Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Junos 14.1 FIPS 140-2 Certification is Most Comprehensive Certification Yet

by Juniper Employee ‎10-06-2015 11:31 AM - edited ‎10-06-2015 11:39 AM


I am pleased to report that the National Institute of Standards and Technology (NIST) has issued a Federal Information Processing Standard (FIPS) 140-2 Certification of the following Juniper Networks devices with Junos 14.1R4 software.


EX9204, EX9208, EX9216

M7i, M10i, M120, M320

MX240, MX480, MX960, MX2010, MX2020

PTX3000, PTX5000

T640, T1600, T4000


The FIPS certification is #2451.


This is a first time FIPS certification for the EX9200 and the PTX devices and a recertification for the M, MX, and T-series devices.  This is Juniper Network’s 56th FIPS certification and this is the most comprehensive single FIPS certification completed to date.


FIPS Certification continues to be challenging as NIST requirements evolve including the deprecation of cryptographic algorithms that were once approved and increased focus on important cryptography elements like maintaining sufficient entropy and using strong deterministic random bit generators (DRBG).


The FIPS 140-2 Random Number Generator Crisis Impact on Juniper Networks Products

by Juniper Employee ‎01-09-2015 08:08 AM - edited ‎01-09-2015 08:12 AM

NIST says that random number generators in many current FIPS certifications will be disallowed at the end of 2015.  So what is the impact on Juniper Networks products?


SYOD: Secure Your Own Data

by JayKelley on ‎07-23-2012 11:57 AM

Let’s face it; reality today is the majority of us have a mobile device – typically a smartphone, or even a tablet.


Plus, we all use our mobile devices to access and store “data”. The problem is what typically is this “data”?


Most of us think of “data” as something really important and critical, like a bank account, debit card or credit card numbers and other information of this nature. Also, often times when we hear “data”, we think of work-related stuff, such as sensitive e-mails and attachments, secret plans or programs, or maybe even ultra-sensitive information like intellectual property that could mean disaster if it fell into the “wrong hands,” such as a competitor.


Yes, all of that information, which can be accessed, downloaded, transmitted and stored on our mobile devices, is data but so are online banking and social networking account user names and passwords, or our corporate or e-mail access user names and passwords for which we leverage the auto-complete function on our mobile devices. Some of us even access, download and store sensitive medical or prescription records on our smartphones or tablets. Even pictures of our families can be sensitive data, not to mention private emails to or from our personal email accounts.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books