Real Time Web Analytics New Mobile Phone Apps, Iphone Apps, Ipad Apps, Computer Apps, Laptop Apps
Premium Accounts

Tuesday, 25 March 2014

Armstrong Atlantic State University Makes the Grade With Juniper Networks Wireless Solutions

Broad Set of Wireless Solutions Meet Density Requirements of a College Campus While Delivering a Secure, Resilient Mobile User Experience at Lower Costs

SUNNYVALE, CA--(Marketwired - Jul 30, 2013) - Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced that Armstrong Atlantic State University, part of the University System of Georgia, has successfully deployed Juniper Networks wireless solutions across its campus-wide network. To support the burgeoning use of mobile devices among students, faculty and staff, Savannah, Georgia-based Armstrong Atlantic State University partnered with Juniper Networks to build out a robust data center and campus network architecture. The new wireless local area network (WLAN) delivers a reliable, consistent mobile experience capable of handling thousands of concurrent sessions of high-definition video, online collaboration and bandwidth-intensive academic research and computational processes.

As a four-year state university offering more than 100 different academic programs to approximately 7,500 students, Armstrong recognized that implementing a comprehensive campus solution with converged wired and wireless capabilities would have a direct and positive impact on its student, faculty and staff communities. In addition, the University supports distance-learning initiatives catering to a large military and mid-career audience, which dictated the need for a robust data center solution. With Juniper Networks, Armstrong was able to build a data center and campus network that addressed their needs while lowering operating costs.

As the Bring Your Own Device (BYOD) trend continues to evolve, the ability for wireless networks to securely support large numbers of mobile devices simultaneously is a top concern for IT administrators. Armstrong's mobile users expect a seamless wireless experience, even as they transition between wired and wireless environments; if they have a negative experience, it can be potentially damaging to the organization's reputation.

In a recent third-party test conducted by wireless broadband consulting firm Novarum, Juniper Networks wireless solutions were proven to withstand large-scale, high-density BYOD environments without interruption, even in extremely bandwidth-intensive environments. As part of the rigorous testing process, Juniper Networks wireless LAN solutions were put through multiple failure scenarios and able to maintain strong connectivity throughout. When tested against competitive offerings, the test results revealed that Juniper Networks wireless LAN solutions were able to deliver high performance network connectivity coupled with additional advanced capabilities, such as Virtual Controller Cluster, which provides hitless fail-over to ensure uninterrupted network traffic to support critical applications.

 News Highlights:

Juniper Networks® WLC Series Wireless LAN Controllers and WLA Series Wireless LAN Access Points, combined with the Juniper Networks EX Series Ethernet Switches, allow Armstrong to deploy a converged data center and campus network that delivers a robust, reliable wired and wireless experience to every user, regardless of location. In addition, with the use of Junos® Space Network Director, which provides a single pane of glass view into both wired and wireless network environments, Armstrong was able to reap the benefits of more efficient network management. Since the roll-out in Spring 2012, the University has seen roughly a 30 percent reduction in operating costs over its previous network vendor deployment. The University has plans to implement a nearly end-to-end Juniper Networks solution within its data center and campus environments, which will further reduce network complexity and maximize uptime. As an institution of higher learning that must maintain and process volumes of personal student data, Armstrong takes security very seriously. With Juniper Networks MAG6610 Junos Pulse Gateways, Armstrong was able to provide authorized users, including students, faculty, staff, guests and contractors, with safe, secure remote and LAN-based network access from anywhere on campus. The MAG Series Gateways integrate with the University's authentication system and interoperate with EX Series switches and any 802.1x device for dynamic context-aware security policy enforcement. To ensure a smooth deployment with minimal downtime, Armstrong turned to network systems integrator and Juniper Networks Partner Advantage Program Elite partner, Layer 3 Communications. Following the initial deployment, Layer 3 Communications continues to provide Armstrong with professional and technical support services for product support and maintenance at the local level.

Supporting Quotes:

"At Armstrong, we fully believe that every student deserves a high quality education and are committed to helping them reach their full potential. The reality is that ubiquitous, secure wireless connectivity is a must-have on today's modern college campuses. If you don't have it, it can have some serious negative ramifications to the institution's reputation. Working with Juniper Networks, we have been able to build out a secure wired and wireless data center and campus network infrastructure that addresses our needs today and well into tomorrow, all while improving total cost of ownership."
-Robert Howard, chief information officer, Armstrong Atlantic State University

