HP Arcsight Smartconnector Supported Products Data Sheet

Total Page:16

File Type:pdf, Size:1020Kb

HP Arcsight Smartconnector Supported Products Data Sheet Data sheet HP ArcSight SmartConnector supported products The HP ArcSight library of out-of-the-box SmartConnectors provides source-optimized collection for leading security commercial products. These products span the entire stack of event-generating source types, from network and security devices to databases and enterprise applications. SmartConnectors are the default listing in this document. In addition to SmartConnectors developed and maintained by HP ArcSight, we test and certify the following connector types through our Technology Alliances Program: • Common event format (CEF) Certified—helps ensure event information is captured properly in the CEF • Action Certified—allows for control of a vendor’s technology from within the HP ArcSight Console Common event format are in bold below and Action are Italicized. If they have both they are bold and Italicized. HP ArcSight SmartConnector supported Application security platform for installation • Arxan GuardIT • CentOS-6.5, 6.6, and 7.0 • Bit9 + Carbon Black Security Platform • Microsoft® Windows Server® 2008 • CA Layer 7 SecureSpan/CloudSpan SP2 32/64-bit Gateway • Microsoft Windows Server 2008 • Intralinks VIA R2 SP1 64-bit • McAfee Application Control (Solidcore) • Microsoft Windows Server 2012 • RSA Silver Tail Systems Forensics Standard 64-bit, R2 64-bit • Red Hat® Enterprise Linux® (RHEL) Clinical/Healthcare applications 6.4 64-bit • FairWarning • SUSE Linux 11 Enterprise Server 64-bit • Oracle Solaris 10 64-bit, 11 32-bit Cloud • IBM AIX version 7.1 64-bit • Box • CloudPassage Halo Anti-virus/Anti-spam • FlexConnector for REST • F-Secure Anti-Virus • Zscaler Nanolog Streaming Service (NSS) • Kaspersky Anti-Virus • McAfee® VirusScan Enterprise Content security • Sophos • Gemalto (Safenet) eSafe Gateway • Symantec Endpoint Protection Manager • Barracuda (NetContinuum Web Firewall) (SEPM) DB SEP 12 • McAfee Email and Web Security Appliance • Symantec Mail Security for Microsoft • McAfee Web Gateway Exchange • Proofpoint Enterprise Protection and • Trend Micro (TM) OfficeScan (Control Enterprise Privacy Manager and TM Control Manager • Puresight Content Filter Database [DB]) • Trend Micro Control Manager • Trend Micro InterScan Messaging Security Applications (Control Manager) • IBM WebSphere • Trend Micro InterScan Web Security • iT-CUBE agileSI SAP® (Control Manager) • Oracle WebLogic Server (BEA) • SAP enterprise resource planning (ERP) • Microsoft SharePoint Server DB Data sheet | HP ArcSight SmartConnector supported products Database Activity Monitoring (DAM)/ IDS/IPS—network-based DB security • Broadweb NetKeeper • Trustwave Application Security DbProtect • Bro IDS • IBM InfoSphere Guardium • Bro IDS NG File • Imperva SecureSphere • Cisco Secure IPS • McAfee Sentrigo Hedgehog • Extreme Networks Enterasys Dragon (Enterprise and vPatch) • HP TippingPoint Security Management System (SMS) Database • IBM Proventia IPS Appliance (SiteProtector) • IBM DB2 • Juniper Networks IDP (NetScreen) • IBM DB2 UDB Audit File • McAfee Network Security Manager • IBM DB2 UDB Audit File, Multiple Instance (Intru Shield) • Microsoft SQL • NitroSecurity IPS • Oracle Audit DB • Radware DefensePro • Oracle Audit Vault • Snort • Oracle Audit Syslog • Cisco Sourcefire Intrusion Sensor • Oracle Audit XML11gR2 • Cisco Sourcefire Defense eStreamer • Sybase Adaptive Server Enterprise (Policy Violation) • Cisco Sourcefire Defense Center eStreamer Data leak prevention • Cisco Sourcefire Real-time Network • Fidelis Cybersecurity XPS Awareness (RNA) Sensor • GTB Inspector • McAfee Host Data Loss Prevention IDM, IAM, and identity security Endpoints (HDLP) • RSA Aveksa • Symantec DLP (Vontu) • BeyondTrust PowerBroker • Verdasys Digital Guardian • Cisco