To avoid becoming the next victim in the long line of data breach impacted organizations, many have started using a diverse and wide array of threat intelligence sources such as honeypots, social media monitoring, malware reverse engineering approaches, or others, as described by Anton Chuvakin in this blog.Read more...
Securing cloud data centers is an ongoing challenge. Your adversaries—cyber criminals, nation state attackers, hacktivists—continue to develop sophisticated, invasive techniques, resulting in a continually evolving threat landscape.
Because clouds are dynamic in nature, with new application and services being spun up or taken down and virtual workloads being moved, security for the cloud should be dynamic also. That poses the question, are traditional firewalls that are focused on layer 3 and 4 inspection sufficient in today’s threat environment? Also, next-gen firewalls are powerful, yet not designed to protect from the velocity and variety of new attacks being created every day. In today’s world, shouldn’t firewalls be able to take immediate action based on known or emerging intelligence?
With the shift to cloud architectures, traditional firewall administration has become burdensome and fraught with human error due to the sheer complexity of distributed security. What’s needed is an effective network security solution that fights cyber criminals head-on and can adapt to emerging threats without exerting excessive load on the enforcement point.
What other fears or concerns about securing the cloud data center keep you up at night?
Stay tuned to my blog for ideas on how to address these challenges.Read more...
If you’re on the fence about whether to attend this year’s RSA Conference and Expo, we've got five great reasons to help you decide. Here's why we think you should definitely drop by and meet and greet our Juniper staff next week at San Francisco’s Moscone Convention Center, North Exhibit Hall D, Booth #3105 . . . .Read more...
According to the survey, in which 6,525 people in the USA and five other global regions participated, many perceive social sites like Facebook (54%) and Twitter (41%) a threat to their privacy. By contrast, a majority (nearly 71%) are okay with sharing shopping data with brands online, primarily because they find it useful when companies subsequently suggest things they actually want.
As someone who enjoys online shopping, I am okay with vendors suggesting and pointing me to items I might like to purchase based on my purchase history. It’s convenient and prevents me from having to manually search for the same which can be time-consuming.
However, both when shopping and using social network sites such as Facebook, I would NOT want any of the sites to expose my personally identifiable information (PII) such as name, financial information, home address, phone numbers, and email addresses. I trust the brands I buy from and expect them to safeguard my data at all times.Read more...
As a marketer, it’s reassuring to be able to point to third-party data that reinforces industry trends and customer needs, rather than us, the vendor, “tooting our own horn.” Hence, a recent report on ZDNet.com caught my eye. In it, the author shares that, according to a Forrester Research Survey conducted in 2013 of more than 2,000 security pros:
Customers continue to seek out and will invest in security solutions that are intelligent – those that understand and accurately identify threats from “noise” and quickly provide feedback to IT personnel to help remediate threats and thwart attacks. They would like to see integration between products from the same vendor for consistent protection from the device to the data center, regardless of where they are accessing network resources from.
Investing Where It Counts
Juniper continues to invest heavily in R&D and bring to market innovative security technologies. We rely on our intelligent engineers who develop cutting-edge solutions that meet our customers’ needs.
For example, Juniper’s SRX firewall integrates with WebApp Secure (the industry’s first Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time) and Spotlight Secure (the new cloud-based hacker device intelligence service that will identify individual attacker devices and track them in a global database). With all three products working together, the solution provides both threat intelligence and enforcement, accurately (without false positives) identifying attackers and stopping them at the network perimeter before they can cause any harm.
Simple yet Powerful Solutions
With the number of security devices in the network on the rise and the impracticality of managing the security infrastructure manually or with individual product management interfaces, simplified management is critical. Simplified SRX firewall management is made possible through Junos Space Security Director, an application on Junos Space Network Management Platform, which provides extensive security scale, granular policy control, and policy breadth across the network.
Furthermore, the newly announced Firefly Perimeter, a virtual firewall based on Juniper’s SRX Services Gateway code delivered in a virtual machine (VM) form factor, enables Service Providers to offer managed firewall security as a service.
Finally, Juniper provides Secure Analytics, a market-leading SIEM that consolidates log source event data from thousands of devices, including SRX, WebApp Secure, and DDoS Secure, and helps quickly discover and remediate network attacks. Providing intelligent security, Secure Analytics can help IT personnel discover threats that often are missed by other security solutions.
So if you are planning to spend more on security and looking to build a relationship with a market leader who will comprehensively address your security and simplified
management needs, check out Juniper’s security solutions.
Early on in my first career (i.e. childhood), I learnt about features. I would pore over the Argos catalogue with a biro - “got! got! want! want! got! - choosing the toys I was going to ask for at Christmas. I had a budget (roughly based on how good I’d been that year) and a deadline (Christmas shopping), and I then had to put forward a business case (Christmas list). I’d embellish this business case with facts about the toys I most wanted. This was made easier by Argos because they’d listed the features from the side of the toy’s box: “With realistic laser canon sounds”, “operating tipper wagons”, “TV AM’s resident rodent superstar” and so on. So, I was glad to discover that choosing and justifying a Juniper SRX is nearly as easy.
Usually if a network device has its features written on the side of the box, you’d only ever want it on your broadband at home. But what if someone made an affordable device which could service your home or small office, runs Junos, has a stateful firewall, switchports and most of the protocols you’ve grown up with, wouldn’t you put that on your Christmas list? “SRX100 - want!”
Judges give props to the SRX "swiss army knife" that "packs a bunch of horsepower and features...into a single unit" Read more...
Discussing a wide range of topics impacting enterprises and
data center security.