"As a specialized network systems integrator, our primary focus is on providing the highest level of guidance, support and services to help our customers build next-generation networks that best support their businesses. In the case of Armstrong, Layer 3 Communications' professional services complemented the University's technical team's capabilities with local engineering resources to provide an additional layer of skill and expertise throughout the design, integration and upgrade process. Being locally based in Georgia, our true value comes from having a keen understanding of the local market and close proximity to the customer to ensure that Armstrong benefits from its investment with Juniper Networks."
-Rodney Turner, chief executive officer, Layer 3 Communications

"For this test -- the largest public wireless LAN test of its kind -- we constructed a repeatable test scenario with 300+ typical Wi-Fi clients accessing an enterprise WLAN consisting of six modern dual-band 802.11n enterprise access points in a high availability configuration with redundant controllers. In almost all of the tests we conducted, we overloaded the network with more traffic than would occur in a 'real-life' scenario so that we could observe how the network behaved under stress. The Juniper Networks WLAN system delivered consistent throughput during these tests and operated in a stable fashion under very high offered load. The Juniper system excelled at spreading the client load evenly -- with each laptop, tablet or smartphone getting a fair slice of the available system capacity. We also created some intentional hardware failures during the testing and the Juniper Networks WLAN system proved to be rock-solid through them all. The Juniper system maintained consistent network connectivity and throughput during a controller failover in the middle of a test."
-Phil Belanger, founder and chief marketing officer, Novarum

"Like many enterprises, universities are under extreme pressure to balance investment to ensure competitiveness while functioning under tight budgetary constraints. Industry disruptors like BYOD are forcing colleges to grapple with challenges such as explosive volume of devices used on campus. These devices are straining bandwidth resources and demanding new security requirements. At Juniper Networks, our customer-driven innovation is derived from closely listening to what our customers need and building the best solutions to help them solve their biggest challenges. This is why our wireless products are built to deliver highly resilient and reliable performance at scale."
- Steve Collen, vice president of marketing, Campus and Data Center Business Unit, Juniper Networks

Additional Resources:

About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logo are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.


View the original article here

Monday, 20 January 2014

Study: Federal IT Pros Becoming Technology Early Adopters to Help Address Cost Cuts, Efficiencies, Federal Mandates as FY14 Budget Looms

New Research Shows 34 Percent of Federal IT Pros Surveyed Plan to Adopt Software-Defined Networking (SDN) Within Two Years to Meet Priorities, Yet Gaps Exist in SDN Understanding

SUNNYVALE, CA--(Marketwired - Aug 22, 2013) - Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced the results of its survey of 250 federal IT professionals conducted by Wakefield Research. IT leaders and practitioners in the federal sector who were surveyed are looking to capitalize on major developments in networking technology to align investments with their top agency priorities of cutting costs (72 percent), increasing efficiency and business agility (68 percent) and meeting mandates (60 percent) as they plan for IT spending in the government's next fiscal year, which begins October 1.

Click to Tweet: Federal IT Pros Becoming Early Adopters of SDN, Study Shows http://bit.ly/JNPRnewz

As federal IT professionals plan for current and future budget cuts, agencies have to find improvements in IT efficiencies to reduce both CAPEX and OPEX. Additionally, several federal mandates are presenting federal IT workers with a unique set of obstacles as they prepare for the new fiscal year.

The survey showed that a majority (66 percent) of respondents believe SDN -- software designed to create more efficient and agile networks -- will be important in accommodating federal mandates or similar efficiency and budgetary requirements with more than one-third (34 percent) claiming they currently have concrete plans to adopt SDN within the next two years. Ninety-one percent of respondents see at least one area in their agency or department that will benefit from SDN and 61 percent of those in executive or management positions consider SDN an important factor in making networking buying decisions. In fact, most respondents who plan to adopt SDN indicate that they intend to do so within the next 13 months. These findings suggest that SDN will become a reality within government faster than many have forecasted.

However, agency preparedness is lacking, with nearly two-thirds (61 percent) surveyed saying they are not familiar with SDN. Even among those familiar with SDN, 58 percent had two or more misconceptions about the implementation of SDN. For example, 11 percent believed SDN only applied to data centers and 15 percent believed it required manual configuration of hardware. The reality is that SDN is being considered and applied in many parts of IT infrastructure, not just the network or the data center. Additionally, SDN will help remove manual configuration of hardware to orchestrate IT operations.