Secure Access Control Server (ACS) • CyberArk Privileged Identity Data security Management (PIM) Suite • CyberArk Inter-Business Vault • CyberArk Privileged Session Management • CyberArk Sensitive Document Vault (PSM) Suite • Gemalto (Safenet) Ingrian • Dell ChangeAuditor DB (Quest) • HP Atalla Network Security • IBM Tivoli Access Manager Processor (NSP) • Juniper Steel-Belted Radius (SBR) • JBoss Security Auditing File • Lieberman Software Enterprise Random • Vormetric Data Firewall Password Manager (ERPM) • Vormetric Data Security Manager • Microsoft Active Directory • Zettaset BDEncrypt • Microsoft Forefront • Microsoft Forefront DB Firewall • Microsoft Network Policy Server • Check Point FW-1 • Netwrix Auditor • Cisco PIX Firewall • Novell Nsure Audit • Cisco PIX/ASA Syslog • ObserveIT Enterprise • Juniper Networks (Altor Networks • Oracle Sun ONE Directory Server Virtual Firewall) • VMware® PacketMotion PacketSentry • Juniper Network Security Manager • RSA Authentication Manager (NetScreen) • Securonix RTI-Risk and Threat • Juniper Network Security Manager Syslog Intelligence • Juniper Networks Firewall and VPN • SpectorSoft Spector 360 Export Service • McAfee Enterprise Syslog • Thycotic Secret Server Intrusion Detection System and Intrusion Prevention System—host-based • IBM BlackICE Server Protection (IBM Security SiteProtector System) • Symantec Critical System Protection Database • Tripwire Enterprise Belden (Tripwire) 2 Data sheet | HP ArcSight SmartConnector supported products Integrated security Malware detection • Barracuda Spam Firewall • AhnLab Malware Defense System (MDS) • Cisco ASA 5500 • Damballa CSP • Fortinet FortiGate • Damballa Failsafe • HP TippingPoint Next-Generation • FireEye Malware Protection Firewall (NGFW) System (MPS) • Palo Alto Networks PAN-OS • FireEye Mandiant Intelligent Response • Secure Computing Sidewinder • Guidance EnCase • Dell SonicWALL • HBGary Active Defense • Stonesoft StoneGate • Lastline Enterprise • TaaSera TaaS NetAnalyzer IT operations • HP Operations Manager (OM and OMi) Network access control • HP OpenView Operations (OVO) • ForeScout CounterACT • Portnox Portnox Log consolidation and analysis • Dell InTrust (fka Aelita Event Manager [AEM]) Network behavior anomaly • Enterprise IT Security SF-RiskSaver • Arbor Networks Peakflow • LOGbinder SP • Lancope StealthWatch • Qualys QualysGuard File, version 7.1 • Qosmos DeepFlow Security Mail filtering Network forensics • Cisco IronPort Email Security Appliance • Narus nSystem • McAfee Email Gateway (Secure • NIKSUN NetDetector Computing IronMail) • RSA NetWitness • McAfee Security for Email Servers • Fidelis Cybersecurity (Access Data) CIRT (GroupShield) • Symantec Messaging Gateway Network management (Mail Security 8200 Series) • Cisco Wireless LAN Controller Syslog • HP Network Node Manager i SNMP Mainframe • Lumeta Enterprise Situational • CA Top Secret Intelligence (ESI) • IBM OS/390 (NVAS) • Lumeta IPsonar • IBM OS/390 (SDSF) • IBM z/OS System Log Network monitoring • IBM eServer iSeries Audit Journal File • ISC DHCP • Helpsystems PowerTech Interact • ISC BIND • Type80 SMA_RT for RACF • Microsoft Operations Manager DB (MOM) • Type80 SMA_RT for CA Top Secret • Microsoft System Center Operations • IBM AS/400 Manager (SCOM) DB • Microsoft System Center Configuration Mail server Manager DB • IBM Lotus Notes Domino Enterprise Server • Microsoft DHCP • Microsoft Exchange • Microsoft DNS • Microsoft Exchange PowerShell • Microsoft WINS • Microsoft Forefront for Exchange Server • Microsoft Forefront Protection Server Network traffic analysis Management Console DB • Cisco NetFlow/Flexible NetFlow • NetScout nGenius • FireEye nPulse Hammerhead • QoSient Argus • InMon sFlow® • Blue Coat Solera Networks DeepSee • TCPdump Network traffic management • Cisco Distributed Director for Cisco 4500 • Bro IDS 3 Data sheet | HP ArcSight SmartConnector