Juniper Networks - Experts & Thought Leaders
Latest Juniper Networks news & announcements
AMG Systems, the pioneer in highly robust connectivity and transmission solutions for IP Video, is seeing increasing demand for the skills of its growing Professional Services team which has been accumulating expertise in custom network design, configuration and deployment with a view to serving systems integrators – enabling them to deliver highly secure, scalable and available networks for more customers installing AMG Systems’ UK-manufactured industrial edge switches. As a Juniper Networks partner, AMG Systems can offer a complete network solution under one roof. AMG Professional Services is able to design, configure and test the entire network from edge devices (AMG’s specialty), right through to the core network powered by Juniper’s technology. This simplifies the process for clients and allows AMG to provide a more comprehensive, end-to-end professional service. AI-powered network solutions AMG Professional Services has been building up its team of experienced network engineers Toby Featherstone, Technical Services Manager, AMG Systems, explained: “By combining our expertise in edge network design for security systems with Juniper’s industry-pioneering secure and AI-powered network solutions we can deliver superior network designs for our clients.” AMG Professional Services has been building up its team of experienced network engineers alongside its market-pioneering networking products for several years now. This preparation means that the AMG Professional Services team is now ready to respond rapidly and effectively to whatever network design, configuration, hardening and deployment work that it is assigned. Network design services AMG Professional Services can also provide consultancy for the initial phases of a project when security threats are being determined and vulnerability assessments are being carried out. The team is structured to allow customers to use as much, or as little, help as they require. So, customers can elect to outsource design and network configuration projects end to end, or instead bring AMG’s expertise in for specific roles such as network hardening or testing prior to a new physical security system going live. The team is structured to allow customers to use as much, or as little, help as they require AMG Systems increasingly acts as a strategic partner for installers and systems integrators that need to optimise surveillance and other management and operational systems, using existing network infrastructure wherever possible. So, from day one, AMG Professional Services has the technical expertise and capacity to offer full network design services, pre-and post-sales support, full low- and high-level network design, as well as providing testing and training facilities. Configuration of network infrastructure Steve Clarke, Managing Director of AMG Systems, said: “With the advent of AI and increasingly sophisticated video analytics built into surveillance cameras, plus audio analytics in smart sensors and increasing complexity of networks, all challenged by the proliferation of bad actors attempting to disrupt critical services which depend increasingly on those networks, it became increasingly clear to us that focusing on robust design and hardened configuration of network infrastructure met a growing market need. So, it’s the right time to expand AMG Professional Services. Our skills are set to experience unprecedented demand.” Toby Featherstone of AMG Systems, added: “We can lead from the pre-sales stage to make sure networks are designed robustly, with redundancy – working all the way through to configuration and testing stages to ensure prompt reliable and scalable solutions are delivered on time and under budget." Zero networking skills Featherstone added: “If you go back just 15 years nearly all surveillance systems were analogue CCTV-based. Zero networking skills were needed in this market then." "However, today AMG Systems increasingly finds itself filling network skills gaps particularly in the UK and Ireland as customers increasingly want to take advantage of the latest intelligent devices which are highly dependent on well configured, highly secure, robust and available networks.”
Navigating security is like trying to make way through a high-stakes labyrinth. There are so many different, complicated passageways that make it hard to reach the destination. Zero Trust can help ease this journey. Zero Trust Dell is leading a paradigm shift in security, but it will take a village to bring it to life. This paradigm is Zero Trust, and it is helping pull together the village through a robust partner ecosystem. Zero Trust is a cybersecurity framework that automates an organisaton’s security architecture and orchestrates a response as soon as systems are attacked. The challenge, however, lies in implementing a complete solution guided by the seven pillars of Zero Trust. No company can do this alone. Zero Trust ecosystem Dell brings together more than 30 leading technology and security companies to create a unified solution To help private and public sector organisatons simplify the adoption, Dell is building a Zero Trust ecosystem. It brings together more than 30 leading technology and security companies to create a unified solution across infrastructure platforms, applications, clouds, and services. An advanced private cloud solution Through this ecosystem, Dell and its partners are paving the way to adoption. Together with the Maryland Innovation Security Institute (MISI), it is providing best-in-class technology at the Zero Trust Center of Excellence and constructing an advanced private cloud solution focused on integrating and orchestrating customer security. This approach will help organisatons implement the technology and tap the expertise needed to build and configure the architecture. Integration of technology Dell is enabling organisatons to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate Leading the integration of the Zero Trust ecosystem, Dell brings together technology and capabilities from partners including Corsha, Gigamon, Intel, Juniper Networks, MISI, Nomad GCS, NVIDIA, Palo Alto Networks, VMware, and others. By replicating the Department of Defence-approved architecture with technology from leading providers, Dell is enabling organisatons to defeat cyber criminals while meeting the U.S. government’s Zero Trust mandate. Capabilities The ecosystem will help execute the Department of Defence Zero Trust requirements, including capabilities such as: Continuous authentication: Continuously authenticates user access using multifactor authentication. Comply to connect, device detection, and compliance: Any device attempting to connect to a network or access a resource is detected and assessed for compliance status. Continuous monitoring and ongoing authorisation: Automated tools and processes continuously monitor applications and assess their authorisation to determine security control effectiveness. Data encryption and rights management: Data rights management tooling encrypts data at rest and in transit to reduce the risk of unauthorised data access. Software-defined networking: Enables the control of packets to a centralised server, provides additional visibility into the network, and enables integration requirements. Policy decision point and policy orchestration: Collects and documents all rule-based policies to orchestrate across the security stack for effective automation. Threat intelligence: Integration of threat intelligence data with other security information and event management (SIEM) data provides a consolidated view of threat activity. End-to-end solution Zero Trust is a journey, and the destination is a well-defined set of integrated and automated security activities validated by the U.S. government and recognised worldwide. The partner ecosystem is a critical component of Dell’s project to scale an end-to-end validated Zero Trust solution for organisatons worldwide. It looks forward to sharing more on the Zero Trust strategy at Dell Technologies World 2023 in Las Vegas, May 22-25, 2023.
