Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Displaying articles for: 05-06-2012 - 05-12-2012

As the current movement toward open source virtualization (in other words, “no-pay” virtualization platform) is gaining more momentum, so are projects like OpenStack. Founded in July 2010 by Rackspace and NASA, OpenStack is an open source cloud computing platform project and community that currently has more than 165 companies, including two recent joiners, IBM and Red Hat. It has three core projects—Compute, Object Storage, and Image Service—with many more in the incubation hopper and, per a recent NetworkWorld article, also ranks as one of the top 10 most powerful Iaas companies.


The beauty of open source is that there is no vendor lock-in and, well, it’s cheaper—which are two things that are important to customers and, by extension, to Juniper. When it comes to the cloud, Juniper’s objective is to provide the best possible and most cost-effective security for its customers—whatever their choice of platform may be. OpenStack supports multiple hypervisors and Juniper’s vGW Virtual Gateway, which currently supports VMware and has short-term planned support for other hypervisors like KVM, Hyper-V, and Xen. So if organizations continue to rally behind OpenStack and the efforts of its growing number of active developers and cloud technologists to create a massively scalable cloud offering, they can count on Juniper to provide security that meets their needs for versatility as well as high-performance, multi-layered defenses, and compliance.

May 2012 Microsoft Patch Tuesday Summary


Welcome to another edition of patch Tuesday summary blog.  Last month’s patch Tuesday involved patching 11 vulnerabilities over 6 bulletins, while this month we are patching 23 vulnerabilities over 7 bulletins.


Here is a list of the vulnerabilities fixed in today’s patches:


Security and "The Internet of things"

by Juniper Employee on ‎05-08-2012 09:24 AM

The much brandied "Internet of things" or the more geeky M2M conjure up a vision of myriad of connected devices all talking to each other exchanging data in real time. Just for a moment overlay that with the security lens and you will start to see what is a seemingly intractable problem - how do you secure these billions of devices ?


Today, Juniper Networks released its Trusted Mobility Index, a global survey of more than 4,000 mobile device users and IT decision-makers, which benchmarks current levels of trust in mobile technologies as well as examines how trends in mobile security and reliability influence attitudes and behaviors.


While there is a great deal of research into increasing mobile security and privacy threats – including Juniper’s own threat research conducted by its Mobile Threat Center – little attention has been given to understanding people’s current attitudes and confidence in their mobile experiences.




The Rise and Risks of Mobile Spyware

by Juniper Employee ‎05-07-2012 03:35 PM - edited ‎05-09-2012 04:50 AM

The total amount of known mobile malware has risen dramatically. From 2010 to 2011, Juniper Networks Mobile Threat Center identified a 155 percent increase in threats to mobile devices. However, no other category of mobile security threats is growing as quickly as Spyware.


In fact, in the first three months of 2012, Spyware targeting mobile devices has doubled. To put this in perspective, Juniper has discovered nearly the same amount of Spyware from January to March of 2012 as we have in the last eight years combined.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books