Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements

I was but a wee lass back when the Just-in-Time movement achieved mainstream awareness in the US. Let me tell you, it was a big hit.

Read more...

February 2015 Microsoft Patch Tuesday Summary

by Juniper Employee ‎02-10-2015 06:15 PM - edited ‎02-10-2015 06:21 PM

Welcome to the February edition of Microsoft Patch Tuesday Summary. In this edition there are 9 updates; 3 are marked "Critical" and 6 are rated "Important".  A total of 55 CVE's (Common Vulnerability and Exposure) were fixed over 9 bulletins this month. One of the Critical update MS15-009 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 41 CVE's (Common Vulnerability and Exposure).

 

Here is a list of Security bulletins which were rolled out in today's Patch Tuesday release.

Read more...

DDoS Mitigation using BGP Flowspec

by Juniper Employee ‎02-10-2015 07:40 AM - edited ‎02-10-2015 07:44 AM

BGPvideo.jpgNANOG 63 just wrapped up in San Antonio last week and I was honored to speak at the conference about ways to mitigate DDoS attacks.

 

The BGP Flow Specification defined in RFC 5575 gives network operators an additional tool to mitigate the effects of DDoS attacks on their network. Over

Read more...

10 steps to deter and defeat Cyber Hackers

by Juniper Employee ‎02-06-2015 03:02 AM - edited ‎02-16-2015 09:02 AM

Turn on the television news, listen to the radio or open the newspaper and there's a high probability you'll see, listen to or read a Cyber Security story. Here are 10 suggestions to help ensure your organization is not hacked.

Read more...

A point of view: Security is about time

by Juniper Employee ‎02-04-2015 10:00 AM - edited ‎02-09-2015 12:01 PM

Juniper’s claim to fame is building incredibly reliable, scalable and fast networking technology.

 

Said simply, we are in the packet moving business. And when you’re moving packets, only two things really matter. First, that packets move quickly. Second, packets are security.

 

Sounds simple enough, no?

Read more...

Seen this movie before?

by Juniper Employee ‎02-03-2015 08:24 AM - edited ‎02-05-2015 10:02 AM

Butch and Sundance walk into the bank, guns blazing. “Hands in the air and shut up – Do as I say and no one gets hurt!” Sundance shouts.

 

There’s a chorus of gasps from the tellers and customers, while the hands go up. While Butch covers, Sundance walks up to the teller, opens his big bag and demands: “All your money. Fill it up. Now.”

 

Read more...

7 Smart Ways to Ensure Data Privacy

by Administrator Administrator ‎01-28-2015 03:11 PM - edited ‎01-28-2015 03:22 PM

Today, user privacy is a huge concern. Check out the seven ways to protect yourself and your identity while connected to the network. 

Read more...

NIST says that random number generators in many current FIPS certifications will be disallowed at the end of 2015.  So what is the impact on Juniper Networks products?

Read more...

Seven Security Predictions for 2015

by Administrator Administrator ‎01-05-2015 12:38 PM - edited ‎01-07-2015 03:00 PM

2015 Security Predictions2015 will be an interesting year for security. As companies work to secure their systems and users, adopting new technologies like mobile payments, two factor authentication, and advanced machine learning solutions, the bar of experience and skill required to breach these environments will increase dramatically.

Read more...

When we officially launched Firefly Perimeter in January 2014, it came with a stateful firewall in a virtual machine format supporting both VMware and KVM, along with NAT, IPSec VPN, and advanced routing features. Now with the latest 12.1X47-D15 release, Firefly Perimeter customers can take advantage of advanced security features such as IPS (Intrusion Prevention Systems) and UTM (Unified Threat Management) and deploy them in the virtualized datacenter and cloud infrastructure. 

 

UTM and IPS are used to identify malicious activity between security zones. When a threat is found, we first attempt to block/stop it then we log this activity for reporting. At a high level, IPS works by scrutinizing all of the bits contained within packets to look for known attacks. Juniper provided downloadable predefined application signatures that detect TCP and UDP applications running on nonstandard ports. The Firefly Perimeter IPS module monitors passing through network traffic, detects suspicious and anomalous traffic based on specific IPS rules, then selectively enforces various attack detection and prevention techniques.

