array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(22) "Juniper Networks, Inc."
["slug"]=>
string(29) "ebcb1-us-juniper-networks-inc"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/c39d30bf-7beb-4a70-be80-ba7c3516ef75"
["description"]=>
string(1272) "Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Juniper Networks [NYSE: JNPR] is headquartered in Sunnyvale, California, with over 9,000 employees in 50 countries and nearly $5 billion in revenue. Our customers include the top 100 global service providers and 30,000 enterprises, including the Global Fortune 100 as well as hundreds of federal, state and local government agencies and higher educational organizations.
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network — one that is intelligent, agile, secure and open to any vendor and any network environment.
To learn more about Juniper, our products, and our vision for the decade ahead, visit our site at https://www.juniper.net.
"
["address_street"]=>
string(19) "1133 Innovation Way"
["address_place"]=>
string(9) "Sunnyvale"
["address_region"]=>
string(10) "California"
["founding_date"]=>
string(10) "1996-02-28"
["website_domain"]=>
string(11) "juniper.net"
["website_url"]=>
string(23) "https://www.juniper.net"
["industry_codes"]=>
array(2) {
[0]=>
string(55) "Computer Peripheral Equipment, Not Elsewhere Classified"
[1]=>
string(20) "Prepackaged Software"
}
["employee_count"]=>
int(300)
["article_count"]=>
int(1736)
}
["articles"]=>
array(9) {
[0]=>
array(7) {
["title_en"]=>
string(50) "Strengthen cyber defenses, minimize security risks"
["snippet_en"]=>
string(178) "(Image: Huawei) With Huawei's multi-layered security solution, companies can reduce the risk of a ransomware attack. If this does happen, the solution will help limit the damage."
["url"]=>
string(112) "https://www.ip-insider.de/cyberabwehr-staerken-sicherheitsrisiken-minimieren-a-02399d3760c4032cc4dc1b5ee97f0689/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/edebf0fb-89a2-4fa8-ae59-e9bc37c02dd9"
["source"]=>
string(13) "ip-insider.de"
["publication_date"]=>
string(10) "2024-02-09"
["categories"]=>
array(7) {
[0]=>
string(13) "Data Security"
[1]=>
string(41) "E-commerce and Technological Developments"
[2]=>
string(10) "Cybercrime"
[3]=>
string(11) "Geopolitics"
[4]=>
string(16) "Customer Privacy"
[5]=>
string(14) "Product Launch"
[6]=>
string(24) "Systemic Risk Management"
}
}
[1]=>
array(7) {
["title_en"]=>
string(67) "Juniper launches the networking industry's first AI-native platform"
["snippet_en"]=>
string(71) "The security courier The security courier The security courier, created"
["url"]=>
string(109) "https://www.ilcorrieredellasicurezza.it/juniper-lancia-la-prima-piattaforma-ai-native-del-settore-networking/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/33c2233a-0775-4c6d-87e9-974b26c2a032"
["source"]=>
string(27) "ilcorrieredellasicurezza.it"
["publication_date"]=>
string(10) "2024-01-31"
["categories"]=>
array(4) {
[0]=>
string(16) "Customer Privacy"
[1]=>
string(10) "Cybercrime"
[2]=>
string(14) "Product Launch"
[3]=>
string(13) "Data Security"
}
}
[2]=>
array(7) {
["title_en"]=>
string(55) "CVE-2024-21619 | National Cyber Defense Institute"
["snippet_en"]=>
string(122) "Hungary's central cyber security organization. National CSIRT, authority, vulnerability assessment, IT security awareness."
["url"]=>
string(71) "https://nki.gov.hu/figyelmeztetesek/cve-serulekenysegek/cve-2024-21619/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/6a01fdcc-4de6-4016-a17b-5ae8b7d86472"
["source"]=>
string(6) "gov.hu"
["publication_date"]=>
string(10) "2024-01-30"
["categories"]=>
array(3) {
[0]=>
string(19) "Government Policies"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
}
}
[3]=>
array(7) {
["title_en"]=>
string(78) "Neighbouring Kent councils hit by simultaneous cyber attacks | Computer Weekly"
["snippet_en"]=>
string(168) "Canterbury, Dover and Thanet Councils in Kent have all been struck by simultaneous cyber attacks knocking systems offline, with indications of a link between all three."
