<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2537377&amp;fmt=gif">

Axians UK Blog

Advanced Threat Protection Interview: Mike Berkovitch, Juniper Networks on JATP

Oct 30, 2018 2:24:22 PM / by Axians UK posted in Sky Advanced Threat Prevention, Advanced Threat Protection, Guest blog, juniper security, Network Vendors, Network Security, Malware, Juniper Networks Partner, Axians Vendor News, JATP, Juniper Networks

0 Comments

Read More

Automated network monitoring vital to data security

Apr 30, 2018 12:30:34 PM / by Axians UK posted in Network monitoring, cyber attacks, Wifi, security, Malware, enterprise networks, cyber security, Hotel netwoks, Wireless network security

0 Comments

Advanced persistent threats and other forms of covert malware can be detected by better network monitoring.

Read More

Juniper Networks Software Defined Secure Networks (SDSN) Platform extends to Multi-Vendor Environments and CASB Threat Intelligence

Aug 22, 2017 11:56:05 AM / by Axians UK posted in Data Protection, Sky Advanced Threat Prevention, CipherCloud, Secure Networks, Core Networks, Netskope, juniper security, Cloud Data, security, Networks Security, Sky ATP, Network Security, Software Defined, DDoS, Technology Network, Malware, Juniper Networks Partner, SDSN, Juniper Networks SDSN, cyber security, Axians Vendor News, Juniper Networks, Threat Intelligence Platform

0 Comments

After launching its Software-Defined Secure Network (SDSN) portfolio in 2016, Juniper Networks is delivering on its promise to support additional security vendors on the platform as it makes better use of cloud-hosted resources in malware detection and prevention.

Read More

Larger DDoS attacks adding power to potency

May 11, 2017 3:15:40 PM / by Axians UK posted in Verisign, Technology News, ddos mitigation, DDoS attack, security, DDoS, Technology, infosecurity, cyber attac, Malware, Infrastructure, Axians, cyber security, cyber crime, Security Assessment, Infosec, Network Managers

0 Comments

Malware and processing muscle to rent is swelling hacker armouries

Distributed denial of service (DDoS) attacks have severe consequences for their victims, causing considerable operational disruption and undermining trust in the organisation amongst customers, end users and business partners.

Read More

Nothing to fear from rise of the machines

Apr 11, 2017 4:04:49 PM / by Axians UK posted in m2m, cyber attacks, SDN, security, Malware, SDSN, Automation, Network Automation, Machines, NFV

0 Comments

Automation has long been identified as a fast track to reduced operational expenditure and improvements in business efficiency, but emerging technology has broadened that scope by a considerable margin.

Read More

Software Defined Secure Networks: An Interview with Ken O’Kelly, Consulting Engineer, Juniper Networks

Dec 5, 2016 1:31:14 PM / by Axians UK posted in Secure Networks, Firewalls, security, Software Defined, SDN Overlay, Overlay, Technology, Higher Education technology, Junos Space, vmWare, Malware, Infrastructure, Education Tech, SDSN, Axians, Software Defined Secure Networks, Axians Vendor News, Juniper Networks, computer

0 Comments

Ken O’Kelly has been a key consultant in Juniper Networks; UK and Ireland security business for the past four and a half years. He previously held various roles (latterly as a security architect) during a 14 year stint with Imtech ICT.

Ken tells Axians about Juniper’s latest software defined security network (SDSN) solution and how it will make life easier for  IT departments tasked with controlling network access for thousands of users.

Q: What is Juniper’s software defined security network (SDSN)?

SDSN is all about changing how you build the network. Traditionally organisations have tended to build security into the perimeter and everything outside that perimeter is untrusted and everything inside it is trusted. That is a bit of a challenge these days given that we all take our laptops and smartphones outside of that trusted barrier when we go home, where malware can infect them and vulnerabilities can be compromised. We then bring the device back inside the network perimeter and now it is trusted again and that gives any threat carte blanche to get around the network.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts