article thumbnail

Juniper delivers distributed data-center security protection, firewalls

Network World

Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources. It’s implemented in a new version of the vendor’s core Junos operating system (version 23.4)

article thumbnail

Arista embraces segmentation as part of its zero-trust security

Network World

Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud. Additionally, the company’s MSS Host focuses on data-center security policies. See how AI can boost data-center availability and efficiency.

Security 152
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Salesforce IT injects generative AI to ease its massive datacenter migration

CIO Business Intelligence

When you’re tasked with migrating 200,000 servers to a new operating system, a helping hand is very welcome indeed. The shift to RHEL will also help the company better offer maximum flexibility, security, and reliability, Lutz adds. One that should also be secure and robust, he says.

article thumbnail

Why it's time to stop setting SELinux to Permissive or Disabled

Tech Republic Security

Too many people shrug off SELinux on their data center systems. Jack Wallen says it's time to stop giving into that siren song so your operating systems are weakened.

article thumbnail

Sharing Responsibility for Data Security in the Cloud

CIO Business Intelligence

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”.

Security 105
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

These factors will prevent some global companies from successfully deploying bandwidth-hungry enterprise IT strategies worldwide, such as virtualization and data center consolidation. Securing these devices is nearly impossible because they are not corporate controlled. XP Will Cause Significant Security Issues.

WAN 273
article thumbnail

Understanding the security shared responsibility model in an as-a-service world

CIO Business Intelligence

As organizations shape the contours of a secure edge-to-cloud strategy, it’s important to align with partners that prioritize both cybersecurity and risk management, with clear boundaries of shared responsibility. The security-shared-responsibility model provides a clear definition of the roles and responsibilities for security.”