<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2537377&amp;fmt=gif">

Axians UK Blog

Juniper Networks Software Defined Secure Networks (SDSN) Platform extends to Multi-Vendor Environments and CASB Threat Intelligence

Aug 22, 2017 11:56:05 AM / by Axians UK posted in Data Protection, Sky Advanced Threat Prevention, CipherCloud, Secure Networks, Core Networks, Netskope, juniper security, Cloud Data, security, Networks Security, Sky ATP, Network Security, Software Defined, DDoS, Technology Network, Malware, Juniper Networks Partner, SDSN, Juniper Networks SDSN, cyber security, Axians Vendor News, Juniper Networks, Threat Intelligence Platform

0 Comments

After launching its Software-Defined Secure Network (SDSN) portfolio in 2016, Juniper Networks is delivering on its promise to support additional security vendors on the platform as it makes better use of cloud-hosted resources in malware detection and prevention.

Read More

Software Defined Secure Networks: An Interview with Ken O’Kelly, Consulting Engineer, Juniper Networks

Dec 5, 2016 1:31:14 PM / by Axians UK posted in Secure Networks, Firewalls, security, Software Defined, SDN Overlay, Overlay, Technology, Higher Education technology, Junos Space, vmWare, Malware, Infrastructure, Education Tech, SDSN, Axians, Software Defined Secure Networks, Axians Vendor News, Juniper Networks, computer

0 Comments

Ken O’Kelly has been a key consultant in Juniper Networks; UK and Ireland security business for the past four and a half years. He previously held various roles (latterly as a security architect) during a 14 year stint with Imtech ICT.

Ken tells Axians about Juniper’s latest software defined security network (SDSN) solution and how it will make life easier for  IT departments tasked with controlling network access for thousands of users.

Q: What is Juniper’s software defined security network (SDSN)?

SDSN is all about changing how you build the network. Traditionally organisations have tended to build security into the perimeter and everything outside that perimeter is untrusted and everything inside it is trusted. That is a bit of a challenge these days given that we all take our laptops and smartphones outside of that trusted barrier when we go home, where malware can infect them and vulnerabilities can be compromised. We then bring the device back inside the network perimeter and now it is trusted again and that gives any threat carte blanche to get around the network.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts