{"id":1409,"date":"2005-05-02T00:00:00","date_gmt":"2005-05-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/02\/juniper-targets-cisco-with-security-strategy\/"},"modified":"2021-12-30T11:39:19","modified_gmt":"2021-12-30T11:39:19","slug":"juniper-targets-cisco-with-security-strategy","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/02\/juniper-targets-cisco-with-security-strategy\/","title":{"rendered":"Juniper Targets Cisco With Security Strategy"},"content":{"rendered":"<p>Looking to ratchet up its competition with Cisco Systems Inc. in the corporate networking market, Juniper Networks Inc. will introduce a set of security tools designed to help IT managers more efficiently enforce access-control and usage policies on their networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Juniper, which is expected to make the announcement at the Interop show in Las Vegas, will also outline a broad network security framework that it plans to fill out over the next few years.<\/p>\n<p>The framework planned by Juniper gives IT managers a potential alternative to Cisco&#8217;s emerging Network Admission Control (NAC) technology and the Network Access Protection offering that Microsoft Corp. is developing.<\/p>\n<p>Overall, the move to integrate security functions into the network layer is a good thing, said Hugh McArthur, director of information systems security at Online Resources Corp., a Chantilly, Va.-based online bill-processing firm.   The security functions being delivered at the network layer also need to mature more before many users will feel confident enough to enable the automated responses to network threats and attacks that the technologies support, said Eric Beasley, senior network manager at Baker Hill Corp. in Carmel, Ind.<\/p>\n<p>David Flynn, vice president of products for Juniper&#8217;s security tools and network-access routers, acknowledged that completely delivering on the Enterprise Infranet vision will be a multiyear process.<\/p>\n<p>Another key difference is that Cisco is integrating the security into its networking equipment, while Juniper is offering its tools as an &#8220;overlay solution&#8221; designed to work with a mix of network gear, said Robert Whiteley, an analyst at Forrester Research Inc.<\/p>\n<p>http:\/\/www.computerworld.com\/networkingtopics\/networking\/story\/0,10801,101450,00.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1409","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1409"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1409\/revisions"}],"predecessor-version":[{"id":3896,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1409\/revisions\/3896"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}