UPDATED 18:19 EST / FEBRUARY 22 2012

NEWS

Juniper’s Mykonos Acquisition a Step Into New Security Realm

News that Mykonos Software was acquired by Juniper Networks was published here earlier at SiliconANGLE.  The integration is ambitious, but invokes some great strategic alignment. The result should help deliver next-generation security directly from Juniper’s network market line and may do so with integration and standalone development of the Mykonos security technology. The Mykonos products use a multi-tactic series of technology to deceive the would-be hacker into detection and with wasted efforts on built-in traps, among other sophisticated tactics. With this dynamic security component, Juniper steps up to a new level, now able to protect the ever increasing web market and countless app/cloud environment right at the network level on a proactive and innovative basis. Attacks can be averted in real time, and the range extends beyond physical on into virtual and cloud environments.

Typical security approaches focus on protection from a perimeter perspective, meaning controlling and monitoring who and what gets in and out. Despite the level of the Mykonos sophistication, its advantage may be an overall simplification to the IT organization, because of the centralization of several components throughout a common system. Mykonos “deception-based technology” boasts:

“Mykonos’ groundbreaking deception-based technology can actively prevent attackers and stop even the most sophisticated zero-day web attacks. It is the only company that can catch an attack in progress, profile the attack, learn the attacker’s behavior, and then use that behavior to thwart future attacks.”

Through detection and evaluation of threat levels of malicious activities, counter measures are deployed to respond appropriately to these threats. This neutralization of malicious automated tools and attacks is a tremendous advantage to the state of security. By this detect, evaluate, and response construct, what transpires is an effective zero-day protection strategy. This means it is different from perimeter and definition-based systems and the sort such as firewalls and intrusion prevention systems.

“By creating detection points that can identify attackers at the onset of an attack, the technology can detect and evaluate the threat level of malicious activity, and respond automatically with threat-appropriate counter measures. Mykonos provides device level tracking, beyond the IP address, which allows for attackers to be uniquely identified, monitored and/or blocked. It can catch an attack in progress, profile the attacker, learn the attacker’s behavior and sophistication, and then use that behavior to thwart future attacks.”

So by one swift action, Juniper has raised the possibility of a realization of security objectives within the burgeoning cloud, apps, virtual and internet environment. It appears to be a brilliant move that once integrated and developed fills one of the most critical vulnerabilities in the enterprise.


A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU