Security Now
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
Latest Articles

Displaying articles for: 02-12-2017 - 02-18-2017

Security Prediction 1: The Internet of Things - Are you really in control?

Security Prediction 1: The Internet of Things - Are you really in control?

here

technology-background-1632715-1599x1068.jpg

Just three years ago, the concept of IoT (Internet of Things) was still fresh; people bought devices because they were ‘cool’ or because it seemed that we could improve quality of life with ownership. The general excitement around IoT has led to market consumerisation faster than security standards have kept pace. 

 

In this blog we will discuss growth in IoT, and the risk of not considering security during design, purchase and implementation of these exciting devices.

 

If you enjoyed reading this blog and would like to read related security blogs please visit here

Read more...

Juniper Employee
Turn on “God Mode” with Juniper’s Software-Defined Secure Networks

Turn on “God Mode” with Juniper’s Software-Defined Secure Networks

 

SDSN_LOGO_V10_TRIMMED.png

Networks have changed significantly over the past decade.  Businesses are moving to the cloud and adopting new technologies such as Internet of Things (IoT) and block chain, all of which are heavily network-dependent.

 

These same enterprises are also spending more on security to protect new and existing infrastructure.  Unfortunately, breaches continue unabated.  Internal records and customer data are being stolen and sold to the highest bidder, causing irreparable damage. This begs the question:  are these businesses missing something fundamental in their approach to network security?

Read more...

Juniper Employee
Juniper extends SDSN eco system with leading CASBs

Juniper extends SDSN eco system with leading CASBs

Juniper extends SDSN eco system with leading CASBs, CipherCloud and Netskope

Read more...

Juniper Employee
It's Time to Abandon the Castle

It's Time to Abandon the Castle

For the past 25 years, organizations of all sizes have relied on the castle and moat protection model – multiple layers of security with the ability to ‘raise the drawbridge’ as a last line of defense. Today, the castle is under siege from all sides and the bridge and moat model has run its course. Today’s networks are extremely complex, but like the castle they are equally simple in foundation: routers, switches and firewalls are the primary building blocks – whether physical or virtual. And like the castle that can no longer keep up with new kinds of foes, network attacks are increasing in complexity, agility and the ability to do damage.

Read more...

Juniper Employee
Top Kudoed Authors
Latest Comments
networkingnow | 11-10-2017
Re: A look into LokiBot infostealer
networkingnow | 11-10-2017
Re: Managing Enterprise Security
networkingnow | 11-08-2017
Re: Introducing the Juniper Networks App for Splunk - Now Available in Splunkbase