Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

CoIT: balancing risk and reward

by Juniper Employee ‎12-17-2013 04:22 AM - edited ‎12-17-2013 09:50 AM

risk and reward.jpgIn Juniper’s Consumerisation Study 2013, three out of four companies consider that when users pull data into consumer apps, it’s a security threat. The same proportion was concerned about data control.


It’s understandable to be concerned, even wise. But there’s a difference between taking the appropriate action and locking security down. My concern when I saw the survey results is that to be competitive, organisations considered that they should be more data risk averse (73 per cent skewed to “data control”, rather than “data agile”) and an even bigger proportion (80 per cent) skewed to “control” as the way to exploit the benefits of Consumerisation of IT (CoIT).


Build-in or Bolt-on? - What kit cars and networks have in common

by Juniper Employee ‎11-05-2013 05:47 AM - edited ‎11-05-2013 12:57 PM

model car.jpgSome people love kit cars. They get a real thrill from buying the bodywork and chassis in the colour they want. They seek out the right engine and transmission and spend hours cleaning and rebuilding them.


They carefully research and select all the other components they need – the brakes, wheels, lights, seats and other interior items. Hours and hours are spent lovingly integrating and assembling them. When the project is finished they have the perfect car for them. And they get a great sense of achievement from doing it.


I as in Boston a couple of weeks ago with my family. As we got into a taxi to go to the restaurant for dinner, I found an iPhone on the seat, and gave it to the driver. Turns out the taxi driver had just dropped a friend off at the airport for a flight, and his buddy left his iPhone in the cab. The driver wanted to get in touch with his friend’s girlfriend, in case his friend called her from the airport worried about where his iPhone may have ended up. But, his friend’s iPhone was locked. The cabbie complained about the iPhone being locked, and wondered aloud why anyone would need a password on their mobile phone.


It was the wrong question to ask with me in the cab. I started listing for him all the reasons why anyone – better yet, EVERYone – should have a passcode set on their mobile device.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books