Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT
Showing results for 
Search instead for 
Do you mean 

Speeds and Feeds are Boring - Until You Have Service Downtime

by Juniper Employee ‎05-17-2017 05:34 AM - edited ‎05-19-2017 07:38 AM

For most people speeds and feeds are boring.

 

You may be thinking that that’s a bold statement from someone at Juniper Networks – a company built upon high performance routing. So, why did I include High Performance in the four network essentials for the future (Automated, Open, Secure, and High Performance)?

 

4 essentials v2.png

 

Speeds and feeds may be boring for most people, but they are essential and must not be overlooked. 

Read more...

Change is the Enemy of Security Operations. How Can You Embrace Change?

by Juniper Employee ‎05-17-2017 05:33 AM - edited ‎05-19-2017 07:38 AM

In this third blog of the series on networking essentials for the future (Automated, Open, Secure, and High Performance), I look at the necessity of being secure.

 

4 essentials v2.png

 

 

Most businesses have come to know that they need to keep data and systems secure. So why is cybersecurity such a hot topic right now?

 

In my view, it is due to the increased value of data and the consequent risk from it being exposed.

Read more...

Everyone Loves Open, But What I Really Want is Choice

by Juniper Employee ‎05-17-2017 05:33 AM - edited ‎05-19-2017 07:41 AM

In this second blog of the series on the network essentials for the future (Automated, Open, Secure, and High Performance), I take a look at Open.

 

4 essentials v2.png

 

 

There are many benefits of an open network, but they all come down to enabling great choice of technology for enterprises.

 

No single technology supplier will ever meet all of your enterprise requirements. Every business uses a multi-vendor approach and the only way for this to be successful is to embrace an open approach whenever possible, so that diverse technologies can work together effectively and easily.

Read more...

The history of IT is closely aligned with automation, from the early computers such as the Enigma Machine to the latest machine learning tools enabling use cases such as automated cancer diagnosis. All of these take tasks that a human can do, but by automating them, it allows people to focus upon higher value work.

 

If we look at networking, automation is at the heart of many recent trends such as SDN (i.e. automating network control) and NFV (i.e. automating the delivery of specific functions which used to be run on dedicated appliances).

 

But, automation is not the only essential within a network.

Read more...

Cybersecurity is not all rocket science, remember the basics…

by Juniper Employee ‎11-30-2016 08:18 AM - edited ‎12-01-2016 09:04 AM

Cybersecurity makes headlines: records stolen, systems taken offline, data held to ransom, identities cloned; these are just some of the breaches that business is working hard to stay ahead of – we all read the headlines, no-one wants to BE the headlines.

 

How do you avoid becoming one of the headlines? As fast as you move, the bad guys can move faster. You need to monitor and protect every surface, they only need to focus on finding a single weak-spot. What can you do? Start with, and maintain your basics, 100% of the time.

Read more...

I'm Spartacus

by Juniper Employee on ‎07-01-2016 01:09 AM

Spartacus poster.jpg

Few who have watched the film of the same name will forget the compelling scene towards the end where the group of captured slaves are asked to identify Spartacus from amongst them and one by one they memorably stand to each proclaim ’I’m Spartacus.’

 

Bear with me as I somewhat tenuously (for now) draw a parallel between that scene and the claims and cries of IT and Networking vendors as they all clamour to shout ‘I’m Open’

 

It seems as though ever since I was a young lad, vendors in the IT community have positioned themselves as “open”.  It could be argued of course that no one would ever claim they are closed and proprietary so the word open became almost the default or ‘safe harbour’ position.

Read more...

At the recent Hackinthebox security conference in Amsterdam, Dutch duo Stephen Kho and Rob Kuiters – who work for the Chief Information Security Office (CISO) team within the Netherlands largest telecommunications provider KPN – revealed that a significant percentage of nodes within the global set of GRX hub networks were accessible from the internet, and some of those were found to have applications running which exposed critical vulnerabilities. 

Read more...

5G Networks and Backhaul

by Juniper Employee ‎06-02-2014 09:48 AM - edited ‎07-11-2014 02:00 PM

We are in the midst of major 4G rollouts and more than half of the world population have not even tasted the supersonic LTE networks, yet we see a lot of industry talks on the topic of 5G networks. So let us shine our crystal balls and see what 5G networks are all about all the while addressing some of the burning questions related to this topic.

 

5G crystal ball.png

Read more...

Virtualized Security: A Great opportunity for Service Providers

by Juniper Employee ‎05-07-2014 07:25 AM - edited ‎05-07-2014 07:29 AM

According to Gartner Group, by 2015 20% of overall VPN / Firewall market will be deployed using virtual infrastructure and 100% of overall IT security product capabilities will be delivered from the cloud. Virtual Security clearly  represents a new opportunity for Service Providers.

 

 

Read more...

Auditing Security in the Data Centre

by Juniper Employee ‎04-28-2014 11:02 AM - edited ‎04-28-2014 12:59 PM

Your security is only as good as its weakest link. Auditing security means ensuring that you have the appropriate policies in place, and that you have confidence those policies are being followed. An external partner can help create both policies and the audit that supports them. Check out the 10 point Auditing Security in the Data Centre infographic, this offers you a framework to work with to ensure you have a comprehensive Data Centre Security Audit.

Read more...

About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Announcements
Juniper Networks Technical Books
Labels