Most Recent Blogs

Juniper Networks' Audacious Goals for Automated Networking

Posted: October 17, 2016   /   By: Dan Conde   /   Tags: Networking, Juniper Networks

NXTWORK1.jpg

At Juniper Networks’ recent NXTWORK customer summit and analyst day, the major announcement was Software Defined Secure Networks (SDSN), a platform for policy, detection, and enforcement for every element of the network. This has been covered in the press and on Juniper’s web site.  The photo to the left includes Rami Rahim (CEO),  Jonathan Davidson (EVP), and Mike Marcellin (CMO) during the analyst day Q&A.

 

Equally interesting was Juniper’s long-term vision for an automated network, which they called a self-driving network. In the same way automated cars may start to take over many manual driving tasks, so too might automated networks take over manual networking tasks. This vision, which happens to go by the same three letters as Software Defined Networks, is ambitious. At the closing session, Pradeep Sindhu, Founder, Vice Chairman, and CTO presented a view of the state of the network, and Dr. Kireeti Kompella discussed the self-driving network.

Read More

Are Enterprise Organizations Ready to Use Free AV Software?

Posted: March 20, 2014   /   By: Jon Oltsik   /   Tags: Microsoft, Endpoint & Application Virtualization, Cisco, Information and Risk Management, Sourcefire, McAfee, Security and Privacy, Security, Bradford Networks, Malwarebytes, Kaspersky Lab, Juniper Networks, freeware, ForeScout, Avast, trend micro, bromium, Symantec, security intelligence, Great Bay Software, antivirus, Cylance, Bit9, Anti-malware, APT

Last year, ESG published a research report titled, Advanced Malware Detection and Protection Trends, based upon a survey of 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees). In one question, ESG asked security professionals whether they agreed or disagreed with the following statement: “Commercial host-based security software (i.e., AV) is more or less the same as free security software.”

It turns out that 36% of security professionals either “strongly agree” or “agree" with this statement, while another 25% are sitting on the fence (i.e., they neither agree nor disagree with the statement).

Read More

New Year’s Forecast for the Information Security Industry: Part 1

Posted: January 02, 2014   /   By: Jon Oltsik   /   Tags: IBM, Apple, Network Security, Cybersecurity, Check Point, Fortinet, Cisco, Information and Risk Management, FireEye, HP, Dell, McAfee, Security and Privacy, Security, Juniper Networks, Lockheed Martin, E&Y, Leidos, Booz Allen, Accenture, Blue Coat, ARM, CSC, Intel, NIST

I hope my cybersecurity colleagues enjoyed their holiday these past few weeks. It was surely well deserved as the year 2013 will be remembered as a whirlwind of activity featuring successful IPOs and scary security incidents. Given this, it’s likely that security professionals spent the last few weeks with one eye on family and holidays and another on emerging details about the massive breach at Target.

So what’s in store for the information security industry in 2014? On the surface, it should be a happy new year across the board for security technology vendors, MSSPs, and professional service firms. That said, there is a lot of work ahead as enterprise organizations figure out how to transform an army of point tools and manual processes into a cohesive security strategy.

Read More

Network Security Trumps Server Security in the Enterprise (Part 2)

Posted: April 30, 2013   /   By: Jon Oltsik   /   Tags: Information Security, IBM, Check Point, Palo Alto Networks, Cisco, network, Information and Risk Management, Sourcefire, HP, McAfee, Security and Privacy, Security, IDS, Juniper Networks, Firewall, SDN, IDS/IPS

I posted a blog at the end of March describing the fact that network-security-trumps-server-security-in-the-enterprise/index.html" target="_blank">network security processes, skills, and technical controls are often more thorough than server security processes, skills, and technical controls at enterprise organizations. As a review, recent ESG research revealed that:

Read More

Software-defined Security?

Posted: August 27, 2012   /   By: Jon Oltsik   /   Tags: Cloud Computing, Check Point, Cisco, VMware, Private Cloud Infrastructure, Networking, Information and Risk Management, Security and Privacy, Amazon, google, VMworld, Juniper Networks, Firewall, SDN, Nicira, OpenFlow, crossbeam systems, Public Cloud Service

Security continues to be a major hurdle for server virtualization and cloud computing so we are likely to hear a lot of cybersecurity buzz coming out of VMworld this week.

Read More

New Requirements for Security Monitoring

Posted: July 31, 2012   /   By: Jon Oltsik   /   Tags: IBM, Cybersecurity, Cisco, Information and Risk Management, HP, McAfee, Security and Privacy, SIEM, ArcSight, Juniper Networks, RSA, Solera Networks, NetWitness, Quest Software, Tibco, LogLogic, Q1 Labs

Today's information security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging.

Read More

A Multitude of Mobile Security Issues

Posted: July 20, 2012   /   By: Jon Oltsik   /   Tags: Apple, Microsoft, End-User Computing, Check Point, MDM, Cisco, Information and Risk Management, McAfee, mobile, Security and Privacy, google, BYOD, android, Good Technology, Juniper Networks, Black Hat, trend micro, Symantec, Anti-malware, Interop, MobileIron, DLP, RSA Security Conference, iPad

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Read More

BYOD Security Gotchas

Posted: May 30, 2012   /   By: Jon Oltsik   /   Tags: Cisco, Information and Risk Management, Security and Privacy, Security, BYOD, endpoint security, android, Juniper Networks, NAC, mobile device, CISO, Extreme Networks, iPad, Enterasys

I've spent a fair amount of time lately on BYOD (Bring Your Own Device), mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

Read More

What I Like About HP's Virtual Application Network (VAN) Announcement

Posted: April 10, 2012   /   By: Jon Oltsik   /   Tags: Cisco, IT Infrastructure, Private Cloud Infrastructure, Networking, HP, Compute, Juniper Networks, software-defined networking, Extreme Networks, OpenFlow, Arista Networks

Pity poor legacy networks. There's a tremendous amount of change going on with everything that connects to networks - mobile devices, virtual hosts, cloud computing applications- but networks have remained static, inflexible, and technically esoteric. This dichotomy leads to a situation that ESG calls "network discontinuity"-legacy networks just can't keep up with modern business and technical requirements.

Read More

The Many Synergies of Dell's Acquisition of SonicWall

Posted: March 13, 2012   /   By: Jon Oltsik   /   Tags: Azure, Microsoft, Palo Alto Networks, Fortinet, VMware, Information and Risk Management, HP, Dell, Security and Privacy, Juniper Networks, Hyper-V, vShield, SecureWorks, SonicWall

You have to give Dell a lot of credit. As the company recognized changes in the industry, it was willing to move beyond efficient PC/server manufacturing and distribution into new technologies and labor-intensive services. In my domain, this led to the acquisition of SecureWorks and Force10. Today, Dell took another step into end-to-end solutions by grabbing security veteran SonicWall.

Read More

Posts by Topic

see all