Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Data Privacy and Convenience: Can We Have Both?

by skathuria ‎01-27-2014 09:00 AM - edited ‎01-27-2014 09:54 AM

As we are nPrivacy_Convenience.pngearing Data Privacy Day, I was keenly amused by and surprised to see the results of a recent Privacy related survey conducted by McCann Truth Central.


According to the survey, in which 6,525 people in the USA and five other global regions participated, many perceive social sites like Facebook (54%) and Twitter (41%) a threat to their privacy. By contrast, a majority (nearly 71%) are okay with sharing shopping data with brands online, primarily because they find it useful when companies subsequently suggest things they actually want.


As someone who enjoys online shopping, I am okay with vendors suggesting and pointing me to items I might like to purchase based on my purchase history. It’s convenient and prevents me from having to manually search for the same which can be time-consuming.


However, both when shopping and using social network sites such as Facebook, I would NOT want any of the sites to expose my personally identifiable information (PII) such as name, financial information, home address, phone numbers, and email addresses. I trust the brands I buy from and expect them to safeguard my data at all times.


Juniper Networks MAG Series appliances provide a suite of enterprise remote access services in a consolidated, secure and scalable platform.  For many the use case for remote access has moved from laptops to App driven access from Smart devices. Beyond connectivity for the traditional Road Warrior/Fat client; there are plenty of use-cases for SSL VPNs.  In its purest form, a SSL VPN uses the encryption features built into the web browser to secure communication between the remote clients and back-end resources. Authentication is performed over the encrypted SSL connection and the user is then authorised to access specific resources in line with the corporate security policy.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books