Juniper’s adaptive threat management solutions for distributed enterprises

Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, deliver security at scale that is identity aware and application aware, enabling consistent application delivery and performance across the distributed enterprise — including data center, campus, branch, remote and partner/extranet locations.

The Adaptive Threat Management Solutions include: the new Juniper Networks WX Client for application acceleration; a new release of Juniper’s network access control solution, Unified Access Control 3.1; new SA Series SSL VPN version 6.5 software with new standards-based interoperability functionality; new Intrusion Prevention System technology; and new releases of Juniper Networks Security Threat Response Manager 2009.1 and Network and Security Manager 2009.1.

Juniper’s Adaptive Threat Management Solutions help to close the vulnerability gap between what companies have deployed in their network and what they need to ensure that business-critical applications can be efficiently delivered at scale regardless of location and that security is intelligent, efficient and ubiquitous.

Key elements:

  • Identity-Based Security and WAN Acceleration: The WX Client automatically downloads and launches upon starting a Network Connect SSL VPN session, so users transparently start receiving the benefits of application acceleration immediately, tailored and based on their identity
  • Dynamically Provisioned Anti-Spyware and Anti-Malware: Juniper’s anti-spyware and anti-malware solution is a license available on SA SSL VPN version 6.5 and UAC 3.1 software releases, which enables the delivery of an access control solution that dynamically provisions anti-spyware and anti-malware software to endpoint devices regardless of the user or location. Juniper also offers application-aware policy enforcement and broadened support for mobile devices, as well as robust endpoint assessment
  • Identity-Based, Application-Specific Enforcement with Visibility and Control: Juniper also offers an access control solution to support full Layer 2-7 role-based policy enforcement. With new IPS technology integrated with SA SSL VPN and UAC, Juniper is the first to deliver role-based application policy enforcement with “follow-me’ user access policies and application usage. This allows companies to enable IPS at all locations to detect and stop application misuse and sophisticated attacks before damage occurs, effectively eliminating security breaches before they happen.

Additionally, Juniper delivers an integrated management, visibility and control solution that can correlate applications, users and user sessions for granular security control and share policies across multiple Juniper product families to maximize security across the network infrastructure. Juniper’s STRM can provide rapid threat detection with real-time streaming of thousands of events per second. With NSM, customers can centrally manage their device configuration and policy provisioning lifecycle to deliver significant cost savings while maintaining security across the distributed enterprise.

Don't miss