["url"]=>
string(106) "https://www.computerweekly.com/news/366566858/Neighbouring-Kent-councils-hit-by-simultaneous-cyber-attacks"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/bcfeaddc-10f8-4175-bdbe-a9a2263b56a4"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-01-19"
["categories"]=>
array(6) {
[0]=>
string(13) "Data Security"
[1]=>
string(41) "E-commerce and Technological Developments"
[2]=>
string(10) "Cybercrime"
[3]=>
string(14) "Product Launch"
[4]=>
string(25) "Business Model Resilience"
[5]=>
string(11) "Acquisition"
}
}
[4]=>
array(7) {
["title_en"]=>
string(54) "NAO head calls for clean data and modern government IT"
["snippet_en"]=>
string(125) "Better IT procurement, better IT systems and better data are among the recommendations Gareth Davies is giving to Parliament."
["url"]=>
string(100) "https://www.computerweekly.com/news/366566492/NAO-head-calls-for-clean-data-and-modern-government-IT"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/eb9e57b8-c2fa-4acf-a2d6-f10f99720541"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-01-16"
["categories"]=>
array(5) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
[2]=>
string(16) "Customer Privacy"
[3]=>
string(19) "Government Policies"
[4]=>
string(11) "Acquisition"
}
}
[5]=>
array(7) {
["title_en"]=>
string(80) "NCA director sacked after WhatsApp and email security breaches | Computer Weekly"
["snippet_en"]=>
string(288) "Nikki Holland, former director of investigations at the NCA, was sacked for “misconduct” after sending sensitive NCA information over personal email and WhatsApp. The NCA assed 16 allegations and upheld two allegations of “gross misconduct” and one allegation of “misconduct”."
["url"]=>
string(108) "https://www.computerweekly.com/news/366566272/NCA-director-sacked-after-WhatsApp-and-email-security-breaches"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/6ed96916-2240-4e1e-8be6-a8ed95498b54"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-01-15"
["categories"]=>
array(6) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Misconduct"
[2]=>
string(10) "Cybercrime"
[3]=>
string(7) "Layoffs"
[4]=>
string(5) "Legal"
[5]=>
string(11) "Acquisition"
}
}
[6]=>
array(7) {
["title_en"]=>
string(82) "Google Cloud abolishes data egress fees for global customer base | Computer Weekly"
["snippet_en"]=>
string(169) "With the charging of data egress fees considered to be an anti-competitive practice, Google Cloud has agreed to stop charging customers for moving data out of its cloud."
["url"]=>
string(110) "https://www.computerweekly.com/news/366566295/Google-Cloud-abolishes-data-egress-fees-for-global-customer-base"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/a60374e7-be93-405e-a406-7fd4d21ce137"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-01-15"
["categories"]=>
array(6) {
[0]=>
string(13) "Data Security"
[1]=>
string(41) "E-commerce and Technological Developments"
[2]=>
string(10) "Cybercrime"
[3]=>
string(16) "Customer Privacy"
[4]=>
string(11) "Acquisition"
[5]=>
string(21) "Competitive Behaviour"
}
}
[7]=>
array(7) {
["title_en"]=>
string(80) "British Library catalogues back online after ransomware attack | Computer Weekly"
["snippet_en"]=>
string(198) "The British Library has restored online access to its main catalogue of nearly 40 million items on a limited basis as it continues the long and arduous process of recovering from a ransomware attack"
["url"]=>
string(108) "https://www.computerweekly.com/news/366566355/British-Library-catalogues-back-online-after-ransomware-attack"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/297ba8db-aad9-4854-9197-fccc07ab664b"
["source"]=>
string(18) "computerweekly.com"
["publication_date"]=>
string(10) "2024-01-15"
["categories"]=>
array(4) {
[0]=>
string(41) "E-commerce and Technological Developments"
[1]=>
string(10) "Cybercrime"
[2]=>
string(13) "Data Security"
[3]=>
string(11) "Acquisition"
}
}
[8]=>
array(7) {
["title_en"]=>
string(71) "Palo Alto Networks reveals alarming cyber gaps in banking and insurance"
["snippet_en"]=>
string(127) "In a study by Palo Alto Networks and IDC Research, the state of cyber resilience across EMEA has been brought into sharp focus."
