Security & Mobility Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

Compass icon small.jpgToday we announced the long-awaited “virtualized SRX” - Firefly Perimeter, as part of Juniper’s Firefly Suite. Firefly Host provides protection for the cloud while Firefly Perimeter provides protection from the cloud.

Read more...

bshelton

Common Criteria Certification for Virtualization Specific Security

by Juniper Employee ‎07-16-2013 12:44 PM - edited ‎07-16-2013 12:44 PM

Common Criteria Certification is an important credential for network solutions, especially for network security solutions. 

Read more...

Recently the US Department of Defense added Juniper Networks MX240-960, MX5-80, and the MX80-48T to the Unified Capabilities Approved Product List (UC APL) as MPLS capable, Assured Services Local Area Network (ASLAN) devices.

So why is this notable? And, so why does the Department of Defense need MPLS anyhow?

 

Read more...

kenok

Security Challenges in a Virtual World

by kenok ‎10-06-2011 06:56 AM - edited ‎10-07-2011 09:00 AM

Server Virtualisation is one of the most rapidly evolving and extensively deployed technologies today. Many IT departments and organisations are benefiting from the cost savings of deploying a virtualised environment and IT administrators are benefiting from the simple deployment and management of these systems. Gartner has stated that “Virtualisation is becoming mainstream: 23% of installed applications are running in a VM now. 48% of installed applications will run on a VM by 2012.” 1 So, what does this mean in security terms?  Well Gartner has also stated that “60 Percent of Virtualised Servers will be less secure than the physical servers they replace through 2012” 2and a recent straw poll carried out by Juniper Networks, of 60 attendees at VMworld 2011, despite security concerns, 63% have already virtualized at least 75% of their data centres and 68% said they are 90% likely to be running mission-critical workloads in virtual machines within the next 12 months 3

Read more...

Thinking about how to extend your network security into your virtual environment? Take a look at this episode of Junos Connect including segments on Protecting Physical and Virtual Data Centers, Junosphere and Multi-Cast enabled Applications video. 

 



Vaishali

New Solution? New Questions

by Juniper Employee on ‎06-11-2009 11:17 AM

Most data centers today are already incredibly complex, with numerous servers, applications, networking hardware, and appliances. On top of this, if you are supporting a virtualized server environment, how do you manage virtual machine (VM) migration in this complicated environment? What’s the best, easiest and most cost-effective way to do it? Read more...

Virtualization is a powerful tool with many applications: data center consolidation, desktop virtualization, etc. However, people often don't consider the security implications of virtualization. Virtualization can make you more secure or less. To learn more about how this works and what you can do about it, watch this video or come see my talk at CSI SX.

HSBU-Alan

Putting the Virtue in Virtualization

by Juniper Employee on ‎02-23-2009 09:25 AM

Technical vocabulary keeps us on our toes and we find ourselves immersed in specialized words that didn't exist even a few years ago. We owe as much of this to advertising (supersize) as we do to subcultures (spyware) and to the morphing of existing words to fit the computerized norm-an example of the last is "virtualization." Read more...

Prasad

Carrier Grade Availability

by Juniper Employee on ‎02-11-2009 11:24 AM - last edited on ‎02-19-2009 03:01 PM by

By now you must have read about the Virtualized Core launch by Juniper Networks. The announcement last week focused quite a bit on virtualization-and with good reason-but one thing that often gets overlooked in the press is something that service providers cannot ignore when it comes to building a Next Generation Network-that is carrier grade availability. Read more...

Prasad

How To Make One Look Like Many

by Juniper Employee on ‎02-02-2009 01:09 PM - last edited on ‎02-19-2009 03:03 PM by

Today’s launch talked about virtualization in the core. I am sure that would have raised quite a few questions in technically-oriented minds. How do you make one router look like many? How do you share resources? How do you provide management separation? Read more...

HSBU-Alan

How Does Your Garden Grow?

by Juniper Employee on ‎02-02-2009 12:23 AM - last edited on ‎02-19-2009 03:03 PM by

Our reliance on telecom is amazing – we stay connected in ways that we seldom even think about. I find myself—and see folks everywhere—texting, emailing, calling, listening, watching, all day long. I see other doing the same thing at bus stops, in coffee houses, in their cars…oh wait a minute, we shouldn’t talk about that one…. Read more...

About Security & Mobility Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Seema Kathuria
Manager
Product Marketing

Profile | Subscribe

Kevin Kennedy
Senior Director
Product Management

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Galina Pildush
Strategy & Planning
Architect

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.