Supporting Quotes

"We see government and service providers both applying SDN to their network operations and continuous monitoring initiatives. Many agencies are working to automate and centralize network configuration and monitoring using tools like Chef and Puppet, enabling automated control-plane monitoring and configuration push and rollback. At Accelerated Servers, we have been successfully applying SDN functionality to integrate continuous monitoring of network operations, security and performance."
-Avi Freedman, CTO, Accelerated Servers

"As the research shows, government IT professionals are looking to lower costs and continue to turn to new technologies to realize efficiencies. Unfortunately, most networks lack the agility and efficiency needed to realize the full benefits of innovations like cloud. While the study shows that a significant number of federal IT professionals see how SDN will help improve business agility and efficiencies needed by agencies, the survey also points to an important knowledge gap of SDN among federal IT professionals. There is a clear need to develop a defined roadmap with an eye toward future-proofing government IT."
-Mark Belk, chief architect for national government, Juniper Networks

Additional Resources:

About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos and QFabric are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.


View the original article here

Juniper Networks Announces Date of Its Fourth Quarter 2013 Preliminary Financial Results Conference Call and Webcast

SUNNYVALE, CA--(Marketwired - Jan 6, 2014) - Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced it will release preliminary financial results for the quarter ended Dec. 31, 2013, on Jan. 23, 2014 after the close of the market and will host a conference call at 2:00 p.m. PST (Pacific Standard Time), to be broadcast live over the Internet. 

To participate via telephone, the toll free dial-in number is 877-407-8033, international callers dial +1-201-689-8033. Please dial in ten minutes prior to the scheduled conference call time. The webcast will be available at http://investor.juniper.net.

Juniper also announced the following tentative release dates for 2014:
Q1 2014 preliminary financial results tentative date: April 22, 2014
Q2 2014 preliminary financial results tentative date: July 22, 2014
Q3 2014 preliminary financial results tentative date: Oct. 21, 2014

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.


View the original article here

Signature Update #2332

9 new signatures:

HTTP: Supermicro Onboard IPMI close_window.cgi Buffer OverflowHTTP: Google Chrome ExecCommand Heap Use After FreeHTTP: Apache Roller OGNL Injection Remote Code ExecutionHTTP: Apache Solr SolrResourceLoader Arbitrary File DisclosureAPP: RealNetworks RealPlayer RMP File Buffer OverflowHTTP:DLINK-DIR605L-CAPTCHA-BOFHTTP: Dlink D-Link DIR-605L Improper Variable Parsing Buffer OverflowHTTP:STC:FIREFOX-LOOKUP-GETTERHTTP: Mozilla Firefox Lookupgetter Dangling Pointer Memory CorruptionHTTP: cPanel 'fileop' Parameter Cross Site ScriptingAPP: IBM Forms Viewer XFDL Form Fontname Tag Parsing Buffer Overflow

4 updated signatures:

HTTP: Parameter Directory TraversalIRC: mIRC PRIVMSG Buffer OverflowHTTP: Internet Explorer JavaScript Integer Overflow Remote Code ExecutionHTTP: Microsoft Windows WinVerifyTrust Signature Validation Vulnerability

1 renamed application signature:

Web:Applications:OFFICE365-SSL

This signature detects attempts to exploit a known vulnerability against Supermicro. A successful attack allows the attacker to execute arbitrary code within the context of the server.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

supermicro intelligent_platform_management_firmware 2.24 (-:~-~-~-~x9_generation_motherboards~)supermicro intelligent_platform_management_firmware up to 2.26 (-:~-~-~-~x9_generation_motherboards~)

This signature detects attempts to exploit a known vulnerability against Google Chrome Web Browser. A successful attack can lead to arbitrary code execution.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

This signature detects attempts to exploit a known vulnerability against Apache Roller OGNL. A successful attack can lead to arbitrary code execution.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

apache roller 5.0apache roller up to 5.0.1apache roller 4.0.1apache roller 4.0

This signature detects attempts to exploit a known vulnerability against Apache Solr SolrResourceLoader. A successful attack can lead to arbitrary file disclosure.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

apache solr 4.5.0apache solr 4.3.0apache solr 4.4.0apache solr 4.1.0apache solr 4.0.0 (beta)apache solr 4.3.1apache solr 4.0.0 (alpha)apache solr up to 4.5.1apache solr 4.2.0apache solr 4.2.1

This signature detects attempts to exploit a known vulnerability in RealPlayer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

realnetworks realplayer 16.0.3.51realnetworks realplayer 16.0.2.32

This signature detects attempts to exploit a known vulnerability in D-Link DIR-605L Wireless N300 Cloud Router. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted service.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

This signature detects attempts to exploit a known vulnerability against Mozilla Firefox Browser. A successful attack can lead to arbitrary code execution.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

