Blogs

Be the first person to recommend this.
All you J-Netters are among the first to know that, on November 18, we’re evolving J-Net into something bigger and better: The Juniper Elevate Community . Months ago, we’d gathered your feedback on the community and found that in general, you wanted better navigation, a simpler design, more recognition, links to other social platforms, and a simplified registration process. We listened and acted. Because that’s what communities do—share ideas and best practices. So we’ve been busy behind the scenes developing an entirely new platform that not only addresses all your input, but also provides a more modern foundation for our new “one-stop-community-shop” ...
0 comments
1 person recommends this.
Junos offers a broad range of automation capabilities, starting from a YANG based configuration and state information base , accessible via CLI, NETCONF and REST over gRPC based JET APIs directly into various Junos daemons. Some readers might even be familiar with custom YANG, allowing operators to extend the functionality in Junos in respect to configuration and operational commands and make them available via CLI, NETCONF and REST. An example can be found in my post about L2VPN Custom YANG . But the ability to customize and extend Junos doesn’t stop here. With the introduction of Junos telemetry streaming , one can turn any available state information ...
2 comments
2 people recommend this.
We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and in the future, it will be difficult to find something that is not suited to automation. If we move the conversation to business, automation is even more commonplace. From business processes and software-as-a-service applications (SaaS) to more complex network and cloud automation, it’s all part of digital business already. So why does it sometimes feel as though cybersecurity is still playing catch up? Cyber criminals are leveraging automation to launch effective malware and ...
0 comments
2 people recommend this.
The Network is an Asset When it Comes to Security, Not a Liability The internet’s greatest feature – its openness – is also its biggest vulnerability. Borderless communication on top of open protocols, without government interference (mostly) has facilitated robust economic growth and global collaboration. However, all technology can be used for malicious purposes and the inherent openness of the networking stack can leave it vulnerable to attacks. Furthermore, the threat surface continues to grow as more and more users and IoT devices connect to the internet. Additionally, the latest disaggregation and virtualization trends in IT and networking continue ...
0 comments
4 people recommend this.
Juniper Connected Security is more than just a marketing catchphrase or a nice metaphorical basket where all of Juniper Networks' information security products can be placed. It is an information security strategy, one focused on the importance of deep network visibility, multiple points of enforcement throughout the network and interconnectivity between both networking and information security products. The expansion of SecIntel throughout Juniper's portfolio is a real-world example of this strategy in action. Bringing threat intelligence to network infrastructure with SecIntel provides customers with a threat-aware network, enabling their network infrastructure ...
0 comments
7 people recommend this.
Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Application Security and Intrusion Detection Prevention (IDP), using firmware JNPR-11.0-20190316.df99236. This independent testing focuses on security effectiveness, using simulations of real-world traffic combined with tests designed to determine the exact limits of vendor-submitted security gateways. Results on identical hardware may vary, if a different firmware version is in use than the one used during testing. “Juniper ...
0 comments
Be the first person to recommend this.
In previous blogs, we discussed the importance of a strong data-protection program across known and understood data, but once the program has been completed, what’s next? Too often, the answer is ‘nothing’ or ‘very little’ with the resource- strapped security team typically needed for moving onto the next project, leaving little time for ongoing review and improvements that will be required to keep data-protection measures up to date. Having a strong and known security posture is important, but it’s equally important to maintain and update that posture. The battle against malware is ongoing and bad actors don’t stay still; they’re constantly looking ...
0 comments
Be the first person to recommend this.
Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named 'Masad Stealer’ . This malware targets a messaging application to steal user data, including Cryptocurrency wallets, credit card information, discord data and more. The developers sell this malware “off the shelf”, so we’re likely to see it crop up again and again, but this does not make it a common form of attack. The most common form of attack today is still phishing, with literally millions of emails received and dealt with daily. According to a recent report on smallbiztrends.com, on average, five emails that we receive per day are phishing ...
0 comments
1 person recommends this.
How information technology products do what they do matters, and nowhere is this truer than in the case of security. IT infrastructure used to be dedicated to a specific task. But with the rise of virtualization, software defined everything and cloud computing, that changed. Shared infrastructure became the norm, but the centralization of IT, and especially clouds, made consuming IT easier. Both the scope and scale of IT increased and, along the way, things were automated to cut down on the management burden. IT at scale requires automation, and while many enterprises are doing it today, automation itself can be burdensome. Managing and maintaining ...
0 comments
1 person recommends this.
Data protection is the ultimate cybersecurity endgame. For this reason, it’s near the top of the agenda in any security team meeting. They know they need to do all they can to ensure data stays inside the organization and, therefore, will layer software and hardware solutions to make that happen. Their adversaries (threat actors) will do anything to gain access to that data for resale , including damage it, lock it up and demand ransom payments for access. This battle began because of the importance that data has in a modern digital business; it is the flow of data that makes a business unique. No two are the same and it is critical ...
0 comments
1 person recommends this.
