Juniper Networks

Displaying 1-40 of 146 results

  • White Papers // Jul 2010

    Mobile Security - why the Time Is Now

    Mobile security is quickly becoming essential for mobile carriers. As mobile devices and networks continue to evolve from second generation (2G) to broadband speeds and also become more open, security attacks on mobile networks and devices will likely increase substantially. The global acceptance of smart phones, net books, PC cards/dongles,...

    Provided By Juniper Networks

  • White Papers // Jun 2010

    Android Market: Threat Analysis of the Android Market

    In keeping with the Open Handset Alliance goals of Android being the first open, complete, and free platform created specifically for mobile devices, Google offers the Android Market. The Android Market offers the ability for developers to create any application they choose with the community regulating whether the application is...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    Ensuring Business Continuity In Government

    The concept of business continuity is based on the identification of all business functions within an organization, and the assignment of a level of importance to each business function. Business continuity planning ensures that all personnel in an organization understand which business functions are the most important to the business....

    Provided By Juniper Networks

  • White Papers // May 2009

    Introduction to Carrier Ethernet VPNs: Understanding the Alternatives

    There are a wide range of VPN technologies available. MPLS-based VPNs are the most prevalent technology types used today, with many based on the use of Ethernet transport to provide high-speed communications. This paper describes the various MPLS-based Ethernet VPN services and technologies which Juniper Networks supports. These include Juniper's...

    Provided By Juniper Networks

  • White Papers // May 2010

    The Cloud-Ready Data Center Network: Apply the Lessons of Cloud Computing to Vastly Improve Economics and Experience

    Cloud computing represents a new way to deliver and use services on a shared IT infrastructure. Previously, applications and hardware were linked, and applications were resident on specifically designated hardware for compute and storage. With cloud computing, the functionality of these same software and hardware products is delivered in a...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Identity Federation in a Hybrid Cloud Computing Environment Solution Guide

    Cloud computing provides on demand and at scale services for infrastructure, platform, and applications based on an off premise, pay-as-one-go operational model. The enterprise benefits from cloud computing in many ways, from adopting a cloud computing solution to build "Cloud ready" data centers or private cloud data centers, to consuming...

    Provided By Juniper Networks

  • White Papers // May 2010

    Extending the Virtualization Advantage With Network Virtualization: Virtualization Techniques in Juniper Networks MX Series 3D Universal Edge Routers

    This paper discusses the numerous virtualization technologies in Juniper Networks MX Series 3D Universal Edge Routers, and Juniper's network virtualization strategy and virtualization solutions. It also provides specific examples on how network-based virtualization helps achieve business goals. Today's competitive environment and economy are driving organizations to respond to ever-increasing business...

    Provided By Juniper Networks

  • White Papers // Oct 2010

    Control Plane Scaling and Router Virtualization

    Over the last few years, service providers have seen a dramatic shift in the business. Traditional revenues have been flat or declining, and increasingly, revenue is decoupled from the traffic being carried over networks, as customer's access content and services offered by third parties. In order to compete successfully, service...

    Provided By Juniper Networks

  • White Papers // Oct 2010

    GPS Verification for Leak Detection and Repair

    In striving to solve the critical issues facing today's society, one would consider pollution, climate change, financial losses, and threats to health and safety as legitimate concerns. In efforts to reduce impact of the aforementioned issues, the U.S. Environmental Protection Agency (EPA) has developed fugitive emissions compliance programs in which...

    Provided By Juniper Networks

  • White Papers // Apr 2009

    Time-Domain Approach to Energy Efficiency in High-Performance Network Element Design

    Energy efficiency is a corner stone of sustainability in data center and high-performance networking. Yet, there is a notable structural mismatch between networking element development practices and experiential equipment utilization. In particular, some aspects of energy usage (such as elasticity) routinely remains out of focus at the system level, restricting...

    Provided By Juniper Networks

  • White Papers // Aug 2012

    Green Telecom Metrics in Perspective

    A fast and parallel evolution of ways to measure and assess energy efficiency in telecom has resulted in an entangled web of drafts and recommendations originating from government, research, and standards organizations. This paper focuses primarily on so-called "Large network equipment" metrics and intends to capture state-of-the-art in this area...

    Provided By Juniper Networks

  • White Papers // Feb 2012

    Wireless LAN Reliability in the Unwired Enterprise

    The unwired enterprise has long been a goal in most organizations, and the advent of 802.11n now makes achieving that goal a practical reality. 802.11n and the proliferation of mobile devices are driving the migration from wired to wireless networks throughout the enterprise. But are wireless LANs up to the...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Cloud Services and Cloud Infrastructure: The Critical Role of High-Performance Networks

    Juniper is uniquely qualified to provide the network infrastructure for cloud computing. Based on one's breadth of experience across service provider and data center networks, and the depth of innovation across silicon, systems and software, one has proven the ability to tackle the tough challenges at the economies of scale...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    VMware View With Juniper Networks SA Series SSL VPN Appliances: Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment

    Customers running a VMware View environment don't just want secure access for virtual desktop sessions, they want convenience as well. With this in mind, Juniper Networks SA Series SSL VPN Appliances extend the security deployment by brokering connections to virtual machines and providing Single Sign-On (SSO) when users access their...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    10 Easy Steps to Secure Teleworking

    The convergence of new technologies and business trends, along with employee preferences to work from home, is driving a rapid growth in telework. Additionally, the growth of web-enabled applications, collaboration tools and Virtual Private Network (VPN) technology has helped government departments and agencies of all sizes to allow their employees...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Data Center Fabric for Cloud Networks: Laying the Foundation for Next-Generation Cloud Infrastructures

    Legacy network architectures are inhibiting today's data centers as IT organizations continue the struggle to keep up with the burgeoning growth of Internet-enabled application services, servers, storage infrastructures and network traffic. The impact of legacy approaches on modern data centers aggravates management complexity and escalates operating costs, while offering little...

    Provided By Juniper Networks

  • White Papers // Apr 2010

    OTN Interfaces for IP Over DWDM: IP-Optical Integration for Managing Wavelengths in Routers

    Traffic growth across core networks has proven to be a major driver for IP-optical integration. As time-division multiplexing (TDM)-based framing at Layer 2 has been discarded in favor of simpler architectures, there has been an increasing need for a technology to replace the performance monitoring and fault-handling characteristics of SONET....

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Security Considerations for Cloud-Ready Data Centers

    Data centers have evolved significantly as organizations consolidate servers, applications, and other resources, and as they adopt new technologies as a means to reduce costs and increase efficiency. Technologies such as server virtualization, distributed application tools, and IP-based storage are helping organizations maximize their data center resources, while at the...

    Provided By Juniper Networks

  • White Papers // Oct 2009

    Network Operating System Evolution: Juniper Networks JUNOS Software - Architectural Choices at the Forefront of Networking

    This paper picks up the Juniper Networks JUNOS Software to understand the requirements and challenges that come with the design of a carrier-class network Operating System (OS). The paper cites key facets of the JUNOS Software, which is Juniper's network operating system, to illustrate the evolution of OS design. The...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    Addressing Scaling Challenges in the Data Center: Juniper Networks Virtual Chassis Solution

    Data centers of organization today are constructed while keeping in mind the need for maximum computing, power management, and performance ability. These data centers are made using three-layer hierarchical structure. These organizations face many disputes for their data centers including scaling and operational challenges. This paper discusses how the Juniper...

    Provided By Juniper Networks

  • White Papers // May 2010

    Antivirus for Branch SRX Series and J Series

    An Anti-Virus is an established part of any Unified Threat Management (UTM) suite and has been available on firewalls for many years. Although the introduction of Web 2.0 has created new security requirements, an antivirus remains an integral part of any security strategy. When deciding to use up an Anti-Virus,...

    Provided By Juniper Networks

  • White Papers // Aug 2010

    Introduction to Carrier Ethernet VPNs: Understanding the Alternative

    There are a wide range of VPN technologies available. MPLS-based VPNs are the most prevalent technology types used today, with many based on the use of Ethernet transport to provide high-speed communications. This paper describes the various MPLS-based Ethernet VPN services and technologies which Juniper Networks supports. These include Juniper's...

    Provided By Juniper Networks

  • White Papers // Jan 2010

    Seamless MPLS

    Just when one thought that MPLS has peaked, that the pace of innovation has slowed, and that MPLS is getting boring, two promising new developments - namely "MPLS in the access" and "seamless MPLS" - bring fresh excitement to service provider networks. MPLS in the access is evolutionary, but a...

    Provided By Juniper Networks

  • White Papers // Dec 2009

    SSL VPN: The Ideal Approach for Establishing Secure Access to Virtual Desktop Infrastructure Solutions

    Because of the many technical and business-oriented benefits it provides, Virtual Desktop Infrastructure (VDI) appears well on its way to becoming a mainstream IT solution. What organizations need to realize, however, is that maximizing these gains depends on establishing a means to secure remote access. For that matter, what users...

    Provided By Juniper Networks

  • White Papers // Mar 2010

    Meeting the Cyber Security Challenge: High-Performance, Secure Networking for Federal Agencies

    From the White House through every level of the government, economy, and society, the security of the information and communications networks is clearly a top national priority. Ongoing attacks on the defense, energy, healthcare, and other systems have become increasingly sophisticated and have been well documented. These serious and growing...

    Provided By Juniper Networks

  • White Papers // Apr 2010

    Checkout the Mobile Payment Opportunity!

    The definition of a mobile payment is often open to interpretation and can differ from source to source. Juniper Research has a simple definition of a mobile payment as payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device....

    Provided By Juniper Networks

  • White Papers // Jun 2004

    HTML overview on T-series

    Please provide abstract

    Provided By Juniper Networks

  • White Papers // Mar 2009

    Emerging Multicast VPN Applications: Drivers for Scalable Next-Generation Multicast VPN

    Several emerging multicast applications require virtualization to support service delivery, traffic separation, and new business models. A more scalable and flexible approach to implementing Multicast VPN (MVPN) is being deployed in service provider, financial, and enterprise networks to effectively support these emerging applications, while achieving greater economies of scale.

