|By PR Newswire||
|February 25, 2013 11:30 AM EST||
SAN FRANCISCO, Feb. 25, 2013 /PRNewswire/ -- RSA CONFERENCE 2013 --
- RSA and Juniper Networks announced their intent to expand their technology partnership to help enable customers to detect and prevent advanced threats and enhance the security and usability of remote access for mobile users.
- The expanded collaboration will include sharing of threat intelligence contained in the new Juniper Networks Junos® Spotlight Secure global attacker intelligence service and the RSA® Live threat intelligence delivery system to help IT security staff reduce the time it takes to identify, assess, and respond to incidents.
- Juniper Networks intends to embed RSA mobile authentication technologies into the Juniper Networks Junos Pulse SSL Secure product, to secure and streamline the mobile user experience when accessing both corporate and cloud-based resources.
RSA, The Security Division of EMC (NYSE: EMC) and Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced their intent to expand their technology partnership designed to help customers stop the wave of advanced threats targeting their networks and securely enable mobile access to applications for increased productivity.
As the limits of legacy security techniques such as IP-based reputation databases and signature-based anti-virus products become more evident, customers increasingly need to rely on threat intelligence to help stop advanced threats. Today, intelligence operations — whether military, counterterrorism, or cyber security — rely on the breadth of sources and techniques to be as effective as possible. Unfortunately, broad scale intelligence sharing amongst IT security vendors is limited, leaving customers with serious visibility gaps into the threat landscape.
RSA and Juniper are addressing these limitations by creating a technology partnership that would provide extensive intelligence sharing between the RSA® Live threat intelligence delivery service and Juniper Networks Junos® Spotlight Secure global attacker intelligence service. RSA intends to use this to extend threat visibility and analytics within RSA® Security Analytics, providing deeper insight and visibility of threats to customers. Juniper intends to embed this additional intelligence into network enforcement points, such as the Juniper Networks® SRX Series Services Gateway firewall product, in order to more effectively block threats in real-time.
The Junos Spotlight Secure global attacker intelligence service captures and shares digital fingerprints of attacker devices in real-time, providing better precision in tracking and blocking attackers than IP reputation databases. The RSA Live solution is designed to focus on malicious networks, including command-and-control and advanced threat-related domains. The sharing of these sources and techniques is anticipated to help provide customers with unparalleled visibility into the attacks which target their networks, as well as the ability to more quickly and effectively block and mitigate them.
In addition, RSA and Juniper intend to build on a previous agreement announced in 2012 to help enable mobile security services tying strong authentication with secure remote access to extend the security model and streamline the mobile user experience when accessing both corporate and cloud-based resources. The two companies are engaged in ongoing interoperability testing so that RSA mobile authentication technologies work with the Juniper Networks Junos® Pulse SSL Secure solution for secure, mobile remote access to corporate resources. The companies also intend to collaborate further to enable Junos Pulse SSL Secure to authenticate native mobile application access to present a unified access point for both VPN and mobile applications.
RSA Executive Quote:
Art Coviello, Executive Chairman, RSA and Executive Vice President, EMC Corporation
"Two of the most common requests we get from customers are about improving information sharing and enabling them to deploy greater security on mobile devices. This expanded technology partnership would enable RSA and Juniper to help address both of those key requirements for customers, and set the stage for increased collaboration on a wider range of advanced security challenges."
Juniper Executive Quote:
Nawaf Bitar, Senior Vice President and General Manager, Security Business Unit, Juniper Networks
"The future of cyber security is centered around enabling real-time sharing of intelligence to prevent advanced attacks. Juniper and RSA are teaming up to share extensive intelligence and drive the industry forward. Spotlight, Juniper's global attacker intelligence service, announced today, transforms the industry from tracking IP addresses to tracking and stopping individual attackers. When Spotlight is coupled with the RSA Live service, customers win by gaining more complete situational awareness and better prevention of advanced attacks."