supported products Operating systems Virtualization • IBM AIX Operating System • CounterTack Event Horizon • HP OpenVMS • VMware ESX/ESXi Server • HP-UX Operating System • VMware Virtual Center • HP-UX Syslog, version 11i v3 • Microsoft Windows 7/NT/2000/2003/ VPN XP/2008 Server/Vista • Check Point VPN-1 • Microsoft Windows® Event Log—unified, • Cisco VPN Concentrator SQL Server 2012 for SQL Server audit • Citrix® NetScaler • Red Hat Linux • Juniper/NetScreen (Neoteris) SSL VPN • Snare for Microsoft Windows • Nortel Contivity Extranet Switch • Solaris Basic Security module (BSM) • UNIX® Vulnerability assessment • SaberNet NTSyslog • eEye REM Security Management Console • HP NonStop servers (XYPRO • eEye Retina Network Security Scanner Merged Audit) • Harris STAT Scanner • IBM Internet Scanner Packet capture • McAfee Vulnerability Manager (FoundScan) • Ixia Anue Net Tool Optimizer • nCircle IP360 Device Profiler • nCircle IP360 Threat Monitor Physical systems/security • Nmap • RedCloud (PlaSec) • Open Vulnerability and Assessment Language (OVAL) Standard Policy management • QualysGuard • McAfee Policy Auditor • Rapid 7 Nexpose • NetIQ Security Manager • Tenable Nessus • SAINT Vulnerability Scanner Router • Cisco Router Web cache • Juniper Router (JUNOS) • Blue Coat Proxy SG Series • HP H3C Comware Platform • Microsoft Internet Security and Acceleration (ISA) Security management • Squid Web Proxy Cache • Enterasys Dragon Server • IBM SiteProtector Web filtering • iSIGHT ThreatScape API • Cisco IronPort Web Security Appliance • Lookingglass ScoutVision • Websense Web Security Suite • Malcovery MRTI • McAfee ePolicy Orchestrator (ePO) Web server • McAfee Network Security Manager DB • Apache • McAfee Rogue System Detection (via ePO) • Microsoft Internet Information Services (IIS) • Microsoft Audit Collection Services • Oracle Sun ONE • Symantec Enterprise Security Manager (ESM) Wireless • AirDefense Guard Storage • Fluke Network
Recommended publications
  • PCI DSS Virtualization Guidelines
    Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: June 2011 Author: Virtualization Special Interest Group PCI Security Standards Council Information Supplement: PCI DSS Virtualization Guidelines Information Supplement • PCI DSS Virtualization Guidelines • June 2011 Table of Contents 1 Introduction ....................................................................................................................... 3 1.1 Audience ................................................................................................................ 3 1.2 Intended Use .......................................................................................................... 4 2 Virtualization Overview .................................................................................................... 5 2.1 Virtualization Concepts and Classes ..................................................................... 5 2.2 Virtual System Components and Scoping Guidance ............................................. 7 3 Risks for Virtualized Environments .............................................................................. 10 3.1 Vulnerabilities in the Physical Environment Apply in a Virtual Environment ....... 10 3.2 Hypervisor Creates New Attack Surface ............................................................. 10 3.3 Increased Complexity of Virtualized Systems and Networks .............................. 11 3.4 More Than One Function per Physical System ................................................... 11 3.5 Mixing VMs of
    [Show full text]
  • Vgw Virtual Gateway Virtual Gateway Virtual
    vGW Virtual Gateway Administration Guide Release 4.5 Service Pack 1 Copyright © 2011, Juniper Networks, Inc Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you indicate that you understand and agree to be bound by those terms and conditions.
