el-e-vate (verb): raise or lift up to a higher position
Whatever your question may be, your peers and our experts have the answers.
Ask and connect
Explore our ideation communities and join the one(s) that inspire you.
Collaborate with us
Grow your skills and broaden your network with help from our experts.
Start now
Happy Holidays, from the Juniper Team!
Discover how to reap the benefits
We’re all about connections, so make it easy for you to hop over to your favorite social channels.
Ask and answer questions with a community of Juniper experts.
See more
Chat real-time with experts on channels covering every interest.
Collaborate on Juniper projects with developers worldwide.
Use pre-built topologies to explore our products and solutions—all for free.
All you J-Netters are among the first to know that, on November 18, we’re evolving J-Net into something bigger and better: The Juniper Elevate Community . Months ago, we’d gathered your feedback on Read more
Junos offers a broad range of automation capabilities, starting from a YANG based configuration and state information base , accessible via CLI, NETCONF and REST over gRPC based JET APIs directly into Read more
We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and in the future, it will be difficult to Read more
The Network is an Asset When it Comes to Security, Not a Liability The internet’s greatest feature – its openness – is also its biggest vulnerability. Borderless communication on top of open protocols, Read more
Juniper Connected Security is more than just a marketing catchphrase or a nice metaphorical basket where all of Juniper Networks' information security products can be placed. It is an information security Read more
Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Read more
In previous blogs, we discussed the importance of a strong data-protection program across known and understood data, but once the program has been completed, what’s next? Too often, the answer is ‘nothing’ Read more
Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named 'Masad Stealer’ . This malware targets a messaging application to steal user data, including Cryptocurrency wallets, Read more
How information technology products do what they do matters, and nowhere is this truer than in the case of security. IT infrastructure used to be dedicated to a specific task. But with the rise of virtualization, Read more
Data protection is the ultimate cybersecurity endgame. For this reason, it’s near the top of the agenda in any security team meeting. They know they need to do all they can to ensure data stays inside Read more
The results of the March 2019 Info-Tech Research Group Security Incident and Event Management (SIEM) Customer Experience Report are in and we’re proud to share that Juniper Networks was named a Champion. Read more
Often, the need to protect data gets applied in a blanket mode with all data receiving equal levels of protection. While this may sound ideal, in reality it is far from that and can actually add layers Read more
The value of business data is constantly changing, and more so every year. Data used to consist of a few names and email addresses, some purchasing information and some contact details gleaned from badge-scans Read more
Network operators and security engineers are battling attacks and trying to protect the network while at the same time struggling with more workloads and costs around network administration. By incorporating Read more
The use of containers as a low-footprint infrastructure upon which to run microservices introduces another layer of infrastructure that needs to be secured. With Juniper Connected Security , organizations Read more
IT and infrastructure are expanding, driven by the demands of the business and the expectation of always-on availability with a secure and positive user experience. As the infrastructure grows, it is also Read more
Importance of Overlays Network overlay technologies have played a key role in modern data centers by improving the efficiency, agility, scalability and manageability of application deployments. Cloud Read more
Juniper Connected Security Effective information security requires gaining visibility into potential threats and preventing the spread of malicious activity when it occurs. In a multicloud environment, Read more
Passwords are the foundation upon which much of modern IT security is built, and what better day to discuss the topic than World Password Day , an event which occurs on the first Thursday of May every Read more
While many people are still figuring out segment routing, up crops SRv6, and then SRv6+. Read why we want SRv6+, and why we believe it's crucial we get it. Now - that leads to questions - whats going Read more
Introduction As we saw in the SPF and TE Single Protocol Solutions blog , when deploying differentiated services it becomes necessary on the ingress router to forward some services, those requiring Read more
Information security is inextricable from all aspects of IT and it must include everything from cloud-based advanced threat prevention to physical switches that automatically quarantine infected devices. Read more
Introduction There is often a desire to provide shortest-path MPLS tunnels and Traffic-Engineered or explicit-path MPLS tunnels in a network for differentiated services. Traditionally, this has been Read more
According to Gartner , “by 2020, 75% of organizations will have deployed a multicloud or hybrid cloud model for their IT needs.” 1 While we’ve known for some time that the future is multicloud, ensuring Read more
Introduction Traffic Engineering (TE) has become an indispensable function in many large and small Networks alike. One key objective of modern TE is the optimization of resource utilization. In particular, Read more
As 2018 comes to a close, it’s clear we need continued security innovations to keep our organizations better protected from cybercrime. Bad actors with limitless resources are hyper-innovative in finding Read more
Introduction The trend in recent years with the Internet - cloudification, app-based consumption and interactivity - in connection to rapidly growing our dependence for Internet-based resources for every-day Read more
Getting to Know the Packet Forwarding Engine: An Informal Guide to the Engines of Packet Forwarding By: Salah M. S. Buraiky This article aims at providing the essential concepts Read more
To our customers: thanks a million. This week at Juniper, we are celebrating an epic milestone: the shipment of our one millionth SRX Series platform! That’s one million units deployed Read more
Mounir Hahad is head of Juniper Threat Labs, the organization at Juniper Networks identifying and tracking malicious threats in the wild and ensuring Juniper products implement effective detection techniques. Read more
It’s easy to become an Elevate member and unlock all the features of the community: