Industry Solutions and Trends
Technology is more than just networking and Juniper experts share their views on all the trends affecting IT
Showing results for 
Search instead for 
Do you mean 

Cybersecurity is not all rocket science, remember the basics…

by Juniper Employee ‎11-30-2016 08:18 AM - edited ‎12-01-2016 09:04 AM

Cybersecurity makes headlines: records stolen, systems taken offline, data held to ransom, identities cloned; these are just some of the breaches that business is working hard to stay ahead of – we all read the headlines, no-one wants to BE the headlines.

 

How do you avoid becoming one of the headlines? As fast as you move, the bad guys can move faster. You need to monitor and protect every surface, they only need to focus on finding a single weak-spot. What can you do? Start with, and maintain your basics, 100% of the time.

Read more...

I'm Spartacus

by Juniper Employee on ‎07-01-2016 01:09 AM

Spartacus poster.jpg

Few who have watched the film of the same name will forget the compelling scene towards the end where the group of captured slaves are asked to identify Spartacus from amongst them and one by one they memorably stand to each proclaim ’I’m Spartacus.’

 

Bear with me as I somewhat tenuously (for now) draw a parallel between that scene and the claims and cries of IT and Networking vendors as they all clamour to shout ‘I’m Open’

 

It seems as though ever since I was a young lad, vendors in the IT community have positioned themselves as “open”.  It could be argued of course that no one would ever claim they are closed and proprietary so the word open became almost the default or ‘safe harbour’ position.

Read more...

At the recent Hackinthebox security conference in Amsterdam, Dutch duo Stephen Kho and Rob Kuiters – who work for the Chief Information Security Office (CISO) team within the Netherlands largest telecommunications provider KPN – revealed that a significant percentage of nodes within the global set of GRX hub networks were accessible from the internet, and some of those were found to have applications running which exposed critical vulnerabilities. 

Read more...

5G Networks and Backhaul

by Juniper Employee ‎06-02-2014 09:48 AM - edited ‎07-11-2014 02:00 PM

We are in the midst of major 4G rollouts and more than half of the world population have not even tasted the supersonic LTE networks, yet we see a lot of industry talks on the topic of 5G networks. So let us shine our crystal balls and see what 5G networks are all about all the while addressing some of the burning questions related to this topic.

 

Read more...

Virtualized Security: A Great opportunity for Service Providers

by Juniper Employee ‎05-07-2014 07:25 AM - edited ‎05-07-2014 07:29 AM

According to Gartner Group, by 2015 20% of overall VPN / Firewall market will be deployed using virtual infrastructure and 100% of overall IT security product capabilities will be delivered from the cloud. Virtual Security clearly  represents a new opportunity for Service Providers.

 

 

Read more...

Auditing Security in the Data Centre

by Juniper Employee ‎04-28-2014 11:02 AM - edited ‎04-28-2014 12:59 PM

Your security is only as good as its weakest link. Auditing security means ensuring that you have the appropriate policies in place, and that you have confidence those policies are being followed. An external partner can help create both policies and the audit that supports them. Check out the 10 point Auditing Security in the Data Centre infographic, this offers you a framework to work with to ensure you have a comprehensive Data Centre Security Audit.

Read more...

Guest blog by Paul Bonner, Head of Technical Services, Hardware.com

 

When companies reorganise or are brought closer together through merger or acquisition, questions over security are pretty low down the list of priorities to deal with. We assume security will adapt when moves and changes take place.

 

But anyone familiar with the huge range of headaches that can occur, and the increased potential for catastrophic data loss or theft, will tread carefully and seek to put security near the top of the agenda.

 

What can be done?

 

Rather like ensuring that your home will cope with all weathers, there is a need to start with the foundations – check they are secure and check them regularly.

 

So for data security it is all about knowing what data you have, classifying it into tiers, and creating a clear policy for each tier. Once such a policy is in place it needs to be regularly reviewed and certain data re-classified, which will mean that its access rights must be amended.

