The New Network
Explore Juniper’s vision for network innovation and how the company and industry are shaping the future with the new network

Juniper and VMware: Collaborating to Enable Cloud Builders

by Juniper Employee ‎04-07-2014 05:30 AM - edited ‎04-14-2014 09:44 AM

By Denise Shiffman, VP Product Management & Strategy at Juniper and

Hatem Naguib, VP Networking and Security at VMware


The need for businesses to enhance the efficiency of IT and increase application agility is overwhelming. Embracing operational models such as cloud computing helps, but in order to fully leverage these new models companies must explore new ways of handling network connectivity. 


Three new products on the market offer low cost, but will severely impact your ability to deliver guaranteed service in your Data Center. 


Bob Dix

Entrance into NCCoE

by Juniper Employee ‎03-14-2014 04:00 AM - edited ‎03-13-2014 03:22 PM

Last month the National Institute of Science and Technology (NIST) issued the Cybersecurity Framework to help organizations improve their cybersecurity protection capability. The Framework is a good first step in marshalling our public and private sector resources against cyber intrusions, providing people and organizations with basic tools to help in this effort.


To further advance the fight against cybercrime, Juniper Networks has entered into an affiliation with the NIST National Cybersecurity Center of Excellence (NCCoE) to become one of the National Cybersecurity Excellence Partners. This continues Juniper’s commitment to work collaboratively to deliver innovation in high IQ networking and security solutions. As part of this initiative, we will work closely with the NCCoE team to examine proof of concepts and other activities that NCCoE will use to build reference solutions that help solve some of the security challenges facing U.S. and multi-national businesses. We believe this effort will help companies stay ahead of cyber adversaries using real, widely deployed technology from companies like Juniper, Microsoft, RSA, Red Hat and Intel.


We’re proud to join recognized leaders in this area and support efforts to improve cybersecurity and critical infrastructure protection, both domestically and globally. 


Gaining Ground in the Switching Race

by Juniper Employee ‎03-07-2014 12:41 PM - edited ‎03-07-2014 12:43 PM

It is a marathon, not a sprint. Per Dell'Oro, Juniper gains significant ground in the race to switching market share. 


Mike Marcellin

Get “In the Know” with Juniper at OFC 2014

by Juniper Employee ‎03-07-2014 06:00 AM - edited ‎03-06-2014 08:13 PM

Picture1.pngThis year, OFC 2014 (March 11-13) is being held in SF (practically right in our backyard), so we’ll be there in full force to share the latest and greatest about our technology vision and products as they relate to the future of optical networking. At booth #309 this year, we’ll be talking about a variety of topics, most notably how we continue to build high-IQ networks to help service providers and cloud builders bring customizable services to their end customers.


Those who visit our booth will get to see the following in action:


  • The NorthStar Controller, a new traffic-engineering controller for service providers
  • Service chaining with Juniper’s Contrail Controller for ease of service creation and troubleshooting
  • The PTX Series with coherent optics interworking with industry-leading partners’ solutions
  • Juniper-powered Network Management and Network Optimization Suite
  • The PTX delivering an end-to-end Carrier Ethernet transport solution
  • Juniper’s new 1Tbps line card for the PTX

In addition to our demos, Juniper experts Jun Shi, Colby Barth and Nitin Kumar will be discussing “The Future of the Metro Core” on Tuesday, March 11th beginning at 1:30 p.m. PT.


Also, don’t miss the Service Provider Summit on Wednesday, March 12 from 8:30 a.m. – 12:30 p.m. PT where topics of interest to CTOs, network architects, network designers and technologists within the service provider and carrier sector will be discussed.


How do you intelligently scale to meet massive demands? How do you address massive spikes with measured scale? With a high-IQ network that knows, of course!


Next week is sure to be full of astonishing discoveries, insightful observations and engaging conversations as we reflect on the future of packet optical networking. Hope to see you there!

Bob Dix

As cyber threats increase, good hygiene can help

by Juniper Employee ‎02-26-2014 06:00 AM - edited ‎02-25-2014 04:54 PM

This week marks the 14th annual RSA Conference where cybersecurity experts will gather to explore all aspects of internet and technology security.


On the heels of the NIST Cybersecurity Framework, it’s a great time to think hard about what each of us can do to improve cybersecurity. None of us can do everything, but ALL OF US can do something. In fact, today we’ve released a new infographic that highlights the threats facing critical infrastructure and how people can use the NIST Cybersecurity Framework as a toolbox to identify proven best practices to better protect themselves.


FINAL Juniper Cybersecurity_infographic jpg.jpeg

 An often overlooked area of cybersecurity is hygiene.  Cybersecurity has had top-billing with media and policy makers for so long now that many people have begun blindly nodding their heads in agreement without fully understanding the topic. When attacks do occur, or vulnerabilities are exposed, they express outrage and alarm, but cannot wrap their heads around what really occurred or why, and—perhaps most importantly—how to respond, or better, what might have prevented the event in the first place.  


This should not be the case. A cohesive, comprehensive and sustained national awareness campaign will help the public understand how to more effectively protect themselves, thereby alleviating many immediate threats. The United States has had success creating a number of national education and awareness campaigns that actually provoke change in people’s behaviors. Forest fire prevention and H1N1 protection awareness succeeded because the public was briefed on the topics, including the threat, and a widespread campaign was organized. A comprehensive campaign to improve the cyber health of American citizens and businesses should be a top priority. Areas of public awareness must include:


  • Never opening email links or attachments unless the sender is known and trusted
  • Periodically changing passwords
  • Installing and regularly updating proper anti-virus and anti-spyware software
  • Regularly installing operating system software updates
  • Enabling firewall security

As the U.S. GAO[1] has noted, threats from external sources continue to increase. They are up 782 percent from 2006 to 2012. A decline in threats is not on the horizon. Therefore, the imperative lies on each of us to help inform and protect the information systems critical to our everyday lives.