["url"]=>
string(106) "https://fintech.global/2024/01/10/palo-alto-networks-reveals-alarming-cyber-gaps-in-banking-and-insurance/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/fbb62382-c4d4-4259-a96a-ee4908903747"
["source"]=>
string(14) "fintech.global"
["publication_date"]=>
string(10) "2024-01-10"
["categories"]=>
array(4) {
[0]=>
string(10) "Cybercrime"
[1]=>
string(13) "Data Security"
[2]=>
string(17) "Academic Research"
[3]=>
string(11) "Acquisition"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(143)
}
[1]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(113)
}
[2]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(90)
}
[3]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(81)
}
[4]=>
array(2) {
["name"]=>
string(18) "Expansion & Growth"
["count"]=>
int(60)
}
[5]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(60)
}
[6]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(58)
}
[7]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(48)
}
[8]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(47)
}
[9]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(44)
}
[10]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(42)
}
[11]=>
array(2) {
["name"]=>
string(15) "Market Movement"
["count"]=>
int(41)
}
[12]=>
array(2) {
["name"]=>
string(31) "Financial Update/Profit Warning"
["count"]=>
int(39)
}
[13]=>
array(2) {
["name"]=>
string(14) "Issuing Shares"
["count"]=>
int(33)
}
[14]=>
array(2) {
["name"]=>
string(10) "Litigation"
["count"]=>
int(33)
}
[15]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(33)
}
[16]=>
array(2) {
["name"]=>
string(16) "Customer Privacy"
["count"]=>
int(32)
}
[17]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(32)
}
[18]=>
array(2) {
["name"]=>
string(21) "Competitive Behaviour"
["count"]=>
int(31)
}
[19]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(30)
}
[20]=>
array(2) {
["name"]=>
string(24) "Stock Research & Ratings"
["count"]=>
int(25)
}
[21]=>
array(2) {
["name"]=>
string(18) "General Investment"
["count"]=>
int(24)
}
[22]=>
array(2) {
["name"]=>
string(41) "E-commerce and Technological Developments"
["count"]=>
int(22)
}
[23]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(22)
}
[24]=>
array(2) {
["name"]=>
string(12) "Staff hiring"
["count"]=>
int(19)
}
[25]=>
array(2) {
["name"]=>
string(7) "Layoffs"
["count"]=>
int(18)
}
[26]=>
array(2) {
["name"]=>
string(19) "Government Policies"
["count"]=>
int(16)
}
[27]=>
array(2) {
["name"]=>
string(24) "Access and affordability"
["count"]=>
int(16)
}
[28]=>
array(2) {
["name"]=>
string(27) "Business Model & Innovation"
["count"]=>
int(16)
}
[29]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(15)
}
}
}
ebcb1-us-juniper-networks-inc
Juniper Networks, Inc.
Location
California
Founded
1996-02-28
Website
https://www.juniper.net
Articles
1736 Articles
Category
Computer Peripheral Equipment, Not Elsewhere Classified
Prepackaged Software
Description
Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and solutions that meet the growing demands of the connected world.
Juniper Networks [NYSE: JNPR] is headquartered in Sunnyvale, California, with over 9,000 employees in 50 countries and nearly $5 billion in revenue. Our customers include the top 100 global service providers and 30,000 enterprises, including the Global Fortune 100 as well as hundreds of federal, state and local government agencies and higher educational organizations.
At Juniper Networks, we believe the network is the single greatest vehicle for knowledge, understanding, and human advancement that the world has ever known. Now more than ever, the world needs network innovation to connect ideas and unleash our full potential. Juniper is taking a new approach to the network — one that is intelligent, agile, secure and open to any vendor and any network environment.
To learn more about Juniper, our products, and our vision for the decade ahead, visit our site at https://www.juniper.net.
(Image: Huawei) With Huawei's multi-layered security solution, companies can reduce the risk of a ransomware attack. If this does happen, the solution will help limit the damage.
Canterbury, Dover and Thanet Councils in Kent have all been struck by simultaneous cyber attacks knocking systems offline, with indications of a link between all three.
Nikki Holland, former director of investigations at the NCA, was sacked for “misconduct” after sending sensitive NCA information over personal email and WhatsApp. The NCA assed 16 allegations and upheld two allegations of “gross misconduct” and one allegation of “misconduct”.
With the charging of data egress fees considered to be an anti-competitive practice, Google Cloud has agreed to stop charging customers for moving data out of its cloud.
The British Library has restored online access to its main catalogue of nearly 40 million items on a limited basis as it continues the long and arduous process of recovering from a ransomware attack
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.