Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

New Firewall and VPN Certifications


SRX Now supports Suite B

by Juniper Employee ‎07-22-2013 11:59 AM - edited ‎07-22-2013 12:23 PM

The NSA says it is good enough for classified information


Juniper Networks MAG Series appliances provide a suite of enterprise remote access services in a consolidated, secure and scalable platform.  For many the use case for remote access has moved from laptops to App driven access from Smart devices. Beyond connectivity for the traditional Road Warrior/Fat client; there are plenty of use-cases for SSL VPNs.  In its purest form, a SSL VPN uses the encryption features built into the web browser to secure communication between the remote clients and back-end resources. Authentication is performed over the encrypted SSL connection and the user is then authorised to access specific resources in line with the corporate security policy.


SYOD: Secure Your Own Data

by JayKelley on ‎07-23-2012 11:57 AM

Let’s face it; reality today is the majority of us have a mobile device – typically a smartphone, or even a tablet.


Plus, we all use our mobile devices to access and store “data”. The problem is what typically is this “data”?


Most of us think of “data” as something really important and critical, like a bank account, debit card or credit card numbers and other information of this nature. Also, often times when we hear “data”, we think of work-related stuff, such as sensitive e-mails and attachments, secret plans or programs, or maybe even ultra-sensitive information like intellectual property that could mean disaster if it fell into the “wrong hands,” such as a competitor.


Yes, all of that information, which can be accessed, downloaded, transmitted and stored on our mobile devices, is data but so are online banking and social networking account user names and passwords, or our corporate or e-mail access user names and passwords for which we leverage the auto-complete function on our mobile devices. Some of us even access, download and store sensitive medical or prescription records on our smartphones or tablets. Even pictures of our families can be sensitive data, not to mention private emails to or from our personal email accounts.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books