Security
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
Latest Articles
GDPR Considerations for Companies Outside the European Union

GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must handle information relating to their customers, giving greater protection to individuals and harmonising the laws for data-handling across the EU.

Read more...

Juniper Employee
It’s Time to Get Multicloud Security Right

It’s Time to Get Multicloud Security Right

Here’s some advice:  use the term “multicloud” now, while it still means something.

Read more...

Juniper Employee
New Cybersecurity Platform Enhancements Enable Automated, Adaptive and Simplified Threat Response

New Cybersecurity Platform Enhancements Enable Automated, Adaptive and Simplified Threat Response

Automated. Adaptive. Simplified. Isn’t that what a cybersecurity solution should be? We know that the number one priority for security teams today is detecting and stopping advanced attacks before they cause major damage. Bad actors are operating with increased organizational efficiency and a seemingly bottomless pit of financial backing, not to mention they are constantly turning up the level of technological innovation they use to carry out their exploits.

Read more...

Juniper Employee
Say Hello to the Juniper Security Enterprise Agreement (EA)

Say Hello to the Juniper Security Enterprise Agreement (EA)

Software subscription and technical support procurement processes can be incredibly challenging for enterprises. Identifying specific software and services needed, projecting the number and types of licenses needed, maintaining inventory of services procured, including potential service expiration dates, and evaluating the impact of expired licenses on business continuity all contribute to the complex procurement process. On top of that, security services introduce a new set of compliance and risk considerations if enterprises are not able to scale their security.

Read more...

Juniper Employee
Stopping 1.4Tbps memecached DDoS attack at Peering router

Stopping 1.4Tbps memecached DDoS attack at Peering router

In the late February 2018 enormously high-volume DDoS attack was observed. It was UDP based memcached service reflection-and-amplification attack, reported as 1.4Tbpos strength.

The 1.4Tbps it is more than entire network capacity of many SP. The big SP of the world has network with higher capacity, but even for them – why to waste 10-20-30% of their resources to carry malicious traffic? So – DROP IT! And do this as early as possible.

 

Read more...

Juniper Employee
More SRX Platforms complete FIPS 140-2 Certification

More SRX Platforms complete FIPS 140-2 Certification

Former US President, Ronald Reagan frequently used the Russian proverb “Trust, but verify”.  This adage is also frequently used in the blockchain community.  The idea is that some things are important enough that they must be verified.

Read more...

Juniper Employee
Latest Comments
networkingnow | 05-22-2018
Re: SRX talk(s)
By  nshimuk
networkingnow | 04-16-2018
Re: Say Hello to the Juniper Security Enterprise Agreement (EA)
networkingnow | 04-03-2018
Re: Say Hello to the Juniper Security Enterprise Agreement (EA)