Mozilla Firefox 3.5.12Mozilla Thunderbird 3.0.1Mozilla Thunderbird 3.1.3Mozilla Thunderbird 3.0.7Mozilla SeaMonkey 2.0.7Red Hat Enterprise Linux Desktop Optional 6Red Hat Enterprise Linux HPC Node Optional 6Red Hat Enterprise Linux Desktop 5 ClientRed Hat Enterprise Linux Server Optional 6Red Hat Enterprise Linux Workstation 6Mozilla Firefox 3.5.6Mozilla SeaMonkey 2.0.1Sun OpenSolaris snv_151aSun OpenSolaris Build Snv 101ASun OpenSolaris Build Snv 119Debian Linux 5.0 MipselSlackware Linux X86 64 -CurrentMozilla Firefox 3.6.2Sun OpenSolaris Build Snv 57Ubuntu Ubuntu Linux 10.10 i386Sun OpenSolaris Build Snv 121Mozilla Firefox 3.6.5Sun OpenSolaris Build Snv 28Mozilla Firefox 3.6.6Mozilla Thunderbird 3.0.4Mozilla Firefox 3.6.6Ubuntu Ubuntu Linux 8.04 LTS Amd64Ubuntu Ubuntu Linux 8.04 LTS I386Ubuntu Ubuntu Linux 8.04 LTS LpiaUbuntu Ubuntu Linux 8.04 LTS PowerpcUbuntu Ubuntu Linux 8.04 LTS SparcSun OpenSolaris Build Snv 48Mozilla Thunderbird 3.1.2Avaya Aura System Platform 6.0Avaya Aura Communication Manager 6.0Mozilla Firefox 3.5.7Avaya Aura System Manager 6.0 SP1Red Hat Enterprise Linux Desktop 6Mozilla Firefox 3.6.9Sun OpenSolaris Build Snv 122Avaya Messaging Storage Server 5.2Mozilla Firefox 3.5.5Sun OpenSolaris Build Snv 71Sun OpenSolaris Build Snv 112Sun OpenSolaris Build Snv 99Avaya Aura Presence Services 6.0Sun OpenSolaris Build Snv 49Red Hat Enterprise Linux Server 6Avaya Aura Conferencing 6.0 StandardUbuntu Ubuntu Linux 9.10 Amd64Ubuntu Ubuntu Linux 9.10 I386Slackware Linux 13.0 X86 64Ubuntu Ubuntu Linux 9.10 PowerpcUbuntu Ubuntu Linux 9.10 SparcMozilla Firefox 3.5.11Mozilla Firefox 3.6.7Mozilla Thunderbird 3.0.6Mozilla Thunderbird 3.1.1Mozilla SeaMonkey 2.0.6Sun OpenSolaris snv_111bSun OpenSolaris Build Snv 67Avaya Aura Session Manager 1.1Avaya Voice Portal 5.0 SP2Sun OpenSolaris Build Snv 39Mandriva Linux Mandrake 2010.0 X86 64Mozilla Firefox 3.5.10Sun OpenSolaris Build Snv 80Sun OpenSolaris Build Snv 134Sun OpenSolaris build snv_151aMozilla SeaMonkey 2.0.5Mozilla Firefox 3.6.4Mozilla Firefox 3.5.10Mozilla Thunderbird 3.0.5Sun OpenSolaris Build Snv 134ASlackware Linux 13.0Sun OpenSolaris build snv_151Sun OpenSolaris build snv_151aUbuntu Ubuntu Linux 9.10 LpiaSun OpenSolaris Build Snv 22Avaya Message Networking 3.1Avaya Voice Portal 4.1 SP1Avaya Voice Portal 4.1 SP2Avaya Voice Portal 5.1Avaya Voice Portal 5.0Mandriva Enterprise Server 5 X86 64SuSE SUSE Linux Enterprise Server 11Avaya Messaging Storage Server 5.2 SP1Sun OpenSolaris Build Snv 64Sun OpenSolaris Build Snv 13Sun OpenSolaris Build Snv 91SuSE SUSE Linux Enterprise Desktop 11Sun OpenSolaris Build Snv 127Sun OpenSolaris Build Snv 110Sun OpenSolaris Build Snv 111Avaya Intuity AUDIX LX 2.0 SP1Avaya Intuity AUDIX LX 2.0 SP2Mozilla Firefox 3.5.0Ubuntu Ubuntu Linux 10.10 amd64Mandriva Linux Mandrake 2010.0Sun OpenSolaris Build Snv 133Sun Solaris 10 SparcAvaya Intuity AUDIX LX 2.0Sun OpenSolaris Build Snv 68Sun OpenSolaris Build Snv 36Sun OpenSolaris Build Snv 136Sun OpenSolaris Build Snv 54Sun OpenSolaris Build Snv 118Sun OpenSolaris Build Snv 74Sun OpenSolaris Build Snv 51SuSE SUSE Linux Enterprise SDK 10 SP3SuSE SUSE Linux Enterprise Desktop 10 SP3SuSE SUSE Linux Enterprise Server 10 SP3Mozilla Firefox 3.6.8Sun OpenSolaris Build Snv 123Red Hat Fedora 12SuSE SUSE Linux Enterprise Server 11 SP1Avaya Voice Portal 5.0 SP1SuSE SUSE Linux Enterprise SDK 11 SP1Sun OpenSolaris Build Snv 116Sun OpenSolaris Build Snv 117Avaya Messaging Storage Server 5.0Avaya Aura Application Enablement Services 5.2Sun OpenSolaris Build Snv 135Ubuntu Ubuntu Linux 9.04 Amd64Sun OpenSolaris Build Snv 100Avaya Voice Portal 5.1Sun OpenSolaris Build Snv 130Avaya Message Networking 5.2Debian Linux 5.0Debian Linux 5.0 AlphaSun OpenSolaris Build Snv 129Debian Linux 5.0 ArmDebian Linux 5.0 HppaDebian Linux 5.0 Ia-32Debian