    [Show full text]
  • Secure Data Center Networking with Open Vswitch
    Secure Data Center Networking with Open vSwitch Pa Pa Hlaing University of Computer Studies, Yangon [email protected] Abstract agility and isolation of VMs. Most physical switches deployed in conventional DCNs are not designed for either supporting such unique VM Data centers have become the next- requirements or flexible enough to augment new generation computing platforms for enterprises functionalities [7]. At the same time, VM and Internet users. This is primarily due to the networking has inherently unique characteristics, economic and technical advantages of resource such as the awareness of the migration of VMs sharing in data centers. By sharing computing and their multicast membership. Therefore, much and storage resources through services such as research has begun exploring the opportunity to cloud computing or software-as-a-service (SaaS), introduce a new, flexible and programmable users can amortize the cost of hardware and networking layer based on the knowledge of software. Because of the virtualization of VMs. resources, a new virtualized network access layer Modern data center networks consist of both has been introduced to interconnect VMs within physical networks connected by switches and the data centers. In data center, hosts have been virtual networks formed by VMs running inside recently employed virtual switch to interconnect physical hosts. Inside one computer, many VMs virtual machines (VMs) within data center can exist (as many as 120 VMs per host), each of networks. Virtual Switch is essential to control which has at least one virtual network interface and manage VM within the hosts. Open vSwitch, card (VNIC). The VNICs communicate with a network switch specifically built for Xen external networks through the host’s physical virtualization environment is presented.
    [Show full text]
  • S32 - a Primer on Virtualization Tom Ray
    S32 - A Primer on Virtualization Tom Ray A Primer on Virtualization Ignoring the man behind the curtain? Agenda • Top 3 things you need to know about Virtualization when you Audit it, & your IT & IT security groups. – What IS virtualization? – What are the issues? – What is a reasonable, “AUDIT-READY” secure Reference Architecture? • Discuss how to Audit a virtualized IT 2 1 What is Virtualization? 3 Some Observations • It is NOT new (but some developments are) • It is an “already expected ” cost containment technology in many IT departments • Before you can answer “what is” you need to identify which kind you are interested in • It is jargon and acronym-rich, & it’s vendor balkanized • It is (still) immature and so nothing does it full justice – no one approach, no set of standards, or vendor, or architecture, or set of components, or framework, or technology, or technique, or regulations, etc. • It will radically impact how you “do” IT & environments 4 2 What are the Issues? 5 In Summary 1. Disconnect between Logical and Physical is exploited for the technology’s benefit; not the humans’ 2. Dynamism 3. Blur & Ease of Sprawl – Increased Complexity & Interdependencies – Overlap of various roles’ capabilities 4. Resource equation is still a zero-sum game (at best) – Same staff (IT & Business) – Same Procedures? , … same Tools? 5. The technology’s Immaturity 6. Our IT Operations Immaturity 7. The CIO’s Drivers (expectations, motivations & intentions) 6 3 What is a reasonable, “AUDIT‐READY” secure Reference Architecture? 7 2 Security Reference Architectures Durable Non Compliance People / Organizations X Processes / Tasks / RnR Metrics? Threat Technologies / Constructs X Mitigation Build Specs / Contracts / Metrics? Documentation Technical-Trust Enablement 1.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/13 for the Period Ending 12/31/12 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2012 OR TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (408) 745-2000 (Address of principal executive offices)(Zip Code) ( Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/26/14 for the Period Ending 12/31/13 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2014, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2013 or TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from__________ to____________ Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (I.R.S. Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (Address of principal executive offices) (Zip code) (408) 745-2000 (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • The Best Tech Startups
