Security
Security is top-of-mind, especially right here where Juniper experts share their insights on the latest security trends and breakthroughs
Latest Articles
Secondhand IoT Devices, Firsthand Threats to Security

Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save money on these devices by capitalizing on less expensive secondhand products sold by third-parties like eBay, Craigslist and even friends or family. But, you may want to think twice before doing this.

 

Read more...

Juniper Employee
New Cybersecurity Platform Enhancements Enable Automated, Adaptive and Simplified Threat Response

New Cybersecurity Platform Enhancements Enable Automated, Adaptive and Simplified Threat Response

Automated. Adaptive. Simplified. Isn’t that what a cybersecurity solution should be? We know that the number one priority for security teams today is detecting and stopping advanced attacks before they cause major damage. Bad actors are operating with increased organizational efficiency and a seemingly bottomless pit of financial backing, not to mention they are constantly turning up the level of technological innovation they use to carry out their exploits.

Read more...

Juniper Employee
Say Hello to the Juniper Security Enterprise Agreement (EA)

Say Hello to the Juniper Security Enterprise Agreement (EA)

Software subscription and technical support procurement processes can be incredibly challenging for enterprises. Identifying specific software and services needed, projecting the number and types of licenses needed, maintaining inventory of services procured, including potential service expiration dates, and evaluating the impact of expired licenses on business continuity all contribute to the complex procurement process. On top of that, security services introduce a new set of compliance and risk considerations if enterprises are not able to scale their security.

Read more...

Juniper Employee
Data - Valuable Asset or Business Risk?

Data - Valuable Asset or Business Risk?

 

Commerce is built on the concept of the value chain. The notion that you can take something of relatively little worth and, through various processes, increase its value is fundamental to a sustainable global economy. And, in the early part of the 21st century, it is “data” that gives rise to perhaps the most significant contemporary value chain of all.

Read more...

Juniper Employee
Protecting the Systems That Impact Our Daily Lives

Protecting the Systems That Impact Our Daily Lives

While the topic of cybersecurity has been at the forefront of the news cycle in recent months, the discussion has mainly focused on the federal government. But while interests of national security have great merit, we must not forget that cybersecurity has many layers. The systems we depend on for electricity, water, healthcare, transportation, finance and more, operate on connected systems that can become targets just as much as an email server or government network. A single devastating attack on our critical infrastructure can place all of these critical resources at risk.

Read more...

Juniper Employee
Contrail Security wins 2017 ONUG Innovation Award!

Contrail Security wins 2017 ONUG Innovation Award!

We launched Contrail Security as a newest member of the Juniper Contrail product family in August 2017. We’ve been overwhelmed with the positive responses we received for Contrail Security in addressing the security needs for Enterprises and Service Providers. Our next step was to demonstrate the strengths of Contrail Security and the Open Networking User Group (ONUG) was the ideal avenue.

Read more...

Juniper Employee
Top Kudoed Authors
Latest Comments
networkingnow | 10-11-2018
Re: Global AWS Transit VPC solution with Integrated security at a competitive price point
networkingnow | 09-17-2018
Re: Black Hat 2018: Securing the Expanding Cyberattack Landscape
By  Vimanyu
networkingnow | 09-10-2018
Re: Black Hat 2018: Securing the Expanding Cyberattack Landscape