|By Elizabeth White||
|February 25, 2013 07:00 AM EST||
"Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks," said Nawaf Bitar, senior vice president and general manager, Security Business Unit, Juniper Networks, as Juniper today unveiled its next-generation security products for protecting data center environments, fortified by the Junos Spotlight Secure a global attacker intelligence service
"This is only possible if you are able to collect definitive information about attackers," Bitar continued. "Junos Spotlight Secure provides the platform to deliver advanced intelligence with device-level attacker tracking. This integrated approach improves security intelligence, provides collective defense against attackers and delivers true defense in-depth for the data center," he added.
Spotlight Secure, said Bitar, will give Juniper's customers "definitive intelligence about threats, attackers and individual devices across a wide number of networks and Juniper security products. With Juniper's new products, enterprises and service providers can achieve advanced protection against data exfiltration, website outages and other serious threats."
Today, companies are struggling to keep pace with the increasing volume and sophistication of cyber attacks, particularly those aimed at web applications and servers, which deal in high-value traffic and typically reside in data centers. According to a new Ponemon Institute report, commissioned by Juniper Networks, web-based attacks (62 percent) and Denial of Service attacks (60 percent) were cited as the most serious types of attacks experienced by the respondents' companies. More telling, a majority (61 percent) of IT and IT security practitioners surveyed also indicated current next-generation firewalls and IP reputation feeds only address part of the cyber security threat. That leaves significant exposure to the most concerning attacks and protecting against these attacks requires security systems that incorporate real-time, definitive and actionable intelligence about attackers.
To effectively secure data centers Juniper believes companies must have knowledge of the attacking devices, not just the IP address, and quickly disseminate that intelligence across the data center and into the network. Juniper Networks can deliver this intelligence through its Junos Spotlight Secure global attacker intelligence service, which acts as the consolidation point for attacker and threat information, feeding real-time intelligence to Juniper's security solutions. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks® SRX Series Services Gateways.
Juniper Networks is introducing new products and enhancements that provide next-generation security to protect against the biggest threats to data centers.
- Junos Spotlight Secure is the industry's only cloud-based global attacker intelligence service that identifies individual attackers at the device level and tracks them in a global database. Compared with currently available reputation feeds that rely only on IP addresses, Junos Spotlight Secure offers customers more detailed security intelligence about attackers and significantly reduces false positives. The solution creates a persistent fingerprint of attacker devices based on over 200 unique attributes, delivering precision blocking of attackers without blocking valid users. Once an attacker is identified and fingerprinted on a subscriber's network using Junos WebApp Secure, the database can immediately share the attacker profiles with other subscribers, providing advanced real-time security across multiple networks.
- Junos WebApp Secure (formerly named Mykonos) takes web application protection to the next level by providing more definitive intelligence about attackers. Deployed in front of application servers behind the firewall, WebApp Secure integrates security intelligence from other sources provided by the Junos Spotlight Secure global attacker intelligence service. This integrated intelligence enables Juniper to deliver threat mitigation with significantly better accuracy compared to IP address-only approaches like current next-generation firewalls and reputation feeds. In addition, Junos WebApp Secure uses the latest Intrusion Deception technology to misdirect and mislead attackers while simultaneously profiling and fingerprinting them.
- Juniper Networks SRX Series Services Gateways integrated with Junos WebApp Secure now benefits from the latest Intrusion Deception technology, as well as the Junos Spotlight Secure global attacker intelligence service. The integration extends the ability of the SRX Series to block attackers that are identified at the security perimeter, and is particularly effective in blocking botnets and large scale web attacks.
- Junos DDoS Secure will leverage Juniper's recent acquisition of certain assets from Webscreen Systems to deliver a fully automated DDoS protection system for websites and web applications. The solution uses a unique, behavior-based approach to DDoS mitigation that provides protection up to 40Gb/s for high-volume attacks, as well as advanced "low-and-slow" application attacks with minimal false positives. Junos DDoS Secure offers the flexibility of being deployed as either a hardware appliance or as a virtual machine in private, public, or hybrid cloud environments.
Juniper Networks security solutions will also be incorporated into security service chains, as outlined in the company's recent Software Defined Networking (SDN) vision and strategy announcement. This approach will allow additional intelligence to be shared across network layers and enable the quick deployment of security services as part of the SDN service chains. Juniper's vision for implementing SDN includes four steps, beginning with centralized management, which is available today with Juniper Networks Junos Space Security Director.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 9, 2016 08:00 AM EST Reads: 974
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 9, 2016 07:45 AM EST Reads: 1,191
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Dec. 9, 2016 07:00 AM EST Reads: 4,348
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
Dec. 9, 2016 06:00 AM EST Reads: 823
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Dec. 9, 2016 05:00 AM EST Reads: 3,141
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Dec. 9, 2016 04:45 AM EST Reads: 504
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 9, 2016 04:30 AM EST Reads: 1,035
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, shared the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
Dec. 9, 2016 04:15 AM EST Reads: 3,558
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Dec. 9, 2016 04:15 AM EST Reads: 1,457
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Dec. 9, 2016 04:00 AM EST Reads: 592
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Dec. 9, 2016 04:00 AM EST Reads: 6,346
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 9, 2016 03:30 AM EST Reads: 502
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Dec. 9, 2016 03:00 AM EST Reads: 425
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Dec. 9, 2016 02:15 AM EST Reads: 6,237
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
Dec. 9, 2016 02:00 AM EST Reads: 3,074
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 9, 2016 01:45 AM EST Reads: 1,000
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 9, 2016 01:45 AM EST Reads: 1,958
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 9, 2016 01:15 AM EST Reads: 3,981
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Dec. 9, 2016 01:15 AM EST Reads: 1,670
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Dec. 9, 2016 12:45 AM EST Reads: 5,131