- Get more information on Juniper Networks Junos Spotlight Secure
- Get more information on RSA Live
- Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast.
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.
RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments.
Combining business-critical controls in identity assurance, encryption & key management, SIEM, Security Analytics, Data Loss Prevention and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform and the data that is generated. For more information, please visit www.EMC.com/RSA.
EMC, RSA and Live are either registered trademarks or trademarks of EMC Corporation in the United States and other countries. Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
This release contains "forward-looking statements" as defined under the Federal Securities Laws. Actual results could differ materially from those projected in the forward-looking statements as a result of certain risk factors, including but not limited to: (i) adverse changes in general economic or market conditions; (ii) delays or reductions in information technology spending; (iii) the relative and varying rates of product price and component cost declines and the volume and mixture of product and services revenues; (iv) competitive factors, including but not limited to pricing pressures and new product introductions; (v) component and product quality and availability; (vi) fluctuations in VMware, Inc.'s operating results and risks associated with trading of VMware stock; (vii) the transition to new products, the uncertainty of customer acceptance of new product offerings and rapid technological and market change; (viii) risks associated with managing the growth of our business, including risks associated with acquisitions and investments and the challenges and costs of integration, restructuring and achieving anticipated synergies; (ix) the ability to attract and retain highly qualified employees; (x) insufficient, excess or obsolete inventory; (xi) fluctuating currency exchange rates; (xii) threats and other disruptions to our secure data centers or networks; (xiii) our ability to protect our proprietary technology; (xiv) war or acts of terrorism; and (xv) other one-time events and other important factors disclosed previously and from time to time in the filings of EMC Corporation, the parent company of RSA, with the U.S. Securities and Exchange Commission. EMC and RSA disclaim any obligation to update any such forward-looking statements after the date of this release.
SOURCE EMC Corporation
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes –...
Oct. 10, 2015 02:00 PM EDT Reads: 489
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 10, 2015 02:00 PM EDT Reads: 291
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends an...
Oct. 10, 2015 01:45 PM EDT Reads: 147
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
Oct. 10, 2015 01:00 PM EDT Reads: 164
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Oct. 10, 2015 01:00 PM EDT Reads: 756
As the world moves towards more DevOps and microservices, application deployment to the cloud ought to become a lot simpler. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. In his session at 17th Cloud Expo, Raghavan "Rags" Srinivas, an Architect/Developer Evangeli...
Oct. 10, 2015 01:00 PM EDT Reads: 212
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 10, 2015 01:00 PM EDT Reads: 269
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Oct. 10, 2015 11:30 AM EDT Reads: 291
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/...
Oct. 10, 2015 11:00 AM EDT Reads: 336
As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides.
Oct. 10, 2015 11:00 AM EDT Reads: 643
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
Oct. 10, 2015 11:00 AM EDT Reads: 1,288
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 17th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity
Oct. 10, 2015 10:00 AM EDT Reads: 543
SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Oct. 10, 2015 10:00 AM EDT Reads: 152
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll sha...
Oct. 10, 2015 09:00 AM EDT Reads: 653
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Oct. 10, 2015 09:00 AM EDT Reads: 621
SYS-CON Events announced today that Machkey International Company will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Machkey provides advanced connectivity solutions for just about everyone. Businesses or individuals, Machkey is dedicated to provide high-quality and cost-effective products to meet all your needs.
Oct. 10, 2015 09:00 AM EDT Reads: 416
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Oct. 10, 2015 09:00 AM EDT Reads: 1,448
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
Oct. 10, 2015 09:00 AM EDT Reads: 238
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...
Oct. 10, 2015 08:00 AM EDT Reads: 256
SYS-CON Events announced today that Key Information Systems, Inc. (KeyInfo), a leading cloud and infrastructure provider offering integrated solutions to enterprises, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Key Information Systems is a leading regional systems integrator with world-class compute, storage and networking solutions and professional services for the most advanced softwa...
Oct. 10, 2015 07:30 AM EDT Reads: 447