    Provided By Juniper Networks

  • White Papers // Mar 2009

    Defending Against the Insider Threat

    The security threat posed by company insiders is all too real. In these times of economic uncertainty and widespread layoffs, the potential to create disgruntled employees is all the greater. But there are steps one can take to protect one's self, starting with a sound, defense-in-depth, collaborative security strategy that...

    Provided By Juniper Networks

  • White Papers // Mar 2009

    WANTED: The Future of Network Security for Service Providers - Now!

    This paper explains why a next-generation network security solution is needed now, what such a solution entails, and the wide range of benefits that it yields. A significant obstacle to all of this transformation and differentiation, however, is the absence of a sufficiently capable network security solution. The vast majority...

    Provided By Juniper Networks

  • White Papers // Apr 2009

    The Next Step in Network Security for Enterprises

    Off late CIOs are under mounting pressure to implement advanced technologies and dynamic, content-rich applications to help sustain business growth, while also reducing the cost of IT operations. However, their ability to pursue these increasingly crucial initiatives is being impeded by the lack of a product that can adequately address...

    Provided By Juniper Networks

  • White Papers // Mar 2009

    Increasing Cyber Security Readiness With Adaptive Threat Management: Essential Insights for Strengthening the Federal Response to Cyber Attacks

    The U.S. Federal Government depends on the vast array of systems and networks in cyberspace to support all aspects of their operations. Unfortunately, this dependence on cyberspace leaves agencies vulnerable to cyber attacks. Threats are growing in number and sophistication, originating from both domestic and foreign sources and encompassing intentional...

    Provided By Juniper Networks

  • White Papers // Jun 2009

    Architecture for Secure SCADA and Distributed Control System Networks: Comprehensive Network-Based Security for Control Systems

    The need for remote monitoring, control, maintenance, and data access have resulted in many Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control Systems (DCS) to be accessible either directly from the Internet or through corporate networks. Contrary to popular belief, many modern industrial control systems use common operating...

    Provided By Juniper Networks

  • White Papers // Jun 2009

    New Standard Lays the Foundation for Coordinated, Multi-Vendor Security

    From Ethernet to HTML, standardization of IT technologies has ultimately led to more choice, greater system interoperability, and lower costs for enterprises. The security market is no exception. Later this year, leading vendors will begin delivering products that support a new security standard that opens the door to powerful, multi-vendor...

    Provided By Juniper Networks

  • Case Studies // Mar 2012

    CODONiS Turns to Juniper Networks QFabric to Deliver Data -Intensive Healthcare From the Cloud

    CODONiS delivers a world-class life sciences computing platform that is designed to help customers accelerate research. Their challenges are to create a world-class life sciences and healthcare computing platform. Advance healthcare and life sciences research through computational breakthroughs. CODONiS deployed Juniper Networks' groundbreaking data center solution, based on the Juniper...

    Provided By Juniper Networks

  • Case Studies // Feb 2010

    China's Ministry of Railways Secures Information Management System with the ISG Series Integrated Security Gateways

    China's Ministry of Railways is in charge of the national railway network, which is the main artery of the country's transport system. Their challenge is to ensure effective data exchange and security for compartmentalized network segments of a government transportation entity. They chose Juniper Networks to overcome this challenge. They...

    Provided By Juniper Networks

  • Case Studies // Apr 2014

    Cloud Dynamics Leverages SDN to Speed Customers' Journey to the Cloud

    Cloud Dynamics has set out to enable the cloud. Cloud Dynamics delivers highly-efficient private cloud infrastructure with a patented cloud operating system, a converged infrastructure fabric, a cloud resource management tool, and a green power and cooling system. Their challenge is to build a scalable, agile cloud data center solution...

    Provided By Juniper Networks

  • Case Studies // Jun 2012

    Bajaj Capital Eliminates Downtime with Juniper Networks' Wired-Less Campus and Data Center Networking

    Bajaj Capital is one of India's oldest and most successful investment advisory firms, serving more than 1 million individual investors and over 3,000 institutional clients. Their challenge is to increase IT-dependent business running over a heterogeneous network infrastructure that was difficult to scale, difficult to manage, and very difficult to...

    Provided By Juniper Networks

  • Case Studies // Nov 2013

    The Netherland's Largest Consumer Electronics Retailer Delivers a Consistent Experience for Its Customers

    The BAS Group is the largest multi-brand electronics retail channel in The Netherlands, supplying more than half of the country's consumer electronics. Their challenges are they need to upgrade connectivity to over 200 stores, provide a consistent customer experience across all of its brands and at every store, increase availability...

    Provided By Juniper Networks

  • Case Studies // Aug 2013

    DQE Communications Creates Next-Generation Mobile Backhaul Network with Juniper Solutions

    DQE Communications is a subsidiary of Pittsburgh-based Duquensne light holdings that provides mobile backhaul and metro Ethernet services. Their challenge is to deploy a Layer 3 IP/MPLS network to create a multiservice backhaul network that consolidates existing 2G and 3G with LTE and supports exponential increases in mobile traffic. They...

    Provided By Juniper Networks