Linux 5.0 Ia-64Debian Linux 5.0 M68kDebian Linux 5.0 MipsSun Solaris 10 X86Debian Linux 5.0 PowerpcDebian Linux 5.0 S/390Debian Linux 5.0 SparcMozilla SeaMonkey 2.0.4Avaya Aura Session Manager 6.0Sun OpenSolaris Build Snv 108Red Hat Fedora 14Avaya Message Networking 5.2.1Mozilla Firefox 3.6.2Avaya Aura System Platform 1.1Avaya Aura System Manager 5.2Sun OpenSolaris Build Snv 01Sun OpenSolaris Build Snv 93Sun OpenSolaris Build Snv 94Mozilla Thunderbird 3.1.2Slackware Linux 13.1 X86 64Mandriva Enterprise Server 5Mandriva Linux Mandrake 2009.0Mandriva Linux Mandrake 2009.0 X86 64Ubuntu Ubuntu Linux 9.04 I386Ubuntu Ubuntu Linux 9.04 LpiaUbuntu Ubuntu Linux 9.04 PowerpcUbuntu Ubuntu Linux 9.04 SparcAvaya IQ 5Sun OpenSolaris Build Snv 88Avaya Communication Server 1000E 7.0Avaya Communication Server 1000M 7.0Avaya Communication Server 1000M Signaling Server 7.0Avaya Communication Server 1000E Signaling Server 7.0Sun OpenSolaris Build Snv 02Red Hat Enterprise Linux 5 ServerCometBird 3.6.7Sun OpenSolaris Build Snv 103Debian Linux 5.0 ArmelSun OpenSolaris Build Snv 95Ubuntu Ubuntu Linux 10.04 Amd64Mozilla Firefox 3.5.3Sun OpenSolaris Build Snv 50Sun OpenSolaris Build Snv 37Mozilla Firefox 3.6.3Avaya Aura Application Enablement Services 5.2.1Sun OpenSolaris Build Snv 87Sun OpenSolaris Build Snv 89Slackware Linux -CurrentSun OpenSolaris Build Snv 59Sun OpenSolaris Build Snv 124Red Hat Enterprise Linux Desktop Workstation 5 ClientSun OpenSolaris Build Snv 35Sun OpenSolaris Build Snv 56Ubuntu Ubuntu Linux 10.04 SparcAvaya Messaging Storage Server 5.1Mozilla Firefox 3.6.10Mozilla Thunderbird 3.1.4Sun OpenSolaris Build Snv 45Mozilla Firefox 3.5.8Sun OpenSolaris Build Snv 111AMozilla SeaMonkey 2.0.3Mozilla Thunderbird 3.0.2Mozilla Firefox 3.6Sun OpenSolaris Build Snv 109Sun OpenSolaris Build Snv 132Sun OpenSolaris Build Snv 41Sun OpenSolaris Build Snv 96Sun OpenSolaris Build Snv 85Sun OpenSolaris Build Snv 90Mozilla Firefox 3.5.9Sun OpenSolaris Build Snv 137Sun OpenSolaris Build Snv 126CometBird 3.6.8SuSE SUSE Linux Enterprise SDK 11Red Hat Fedora 13Red Hat Enterprise Linux Workstation Optional 6Sun OpenSolaris Build Snv 128Avaya Aura Session Manager 5.2Mozilla Firefox 3.5.4Sun OpenSolaris Build Snv 81Mozilla Thunderbird 3.0Avaya Aura Communication Manager 6.0.1Ubuntu Ubuntu Linux 10.04 I386Ubuntu Ubuntu Linux 10.04 PowerpcSun OpenSolaris Build Snv 47Sun OpenSolaris Build Snv 83Sun OpenSolaris Build Snv 82Sun OpenSolaris Build Snv 113Sun OpenSolaris Build Snv 114Avaya Aura Conferencing 6.0Mozilla Firefox 3.5.2Sun OpenSolaris Build Snv 98Sun OpenSolaris Build Snv 131Sun OpenSolaris Build Snv 120CometBird 3.6.10Red Hat Enterprise Linux AS 4Red Hat Enterprise Linux ES 4Red Hat Enterprise Linux WS 4Red Hat Enterprise Linux Desktop Version 4Ubuntu Ubuntu Linux 10.10 powerpcSun OpenSolaris Build Snv 101Avaya Voice Portal 4.0Avaya Voice Portal 4.1Mandriva Linux Mandrake 2010.1 X86 64Mandriva Linux Mandrake 2010.1Mozilla Firefox 3.5.1Sun OpenSolaris Svn 126Avaya Message Networking MN 3.1Sun OpenSolaris Build Snv 111BSun OpenSolaris Build Snv 102Mozilla SeaMonkey 2.0.2Sun OpenSolaris Build Snv 92Sun OpenSolaris Build Snv 76Sun OpenSolaris Build Snv 77Sun OpenSolaris Build Snv 19Sun OpenSolaris Build Snv 78Sun OpenSolaris Build Snv 84Sun OpenSolaris Build Snv 38Sun OpenSolaris Build Snv 115SuSE openSUSE 11.3Sun OpenSolaris Build Snv 125Avaya Messaging Storage Server 4.0Slackware Linux 13.1SuSE SUSE Linux Enterprise Desktop 11 SP1Sun OpenSolaris Build Snv 104Sun OpenSolaris Build Snv 105SuSE openSUSE 11.2Slackware Linux 12.2Avaya IQ 5.1Sun OpenSolaris Build Snv 58Sun OpenSolaris Build Snv 86Sun OpenSolaris Build Snv 29Sun Solaris 11 ExpressDebian Linux 5.0 Amd64Sun OpenSolaris Build Snv 61Sun OpenSolaris Build Snv 106Sun OpenSolaris Build Snv 107SuSE openSUSE 11.1