Cequence Security, a renowned provider of Unified Application Program Interface (API) Protection, shared details of its record growth during the first half of FY22 and the appointment of Wei Wang as Chief Financial Officer (CFO). Cequence Security’s unique approach to uncovering and preventing API threats that can lead to fraud and data loss has resulted in the company protecting $1.3 trillion in assets among Fortune 500 companies and more than two billion user accounts worldwide. Decade of experience With over a decade of experience in the technology sector at both start-ups and Fortune 500 companies including Cohesity, Juniper and Ordr, Wang’s addition to the leadership team comes at a pivotal time for the company as it experiences increased growth among U.S. and international customers. In her capacity as CFO, Wang will lead Cequence Security’s financial strategy and processes to empower its next chapter of growth within the API protection market. “The API security market is quickly gaining traction and Cequence Security is leading the charge,” said Wang. “I’m thrilled to be joining the company at such an exciting time and look forward to working with this talented team to further accelerate Cequence Security’s strong momentum and high growth trajectory.” Major milestones Alongside the appointment of Wang, Cequence Security achieved several major milestones in the first half of FY22, including: Investment by KPN Ventures: KPN Ventures, the venturing arm of KPN, the Netherlands’ telecom & ICT company, has invested in Cequence Security as part of the company's Series C funding round to help accelerate growth in Europe, Middle East and Africa (EMEA). Increased Customer Growth and User Adoption: Cequence Security grew its customer base and had more transactions in the last quarter than in the previous three quarters combined. New customers included Telstra, the largest telecom carrier in Australia; the leading automotive manufacturer in the U.K.; and two of the top three telecom companies in the U.S. leading Cequence Security to protect more than 55% of Americans. Geographic Expansion: Following a strategic growth investment from KPN, Cequence Security further expanded its operations in the EMEA region. Additionally, the company grew its headcount by 89% YoY – from 75 employees ending October 31, 2021 to 142 employees ending October 31, 2022. New Product Innovations: Cequence Security released API Spyder, an agentless API attack surface management (ASM) tool that provides security teams with an attacker’s view of their publicly exposed APIs and resources. With the addition of API Spyder, Cequence Security now offers the most comprehensive, end-to-end solution for the entire API protection lifecycle on the market. Industry Recognition and Accolades: Cequence Security’s Unified API Protection solution was named the winner of the "Enterprise CyberSecurity Solution of the Year” category in the 2022 Cybersecurity Breakthrough Awards and was named a finalist in the “API Security” category in the 2022 CISO Choice Awards. Currency of exchange APIs have become the currency of exchange for everything we do in today’s digital economy “APIs have become the currency of exchange for everything we do in today’s digital economy, which is why it’s critically important for businesses to take a modern approach that enables teams to discover, detect and defend their APIs,” said Ameya Talwalkar, CEO and Founder of Cequence Security. Ameya Talwalkar adds, “Wei’s skill set and proven track record of financial leadership at companies of various sizes will bring a unique perspective that is a tremendous asset as we seek to expand our global footprint and product offerings to meet the growing market need in today’s digital-first world.” Enhanced protection “Cequence's API Protection offering is expected to provide support for KPN's business customers who need a solution that can scale with their demands and provides enhanced protection for their applications,” said Sem Alberga, Investment Director at KPN Ventures. Sem Alberga adds, “The Cequence platform provides a full range of functions including inline response mitigation to help address the growing number of cyber-attacks targetting APIs for internet, mobile and IoT apps.” Impressive roster “APIs have become the number one attack vector largely due to being inherently insecure and providing direct access to critical data. We originally invested in Cequence as they have an impressive roster of customers, including many Fortune 500, household brands and two of the three largest telcos in the U.S., which means they can meet the demands of the largest and most demanding organisations." “They are the only vendor that can cover the full API Protection lifecycle from discovery to detection to defence. It is the only solution that provides visibility and inline response mitigation to attacks on APIs,” said Marcus Bartram, Investment Partner at Telstra Ventures.
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download