Juniper Networks intros global cloud-based 'attacker database'

At the start of RSA 2013, Juniper Networks is rolling out a global database to track attacks on individual devices.

Juniper Networks is ramping up its security options today with new global services designed to protect everything from individual devices to the datacenter.

Announced amid the start of the 2013 RSA Conference in San Francisco this week, Juniper is aiming to grab the spotlight early, so to speak, with Spotlight Secure, a cloud-based "attacker database."

Juniper is trying to single out Spotlight Secure as the "only" cloud-based threat intelligence service that identifies individual attackers at the device level, then tracking them in a global database. This is framed in comparison to services that rely only on IP addresses for tracking attacks.

Thus, Juniper argues that Spotlight Secure can offer a more detailed profile of more than 200 unique attributes about each attacker while reducing false alarms at the same time.

Once a cyber criminal is identified through Juniper's Junos WebApp Secure (a solution formerly known as Mykonos), which is in front of application servers behind the firewall), Spotlight shares the attacker's profile with other subscribers in real-time for quicker action.

Juniper's latest announcements are rolling out as the networking security company is releasing a new report about perceptions of emerging network security technologies.

The major takeaway from the report is that most IT professionals are most concerned with theft of authentication credentials as well as intellectual property -- most notably anything concerning research and development, business strategies and industrial processes.


Researchers also concluded that the motivation for investing in new security methods has shifted from simply prevention of security breaches and frequent cyber attacks to just how sophisticated these threats have become.

However, Juniper found that nearly half (48 percent) of respondents believe that emerging network security technologies are "not effective in minimizing attacks that aim to bring down web applications or curtail gratuitous Internet traffic."

For reference, Juniper researchers surveyed 4,774 IT and IT security practitioners in the following nine countries: United States, United Kingdom, Australia, Germany, France, India, Japan, China and Brazil. All participants were said to have approximately 10 years of IT or IT security experience, on average.

Chart via Juniper Networks