Juniper Networks upgrade Mykonos Web Security Software

By

Identify attackers in real time with the latest Mykonos Web Security release.

Juniper Networks announced major enhancements to its Mykonos Web Security Software, which uses the company’s Intrusion Deception Technology to defend against web-based threats in real-time. 

According to the announcement, the new release of Mykonos Web Security “provides 30 new features and enhancements that strengthen protection against a wider range of attackers and hacking techniques, simplify configuration for security administrators, and boost scalability to help ensure holistic protection as traffic volumes increase.”

The Mykonos Web Security solution uses detection points, called tar traps, to identify attackers in real-time as they attempt to hack their desired target. Once attackers are identified, Mykonos Web Security prevents them from compromising critical information, wastes their time by presenting false vulnerabilities, and provides valuable intelligence to thwart future attacks. 

“Web-based threats have become a major concern and companies require a proactive solution with real-time prevention to augment traditional-network security defenses. Mykonos is the first company to detect hackers during the reconnaissance phase of an attack. We can track, profile and, most importantly, respond to an attacker before the damage is done, said David Koretz, vice president and general manager, Mykonos Software.

For more information, see http://www.mykonossoftware.com/index.php.

06/06/2012

Related content

  • HP Expands Security Offerings
  • Tech News
    Huge DDoS Attack over HTTPS is Discovered and Stopped
  • Tech News
    In the news: Open Source AGPL Added as License Option for Elasticsearch; Sovereign Tech Fund Invests in FreeBSD Development; Red Hat's OpenStack Services on OpenShift Now Generally Available; Juniper Networks Offers New AI-Native Courses and Services; Delphix Report Cites Growing Concerns Over Data Protection; Endor Labs Launches Magic Patches and Upgrade Analysis Tool; Rackspace to Offer TuxCare's Extended Linux System Support; Announcing eLxr: Enterprise-Grade Linux for Edge-to-Cloud Deployments; NSA Issues Zero Trust Guidance on Automation and Orchestration; and IT Pros Report Lack of Familiarity with Secure Software Development.
  • Targeted attacks on companies
    Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
  • No One Is Safe; Citrix Networks Breached
comments powered by Disqus