Basic issues, such as those noted above and more, produce roughly 80 percent of exploitable vulnerabilities that contribute to cyber-events. More than ever, now is the time for government and its industry partners to help the public better understand the nature of cybersecurity and what steps they can take to improve and ensure their safety.


  • Start by raising more awareness in K-12 school communities
  • Provide tips and expertise to small businesses (through social media, pamphlets?)
  • Use traditional and non-traditional communications channels to drive local decision makers to update cybersecurity information and make resources available

Operationalizing the effort

These actions and activities have been long discussed and may seem simple enough, many people even may consider them common sense. However, it is true that threats, vulnerabilities and their fallout remain a serious challenge. How can we activate this type of campaign?


  • Engage a consortium of leaders from government, industry, academia, and non-profits, as well as the wide array of associations National Governor’s Association, National Association of State CIO’s, National League of Cities, National Association of Counties, building on current efforts such as National Cyber Security Alliance.
  • Leverage the government agencies with regular contact with citizens, like the Small Business Administration, Internal Revenue Service, U.S. Postal Service, and others, to distribute materials offering insights or pointing to a website where they can get information about how to protect themselves.
  • Similar efforts should be made with state, local, tribal, and territorial constituents.

Our elected officials can and should lead by example. Each of them should include links and information on their constituent home pages pointing to information about basic cyber security hygiene and how to better protect themselves from an infection in cyberspace.


Better conveying cybersecurity’s impact on the daily lives of Americans and making it relatable is crucial to broadening awareness. Building a common sense approach to cybersecurity will help empower individuals and demonstrate how to positively contribute to the health of our cyber-ecosystem.


This approach will not solve all of the cybersecurity risk management challenge. However, addressing the 80 percent hygiene challenge will make a significant positive impact on raising our overall security profile. None of us can do everything, but all of us can do something.


Let’s get going. 



How to Leverage SDN to VIRTUALIZE a High-IQ Network

by Juniper Employee ‎02-25-2014 01:31 PM - edited ‎02-25-2014 01:50 PM



Data Center Technology Experts

by Juniper Employee ‎02-25-2014 10:00 AM - edited ‎03-10-2014 07:55 PM

You may have noticed that we have had significantly more blogs from Juniper around Data Center in the past four months

The reason is quite simpleyou told us the best way for you to understand where we are going and how we are getting there 

is to have the people building the productssolutionsand architectures talk directly to our customers and partners through

our blogs.


Mike Marcellin

How to Leverage SDN to CUSTOMIZE High-IQ Networks

by Juniper Employee ‎02-24-2014 10:01 AM - edited ‎02-26-2014 10:35 AM

AutomateCreateScaleBusiness is all about competitive advantage over your rivals to better serve the end customer.  In the quest for competitive advantage, one of the areas gaining greater prominence over the past few years is around customization.  



How To Leverage SDN to MONETIZE a High-IQ Network

by Juniper Employee ‎02-23-2014 01:18 PM - edited ‎02-25-2014 08:44 AM

sdnmonetize.jpgService Providers today are faced with an intriguing challenge: how do you capture market share by providing new and innovative services when the limitations of traditional networks constrain your ability to be turn up new services quickly, make it difficult to test and fail fast, and prevent you from being the first to grow the next new big service opportunity?



If You Can Imagine It, Juniper Can Help Build It

by Juniper Employee ‎02-23-2014 06:00 AM - edited ‎02-24-2014 10:41 AM

infographicCompanies like ours are solving critical global problems. We do this because our businesses depend on it. But there is a more fundamental importance to what we do each and every day in this industry. Take, as an example, a modern day server. With the latest CPU technology and the latest memory architecture, it has the power to solve some very complex computational tasks. 


Bob Dix

Juniper's view on the newly unveiled NIST Cybersecurity Framework

by Juniper Employee ‎02-12-2014 10:00 AM - edited ‎02-12-2014 09:30 AM

As recent events demonstrate, cybersecurity is one of the most important issues facing policymakers in Washington.   The NIST Cybersecurity Framework announced today is a laudable first step toward addressing the challenges we face.  However, it’s just a first step, and there is more that government and industry must do together to address basic cyber hygiene as well as the most sophisticated and persistent threats to critical infrastructure.  Without a coordinated and sustained approach, the bad guys will likely stay one step ahead.  We look forward to a continued partnership with the Administration as Juniper Networks works to address the cyber challenges that lie ahead.

About The New Network

Exploring the vision for the networking industry and the issues shaping its future.

Subscribe to The New Network    RSS Icon

Our Bloggers

Rami Rahim
Executive Vice President
Platform Systems Division

Profile | Subscribe

Brad Brooks
Chief Marketing Officer

Profile | Subscribe

Bask Iyer
Senior Vice President and CIO

Profile | Subscribe

Judy Beningson
Vice President, Strategic Planning

Profile | Subscribe

Mike Marcellin
Senior Vice President

Profile | Subscribe

Jonathan Davidson
Senior Vice President

Profile | Subscribe

Ankur Singla
Vice President of Engineering

Profile | Subscribe

Bob Dix
Vice President
Government Affairs &
Critical Infrastructure Protection

Profile | Subscribe

Copyright© 1999-2013 Juniper Networks, Inc. All rights reserved.