Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Compass icon small.jpgToday we announced the long-awaited “virtualized SRX” - Firefly Perimeter, as part of Juniper’s Firefly Suite. Firefly Host provides protection for the cloud while Firefly Perimeter provides protection from the cloud.


Common Criteria Certification is an important credential for network solutions, especially for network security solutions. 


Recently the US Department of Defense added Juniper Networks MX240-960, MX5-80, and the MX80-48T to the Unified Capabilities Approved Product List (UC APL) as MPLS capable, Assured Services Local Area Network (ASLAN) devices.

So why is this notable? And, so why does the Department of Defense need MPLS anyhow?



Security Challenges in a Virtual World

by kenok ‎10-06-2011 06:56 AM - edited ‎10-07-2011 09:00 AM

Server Virtualisation is one of the most rapidly evolving and extensively deployed technologies today. Many IT departments and organisations are benefiting from the cost savings of deploying a virtualised environment and IT administrators are benefiting from the simple deployment and management of these systems. Gartner has stated that “Virtualisation is becoming mainstream: 23% of installed applications are running in a VM now. 48% of installed applications will run on a VM by 2012.” 1 So, what does this mean in security terms?  Well Gartner has also stated that “60 Percent of Virtualised Servers will be less secure than the physical servers they replace through 2012” 2and a recent straw poll carried out by Juniper Networks, of 60 attendees at VMworld 2011, despite security concerns, 63% have already virtualized at least 75% of their data centres and 68% said they are 90% likely to be running mission-critical workloads in virtual machines within the next 12 months 3


Thinking about how to extend your network security into your virtual environment? Take a look at this episode of Junos Connect including segments on Protecting Physical and Virtual Data Centers, Junosphere and Multi-Cast enabled Applications video. 


New Solution? New Questions

by Juniper Employee on ‎06-11-2009 11:17 AM

Most data centers today are already incredibly complex, with numerous servers, applications, networking hardware, and appliances. On top of this, if you are supporting a virtualized server environment, how do you manage virtual machine (VM) migration in this complicated environment? What’s the best, easiest and most cost-effective way to do it? Read more...

Virtualization is a powerful tool with many applications: data center consolidation, desktop virtualization, etc. However, people often don't consider the security implications of virtualization. Virtualization can make you more secure or less. To learn more about how this works and what you can do about it, watch this video or come see my talk at CSI SX.

Putting the Virtue in Virtualization

by Juniper Employee on ‎02-23-2009 09:25 AM

Technical vocabulary keeps us on our toes and we find ourselves immersed in specialized words that didn't exist even a few years ago. We owe as much of this to advertising (supersize) as we do to subcultures (spyware) and to the morphing of existing words to fit the computerized norm-an example of the last is "virtualization." Read more...

Carrier Grade Availability

by Juniper Employee on ‎02-11-2009 11:24 AM - last edited on ‎02-19-2009 03:01 PM by

By now you must have read about the Virtualized Core launch by Juniper Networks. The announcement last week focused quite a bit on virtualization-and with good reason-but one thing that often gets overlooked in the press is something that service providers cannot ignore when it comes to building a Next Generation Network-that is carrier grade availability. Read more...

How To Make One Look Like Many

by Juniper Employee on ‎02-02-2009 01:09 PM - last edited on ‎02-19-2009 03:03 PM by

Today’s launch talked about virtualization in the core. I am sure that would have raised quite a few questions in technically-oriented minds. How do you make one router look like many? How do you share resources? How do you provide management separation? Read more...

How Does Your Garden Grow?

by Juniper Employee on ‎02-02-2009 12:23 AM - last edited on ‎02-19-2009 03:03 PM by

Our reliance on telecom is amazing – we stay connected in ways that we seldom even think about. I find myself—and see folks everywhere—texting, emailing, calling, listening, watching, all day long. I see other doing the same thing at bus stops, in coffee houses, in their cars…oh wait a minute, we shouldn’t talk about that one…. Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books