Security Experts:

Johnnie Konstantas's picture

Johnnie Konstantas

Johnnie Konstantas is Director of Product Marketing for Juniper Cloud Security solutions. Within her 17 years in telecommunications and security, she has held leadership positions spanning engineering, product management and marketing. Most recently, Konstantas was the VP of Marketing at Altor Networks (acquired by Juniper) where she built the team, automation infrastructure and processes for establishing and expanding the company's leadership as an innovator and solution provider of cloud and virtualization security technology. She started her career at Motorola, designing and implementing cellular infrastructure systems before transitioning to product portfolio management and marketing. Konstantas holds a B.S. in Electrical Engineering from the University of Maryland.

Recent articles by Johnnie Konstantas

  • On the whole, with only about 1000 machines infected today out of millions worldwide, the probability to exposure remains low, but just to be sure this old Flame doesn’t come knocking, there are precautions you can take as part of your security update regimes.
  • How can you defend against a new generation of threats and attackers that are leveraging automation and outpacing alerting mechanisms and manual-access controls?
  • IT managers aren’t the only ones aware of this BYOD trend – attackers are too. Whether their aim is to promote a cause (hacktivism) or turn a profit, our mobile devices constitute perhaps the easiest way to do so.
  • Second in a series on evaluating new firewalls. This week Johnnie explains how the highest security for your environment is to have technology that can sustain its protections through network growth and scale.
  • If you are ready to upgrade your firewalls you will have tons of choices but you’ll also need to conduct considerable research and gain an understanding of what those choices mean in terms of benefits and trade offs for your network.
  • 4G/LTE networks are based on entirely new infrastructure. Naturally, 4G/LTE all IP infrastructure will extend the attack surface. While technologies like firewalls, intrusion detection sensors, encryption tools and subscriber protection suites can ameliorate some of the risks, the question now is: What’s available to you from your provider and for your chosen device?
  • Is a purpose-built virtualization security solution the cure to VM stall? It certainly helps allay the security and ROI concerns that are part of the reticence to deploy.
  • According to a recent survey, participants appear to be searching for solutions that bridge the gap between physical and virtual security. In fact, 80% said they consider integration with a physical firewall to be a critical feature for virtualized security.
  • We know by now that virtualized data centers and cloud deployments require more than the traditional physical security measures. To protect your data center, you must run antivirus scans on your virtual machines (VMs). It’s the right thing to do. It’s more so a question of how to do this right thing the right way.
  • Enterprises use smartphones and mobile devices in some manner to improve mobility and productivity, as do government agencies and even small-to-medium sized businesses. These organizations must protect their network and their users – and their devices, whether corporate owned or a user’s personal mobile device – from loss, theft and exploit.
  • The private sector usually leads the way in technological advancement, but might we be witnessing a shift, where the government could begin to outpace the private sector? Has Vivek Kundra’s effort to reduce waste, improve efficiency, and save $18.8 billion through data center consolidation landed the U.S. Government on the cutting edge of technology?
  • New guidance on virtualization from the PCI Council is here. So what if you’re a business readying to deploy a private cloud, where you’ll be storing cardholder data? Or what if you’re thinking of a move to a public cloud? What can you take from the new guidance?
  • When it comes to any security—though especially cloud security—there are several areas in which protections have to be applied. While we may not ever know exactly what happened at Sony, we can conclude that the right way to reduce the chances of such a breach happening again is to install as many layers of access protection and traffic visibility as possible.
  • Cybercrime is no joke, but rather, one of this century’s most serious threats. While every organization faces this threat, some are at greater risk than others.
  • The biggest trend in the healthcare industry in recent years has been the epic government-mandated move to electronic medical records (EMRs). This effort promises to bring long-term cost savings, improved efficiencies and productivity, and, ultimately, enhanced patient care.
  • University IT departments aren’t shy about investigating and participating in the latest and greatest technology trends—including virtualization and cloud computing.
  • Virtualization is a hot topic. When it comes to the concepts and solutions around protecting virtual and cloud environments, people have a lot of questions. Here’s a sampling of what I’ve been asked lately.
  • Implement ironclad cloud security today to thwart malware attacks of the future. When it comes to securing the public and private cloud and their virtualized underpinnings, organizations should know the various security options and their associated risks.
  • If you’re in the market for a cloud services provider, you should have several security questions at the ready. Consider it a shopping list of must-haves to run through with any provider, and the best way to ensure you’re getting the most secure and trusted IaaS offering possible.
  • Cloud computing and virtualization are poised to dominate security discussions for 2011. It stands to reason that as businesses and governments take their data centers and workloads to the virtualization platform, ensuring protection and compliance will be top of mind.
  • With PCI DDS 2.0, any organization that had been waiting for PCI DSS to put forward that a Virtual Machine equals a server in order to proceed with a virtualization project, the light is now green.
  • Knowledge is power and, when it comes to security – the more information you have about your environment – the more effective you can be at protecting it.
  • Security practitioners know the requirements and functionality, which define each criterion for the physical network, but not nearly as much is known or understood about the parameters that make for a sound virtualization security solution choice.