Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
ssl_boy

Best Practises in Authentication with Junos Pulse and SSL VPN

by ‎04-25-2013 04:01 AM - edited ‎04-29-2013 08:01 AM

hostchecker.jpgDespite the growth in “Bring your own device” (BYOD) strategies, traditional mobile clients running “full-fat” operating systems are likely to be around for the foreseeable future. Realistically, BYOD cannot completely replace or supplant traditional laptops as there are still plenty of legacy business applications requiring a screen larger than 4 inches, a full sized keyboard and a mouse. 

                                                                                                                                                             

Read more...

ssl_boy

When (and where) to use SSL VPN: Security, Portability, and Flexibility

by ‎04-23-2013 02:02 AM - edited ‎04-23-2013 02:02 AM

Juniper Networks MAG Series appliances provide a suite of enterprise remote access services in a consolidated, secure and scalable platform.  For many the use case for remote access has moved from laptops to App driven access from Smart devices. Beyond connectivity for the traditional Road Warrior/Fat client; there are plenty of use-cases for SSL VPNs.  In its purest form, a SSL VPN uses the encryption features built into the web browser to secure communication between the remote clients and back-end resources. Authentication is performed over the encrypted SSL connection and the user is then authorised to access specific resources in line with the corporate security policy.

Read more...

JayKelley

SYOD: Secure Your Own Data

by Juniper Employee ‎07-23-2012 11:57 AM - edited ‎07-23-2012 11:57 AM

Let’s face it; reality today is the majority of us have a mobile device – typically a smartphone, or even a tablet.

 

Plus, we all use our mobile devices to access and store “data”. The problem is what typically is this “data”?

 

Most of us think of “data” as something really important and critical, like a bank account, debit card or credit card numbers and other information of this nature. Also, often times when we hear “data”, we think of work-related stuff, such as sensitive e-mails and attachments, secret plans or programs, or maybe even ultra-sensitive information like intellectual property that could mean disaster if it fell into the “wrong hands,” such as a competitor.

 

Yes, all of that information, which can be accessed, downloaded, transmitted and stored on our mobile devices, is data but so are online banking and social networking account user names and passwords, or our corporate or e-mail access user names and passwords for which we leverage the auto-complete function on our mobile devices. Some of us even access, download and store sensitive medical or prescription records on our smartphones or tablets. Even pictures of our families can be sensitive data, not to mention private emails to or from our personal email accounts.

Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Paul Bristow
Senior Director
Product Management

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Henrik Davidsson
Director
Security Sales

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Steve Hanna
Distinguished Engineer

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.