Blogs

2 people recommend this.
We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and in the future, it will be difficult to find something that is not suited to automation. If we move the conversation to business, automation is even more commonplace. From business processes and software-as-a-service applications (SaaS) to more complex network and cloud automation, it’s all part of digital business already. So why does it sometimes feel as though cybersecurity is still playing catch up? Cyber criminals are leveraging automation to launch effective malware and phishing ...
0 comments
2 people recommend this.
The Network is an Asset When it Comes to Security, Not a Liability The internet’s greatest feature – its openness – is also its biggest vulnerability. Borderless communication on top of open protocols, without government interference (mostly) has facilitated robust economic growth and global collaboration. However, all technology can be used for malicious purposes and the inherent openness of the networking stack can leave it vulnerable to attacks. Furthermore, the threat surface continues to grow as more and more users and IoT devices connect to the internet. Additionally, the latest disaggregation and virtualization trends in IT and networking continue ...
0 comments
4 people recommend this.
Juniper Connected Security is more than just a marketing catchphrase or a nice metaphorical basket where all of Juniper Networks' information security products can be placed. It is an information security strategy, one focused on the importance of deep network visibility, multiple points of enforcement throughout the network and interconnectivity between both networking and information security products. The expansion of SecIntel throughout Juniper's portfolio is a real-world example of this strategy in action. Bringing threat intelligence to network infrastructure with SecIntel provides customers with a threat-aware network, enabling their network infrastructure ...
0 comments
7 people recommend this.
Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Application Security and Intrusion Detection Prevention (IDP), using firmware JNPR-11.0-20190316.df99236. This independent testing focuses on security effectiveness, using simulations of real-world traffic combined with tests designed to determine the exact limits of vendor-submitted security gateways. Results on identical hardware may vary, if a different firmware version is in use than the one used during testing. “Juniper is ...
0 comments
Be the first person to recommend this.
In previous blogs, we discussed the importance of a strong data-protection program across known and understood data, but once the program has been completed, what’s next? Too often, the answer is ‘nothing’ or ‘very little’ with the resource- strapped security team typically needed for moving onto the next project, leaving little time for ongoing review and improvements that will be required to keep data-protection measures up to date. Having a strong and known security posture is important, but it’s equally important to maintain and update that posture. The battle against malware is ongoing and bad actors don’t stay still; they’re constantly looking ...
0 comments
Be the first person to recommend this.
Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named 'Masad Stealer’ . This malware targets a messaging application to steal user data, including Cryptocurrency wallets, credit card information, discord data and more. The developers sell this malware “off the shelf”, so we’re likely to see it crop up again and again, but this does not make it a common form of attack. The most common form of attack today is still phishing, with literally millions of emails received and dealt with daily. According to a recent report on smallbiztrends.com, on average, five emails that we receive per day are phishing messages . Nearly ...
0 comments
1 person recommends this.
How information technology products do what they do matters, and nowhere is this truer than in the case of security. IT infrastructure used to be dedicated to a specific task. But with the rise of virtualization, software defined everything and cloud computing, that changed. Shared infrastructure became the norm, but the centralization of IT, and especially clouds, made consuming IT easier. Both the scope and scale of IT increased and, along the way, things were automated to cut down on the management burden. IT at scale requires automation, and while many enterprises are doing it today, automation itself can be burdensome. Managing and maintaining the ...
0 comments
1 person recommends this.
Data protection is the ultimate cybersecurity endgame. For this reason, it’s near the top of the agenda in any security team meeting. They know they need to do all they can to ensure data stays inside the organization and, therefore, will layer software and hardware solutions to make that happen. Their adversaries (threat actors) will do anything to gain access to that data for resale , including damage it, lock it up and demand ransom payments for access. This battle began because of the importance that data has in a modern digital business; it is the flow of data that makes a business unique. No two are the same and it is critical for ...
0 comments
1 person recommends this.
The results of the March 2019 Info-Tech Research Group Security Incident and Event Management (SIEM) Customer Experience Report are in and we’re proud to share that Juniper Networks was named a Champion. These results validate our Juniper Connected Security solution, along with our focus on simplicity, interconnectivity and automation. Juniper received the highest score among all vendors on Net Emotional Footprint, which measures high-level user sentiment toward SIEM vendors and their products. The report provides clear evidence that our customers feel we're easy to do business with and further reinforces our industry-leading support. It sets ...
0 comments
1 person recommends this.
Often, the need to protect data gets applied in a blanket mode with all data receiving equal levels of protection. While this may sound ideal, in reality it is far from that and can actually add layers of unnecessary complexity to business, resulting in either slowing things down, or introducing shadow IT as employees look to circumvent controls. Most important in any data-protection project is to take time to understand what data you have, as only then can you successfully know what does or does not need to be protected. However, this is time-consuming, complex and dynamic. As a result, many people use a blanket approach to security because it ...
0 comments
2 people recommend this.