 

With a policy in place, all levels of reorganisation can be handled with appropriate care – or at least far more effectively than normally occurs.

 

A single staff reassignment seems insignificant, but it must be handled with care. At the most basic level staff are constantly moving within an organisation. The policy needs to cope with such changes so that an individual’s need for data is reassessed and changed appropriately.

Read more...

The virtual world is a wake-up call for your security policy

by paul.bonner@hardware.com ‎04-28-2014 04:47 AM - edited ‎04-28-2014 04:49 AM

Guest blog by Paul Bonner, Head of Technical Services, Hardware.com

 

There is little doubt that the cloud and virtualisation is playing a big part in all our futures. Despite the odd horror story, virtualisation is ever-present in every area of commercial life.

 

But like all white knuckle rides, there is a time when we have to come to earth and face up to the implications. It’s a time to realise that our old-world view of security is not best suited to the world we now inhabit.

 

Companies have been attracted to such services for a range of very good reasons, but most have not redrawn their security policies to reflect the new risks posed by the combination of cloud and virtualised environments.

 

So what are these risks?

 

One of the key concerns for your data centre security strategy is coping with an increased attack surface due to vulnerabilities in virtualised environments.

 

While many providers can demonstrate high levels of physical security there are many more weaknesses evident within a virtualised environment, whether in-house or in a provider's location. A key area of weakness is in server virtualisation.

Read more...

Guest blog by Mario Socarras, Presales Consultant, Logicalis UK

 

Cloud services have provided a solid alternative for enterprises to consume IT services, but most organisations use a hybrid cloud that combines private infrastructure with specific external cloud services.

 

There are still availability and security concerns about cloud services. Availability has proved not to be a problem when proper redundancy mechanisms are put in place such as links, bandwidth and DNS and VPN termination.

 

On the other hand, achieving proper security for a hybrid cloud requires a comprehensive set of processes, technology and people. When security is addressed as a practice with defined steps, it can to be both manageable and effective. Here is a summary of how to address hybrid cloud security:

 

Know yourself: It is fundamental to have visibility of assets, and properly assess risk. This means understanding the application's data flow, where the data is, who accesses the data, and when it is accessed. Identifying where the valuable or sensitive information resides means you can apply specific security measures through the whole infrastructure, from end users or devices to the data.

 

Scan, test and evaluate: Scan applications, server and network devices to discover vulnerabilities. Scanning should be a customised process in which each asset is analysed differently in the context of its use. Web applications, for example, will be exposed to different threats than routers and switches. Scanning can, and must, also be done for applications and infrastructure that are in a public cloud.

 

Read more...

Guest Users : Friend or Foe to your network

by Juniper Employee ‎04-24-2014 05:44 AM - edited ‎04-24-2014 06:03 AM

Asset protection is nothing new; but the thorny issue of guest access remains. 

 

Visit a British castle, such as the magnificent Leeds Castle in Kent, and you will see a supreme example of medieval enterprise security. High walls, wide moats, buttresses, arrow loops and numerous surveillance points; all contributing to the desired effect. If the outward appearance didn’t put invaders off, the thought of boiling water thrown at them if they came too close to the drawbridge was a pretty good secondary deterrent. Such protective measures served a vital function; but as with today’s corporate networks, the best laid plans and fortifications were little protection against visitors or guest workers with ill intentions.

 

The question asked then and now is still:  When is a visitor or contractor a threat, and what can be done to mitigate that threat?

It has become expected that organisations provide wireless networks for visitors and staff but increasingly questions are being asked about the threats posed by outsiders given access to wireless services and allowed beyond into an organisation’s network. Aside from combating the obvious rogue element it is also important to remember that such users can have malicious effects without intending it, due to malware existing, unknown to them, on their machines.

Read more...

About Industry Solutions and Trends

Subscribe RSS Icon

Follow our Twitter Accounts:
Juniper Networks Twitter
UK Twitter
Japan Twitter
Australia Twitter
Announcements

Juniper Design & Architecture Center - Mobile Cloud
Labels