The results of the March 2019 Info-Tech Research Group Security Incident and Event Management (SIEM) Customer Experience Report are in and we’re proud to share that Juniper Networks was named a Champion. These results validate our Juniper Connected Security solution, along with our focus on simplicity, interconnectivity and automation. Juniper received the highest score among all vendors on Net Emotional Footprint, which measures high-level user sentiment toward SIEM vendors and their products. The report provides clear evidence that our customers feel we're easy to do business with and further reinforces our industry-leading support. ...
0 comments
1 person recommends this.
Often, the need to protect data gets applied in a blanket mode with all data receiving equal levels of protection. While this may sound ideal, in reality it is far from that and can actually add layers of unnecessary complexity to business, resulting in either slowing things down, or introducing shadow IT as employees look to circumvent controls. Most important in any data-protection project is to take time to understand what data you have, as only then can you successfully know what does or does not need to be protected. However, this is time-consuming, complex and dynamic. As a result, many people use a blanket approach to security because ...
0 comments
2 people recommend this.
The value of business data is constantly changing, and more so every year. Data used to consist of a few names and email addresses, some purchasing information and some contact details gleaned from badge-scans at the last event attended. As such, it was only valuable at certain times and rarely viewed as business critical. Fast forward to today, this has changed. Now, the quality and quantity of data that is stored directly contributes to business success on many different levels. Some organizations are ‘mining data’ for information or creating ‘data lakes’ using customer data which can then be used to understand purchasing patterns and attempt to predict ...
0 comments
2 people recommend this.
Network operators and security engineers are battling attacks and trying to protect the network while at the same time struggling with more workloads and costs around network administration. By incorporating Juniper Networks’ security intelligence onto the MX Series routers, security can be extended to routing infrastructure to turn connectivity layers into automated defense layers at scale. This combination, available in JUNOS 19.3, helps network operators provide another level of security. How Does it Work? J uniper Networks’ security intelligence (SecIntel) delivers real-time threat intelligence by enabling automatic and responsive traffic ...
0 comments
1 person recommends this.
The use of containers as a low-footprint infrastructure upon which to run microservices introduces another layer of infrastructure that needs to be secured. With Juniper Connected Security , organizations can provide industry-leading security for their containerized workloads, extending visibility and enforcement all the way down to the communication between individual microservices within an application. Like all aspects of IT, containers need to be secured and administrators need visibility into data flows moving in and out of these containers. Monolithic applications are difficult to scale and incredibly inefficient when scaling is achieved. ...
0 comments
2 people recommend this.
IT and infrastructure are expanding, driven by the demands of the business and the expectation of always-on availability with a secure and positive user experience. As the infrastructure grows, it is also becoming more complex. This complexity is taxing on both the security and operations teams and creates blind spots for traditional defenses. Securing today's infrastructure requires enhanced visibility and multiple points of enforcement throughout the infrastructure. Increased complexity, as well as increasing attacker capabilities, are combining to create a perfect storm for information security. A connected security strategy is an absolute ...
1 comment
3 people recommend this.
Importance of Overlays Network overlay technologies have played a key role in modern data centers by improving the efficiency, agility, scalability and manageability of application deployments. Cloud providers are rapidly innovating on cloud connect models to deploy new applications that require specific network topologies, without modifying the underlying physical networks. As overlay methodologies actively evolve, it’s imperative that data center edge routers adopt a new paradigm - to implement overlays that are flexible and can adapt to the changing demands expeditiously. Background of JUNOS Overlays So far, overlays or tunnels in JUNOS ...
1 comment
1 person recommends this.
Juniper Connected Security Effective information security requires gaining visibility into potential threats and preventing the spread of malicious activity when it occurs. In a multicloud environment, it is easy to lose viability due to lack of control over the underlying infrastructure. Defending those same multicloud environments can be resource intensive, as maintaining consistent security policies across multiple infrastructures is complicated. Juniper Connected Security can help. Juniper Connected Security enables organizations to see, automate and protect users, applications and infrastructure across the network. Using automation, machine ...
0 comments
3 people recommend this.
Passwords are the foundation upon which much of modern IT security is built, and what better day to discuss the topic than World Password Day , an event which occurs on the first Thursday of May every year. World Password Day is a day in which companies around the world post blogs with advice, sometimes questionable , the obligatory XKCD comic and talk about the importance of Multi-Factor Authentication (MFA). At Juniper Networks, we thought instead we'd have "the talk" about the foundation of password protection as a foundation of security itself. The only constant is change Microsoft very publicly stated the decision to change their default ...
1 comment
5 people recommend this.
While many people are still figuring out segment routing, up crops SRv6, and then SRv6+. Read why we want SRv6+, and why we believe it's crucial we get it. Now - that leads to questions - whats going on - and there seems to be some lack of understanding as to what this is - and why we want it - so - here is a kind of 101 on what SRv6+ is - why we want it - and why we believe its crucial we get it. Firstly though - lets step back - and look at what SRv6 is, in brief. Effectively, segment routing has various types of segment identifiers - these can be seen in https://tools.ietf.org/html/draft-ietf-spring-segment-routing-policy-02 . While I won't ...
0 comments