The value of business data is constantly changing, and more so every year. Data used to consist of a few names and email addresses, some purchasing information and some contact details gleaned from badge-scans at the last event attended. As such, it was only valuable at certain times and rarely viewed as business critical. Fast forward to today, this has changed. Now, the quality and quantity of data that is stored directly contributes to business success on many different levels. Some organizations are ‘mining data’ for information or creating ‘data lakes’ using customer data which can then be used to understand purchasing patterns and attempt to predict future ...
0 comments
2 people recommend this.
Network operators and security engineers are battling attacks and trying to protect the network while at the same time struggling with more workloads and costs around network administration. By incorporating Juniper Networks’ security intelligence onto the MX Series routers, security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale. This combination, available in JUNOS 19.3, helps network operators provide another level of security. How Does it Work? J uniper Networks’ security intelligence (SecIntel) delivers real-time threat intelligence by enabling automatic and responsive traffic ...
0 comments
1 person recommends this.
The use of containers as a low-footprint infrastructure upon which to run microservices introduces another layer of infrastructure that needs to be secured. With Juniper Connected Security , organizations can provide industry-leading security for their containerized workloads, extending visibility and enforcement all the way down to the communication between individual microservices within an application. Like all aspects of IT, containers need to be secured and administrators need visibility into data flows moving in and out of these containers. Monolithic applications are difficult to scale and incredibly inefficient when scaling is achieved. ...
0 comments
2 people recommend this.
IT and infrastructure are expanding, driven by the demands of the business and the expectation of always-on availability with a secure and positive user experience. As the infrastructure grows, it is also becoming more complex. This complexity is taxing on both the security and operations teams and creates blind spots for traditional defenses. Securing today's infrastructure requires enhanced visibility and multiple points of enforcement throughout the infrastructure. Increased complexity, as well as increasing attacker capabilities, are combining to create a perfect storm for information security. A connected security strategy is an absolute necessity ...
1 comment
1 person recommends this.
Juniper Connected Security Effective information security requires gaining visibility into potential threats and preventing the spread of malicious activity when it occurs. In a multicloud environment, it is easy to lose viability due to lack of control over the underlying infrastructure. Defending those same multicloud environments can be resource intensive, as maintaining consistent security policies across multiple infrastructures is complicated. Juniper Connected Security can help. Juniper Connected Security enables organizations to see, automate and protect users, applications and infrastructure across the network. Using automation, machine ...
0 comments
3 people recommend this.
Passwords are the foundation upon which much of modern IT security is built, and what better day to discuss the topic than World Password Day , an event which occurs on the first Thursday of May every year. World Password Day is a day in which companies around the world post blogs with advice, sometimes questionable , the obligatory XKCD comic and talk about the importance of Multi-Factor Authentication (MFA). At Juniper Networks, we thought instead we'd have "the talk" about the foundation of password protection as a foundation of security itself. The only constant is change Microsoft very publicly stated the decision to change their default ...
1 comment
4 people recommend this.
Information security is inextricable from all aspects of IT and it must include everything from cloud-based advanced threat prevention to physical switches that automatically quarantine infected devices. Automating IT in order to simplify it, make it repeatable and allow multiple products to form a whole greater than any individual component, is the basis of Juniper Connected Security . Juniper Connected Security combines inbuild detection of threats and the enforcement of policy with the capabilities of our partners to safeguard users, applications and infrastructure against advanced threats. Combining automation with a layered approach to defense ...
0 comments
1 person recommends this.
According to Gartner , “by 2020, 75% of organizations will have deployed a multicloud or hybrid cloud model for their IT needs.” 1 While we’ve known for some time that the future is multicloud, ensuring cybersecurity across diverse and non-traditional environments has mostly been an afterthought. Despite organizations weaving cloud-based ecosystems and Internet of Things (IoT) devices and applications into the fabric of their networks, they have not emphasized security at the same level. To learn more about what organizations are – and are not – doing to prepare and fortify their security postures, Juniper Networks partnered with the Internet of Things Institute ...
0 comments
2 people recommend this.
As 2018 comes to a close, it’s clear we need continued security innovations to keep our organizations better protected from cybercrime. Bad actors with limitless resources are hyper-innovative in finding and exploiting vulnerabilities. Meanwhile, our vulnerabilities are expanding with cloud environments and distributed, digital business models. We need new ideas to keep our security postures strong. Attacks like cryptojacking and new variants of ransomware are using revolutionary obfuscation tactics and automation to bypass traditional security solutions. The ongoing shortage of qualified security experts , combined with a flood of data from multiple security ...
0 comments
3 people recommend this.
To our customers: thanks a million. This week at Juniper, we are celebrating an epic milestone: the shipment of our one millionth SRX Series platform! That’s one million units deployed around the globe, serving our customers in a number of environments and applications: Purchased by over 40,000 customers Deployed everywhere in the world: Americas, Europe, Middle East, Africa, and Asia Pacific Fits everywhere, from small enterprise locations to national government and the commercial internet backbone Used in branch locations, campus and headquarters, and data center Serves many industries including financial services, ...
1 comment