Juniper’s Mykonos Acquisition a Step Into New Security Realm
News that Mykonos Software was acquired by Juniper Networks was published here earlier at SiliconANGLE. The integration is ambitious, but invokes some great strategic alignment. The result should help deliver next-generation security directly from Juniper’s network market line and may do so with integration and standalone development of the Mykonos security technology. The Mykonos products use a multi-tactic series of technology to deceive the would-be hacker into detection and with wasted efforts on built-in traps, among other sophisticated tactics. With this dynamic security component, Juniper steps up to a new level, now able to protect the ever increasing web market and countless app/cloud environment right at the network level on a proactive and innovative basis. Attacks can be averted in real time, and the range extends beyond physical on into virtual and cloud environments.
Typical security approaches focus on protection from a perimeter perspective, meaning controlling and monitoring who and what gets in and out. Despite the level of the Mykonos sophistication, its advantage may be an overall simplification to the IT organization, because of the centralization of several components throughout a common system. Mykonos “deception-based technology” boasts:
“Mykonos’ groundbreaking deception-based technology can actively prevent attackers and stop even the most sophisticated zero-day web attacks. It is the only company that can catch an attack in progress, profile the attack, learn the attacker’s behavior, and then use that behavior to thwart future attacks.”
Through detection and evaluation of threat levels of malicious activities, counter measures are deployed to respond appropriately to these threats. This neutralization of malicious automated tools and attacks is a tremendous advantage to the state of security. By this detect, evaluate, and response construct, what transpires is an effective zero-day protection strategy. This means it is different from perimeter and definition-based systems and the sort such as firewalls and intrusion prevention systems.
“By creating detection points that can identify attackers at the onset of an attack, the technology can detect and evaluate the threat level of malicious activity, and respond automatically with threat-appropriate counter measures. Mykonos provides device level tracking, beyond the IP address, which allows for attackers to be uniquely identified, monitored and/or blocked. It can catch an attack in progress, profile the attacker, learn the attacker’s behavior and sophistication, and then use that behavior to thwart future attacks.”
So by one swift action, Juniper has raised the possibility of a realization of security objectives within the burgeoning cloud, apps, virtual and internet environment. It appears to be a brilliant move that once integrated and developed fills one of the most critical vulnerabilities in the enterprise.
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.