Security
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
JBlatnik , Visitor
Security
Policy. Detection. Enforcement. Start Securing Your Network with a Software Defined Approach
Feb 25, 2016

At Juniper, we believe that a successful digital transformation requires a shift – moving away from traditional network security to a strategy of securing the network. Network security as recognized today is reactive, siloed and utilizes a block and tackle approach to deal with known threats. Securing the network, instead, entails being adaptable and improving the accuracy of preventing or stopping threats. Reacting and remediating identified threats is not enough for us – we want our customers to know who the bad guys are and identify them quicker, and stop them faster!

 

With the end-goal of security innovation in mind, Juniper is executing on its vision for a Software Defined Secure Network – a secure network based on evolving policy, detection and enforcement that:

 

  • Utilizes all resources for security – not just dedicated appliances. This means using the network, an ecosystem of security intelligence (good guys unite!) and cloud computing.
  • Leverages technology of today and the future by using the strength of cloud economics for intelligence and compute resources.
  • Uses a policy engine that dynamically adapts to real-time threat information to unify policy across heterogeneous network environments.

Today’s digital transformation is focused on changing the way we do business by utilizing new technologies to increase the pace of innovation. One of these innovations includes the significantly increasing intensity, interval and surface area of security threats and attacks. Threats are not only outside of your network – there are threats that are most likely already inside of your network – so the traditional method of only relying upon network perimeter security is not enough. Just as the network is fundamental to the digital transformation, the network also needs to be an active participant in protection.

 

In an effort to create a holistic security ecosystem, Hugh Tatton-Brown, general manager, security portfolio at BT, issued a blog calling on all security partners to help form a “security ecosystem that is a holistic control in itself, and one that’s able to react, in near real-time, to current and evolving intelligence.” The end goal is to allow people to focus on security innovations that help discover the “unknown unknowns.”

 

Needless to say, here at Juniper Networks, we agree with Hugh’s stance, and our security strategy illustrates our commitment to providing a means that enables global security leaders to focus on the “unknown unknowns.”

 

This is how Juniper is enabling the ecosystem and partnering to define a security standard. Interested in having a conversation on Software Defined Secure Networks? Interested in working with us towards innovation in the security ecosystem? Attend my presentation on Next Generation Security at RSA or stop by the Juniper Networks booth, #N3315 in the North Hall.

 

Feb 25, 2016
Muhammad Zaidi

Currently i am working for cloud services , we are hosting different customer. In order to monitor that customer we are using centralize tool so that tool is sitting behind firewall in different zone and all other customers are in there zone but they share same routing table and can see each other subnet but cannot reach due to policy but is this security breach ? if so what can be done to prevent this ? VRF ?


 

 

 

Feb 25, 2016

Muhammad, 

sharing a routing table between tenants is a very bad idea for a multitude of reasons. You do not want the actions of one tenant to affect another, either due to the actions of a "bad actor" or due to human error. You want as much isolation of tenants as possible. VRF's/Separate routing instances would be a step in the right direction.

 

Top Kudoed Members