    April 20, 2009 InformationWeekanalytics.com Analytics Alerts The Best Tech Startups Contents The vendors that made our first-ever InformationWeek 2 Five Engines Of Innovation: Startup 50 list solve critical IT problems, cut costs, and Paglo, Altor, Nirvanix, Ocarina, improve operations. Our finalists address a range of busi- And Spigit 3 The Complete Startup 50 List ness technology challenges, but the biggest concentration 9 Profiles Of Other Notable of entrepreneurial energy falls into three areas: virtualiza- Startup 50 Vendors tion, cloud computing, and software as a service. Each of 43 How To Vet Startups these companies makes a strong case that now is the time to try something new, with proper vetting. InformationWeekanalytics.com Analytics Alerts Engines Of Innovation By Andrew Conry-Murray $601.8 MILLION. That’s how much venture capital has been invested in the InformationWeek Startup 50, a group of up-and-coming technology vendors chosen through a three-step process of nomination, online voting, and editorial vetting. The companies that made our list were assessed on the following criteria: innovation in technology or business model; value, delivered in lower costs, increased sales, higher productivity, or improved customer loyalty; and enter- prise readiness, meaning a product that scales and is ready for deployment. What follows is the full Startup 50 list, along with profiles of five companies from the list that represent the inno- vative ways these startups solve critical IT problems, cut costs, and improve operations. To be considered, the newbies could be no more than 5 years old. Our finalists address a range of business technology challenges, but the biggest concentration of entrepreneurial energy falls into three areas: virtualization, cloud computing, and software as a service.
    [Show full text]
  • Vgw Virtual Gateway
    vGW Virtual Gateway Administration Guide Release 4.5 Copyright © 2011, Juniper Networks, Inc Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. SOFTWARE LICENSE The terms and conditions for using this software are described in the software license contained in the acknowledgment to your purchase order or, to the extent applicable, to any reseller agreement or end-user purchase agreement executed between you and Juniper Networks. By using this software, you indicate that you understand and agree to be bound by those terms and conditions. Generally speaking, the software license restricts the manner in which you are permitted to use the software and may contain prohibitions against certain uses.
    [Show full text]
  • SECURING Vms IS YOUR NEXT MISSION
    INFORMATIONINFORMATION ECURITYECURITY® SS MARCH 2011 Virtual Certainty VIRTUALIZATION FREES YOU FROM STACKING SERVER BOXES. SECURING VMs IS YOUR NEXT MISSION. also RISK ASSESSMENT FRAMEWORKS MANAGING CLIENT-SIDE SECURITY INFOSECURITYMAG.COM FROM OUR SPONSORS MARCH 2011 contentsVOLUME 13 NUMBER 2 FEATURES Virtual Certainty 20 VIRTUALIZATION SECURITY VMs introduce a new security dynamic, one that emphasizes asset discovery, change management and tweaks to existing security technology. BY DAVE SHACKLEFORD Sizing Up Risk 28 METHODOLOGY There are a lot of risk assessment frameworks out there. Here’s what you need to know in order to pick the right one. BY RICHARD E. MACKEY, JR. The Client Side 37 PATCH MANAGEMENT Attacks on applications like Adobe Reader and Java require effective and timely patching of user systems. BY MICHAEL COBB DEPARTMENTS Transformation Time 5 EDITOR’S DESK Cloud computing is forcing an evolution of information security practices and technology. BY MARCIA SAVAGE Help Wanted 11 SCAN A new competition tries to foster interest in cybersecurity as early as high school. BY ROBERT WESTERVELT ALSO Cybercrime Trends Recipe for Reinvention 8 PERSPECTIVES Enterprise 14 SNAPSHOT use of consumer-oriented technologies requires a A Framework for Security Career Success new security model. 16 ADVICE Here are four things you need to do in order to execute on your long-term career plan. BY LEE KUSHNER AND MIKE MURRAY 46 SPONSOR RESOURCES 3 INFORMATION SECURITY MARCH 2011 EDITOR’S DESK Transformation Time Cloud computing is forcing an evolution of information security practices and technology. BY MARCIA SAVAGE IF YOU NEEDED any more confirmation of how big cloud computing has become (not that you really did), you didn’t have to look any further than last month’s RSA Conference 2011.
