A A A
San serif Serif
INSTITUTE OF INFORMATION TECHNOLOGY
MINISTRY OF SCIENCE AND EDUCATION OF THE REPUBLIC OF AZERBAIJAN
INSTITUTE OF INFORMATION TECHNOLOGY
Photo Video E-mail
  • Az
  • En
  • Ru
  • Az
  • En
  • Ru
Search
Search by date range
  • ABOUT INSTITUTE
    • General information
    • Leadership
    • Requisities of the Institute
    • Attributes
  • RESEARCH ACTIVITY
    • Research direction
    • Conferences, seminars
    • Doctoral and PhD Course
  • DISSERTATION BOARD
    • Elanlar
    • Structure of the dissertation council
    • İddiaçılar üçün
      • Fəlsəfə doktoru
      • Elmlər doktoru
    • Requirements on the dissertations
    • List of documents
    • Compilation rules of the dissertations
    • Recommended scientific publications
  • INTERNATIONAL COOPERATION
    • Organizations
    • Agreements
    • Events
    • Meetings
    • Scholarships
  • MEDIA
  • NEWS
  • ANNOUNCE
  • CONTACT
  • ABOUT INSTITUTE
    • General information
    • Leadership
    • Requisities of the Institute
    • Attributes
  • RESEARCH ACTIVITY
    • Research direction
    • Conferences, seminars
    • Doctoral and PhD Course
  • DISSERTATION BOARD
    • Elanlar
    • Structure of the dissertation council
    • İddiaçılar üçün
      • Fəlsəfə doktoru
      • Elmlər doktoru
    • Requirements on the dissertations
    • List of documents
    • Compilation rules of the dissertations
    • Recommended scientific publications
  • INTERNATIONAL COOPERATION
    • Organizations
    • Agreements
    • Events
    • Meetings
    • Scholarships
  • MEDIA
  • NEWS
  • ANNOUNCE
  • CONTACT
Photo Video E-mail

NEWS

4155

In Juniper introduced the "connected" security architecture

19 April 2019 - 14:17 | Interesting information
In Juniper introduced the "connected" security architecture

The platform, which is designed to automate the monitoring of the entire corporate network - from peripheral devices to the cloud center - involves the technology of several companies at once.

The platform called Juniper Connected Security is designed to automate the monitoring of the corporate network throughout its entire length - from peripheral devices to the cloud center. It combines technologies developed by several different companies: Carbon Black, Aerohive, and Aruba provided end-user security tools and Nutanix and Red Hat technology for data centers.

This approach, according to Juniper Networks, is the most effective. Most companies, regardless of their size, have to work with several security vendors. Security should be multi-layered, according to Juniper. Monoculture security leads to the formation of a single point of failure, and only the joint work of different components allows you to protect the network. Information security is inseparable from the daily work of IT, it is emphasized in the statement of the vice-president of the company Juniper Samantha Madrid. Products from different developers should not work in isolation.

osp.ru 

 

Latest news

08 Mai 2025, 19:00 | Conferences, assemblies

08 Mai 2025, 14:35 | Important events

08 Mai 2025, 09:20 | Conferences, assemblies

07 Mai 2025, 17:04 | Conferences, assemblies

VIDEO

07 Mai 2025, 09:17 | Interviews, speeches

06 Mai 2025, 09:08 | Conferences, assemblies
  • About the Institute
    • Leadership
    • Requisites of the institute
  • Scientific activity
    • Basic scientific directions
    • Conferences, seminars
    • PhD Course
  • Services
    • Publication services
    • Education
    • Library-information servise
  • Training
    • Training Innovation Center
    • IT courses
    • Certification
  • Useful links
    • Links
  • News
  • Announce
  • Useful links
  • Site map
  • Contact
AZ1141, Azerbaijan Republic, Baku, B.Vahabzade str., 9A
ict@iit.science.az
pr@iit.science.az
© 2006 - 2025 Institute of Information Technology