This signature detects SSL access to Microsoft Office servers. Microsoft Office 365 is the suite of familiar Microsoft Office collaboration and productivity tools delivered as a cloud-based service.

srx-branch-11.4, srx-branch-12.1, srx-11.4, mx-11.4, srx-12.1

This signature detects attempts to exploit a known vulnerability in the mIRC client. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

This signature detects attempts to exploit a known cross-site scripting vulnerability against cPanel. It is due to insufficient validation of user-supplied input. Attackers can inject arbitrary web script or HTML content within the context of the current user.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

cPanel 11.4.19cPanel 11.18.3cPanel 11 betacPanel 11.18.3-R21703cPanel 11.0.0cPanel 11.18.4cPanel 11.24.4cPanel 11.24.7cPanel 11cPanel 11.21.0-BETA

This signature detects attempts to exploit a known vulnerability against Microsoft Windows. The vulnerability is due to an error in the way WinVerifyTrust validates PE files signed with Windows Authenticode. The error allows signed PE files to be modified without impacting the signature's validation. A successful attack can allow untrusted attacker-controlled code to be copied and executed on a target machine within the context of the currently logged in user.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

microsoft windows_xp - (sp2:x64)microsoft windows_8 - (-:x86)microsoft windows_server_2008 r2 (sp1:itanium)microsoft windows_8.1 - (-:~-~-~-~x86~)microsoft windows_8 - (-:x64)microsoft windows_rt_8.1 -microsoft windows_server_2012 r2 (-:~-~datacenter~~~)microsoft windows_xp (sp3)microsoft windows_server_2003 (sp2:x64)microsoft windows_rt -microsoft windows_server_2012 r2 (-:~-~standard~~~)microsoft windows_server_2012 -microsoft windows_7 (sp1:x64)microsoft windows_server_2008 (sp2:x64)microsoft windows_vista (sp2:x64)microsoft windows_server_2012 r2 (-:~-~essentials~~~)microsoft windows_server_2008 r2 (sp1:x64)microsoft windows_7 (sp1:x86)microsoft windows_server_2008 (sp2:x86)microsoft windows_server_2008 (sp2:itanium)microsoft windows_server_2003 (sp2:itanium)microsoft windows_8.1 - (-:~-~-~-~x64~)

This signature detects attempts to exploit a known vulnerability in the IBM Forms Viewer. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the targeted application.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

ibm forms_viewer 4.0.0.1ibm forms_viewer 4.0.0ibm forms_viewer 4.0.0.2ibm forms_viewer 8.0.1ibm forms_viewer 8.0.0

This signature detects directory traversal attempts within HTTP GET or POST form parameters. Attackers can exploit a poorly-written CGI program to access or modify private files.

