Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

We often speak of the Internet of Things as if it was one thing.  It is, of course, not.  It is arguably one of the most diverse spaces that technology has yet created.  There are many standards and technologies addressing the challenges of this new space.

Read more...

Software Defined Secure Networks (SDSN): Why do we need them?

by Juniper Employee ‎04-29-2016 05:11 PM - edited ‎04-29-2016 06:12 PM

At this year’s RSA event Juniper announced, “software defined secure networks” (SDSN). It has been the topic of discussion with customers and partners to make them think of security in a completely different way. This blog focuses on a new way of deploying security across the entire organization and cloud assets.

 

 

Read more...

Juniper Sky Advanced Threat Prevention vs. Locky Malware

by Juniper Employee ‎04-14-2016 02:00 PM - edited ‎04-15-2016 01:24 PM

“Locky” is a new strain of ransomware malware that emerged on February 16th of this year. Ransomware is a type of malware that infects a computer and blocks access to the computer or files on the computer in some way. The most common ransomware technique is encrypting documents and other important files so the content of the files is inaccessible until a ransom is paid, typically using Bitcoin as the method of payment. With Locky, the payoff was 0.5 or 1 BTC for most people (about $200 to $400 USD).

 

The “Locky” name was given to this malware because it renames all of those encrypted files with a “.locky” extension.

 

Read more...

Guy bought a new refrigerator; a smart one.  In addition to keeping the milk from going bad, it tracks inventory, the habits of the household, and reports this data back to its home base.  Of course, this is not the only Internet connected device Guy’s household owns; thermostats, security cameras, motion detectors, light controls, locks, and on and on.  When Guy sells his house, he will go around decommissioning all these devices; disabling, reconfiguring, dismembering them.  But then, how is the new owner going to get into the house and turn on the lights?  It is a new world. 

Read more...

slipstream.png

You’d never mistake most network management applications for the next Facebook or Pinterest as they typically lag well behind consumer-facing websites in terms of an end-user experience.   But the consumerization of the enterprise has dramatically changed user expectations, and network management applications are having to step up to meet them.

 

 

Read more...

At Juniper, we believe that a successful digital transformation requires a shift – moving away from traditional network security to a strategy of securing the network. Network security as recognized today is reactive, siloed and utilizes a block and tackle approach to deal with known threats. Securing the network, instead, entails being adaptable and improving the accuracy of preventing or stopping threats. Reacting and remediating identified threats is not enough for us – we want our customers to know who the bad guys are and identify them quicker, and stop them faster!

Read more...

With today’s rapidly changing threat landscape and sophistication of hackers, businesses and their leaders are investing more money in security but the attackers are still winning. At RSA 2016, Vice President of Cloud, Enterprise and Security Portfolio Marketing, Jennifer Blatnik, will take the stage to discuss these harsh realities and unveil Juniper’s solution to the conflict.

Read more...

gartner-competitive-thumbnail-shadox.jpg

There’s no denying it: there is a technology innovation cycle underway that is having a major impact on networking.  How is this impacting the buying behavior of carriers and CSPs?  Read this blog to learn more!

Read more...

Let's Get Virtual

by Juniper Employee on ‎02-03-2016 02:49 PM

If your business is like most, embracing virtualization with the expectation of tremendous cost and agility savings, it's not alone.  Check out this vSRX infographic to see industry comparisons, analyst data, and how the vSRX stacks up against the competition.

Read more...

The portfolio of Juniper Networks solutions certified for use by the US Department of Defense continues to expand and be updated.

Read more...

As part of the continuing commitment by Juniper Networks to the Common Criteria/National Information Assurance Partnership (NIAP) certification program, we are pleased to report that EX, MX, PTX , and QFX devices recently completed Common Criteria Certification against the NIAP Network Device Protection Profile. 

Read more...

The annual advent of National Cybersecurity Awareness Month reminds us clearly that cybersecurity protection and resilience is a team sport and that only through partnership and collaboration can we improve our national and global capability to address the evolving risk in cyberspace.

Read more...

We are amidst an ongoing transformation. One in which the benefits can outweigh the challenges, but awareness, education and following basic best practices that are embedded within daily activities are critical to protecting oneself and reducing the possibility of a breach.

Read more...

  

Juniper Networks SRX and LN series platforms complete Common Criteria Certification and are listed on the NIAP Product Compliant List as Firewalls and VPN devices. 

Certifications were with Junos 12.1X46. 

The SRX1400, SRX3400, and SRX3600 were certified against the NIAP Network Device Protection Profile plus the Firewall Extended Package.

            The Security Target for these devices is located here.

            The Certification Report can be found here.

The SRX100-650 and the SRX5800 and the LN1000 and LN2600 were certified against the NIAP Network Device Protection Profile plus the Firewall Extended Package and the IPsec Gateway VPN Extended Package.

            The Security Target for these devices is located here.

            The Certification Report can be found here.

Listing on the NIAP PCL is required by Federal policy for many different cases.  First, as the NIAP PCL webpage states- “U.S. Customers (designated approving authorities, authorizing officials, integrators, etc.) may treat these mutually-recognized evaluation results as complying with the Committee on National Security Systems Policy (CNSSP) 11 National Policy Governing the Acquisition of Information Assurance (IA) and IA-Enabled Information Technology (IT) Products - dated June 2013 (https://www.cnss.gov/policies.html)

CNSSP 11 applies to any US Government system carrying classified data at any level and to systems carrying certain command and control traffic regardless of the classification.

NIAP PCL listing is required by the DISA Security Technical Implementation Guide (STIG)s for many product categories.  NIAP PCL listing is required for DoD Cloud providers who are handling Impact Level 5 and 6 information, and in other Federal Government acquisitions that require the NIST 800-53, rev 4- SA-4 (7) control.

Cyber threats today are evolving, becoming more sophisticated and making it critical for organizations to educate, implement and encourage employees to follow cyber best practices. In a recent RAND Corporation report, sponsored by Juniper Networks, it was projected that the cost to businesses in managing cybersecurity risk is set to increase 38 percent over the next 10 years.

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Jennifer Blatnik
Vice President
Enterprise Portfolio Marketing

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements

Tech Cafe Online Event
Labels