service that will identify individual attacker devices and track them in a global database). With all three products working together, the solution provides both threat intelligence and enforcement, accurately (without false positives) identifying attackers and stopping them at the network perimeter before they can cause any harm.

 

Simple yet Powerful Solutions

With the number of security devices in the network on the rise and the impracticality of managing the security infrastructure manually or with individual product management interfaces, simplified management is critical. Simplified SRX firewall management is made possible through Junos Space Security Director, an application on Junos Space Network Management Platform, which provides extensive security scale, granular policy control, and policy breadth across the network.

 

Furthermore, the newly announced Firefly Perimeter, a virtual firewall based on Juniper’s SRX Services Gateway code delivered in a virtual machine (VM) form factor, enables Service Providers to offer managed firewall security as a service.

 

Finally, Juniper provides Secure Analytics, a market-leading SIEM that consolidates log source event data from thousands of devices, including SRX, WebApp Secure, and DDoS Secure, and helps quickly discover and remediate network attacks. Providing intelligent security, Secure Analytics can help IT personnel discover threats that often are missed by other security solutions.

 

So if you are planning to spend more on security and looking to build a relationship with a market leader who will comprehensively address your security and simplified
management needs, check out Juniper’s security solutions.

Read more...

Early on in my first career (i.e. childhood), I learnt about features. I would pore over the Argos catalogue with a biro - “got! got! want! want! got! - choosing the toys I was going to ask for at Christmas. I had a budget (roughly based on how good I’d been that year) and a deadline (Christmas shopping), and I then had to put forward a business case (Christmas list). I’d embellish this business case with facts about the toys I most wanted. This was made easier by Argos because they’d listed the features from the side of the toy’s box: “With realistic laser canon sounds”, “operating tipper wagons”, “TV AM’s resident rodent superstar” and so on. So, I was glad to discover that choosing and justifying a Juniper SRX is nearly as easy. 

 

Usually if a network device has its features written on the side of the box, you’d only ever want it on your broadband at home. But what if someone made an affordable device which could service your home or small office, runs Junos, has a stateful firewall, switchports and most of the protocols you’ve grown up with, wouldn’t you put that on your Christmas list?  SRX100 - want!”


Read more...

ScottL

The SRX650 Services Gateway takes Best of Interop!

by Juniper Employee ‎05-20-2009 11:13 AM - edited ‎05-29-2009 05:37 PM

Judges give props to the SRX "swiss army knife" that "packs a bunch of horsepower and features...into a single unit" Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.