Juniper Networks Releases New Mykonos Security Software to Stop Web Attacks

Updated: June 11, 2012

Juniper Networks Releases New Mykonos Security Software to Stop Web Attacks

Juniper Networks (NYSE: JNPR), the industry leader in network innovation, announced major platform enhancements to its Mykonos Web Security Software, which uses ground-breaking Intrusion Deception™ Technology to defend against web-based threats in real-time. The new release of Mykonos Web Security provides 30 new features and enhancements that strengthen protection against a wider range of attackers and hacking techniques, simplify configuration for security administrators, and boost scalability to help ensure holistic protection as traffic volumes increase.

Web applications and websites are under constant attack and are the most popular targets for hackers because they remain the largest unprotected threat in corporate networks. A Ponemon Institute survey found 73 percent of organizations have been hacked at least once in the past two years through insecure web applications.

The Mykonos Web Security solution uses deception to create detection points -- or tar traps -- to identify malicious actors in real-time as they attempt to hack their desired target. Once attackers are identified, Mykonos Web Security prevents them from compromising critical information, wastes their time by presenting false vulnerabilities and provides valuable intelligence to thwart future attacks. This active, intelligence-based approach uses Mykonos' Intrusion Deception™ System -- the only system that truly neutralizes threats as they occur -- giving companies the upper hand by using attackers' actions against them without relying on signatures or passively restricting traffic. With Mykonos Web Security, Juniper Networks is transforming the security industry and changing the ROI of hacking by making it costly, time consuming and tedious for attackers to chase after false data.

Release Highlights

Enhanced security protections: Mykonos Web Security now detects a wider range of attackers and hacking techniques, protecting against more threats, as well as provides new countermeasures, including:

  • Preventing brute-force authentication attacks that rapidly guess combinations of usernames and passwords to gain access to systems. Mykonos Web Security prevents the attacker from using any compromised credentials even if an attacker happens to 'guess' the correct password.
  • Defending against directory traversal attempts that are used to map websites to gain additional information on how to attack them.
  • Integrating third-party software vulnerability protection into Mykonos Web Security, which helps prevent against known software vulnerabilities typically targeted by automated attack scripts. Mykonos Web Security now integrates a large library of known third-party attack data into its tracking, profiling, and response systems.

User-friendly and intuitive interface: A simplified interface unifies the security console and configuration, making it easier for customers to manage systems, as well as provides a new setup wizard tool to quickly deploy without assistance from Juniper Networks.

Greater performance clustering: Mykonos Web Security now supports throughput greater than 1Gb/second by enabling customers to add multiple slaves to a clustering model. In effect, this allows for Mykonos Web Security to protect higher-volume web properties.

Comprehensive approach to security: The new version of Mykonos Web Security provides a significant new layer of defense against web attacks and builds on the successful SRX and vGW platforms as a key component of Juniper's strategy to deliver a comprehensive and automated approach for data center security.

Related Categories
Featured Research
  • Securing Enterprise Information Technology

    In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more

  • Office365 Adoption eGuide

    Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more

  • Okta Directory Integration

    For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more

  • Better BYOD with Pulse Secure and MDM Partners

    Learn how Pulse Secure and leading MDM product partners are transforming the way employees and IT benefit from the productivity and flexibility of BYOD — without compromising security or increasing management complexity. more

Related Articles