Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

SD_Logging_Dashboard.png

 

Network security is only as good as the ability to easily manage it. If you have a complex security network with multiple firewalls, policies, and administrators, it is essential to have a simple and scalable way to manage them all. In fact, Gartner’s most recent Magic Quadrant for Enterprise Network Firewalls report specifically calls out scalable management as a critical component of Network Firewall solutions.

 

Our Juniper SRX (physical firewall) and Firefly Perimeter (virtual firewall) customers want the best way to easily manage their firewalls and policies—and that way is via Junos Space Security Director. Fortunately, as an application on the Junos Space Network Management Platform, Security Director can easily scale to meet the needs of our customers–whether you’re an enterprise who will expand your reach into new markets or a service provider who needs to provide reliable and secure application and service access to your clients in a way that’s in line with your Service Level Agreements (SLAs).

 

We built the Junos Space platform from the ground up for scale, and Security Director directly benefits from this:

-          Junos Space can manage thousands of Junos devices (including SRX firewalls)

-          Instantly scale by simply adding or deleting nodes on the network fabric

-          Readily extend the number of concurrent administrators supported

 

Now, the latest Junos Space Security Director V13.3R1 software release introduces enhanced centralized management for SRX and Firefly Perimeter deployments, having added:

-          Security Event Logging via Junos Space Log Director so you can aggregate and filter events based on certain criteria such as Source/Destination IP/application/service

-          UTM Support, which allows policy configuration for Web filtering, antivirus, and anti-spam

-          Role-Based Access that lets you segment administrative responsibility such that you can place devices, policies and objects within domains and then assign read or read/write permissions 

 

Many customers have been waiting for these capabilities, and I’m delighted to share this good news! Stay tuned for further Juniper innovations based on what you’ve been telling us you need.

Read more...

Placing Our Bets on Network Security in 2014

by skathuria ‎01-16-2014 03:01 PM - edited ‎01-25-2014 03:13 PM

                                           Blog_NetworkSecGrowth_Pic.png

As a marketer, it’s reassuring to be able to point to third-party data that reinforces industry trends and customer needs, rather than us, the vendor, “tooting our own horn.” Hence, a recent report on ZDNet.com caught my eye. In it, the author shares that, according to a Forrester Research Survey conducted in 2013 of more than 2,000 security pros:

  • Almost 50% of companies plan to spend more on network security in 2014.
  • About 60% of companies want to buy from one vendor because they have enough best-of-breed applications and want to simplify management and integration.
  • Firewalls and threat intelligence are the most popular security as a service products.
  • Nearly 30% of companies plan to invest in security analytics.

Customers continue to seek out and will invest in security solutions that are intelligent – those that understand and accurately identify threats from “noise” and quickly provide feedback to IT personnel to help remediate threats and thwart attacks. They would like to see integration between products from the same vendor for consistent protection from the device to the data center, regardless of where they are accessing network resources from.

 

Investing Where It Counts

Juniper continues to invest heavily in R&D and bring to market innovative security technologies. We rely on our intelligent engineers who develop cutting-edge solutions that meet our customers’ needs.

 

For example, Juniper’s SRX firewall integrates with WebApp Secure (the industry’s first Web Intrusion Deception System that detects, tracks, profiles and prevents hackers in real-time) and Spotlight Secure (the new cloud-based hacker device intelligence service that will identify individual attacker devices and track them in a global database). With all three products working together, the solution provides both threat intelligence and enforcement, accurately (without false positives) identifying attackers and stopping them at the network perimeter before they can cause any harm.

 

Simple yet Powerful Solutions

With the number of security devices in the network on the rise and the impracticality of managing the security infrastructure manually or with individual product management interfaces, simplified management is critical. Simplified SRX firewall management is made possible through Junos Space Security Director, an application on Junos Space Network Management Platform, which provides extensive security scale, granular policy control, and policy breadth across the network.

 

Furthermore, the newly announced Firefly Perimeter, a virtual firewall based on Juniper’s SRX Services Gateway code delivered in a virtual machine (VM) form factor, enables Service Providers to offer managed firewall security as a service.

 

Finally, Juniper provides Secure Analytics, a market-leading SIEM that consolidates log source event data from thousands of devices, including SRX, WebApp Secure, and DDoS Secure, and helps quickly discover and remediate network attacks. Providing intelligent security, Secure Analytics can help IT personnel discover threats that often are missed by other security solutions.

 

So if you are planning to spend more on security and looking to build a relationship with a market leader who will comprehensively address your security and simplified
management needs, check out Juniper’s security solutions.

Read more...

About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon


Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Director
Software Engineering

Profile | Subscribe

Scott Emo
Director
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Announcements
Juniper Networks Technical Books
Labels