Bait and Tackle: What Can Be Done About Phishing?

Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named ‘Masad Stealer’. This malware targets a messaging application to steal user data, including Cryptocurrency wallets, credit card

Share
Automating Threat Detection and Remediation with Juniper Connected Security

How information technology products do what they do matters, and nowhere is this truer than in the case of security. IT infrastructure used to be dedicated to a specific task.

Share
For Better Protected Data, Add a Dose of Healthy Skepticism

Data protection is the ultimate cybersecurity endgame. For this reason, it’s near the top of the agenda in any security team meeting. They know they need to do all they

Share
Juniper Named a Champion in the Info-Tech Research Group SIEM Customer Experience Report

The results of the March 2019 Info-Tech Research Group Security Incident and Event Management (SIEM) Customer Experience Report are in and we’re proud to share that Juniper Networks was named

Share
The Human Element: Data Protection is More Than Machines

Often, the need to protect data gets applied in a blanket mode with all data receiving equal levels of protection. While this may sound ideal, in reality it is far

Share
Defenses and Dangers: Understanding Your Data Protection Needs

The value of business data is constantly changing, and more so every year. Data used to consist of a few names and email addresses, some purchasing information and some contact

Share
Security Intelligence for the MX Series Routers

Network operators and security engineers are battling attacks and trying to protect the network while at the same time struggling with more workloads and costs around network administration. By incorporating

Share
Extending Security to All Points of Connection: Containerized Security with the cSRX

The use of containers as a low-footprint infrastructure upon which to run microservices introduces another layer of infrastructure that needs to be secured. With Juniper Connected Security, organizations can provide

Share
Delivering Security That Scales

IT and infrastructure are expanding, driven by the demands of the business and the expectation of always-on availability with a secure and positive user experience. As the infrastructure grows, it

Share
Juniper Connected Security: On Defending a Multicloud Environment

Effective information security requires gaining visibility into potential threats and preventing the spread of malicious activity when it occurs. In a multicloud environment, it is easy to lose viability due

Share