Juniper Networks intros global cloud-based 'attacker database'

Summary:At the start of RSA 2013, Juniper Networks is rolling out a global database to track attacks on individual devices.

Juniper Networks is ramping up its security options today with new global services designed to protect everything from individual devices to the datacenter.

Announced amid the start of the 2013 RSA Conference in San Francisco this week, Juniper is aiming to grab the spotlight early, so to speak, with Spotlight Secure, a cloud-based "attacker database."

Juniper is trying to single out Spotlight Secure as the "only" cloud-based threat intelligence service that identifies individual attackers at the device level, then tracking them in a global database. This is framed in comparison to services that rely only on IP addresses for tracking attacks.

Thus, Juniper argues that Spotlight Secure can offer a more detailed profile of more than 200 unique attributes about each attacker while reducing false alarms at the same time.

Once a cyber criminal is identified through Juniper's Junos WebApp Secure (a solution formerly known as Mykonos), which is in front of application servers behind the firewall), Spotlight shares the attacker's profile with other subscribers in real-time for quicker action.

Juniper's latest announcements are rolling out as the networking security company is releasing a new report about perceptions of emerging network security technologies.

The major takeaway from the report is that most IT professionals are most concerned with theft of authentication credentials as well as intellectual property -- most notably anything concerning research and development, business strategies and industrial processes.

zdnet-juniper-networks-emerging-security-study

Researchers also concluded that the motivation for investing in new security methods has shifted from simply prevention of security breaches and frequent cyber attacks to just how sophisticated these threats have become.

However, Juniper found that nearly half (48 percent) of respondents believe that emerging network security technologies are "not effective in minimizing attacks that aim to bring down web applications or curtail gratuitous Internet traffic."

For reference, Juniper researchers surveyed 4,774 IT and IT security practitioners in the following nine countries: United States, United Kingdom, Australia, Germany, France, India, Japan, China and Brazil. All participants were said to have approximately 10 years of IT or IT security experience, on average.

Chart via Juniper Networks

Topics: Security, Data Centers, Data Management, Enterprise 2.0, Networking

About

Rachel King is a staff writer for CBS Interactive based in San Francisco, covering business and enterprise technology for ZDNet, CNET and SmartPlanet. She has previously worked for The Business Insider, FastCompany.com, CNN's San Francisco bureau and the U.S. Department of State. Rachel has also written for MainStreet.com, Irish Americ... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.