Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Putting Attackers in the Spotlight

by Juniper Employee ‎08-26-2013 12:46 AM - edited ‎08-26-2013 09:26 AM

Spotlight.jpgThree key capabilities for keeping data centres secure


In a Ponemon Institute study earlier this year most of the organisations surveyed reported an average of almost two successful security breaches in the past two years. And according to a Verizon report, 81% of the breaches its respondents saw utilised some form of hacking and, most worryingly, 85% of them took weeks or more to discover. In that time a hacker could take an awful lot of intellectual property from an organisation’s data centre.


The problem is existing security products address only part of the security challenge. New threat types leveraging web applications require additional defences because the ones typically deployed are ineffective. Reputation feeds, for example, rely on IP addresses, but we know that more than one person could be using an IP address. Signature-based solutions throw too many false positives to be useful in many cases. Blocking legitimate customers is not a good idea.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books