Welcome to the Juniper #RSAC2020 liveblog!  Stick with us for live updates on the hottest topics being discussed throughout the conference. We are excited to hear what’s on the minds

Share
Juniper Networks Unleashes the Power of a Threat-Aware Network

Juniper Networks is pleased to announce updates to its Juniper Connected Security strategy, enabling organizations to secure their networks on-premises, at the edge and on every cloud in between. Juniper

Share
Rise of the Machines – Using AI, Machine Learning and Automation to Improve Your Security Posture

We live in a world where everything is being automated – from the “smart” gadgets in your home to, eventually, the self-driving car that takes you to work. Now and

Share
Juniper Universal Services Framework for Security = Operational Consistency

The internet’s greatest feature – its openness – is also its biggest vulnerability. Borderless communication on top of open protocols, without government interference (mostly) has facilitated robust economic growth and

Share
The Power of a Threat-Aware Network

Juniper Connected Security is more than just a marketing catchphrase or a nice metaphorical basket where all of Juniper Networks’ information security products can be placed. It is an information

Share
Juniper Networks Achieves Recommended Rating from NSS Labs for Data Center Security Gateway

Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year’s Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service

Share
The Power of Automation for Data Protection

In previous blogs, we discussed the importance of a strong data-protection program across known and understood data, but once the program has been completed, what’s next? Too often, the answer

Share
Bait and Tackle: What Can Be Done About Phishing?

Last month, Juniper Threat Labs released research on a new Trojan-delivered malware named ‘Masad Stealer’. This malware targets a messaging application to steal user data, including Cryptocurrency wallets, credit card

Share
Automating Threat Detection and Remediation with Juniper Connected Security

How information technology products do what they do matters, and nowhere is this truer than in the case of security. IT infrastructure used to be dedicated to a specific task.

Share
For Better Protected Data, Add a Dose of Healthy Skepticism

Data protection is the ultimate cybersecurity endgame. For this reason, it’s near the top of the agenda in any security team meeting. They know they need to do all they

Share