Juniper Networks' Audacious Goals for Automated Networking

At Juniper Networks’ recent NXTWORK customer summit and analyst day, the major announcement was Software Defined Secure Networks (SDSN), a platform for policy, detection, and enforcement for every element of the network. This has been covered in the press and on Juniper’s web site.  The photo to the left includes Rami Rahim (CEO),  Jonathan Davidson (EVP), and Mike Marcellin (CMO) during the analyst day Q&A.

 

Equally interesting was Juniper’s long-term vision for an automated network, which they called a self-driving network. In the same way automated cars may start to take over many manual driving tasks, so too might automated networks take over manual networking tasks. This vision, which happens to go by the same three letters as Software Defined Networks, is ambitious. At the closing session, Pradeep Sindhu, Founder, Vice Chairman, and CTO presented a view of the state of the network, and Dr. Kireeti Kompella discussed the self-driving network.

Topics: Networking Juniper Networks

Are Enterprise Organizations Ready to Use Free AV Software?

Last year, ESG published a research report titled, Advanced Malware Detection and Protection Trends, based upon a survey of 315 security professionals working at enterprise organizations (i.e., more than 1,000 employees). In one question, ESG asked security professionals whether they agreed or disagreed with the following statement: “Commercial host-based security software (i.e., AV) is more or less the same as free security software.”

It turns out that 36% of security professionals either “strongly agree” or “agree" with this statement, while another 25% are sitting on the fence (i.e., they neither agree nor disagree with the statement).

Topics: Microsoft Endpoint & Application Virtualization Cisco Information and Risk Management Sourcefire McAfee Security and Privacy Security Bradford Networks Malwarebytes Kaspersky Lab Juniper Networks freeware ForeScout Avast trend micro bromium Symantec security intelligence Great Bay Software antivirus Cylance Bit9 Anti-malware APT

New Year’s Forecast for the Information Security Industry: Part 1

I hope my cybersecurity colleagues enjoyed their holiday these past few weeks. It was surely well deserved as the year 2013 will be remembered as a whirlwind of activity featuring successful IPOs and scary security incidents. Given this, it’s likely that security professionals spent the last few weeks with one eye on family and holidays and another on emerging details about the massive breach at Target.

So what’s in store for the information security industry in 2014? On the surface, it should be a happy new year across the board for security technology vendors, MSSPs, and professional service firms. That said, there is a lot of work ahead as enterprise organizations figure out how to transform an army of point tools and manual processes into a cohesive security strategy.

Topics: IBM Apple Network Security Cybersecurity Check Point Fortinet Cisco Information and Risk Management FireEye HP Dell McAfee Security and Privacy Security Juniper Networks Lockheed Martin E&Y Leidos Booz Allen Accenture Blue Coat ARM CSC Intel NIST

Network Security Trumps Server Security in the Enterprise (Part 2)

I posted a blog at the end of March describing the fact that network-security-trumps-server-security-in-the-enterprise/index.html" target="_blank">network security processes, skills, and technical controls are often more thorough than server security processes, skills, and technical controls at enterprise organizations. As a review, recent ESG research revealed that:

Topics: Information Security IBM Check Point Palo Alto Networks Cisco network Information and Risk Management Sourcefire HP McAfee Security and Privacy Security IDS Juniper Networks Firewall SDN IDS/IPS

Software-defined Security?

Security continues to be a major hurdle for server virtualization and cloud computing so we are likely to hear a lot of cybersecurity buzz coming out of VMworld this week.

Topics: Cloud Computing Check Point Cisco VMware Private Cloud Infrastructure Networking Information and Risk Management Security and Privacy Amazon google VMworld Juniper Networks Firewall SDN Nicira OpenFlow crossbeam systems Public Cloud Service

New Requirements for Security Monitoring

Today's information security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging.

Topics: IBM Cybersecurity Cisco Information and Risk Management HP McAfee Security and Privacy SIEM ArcSight Juniper Networks RSA Solera Networks NetWitness Quest Software Tibco LogLogic Q1 Labs

A Multitude of Mobile Security Issues

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Topics: Apple Microsoft End-User Computing Check Point MDM Cisco Information and Risk Management McAfee mobile Security and Privacy google BYOD android Good Technology Juniper Networks Black Hat trend micro Symantec Anti-malware Interop MobileIron DLP RSA Security Conference iPad

BYOD Security Gotchas

I've spent a fair amount of time lately on BYOD (Bring Your Own Device), mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

Topics: Cisco Information and Risk Management Security and Privacy Security BYOD endpoint security android Juniper Networks NAC mobile device CISO Extreme Networks iPad Enterasys

What I Like About HP's Virtual Application Network (VAN) Announcement

Pity poor legacy networks. There's a tremendous amount of change going on with everything that connects to networks - mobile devices, virtual hosts, cloud computing applications- but networks have remained static, inflexible, and technically esoteric. This dichotomy leads to a situation that ESG calls "network discontinuity"-legacy networks just can't keep up with modern business and technical requirements.

Topics: Cisco IT Infrastructure Private Cloud Infrastructure Networking HP Compute Juniper Networks software-defined networking Extreme Networks OpenFlow Arista Networks

The Many Synergies of Dell's Acquisition of SonicWall

You have to give Dell a lot of credit. As the company recognized changes in the industry, it was willing to move beyond efficient PC/server manufacturing and distribution into new technologies and labor-intensive services. In my domain, this led to the acquisition of SecureWorks and Force10. Today, Dell took another step into end-to-end solutions by grabbing security veteran SonicWall.

Topics: Azure Microsoft Palo Alto Networks Fortinet VMware Information and Risk Management HP Dell Security and Privacy Juniper Networks Hyper-V vShield SecureWorks SonicWall