DI-Base, DI-Server, idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.0.0, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

MidiCMS Software MidiCMS Website Builder 2011

This signature detects attempts to exploit a known vulnerability against Microsoft Internet Explorer. A successful attack can lead to arbitrary code execution.

idp-4.0.0, idp-4.0.110090709, idp-4.0.110090831, idp-4.1.0, idp-4.2.0, idp-5.0.0, mx-9.4, isg-3.1.134269, isg-3.1.135801, isg-3.4.0, isg-3.5.0, srx-9.2, srx-branch-9.4, j-series-9.5, idp-4.2.110100823, srx-10.0, srx-branch-10.0, idp-4.2.110101203, idp-5.1.0, idp-4.1.110110609, srx-11.4, srx-branch-11.4, idp-4.1.110110719, mx-11.4, isg-3.4.139899, idp-5.0.110121210, srx-12.1, srx-branch-12.1, isg-3.4.140032, idp-5.0.110130325, isg-3.5.140185, idp-5.1.110130715, isg-3.5.140347, idp-5.1.110131122

Microsoft Internet Explorer 9Microsoft VBScript 5.6Microsoft JScript 5.7Microsoft JScript 5.8Microsoft Internet Explorer 8Microsoft JScript 5.6Microsoft VBScript 5.7Microsoft VBScript 5.8

View the original article here

Juniper Networks Announces Date of Its Second Quarter 2013 Preliminary Financial Results Conference Call and Webcast

SUNNYVALE, CA--(Marketwired - Jul 8, 2013) - Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today confirmed it will release preliminary financial results for the quarter ended June 30, 2013, on July 23, 2013 after the close of the market and will host a conference call at 2:00 p.m. PDT (Pacific Daylight Time), to be broadcast live over the Internet. 

To participate via telephone, the toll free dial-in number is 877-407-8033, international callers dial +1-201-689-8033. Please dial in ten minutes prior to the scheduled conference call time. The webcast will be available at http://investor.juniper.net.

Juniper Networks future tentative release dates for 2013:
Q3 2013 preliminary financial results tentative date: Oct. 22, 2013

About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.


View the original article here

Whether Buying or Selling, Don’t Be Cyber Monday’s Turkey

The busiest time of the year for e-tailers is upon us with online holiday sales forecasted to grow by as much as 15% to 82B (source: National Retail Federation http://www.nrf.com). Bloomberg says AMZN, for instance, will get 35% of its total sales in the last three months of 2013.  

amazon.jpgThe rates of online shopping growth have been on a serious upswing in recent years, aided in part by the spike in apps and coupons targeting Smartphone and tablet users who are embracing shopping on the go with greater trust.

This, too, is when cybercriminals kick their activity into high gear, looking to take advantage of distracted IT staff and security teams squeamish to stem business flow, in order to conduct their scams unabated. According to the Ponemon Institute’s 2013 eCommerce Cybercrime report, thieves masquerading as online shops and legitimate buyers will employ a number of ways to make money, including awards points scams, hack mobile coupons and hoarding goods in shopping carts waiting for deals to become effective so they can buy at rock-bottom cost and resell.

But the number one way that hackers will target ecommerce this holiday season is through botnets and DDoS attacks that aim to disrupt online shop availability.

methods.jpg

You would think that with so much on the line—a minute of downtime translates to $8K in losses according to @davidautter in his article Cyber Monday Financial Stakes High for Ecommerce and Criminals—that businesses would be making security a top priority especially given that Black Friday and Cyber Monday kick off months’ long buying boon. But as the study indicates, most firms believe that identifying and stopping automated attacks to their ecommerce servers is too difficult.

And they would be right. Dealing with DDoS attacks entails, effectively, not accepting certain traffic types that are assumed to be originating from malicious sources. In other words, if you are going to identify a botnet or a DDoS attempt, you better be right. Otherwise, you will be shutting out legitimate buyers. This false-positive weariness with traditional mitigation tactics is somewhat justified, but firms have options with newer techniques for fending off automated attacks. Heuristic-based application DDoS mitigation and intrusion deception are very promising technologies that thwart unwarranted access to web applications with very high accuracy. Given the percentage that holiday buying boosts overall e-tailer revenue, they are worth a look.

 cyber monday.png

As for consumers, the FBI has some great tips for spotting fraud. I’ve reposted below.

