Best-of-breed security doesn’t always reduce the risk of a breach. The move to multicloud and distributed environments creates operational complexity that leads to gaps in your defense. It’s time for a better approach to security that effectively safeguards your organization while streamlining operations. Juniper Networks’ seamless security architecture delivers automated enforcement, increased visibility, and cloud protection to do just that.
The Juniper Networks Connected Security solution provides end-to-end network visibility, allowing enterprises to secure their entire network, both physical and virtual. Using threat detection and policy enforcement, Juniper Connected Security automates and centrally manages security in a multi-vendor environment.
The Juniper Connected Security solution is comprised of the following components:
- A threat detection engine—Cloud-based Sky ATP detects known and unknown malware. Known threats are detected using feed information from a variety of sources, including command control server and GeoIP. Unknown threats are identified using various methods such as sandboxing, machine learning, and threat deception.
- Centralized policy management—Junos Space Security Director, which also manages SRX Series devices, provides the management interface for the Juniper Connected Security solution called Policy Enforcer.
- Expansive policy enforcement—In a multi-vendor enterprise, Juniper Connected Security enforces security across Juniper Networks devices, cloud-based solutions, and third-party devices.
- User intent-based policies—Create policies according to logical business structures such as users, user groups, geographical locations, sites, tenants, applications, or threat risks. This allows network devices (switches, routers, firewalls and other security devices) to share information, resources, and when threats are detected, remediation actions within the network.
Benefits of Juniper Networks Connected Security
- Management and visibility - Enables you to view traffic across the network, dynamically deploy security policies and block threats. Juniper Connected Security manages the entire network infrastructure as a single enforcement domain, thereby providing enforcement points across the network. Uses machine learning and data mining tools to offer effective threat management while producing detailed data access and user activity reports.
- Comprehensive security - Ensures that the same security policies are applied across all of the devices in the network. It extends security to each layer of the network, including routers, switches, and firewalls.
- Protection from advanced malware - Provides automated offense identification and consolidates the threat intelligence with threat hunting activities to simplify and focus attention on the highest priority offenses.
- Automated policy or enforcement orchestration - Provides real-time feedback between the security firewalls. Reduces the risk of compromise and human error by allowing you to focus on maximizing security and accelerating operations with a simple, concise rule set.
- Scalability - Supports up to 15,000 devices.
- Third-party integration - Provides APIs to integrate with the ecosystem partners for capabilities such as cloud access security, network access control, and endpoint protection, and additional threat intelligence feeds
Juniper Networks offers you products from these product groups:
- Anti-virus and malware protection (38)
- APT protection (39)
- Cloud (computing) security (116)
- Content security (46)
- Denial of service protection (16)
- Event management (32)
- Firewalls (37)
- Intrusion detection/prevention (52)
- Log Management (25)
- Mobile security (52)
- Unified threat-Management (UTM)/security appliances (8)
- VPN/ remote access (42)