<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2537377&amp;fmt=gif">

Axians UK Blog

From ancient ruins to modern strongholds: Why network security must move beyond the firewall

May 23, 2018 1:17:39 PM / by Axians UK posted in Security posture, Automated Network solutions, Core Networks, Firewalls, security, Sky ATP, Network Security, Network Security Skills, BYOD, Juniper Networks Partner, SDSN, Juniper Networks SDSN, Axians, cyber security, Software Defined Secure Networks, Axians Vendor News, Juniper Networks, BYOD policy

0 Comments

In today’s world of dynamic corporate networks and ever-developing security threats, traditional network security can be imagined as an ancient castle. In this modern connected world, those ancient structures are crumbling.

Read More

Software Defined Secure Networks: An Interview with Ken O’Kelly, Consulting Engineer, Juniper Networks

Dec 5, 2016 1:31:14 PM / by Axians UK posted in Secure Networks, Firewalls, security, Software Defined, SDN Overlay, Overlay, Technology, Higher Education technology, Junos Space, vmWare, Malware, Infrastructure, Education Tech, SDSN, Axians, Software Defined Secure Networks, Axians Vendor News, Juniper Networks, computer

0 Comments

Ken O’Kelly has been a key consultant in Juniper Networks; UK and Ireland security business for the past four and a half years. He previously held various roles (latterly as a security architect) during a 14 year stint with Imtech ICT.

Ken tells Axians about Juniper’s latest software defined security network (SDSN) solution and how it will make life easier for  IT departments tasked with controlling network access for thousands of users.

Q: What is Juniper’s software defined security network (SDSN)?

SDSN is all about changing how you build the network. Traditionally organisations have tended to build security into the perimeter and everything outside that perimeter is untrusted and everything inside it is trusted. That is a bit of a challenge these days given that we all take our laptops and smartphones outside of that trusted barrier when we go home, where malware can infect them and vulnerabilities can be compromised. We then bring the device back inside the network perimeter and now it is trusted again and that gives any threat carte blanche to get around the network.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

See all

Recent Posts