New products or gift cards being sold on auction or classified advertisement websites where the price is significantly lower than any sales price in retail outlets;“One day only” websites featuring the sale of specific items in high demand;Phishing and scam e-mails, text messages, or phone calls that look or sound like they’re coming from a well-known retailer and that ask you to verify a credit card number or to update personal account information; andGift card offers on social media sites claiming to be from major retailers…often, these offers are used to gain access to your social media account and personal information.

They boil down to: If it sounds too good to be true, then it probably is. Happy and safe holiday.


View the original article here

Cyberport Selects Juniper Networks Contrail to Drive Software-Defined Networking Within Its Community Cloud

Hong Kong's Creative Digital Community to Deploy Contrail Virtual Network Overlay Solution to Automate and Orchestrate Its Cloud Network

SUNNYVALE, CA--(Marketwired - Dec 30, 2013) - Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced that Cyberport will deploy Juniper Networks® Contrail as the virtual network solution for its Cyberport Community Cloud. The new offering from Cyberport is designed to give ICT (information and communications technology) start-ups hands-on experience with a state-of-the-art cloud environment and serve as a gateway to public cloud services.

To grow top line revenue and control cost, Cyberport was looking to migrate from traditional data center architecture to a more flexible and agile cloud infrastructure. They have been testing and piloting a cloud computing environment, based on the OpenStack cloud orchestration system for its community start-up companies since 2010 and was one of Juniper's global customers to be involved in Juniper Networks Contrail solution trials.

With a vision to establish itself as a leading ICT hub in the Asia-Pacific region, Cyberport contributes to the growth of the Hong Kong digital economy by nurturing industry start-ups and entrepreneurs, leading collaboration to pool resources and create business opportunities, and accelerating ICT adoption through strategic initiatives and partnerships.

News Highlights

Over 30 cloud-based applications developed by the start-up community have been tested on Cyberport's pilot cloud platform as part of a highly-successful Contrail proof-of-concept trial.  Juniper Networks Contrail will enable Cyberport to offer network-as-a-service within its community cloud. The introduction of a self-service portal enables Cyberport customers to subscribe and self-provision compute, storage, network assets and enjoy bandwidth on-demand.  Juniper Networks Contrail is expected to provide Cyberport a simple way to connect physical networks with a virtual environment and provision underlying services, thus reducing the time, cost and risk for the users when configuring the network.  With Contrail, Cyberport will be able to create new services and monetization opportunities through increased automation and higher utilization of existing infrastructure without adding headcount to the team.  Cyberport will deploy a Juniper Networks MX80 3D Universal Edge Router for network bandwidth and IP provisioning. Cyberport will also leverage Contrail's open standard protocols to orchestrate on-the-fly configuration changes across its data center switching and routing infrastructure to establish virtual networks that dynamically support operations in the community cloud. Juniper Networks' Contrail will also enable Cyberport to support the federation of its community cloud with public cloud environments, increasing the speed of business and service innovation for its start-up customers by making the network more dynamic, flexible and automated. The combination of Contrail and MX Universal SDN Gateway platform will not only provide a scalable and production ready solution for Cyberport, by leveraging a standards-based architecture that integrates with a wide variety of hypervisors, physical networks and cloud orchestration platform such as OpenStack -- Juniper Networks Contrail will also eliminate the risk of Cyberport becoming subject to vendor lock-in.

Supporting Quotes

Juniper Networks
"Cyberport is among the first of many customers turning to Juniper Networks Contrail to help unleash the full potential of cloud computing to drive agility, fuel innovation and reduce costs. Together with our broad partner ecosystem, we are providing Cyberport and other customers with a production-ready solution that meets their business needs and eliminates the barriers that have stifled network innovation in the past."
- Aruna Ravichandran, vice president of product and solutions marketing, Juniper Networks

Additional Resources:

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Statements in this press release concerning Juniper Networks' prospects, future products and prospective benefits to customers are forward-looking statements that involve a number of uncertainties and risks. Actual results or events could differ materially from those anticipated in those forward-looking statements as a result of certain factors, including delays in scheduled product availability, the company's failure to accurately predict emerging technological trends, and other factors listed in Juniper Networks' most recent reports on Form 10-K and 10-Q filed with the Securities and Exchange Commission. All statements made in this press release are made only as of the date of this press release. Juniper Networks undertakes no obligation to update the information in this release in the event facts or circumstances subsequently change after the date of this press release. Any future product, feature, enhancement or related specification that may be referenced in this press release are for information purposes only, are subject to change at any time without notice and are not commitments to deliver any future product, feature, enhancement or related specification. The information contained in this press release is intended to outline Juniper Networks' general product direction and should not be relied on in making a purchasing decision.


View the original article here

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Powered by Blogger