Security
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
Latest Articles
Rise of the Machines – Using AI, Machine Learning and Automation to Improve Your Security Posture

Rise of the Machines – Using AI, Machine Learning and Automation to Improve Your Security Posture

We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and in the future, it will be difficult to find something that is not suited to automation.

 

 

Read more...

Juniper Employee
Juniper Universal Services Framework for Security = Operational Consistency

Juniper Universal Services Framework for Security = Operational Consistency

The internet’s greatest feature – its openness – is also its biggest vulnerability. Borderless communication on top of open protocols, without government interference (mostly) has facilitated robust economic growth and global collaboration. However, all technology can be used for malicious purposes and the inherent openness of the networking stack can leave it vulnerable to attacks. Furthermore, the threat surface continues to grow as more and more users and IoT devices connect to the internet. Additionally, the latest disaggregation and virtualization trends in IT and networking continue to add complexity and generate new entry points that can be exploited.

Read more...

Juniper Employee
The Power of a Threat-Aware Network

The Power of a Threat-Aware Network

Juniper Connected Security is more than just a marketing catchphrase or a nice metaphorical basket where all of Juniper Networks' information security products can be placed. It is an information security strategy, one focused on the importance of deep network visibility, multiple points of enforcement throughout the network and interconnectivity between both networking and information security products. The expansion of SecIntel throughout Juniper's portfolio is a real-world example of this strategy in action. Bringing threat intelligence to network infrastructure with SecIntel provides customers with a threat-aware network, enabling their network infrastructure to act against attacks and help safeguard users and applications.

Read more...

Juniper Employee
Juniper Networks Achieves Recommended Rating from NSS Labs for Data Center Security Gateway

Juniper Networks Achieves Recommended Rating from NSS Labs for Data Center Security Gateway

Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Application Security and Intrusion Detection Prevention (IDP), using firmware JNPR-11.0-20190316.df99236.

 

This independent testing focuses on security effectiveness, using simulations of real-world traffic combined with tests designed to determine the exact limits of vendor-submitted security gateways.  Results on identical hardware may vary, if a different firmware version is in use than the one used during testing.

Read more...

Juniper Employee
The Power of Automation for Data Protection

The Power of Automation for Data Protection

In previous blogs, we discussed the importance of a strong data-protection program across known and understood data, but once the program has been completed, what’s next? Too often, the answer is ‘nothing’ or ‘very little’ with the resource- strapped security team typically needed for moving onto the next project, leaving little time for ongoing review and improvements that will be required to keep data-protection measures up to date.

 

Having a strong and known security posture is important, but it’s equally important to maintain and update that posture. The battle against malware is ongoing and bad actors don’t stay still; they’re constantly looking for new weak spots and opportunities to break through defenses and gain access to valuable data.

 

 

Read more...

Juniper Employee
Bait and Tackle: What Can Be Done About Phishing?

Bait and Tackle: What Can Be Done About Phishing?

Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named 'Masad Stealer’. This malware targets a messaging application to steal user data, including Cryptocurrency wallets, credit card information, discord data and more. The developers sell this malware “off the shelf”, so we’re likely to see it crop up again and again, but this does not make it a common form of attack. 

Read more...

Juniper Employee
Latest Comments
networkingnow | 08-05-2019
Re: Delivering Security That Scales
networkingnow | 05-03-2019
Re: World Password Day: We Need to Talk
By  sabihac
networkingnow | 12-05-2018
Re: Juniper SRX Series: 1 Million Sold and Counting!