On our website, we would like to use the services of third-party providers who help us improve our promotional offerings (marketing), evaluate the use of our website (performance) and adapt the website to your preferences (functionality). We need your consent for the use of these services; you can always revoke this consent. You can find information about the services and the chance to reject them under “User-defined.” You can find additional information in our Data Protection Policy.

Use #itsa20

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2020

Juniper Networks

Oskar-Schlemmer-Straße 15

80807 München



Phone: +49(0)89.2030-12029

Request contact / appointment Request contact / appointment

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.


Products of Juniper Networks (4)

Juniper Networks

Best-of-breed security doesn’t always reduce the risk of a breach. The move to multicloud and distributed environments creates operational complexity that leads to gaps in your defense. It’s time for a better approach to security that effectively safeguards your organization while streamlining operations. Juniper Networks’ seamless security architecture delivers automated enforcement, increased visibility, and cloud protection to do just that.

The Juniper Networks Connected Security solution provides end-to-end network visibility, allowing enterprises to secure their entire network, both physical and virtual. Using threat detection and policy enforcement, Juniper Connected Security automates and centrally manages security in a multi-vendor environment.

The Juniper Connected Security solution is comprised of the following components:

  • A threat detection engine—Cloud-based Sky ATP detects known and unknown malware. Known threats are detected using feed information from a variety of sources, including command control server and GeoIP. Unknown threats are identified using various methods such as sandboxing, machine learning, and threat deception.
  • Centralized policy management—Junos Space Security Director, which also manages SRX Series devices, provides the management interface for the Juniper Connected Security solution called Policy Enforcer.
  • Expansive policy enforcement—In a multi-vendor enterprise, Juniper Connected Security enforces security across Juniper Networks devices, cloud-based solutions, and third-party devices.
  • User intent-based policies—Create policies according to logical business structures such as users, user groups, geographical locations, sites, tenants, applications, or threat risks. This allows network devices (switches, routers, firewalls and other security devices) to share information, resources, and when threats are detected, remediation actions within the network.

Benefits of Juniper Networks Connected Security

  • Management and visibility - Enables you to view traffic across the network, dynamically deploy security policies and block threats. Juniper Connected Security manages the entire network infrastructure as a single enforcement domain, thereby providing enforcement points across the network. Uses machine learning and data mining tools to offer effective threat management while producing detailed data access and user activity reports.
  • Comprehensive security - Ensures that the same security policies are applied across all of the devices in the network. It extends security to each layer of the network, including routers, switches, and firewalls.
  • Protection from advanced malware - Provides automated offense identification and consolidates the threat intelligence with threat hunting activities to simplify and focus attention on the highest priority offenses.
  • Automated policy or enforcement orchestration - Provides real-time feedback between the security firewalls. Reduces the risk of compromise and human error by allowing you to focus on maximizing security and accelerating operations with a simple, concise rule set.
  • Scalability - Supports up to 15,000 devices.
  • Third-party integration - Provides APIs to integrate with the ecosystem partners for capabilities such as cloud access security, network access control, and endpoint protection, and additional threat intelligence feeds

Juniper Networks offers you products from these product groups:

You decided to attend the it-sa? Get your tickets at the TicketShop


Clicking on an exhibitor opens his profile with more information.


The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.