 

On the other hand, UTM is an industry term that was coined to define Layer 7 protection against client-side threats. It utilizes technologies such as network-based antivirus protection, URL filtering, anti-spam solutions, and content filtering. While IPS is primarily focused on network-based attacks on protocols and is stream based (it processes traffic inline without modifying it as a stream), UTM is meant to protect against malicious files (malware) and URL’s as well as enforce local policies for Internet usage.

 

Both IPS and UTM (Sophos Anti Virus, Sophos Anti-Spam, WebSense Enhanced Web Filtering) licenses are based on an annual subscription model, available in one-, three-, or five-year increments. The licenses can be purchased a la carte, or bundled, depending on customer’s specific needs. UTM Content Filtering and basic URL Filtering features are free and require no additional license.

 

Please visit the listed links for more technical details on IPS features as well as UTM features. If you cannot wait to see how these advanced security features and Firefly Perimeter works in general, you can start evaluating today by downloading the latest Firefly Perimeter 12.1X47-D15 release image here (no license required for evaluation). Installation and configuration instructions are also available from the same link.

In just over a year, your FIPS 140-2 cryptographic module may lose its certification

Read more...

December 2014 Microsoft Patch Tuesday Summary

by Juniper Employee ‎12-09-2014 04:35 PM - edited ‎12-09-2014 11:10 PM

It’s Microsoft Patch Tuesday! In the December edition there are 7 updates; three are marked "Critical" and four are rated "Important". A total of 25 vulnerabilities were fixed over 7 bulletins this month. One of the Critical update MS14-080 is an all version Internet Explorer (IE 6 to 11) patch. This single update resolves 14 CVE's (Common Vulnerability and Exposure).

 

Here is a list of Security bulletins which were rolled out in today's Patch Tuesday release.

Read more...

SRX5k New Hardware Release (SCBE & RE-1800) boosts performance per slot to 120G with latest 12.1X47-D15 software release

Read more...

If there’s one truth about the cybercrime dynamic, it is this: by their very nature, the adversary is always ahead of defender.
 
The adversaries are fast, smart, and they develop new techniques every day to steal, manipulate, or wreak havoc on our lives, businesses, and the economy at large.
 
When trying to defend your network, time has not been on your side. The time it takes between identifying a threat (such as malware, a malicious IP, or a new vulnerability) and putting the right defense in place to mitigate that threat is still much, much too long.
 
That’s why Juniper created its Spotlight Secure Threat Intelligence Platform. It’s designed to do just one thing: Take threat intelligence from any source, and immediately allow all SRX firewalls to stop that threat before it take action on network. In the past, this could take weeks or months. With Juniper’s Spotlight Secure, it takes just minutes.
 
Take a look at Spotlight Secure overview, and find out how a threat intelligence platform for SRX can keep your network more secure than ever before. Or check out more information on the Juniper.net Spotlight Secure page.

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kyle Adams
Senior Software Engineer

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Erin K. Banks
Senior Technical Marketing Manager

Profile | Subscribe

Ajay Bharadwaj
Product Manager

Profile | Subscribe

Michael Callahan
Vice President
Product Marketing

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Mora Gozani
Senior Manager
Product Marketing

Profile | Subscribe

Ashur Kanoon
Sr. Manager
Technical Marketing

Profile | Subscribe

Dave Killion
Software Engineer

Profile | Subscribe

Rebecca Lawson
Senior Director
Product Marketing

Profile | Subscribe

Rajoo Nagar
Senior Manager
Product Marketing

Profile | Subscribe

Erin O'Malley
Manager
Product Marketing

Profile | Subscribe

Edward Roberts
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Ashutosh Thakur
Product Line Manager

Profile | Subscribe

Troy Vennon
Software Engineer

Profile | Subscribe

Brad Woodberg
Product Manager

Profile | Subscribe

Labels
Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.