|By Elizabeth White||
|February 25, 2013 07:00 AM EST||
"Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks," said Nawaf Bitar, senior vice president and general manager, Security Business Unit, Juniper Networks, as Juniper today unveiled its next-generation security products for protecting data center environments, fortified by the Junos Spotlight Secure a global attacker intelligence service
"This is only possible if you are able to collect definitive information about attackers," Bitar continued. "Junos Spotlight Secure provides the platform to deliver advanced intelligence with device-level attacker tracking. This integrated approach improves security intelligence, provides collective defense against attackers and delivers true defense in-depth for the data center," he added.
Spotlight Secure, said Bitar, will give Juniper's customers "definitive intelligence about threats, attackers and individual devices across a wide number of networks and Juniper security products. With Juniper's new products, enterprises and service providers can achieve advanced protection against data exfiltration, website outages and other serious threats."
Today, companies are struggling to keep pace with the increasing volume and sophistication of cyber attacks, particularly those aimed at web applications and servers, which deal in high-value traffic and typically reside in data centers. According to a new Ponemon Institute report, commissioned by Juniper Networks, web-based attacks (62 percent) and Denial of Service attacks (60 percent) were cited as the most serious types of attacks experienced by the respondents' companies. More telling, a majority (61 percent) of IT and IT security practitioners surveyed also indicated current next-generation firewalls and IP reputation feeds only address part of the cyber security threat. That leaves significant exposure to the most concerning attacks and protecting against these attacks requires security systems that incorporate real-time, definitive and actionable intelligence about attackers.
To effectively secure data centers Juniper believes companies must have knowledge of the attacking devices, not just the IP address, and quickly disseminate that intelligence across the data center and into the network. Juniper Networks can deliver this intelligence through its Junos Spotlight Secure global attacker intelligence service, which acts as the consolidation point for attacker and threat information, feeding real-time intelligence to Juniper's security solutions. The first products to leverage Spotlight Secure security intelligence are Junos WebApp Secure and Juniper Networks® SRX Series Services Gateways.
Juniper Networks is introducing new products and enhancements that provide next-generation security to protect against the biggest threats to data centers.
- Junos Spotlight Secure is the industry's only cloud-based global attacker intelligence service that identifies individual attackers at the device level and tracks them in a global database. Compared with currently available reputation feeds that rely only on IP addresses, Junos Spotlight Secure offers customers more detailed security intelligence about attackers and significantly reduces false positives. The solution creates a persistent fingerprint of attacker devices based on over 200 unique attributes, delivering precision blocking of attackers without blocking valid users. Once an attacker is identified and fingerprinted on a subscriber's network using Junos WebApp Secure, the database can immediately share the attacker profiles with other subscribers, providing advanced real-time security across multiple networks.
- Junos WebApp Secure (formerly named Mykonos) takes web application protection to the next level by providing more definitive intelligence about attackers. Deployed in front of application servers behind the firewall, WebApp Secure integrates security intelligence from other sources provided by the Junos Spotlight Secure global attacker intelligence service. This integrated intelligence enables Juniper to deliver threat mitigation with significantly better accuracy compared to IP address-only approaches like current next-generation firewalls and reputation feeds. In addition, Junos WebApp Secure uses the latest Intrusion Deception technology to misdirect and mislead attackers while simultaneously profiling and fingerprinting them.
- Juniper Networks SRX Series Services Gateways integrated with Junos WebApp Secure now benefits from the latest Intrusion Deception technology, as well as the Junos Spotlight Secure global attacker intelligence service. The integration extends the ability of the SRX Series to block attackers that are identified at the security perimeter, and is particularly effective in blocking botnets and large scale web attacks.
- Junos DDoS Secure will leverage Juniper's recent acquisition of certain assets from Webscreen Systems to deliver a fully automated DDoS protection system for websites and web applications. The solution uses a unique, behavior-based approach to DDoS mitigation that provides protection up to 40Gb/s for high-volume attacks, as well as advanced "low-and-slow" application attacks with minimal false positives. Junos DDoS Secure offers the flexibility of being deployed as either a hardware appliance or as a virtual machine in private, public, or hybrid cloud environments.
Juniper Networks security solutions will also be incorporated into security service chains, as outlined in the company's recent Software Defined Networking (SDN) vision and strategy announcement. This approach will allow additional intelligence to be shared across network layers and enable the quick deployment of security services as part of the SDN service chains. Juniper's vision for implementing SDN includes four steps, beginning with centralized management, which is available today with Juniper Networks Junos Space Security Director.
Sep. 29, 2016 11:00 AM EDT Reads: 3,501
Sep. 29, 2016 11:00 AM EDT Reads: 4,164
Sep. 29, 2016 11:00 AM EDT Reads: 2,386
Sep. 29, 2016 11:00 AM EDT Reads: 288
Sep. 29, 2016 11:00 AM EDT Reads: 386
Sep. 29, 2016 10:45 AM EDT Reads: 436
Sep. 29, 2016 10:30 AM EDT Reads: 4,441
Sep. 29, 2016 10:30 AM EDT Reads: 2,976
Sep. 29, 2016 10:30 AM EDT Reads: 1,232
Sep. 29, 2016 10:30 AM EDT Reads: 2,892
Sep. 29, 2016 10:15 AM EDT Reads: 597
Sep. 29, 2016 10:15 AM EDT Reads: 2,365
Sep. 29, 2016 10:15 AM EDT Reads: 3,296
Sep. 29, 2016 10:00 AM EDT Reads: 3,901
Sep. 29, 2016 10:00 AM EDT Reads: 1,164
Sep. 29, 2016 10:00 AM EDT Reads: 2,279
Sep. 29, 2016 10:00 AM EDT Reads: 2,702
Sep. 29, 2016 09:45 AM EDT Reads: 1,206
Sep. 29, 2016 09:45 AM EDT Reads: 2,645
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 29, 2016 09:30 AM EDT Reads: 633