Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Securing the Distributed Enterprise

by Juniper Employee ‎09-11-2017 02:00 AM - edited ‎09-11-2017 03:15 PM

SB - powered by SDSN - 600x322 linkedin.jpg

Today’s enterprise is complex with digital operations and data located in the cloud, at headquarters and on remote sites. Coupled with business need for always-on working and application reliability and it’s not surprising that teams often struggle under the weight of their work.



Data is bucking the trend that suggests all things eventually become a simple commodity. We’ve all spent years just seeing data as ‘there’; whether it’s a spreadsheet, email or information on a website/social media – data just exists. However, with recent, and massive, growth in stored data its value throughout its lifetime has now changed.


What do I mean by this?


Security threats continue to increase exponentially in volume and in risk. According to a recent CBR article, cybercrime is expected to cost the world more than $2 trillion by 2019. Developers are creating more applications more frequently and many are migrating them between different clouds for business agility. But, the greater volume and dynamic nature of applications make businesses more vulnerable. In fact, Microsoft predicts that we will be writing 111 billion lines of new software code every year that will generate 50 times more data volume by 2020. This should give you an idea of the increased threat attack surface in a multi-cloud world. 


“Alexa, ask SkyATP…”

by Juniper Employee ‎08-21-2017 05:04 PM - edited ‎08-22-2017 03:35 PM


Technology isn’t the only thing that has advanced in recent years.  User behavior has been evolving as well. Take something as simple as getting from Point A to Point B: from printed maps to GPS-enabled smartphone maps to, in the near future, self-driving cars, we have all adopted new behaviors and adapted to new technologies that make our lives much easier and more efficient.






Our people are our greatest asset; this is the universal mantra amongst organizations who value their staff and reputation, and never has this been truer than in the fight against cyber-crime. If any team has ever been asked to up its game and be one step ahead of an ingenious and cunning enemy, it’s the network and IT security team tasked with overcoming cyber-criminals.



At the same time we also know that there are simply not enough cyber-security experts to fill all the jobs available, and this is a huge issue. A recent article from Harvard Business Review highlights this challenge – stating that there will be more than 1.5 million unfilled positions globally by 2020!


This represents the largest single shortfall in human resource. Quite simply there are not enough people in cyber-security today, and even with the new-hires currently graduating university and college globally the gap is not going to shrink any time soon.


Security teams already suffer from ‘alert fatigue’ and that can lead them to become ambivalent, ultimately introducing risk as they may miss the single critical alert hidden inside thousands of other purely informational alerts.


To meet the challenge we need to think differently, invest differently and adopt new technology, but what does this mean? We hear buzz words like virtualization, machine learning, artificial intelligence. But are they really just buzz words, or can they actually help you to be better prepared for the cyber-threat challenge?


On August 24th at 14:00 BST we are running the next in Juniper Networks’ series of  security webinars. If you are interested to hear and discuss this challenge then please join myself and Lee Fisher to hear our thoughts, recommendations and ideas. You can register here.


Transit-VPC solution with Juniper’s virtual SRX allows enterprises to seamlessly add NGFW services and connectivity to large multi-VPC AWS deployments. This solution utilizes a hub-and-spoke topology where every VPC connects to a special “transit VPC” which serves as a central hub for internal traffic, as well as external traffic sent to the corporate on-premises data center or the internet


EX2300 and EX3400 Receive US Department of Defense Certification

by Juniper Employee ‎06-30-2017 12:35 PM - edited ‎07-06-2017 11:18 AM

Juniper Networks expands portfolio of devices on DoD APL


Rapid Response: New Petya Ransomware Discovered

by Juniper Employee ‎06-27-2017 01:23 PM - edited ‎06-28-2017 11:43 AM

Juniper Networks is aware of a new variant of the Petya malware family. The malware combines a number of existing techniques to spread across vulnerable clients. We have begun the process of analyzing samples today’s samples of Petya in the lab and can report that we are able to detect and prevent infection using our SkyATP and IDP technologies. Juniper will continue to update this blog as additional information becomes available.



SRX complete fourth FIPS 140-2 certification

by Juniper Employee ‎06-23-2017 12:48 PM - edited ‎06-23-2017 12:49 PM

Who said the third time is the charm?


The Automat(i)ons are coming!

by Juniper Employee on ‎06-22-2017 01:00 AM


Automation is an area where IT has always been somewhat nervous, and historically this is with good reason. In the past, I worked for two antivirus vendors where a weekly signature update was released that caused clients to overwrite legitimate files with zero-byte replacements.



Hybrid Cloud or Multicloud? Your Call. But Juniper will bring the Security.

by Juniper Employee ‎06-06-2017 11:47 AM - edited ‎06-07-2017 09:38 AM

Image_youtube.pngLower price, scalability, and the need for a global footprint are still the major drivers for both cloud migration and the choice of cloud provider. However, availability and the sophistication of emerging technologies such as machine learning, artificial intelligence, Internet-of-Things (IoT), and image and voice services, which are now built into the cloud platform, are also becoming key considerations when choosing cloud platforms. The allure of quickly incorporating these technologies with a couple mouse clicks and a few APIs is very powerful, especially when considering the time and cost savings compared to developing these capabilities in-house, or finding and establishing relationships with the multiple vendors needed to implement these technologies.




A pervasive security solution that makes practical sense

by Juniper Employee ‎06-06-2017 10:30 AM - edited ‎06-06-2017 10:33 AM

SDSN_private_3.pngMany vendors require that customers purchase everything from them in order to provide a complete, end-to-end security solution. However, the reality is that most enterprises are multivendor environments.  Any solution that requires swapping out existing infrastructure during a refresh cycle, or locks customers into a single vendor, imposes significant restrictions with respect to introducing new capabilities and adopting new technologies.


With the SDSN platform, you can still quarantine or block infected hosts in a multivendor environment, without swapping out your existing infrastructure.  Imagine not having to write off the thousands or even millions of dollars in equipment investments while taking your security game to the next level. It’s a solution that makes practical sense.





Lately, it seems that every time we turn around, there’s a cyber-assault, potentially more dangerous and more devious than the last. There’s the real threats and attacks like WannaCry. And there’s the apparently fabricated news you see on television and in theaters. We appear to be surrounded by virtually any sort of potential cybercrime. But we shouldn’t have to accept this as normal.


On top of this very active threat climate, organizations are drowning in the complexity of dozens of “best-of-breed” security solutions that get pulled together in an effort to build a proper defense solution. On top of this, organizations face a flood of alerts on many different consoles, and need to try and keep numerous security policies up-to-date. Did you know that most policies are written once and rarely updated? These go mostly unnoticed until there’s a security incident and the root cause analysis points to an ancient policy that was left unattended.


Rapid Response: The WannaCry Ransomware Outbreak

by Juniper Employee ‎05-13-2017 08:48 AM - edited ‎05-17-2017 03:33 PM


A new strain of self-replicating ransomware is affecting computers all over the world that is known by various names: Wanna, WannaCry or Wcr.  This malware is disrupting companies and services for businesses, governments and consumers.


The information that we have at the time of writing seems to indicate that the initial point of infection within most organizations is via traditional mechanisms, primarily email and web-delivered PDF's sourced from the Necurs botnet. The novelty of WannaCry is of course its ability to break out from the initial “Patient Zero” and propagate laterally across an SMBv1-enabled network in rapid fashion.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books