    [Show full text]
  • Juniper Networks Inc
    JUNIPER NETWORKS INC FORM 10-K (Annual Report) Filed 02/24/12 for the Period Ending 12/31/11 Address 1194 NORTH MATHILDA AVE SUNNYVALE, CA 94089 Telephone 4087452000 CIK 0001043604 Symbol JNPR SIC Code 3576 - Computer Communications Equipment Industry Communications Equipment Sector Technology Fiscal Year 12/31 http://www.edgar-online.com © Copyright 2013, EDGAR Online, Inc. All Rights Reserved. Distribution and use of this document restricted under EDGAR Online, Inc. Terms of Use. Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2011 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (408) 745-2000 (Address of principal executive offices)(Zip Code) ( Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange LLC Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act.
    [Show full text]
  • 5 Best Practices to Protect Virtual Environments
    White Paper: The Business Case for Data Governance CONTENTS OF THIS WHITE PAPER 5 Best Practices to Protect Your Security – Virtualization’s Big Hurdle..1 Virtual Environment Why Old-STyle Protections Fall short..2 Latest research from the Yankee Group shows that nearly half Best Practices ........................................3 of all businesses have virtualized some portion of their data Create A VM Service “Good” List............... 3 centers. This means there is a very good chance you are in the Monitor and Protect the Hypervisor............ 4 midst of, or soon will be, a virtualization initiative in order to cut Enforce Access Control Per VM................. 4 the costs of operating your data center, DMZ, mission critical applications or desktop environment. Standing in the way of Layer Defenses .......................................... 4 realizing virtualization’s promise however, is security. And Insist On Purpose-Built .............................. 5 going forward with your virtualization initiative without Summary.................................................5 addressing visibility, protection and compliance can prove problematic as malware targeting virtual networks proliferates and standards mandating granular virtualization security become ratified. This paper lays out five ways by which you can fortify your planned or existing virtualized environment, to ensure it is architected for security, malware suppression, and regulation compliance. SECURITY – VIRTUALIZATION’S BIG HURDLE Virtualization stands to bring enormous cost savings to enterprises, by significantly reducing the space and electrical power required to run data centers and by streamlining the management of an ever-growing number of servers. It is no wonder then; adoption of virtualization is proceeding at a very rapid clip, further accelerated by trying economic times and cost cutting mandates.
    [Show full text]
  • Juniper Networks Inc(Jnpr)
    JUNIPER NETWORKS INC (JNPR) 10-K Annual report pursuant to section 13 and 15(d) Filed on 02/25/2011 Filed Period 12/31/2010 Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 Form 10-K (Mark One) [X] ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the fiscal year ended December 31, 2010 OR [ ] TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 For the transition period from to Commission file number 001-34501 JUNIPER NETWORKS, INC. (Exact name of registrant as specified in its charter) Delaware 77-0422528 (State or other jurisdiction of incorporation or organization) (IRS Employer Identification No.) 1194 North Mathilda Avenue Sunnyvale, California 94089 (408) 745-2000 (Address of principal executive offices, incorporation or organization) (Registrant's telephone number, including area code) Securities registered pursuant to Section 12(b) of the Act: Title of Each Class Name of Each Exchange on Which Registered Common Stock, par value $0.00001 per share New York Stock Exchange LLC Securities registered pursuant to Section 12(g) of the Act: None Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes [X] No [ ] Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes [ ] No [X] Indicate by check mark whether the Registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filings requirements for the past 90 days.
    [Show full text]