Welcome!

Cloud Security Authors: Elizabeth White, Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Liz McMillan

Related Topics: Cloud Security

News Feed Item

Juniper Networks Announces Industry’s Only Adaptive Threat Management Solutions to Deliver Intelligent Security and Performance Across the Distributed Enterprise

Juniper Networks, Inc. (NASDAQ:JNPR), the leader in high-performance networking, today announced the industry’s only open solution set to deliver intelligent security and performance across all enterprise locations. Juniper Networks Adaptive Threat Management Solutions, based on a dynamic security infrastructure, are the first to deliver security at scale that is both identity aware and application aware, now enabling consistent application delivery and performance across the distributed enterprise—including data center, campus, branch, remote and partner/extranet locations. Juniper empowers customers to reduce risks that threaten the distributed enterprise and their window of vulnerability from months to minutes or seconds.

Juniper’s Adaptive Threat Management Solutions are based on a flexible “pay-as-you-grow” deployment model that can simultaneously reduce risk, lower TCO and increase productivity. The Adaptive Threat Management Solutions include: the new Juniper Networks WX Client for application acceleration; a new release of Juniper’s network access control (NAC) solution, Unified Access Control (UAC) 3.1; new market-leading SA Series SSL VPN version 6.5 software with new standards-based interoperability functionality; new Intrusion Prevention System (IPS) technology; and new releases of Juniper Networks Security Threat Response Manager (STRM) 2009.1 and Network and Security Manager (NSM) 2009.1 for network-wide, centralized visibility and control.

“Workforces have become increasingly globally distributed, and at the same time the number of mission-critical applications that are accessed via the network have increased. Networks are stretched to their limit, application delivery requirements have grown, and every day hackers come up with more sophisticated and stealthy attacks. Enterprises that don’t see or react to these changes put themselves at risk,” said Jeff Wilson of Infonetics Research. “Identity and application aware security and performance solutions are essential. Juniper’s Adaptive Threat Management Solutions are designed to ensure that security is intelligent and applications are delivered across the entire network and everywhere business is conducted.”

Juniper’s Adaptive Threat Management Solutions help to close the vulnerability gap between what companies have deployed in their network and what they need to ensure that business-critical applications can be efficiently delivered at scale regardless of location and that security is intelligent, efficient and ubiquitous.

  • With the WX Client, Juniper can deliver an order of magnitude performance improvement at half the cost of competitive solutions. Optionally integrated with Juniper’s SA SSL VPN, Juniper is delivering the industry’s only identity-enabled WAN acceleration client.
  • With the industry’s only coordinated enterprise-wide access control offering via Juniper’s UAC and SA SSL VPN, Juniper can dynamically provision seamlessly integrated anti-spyware and anti-malware software to endpoint devices across the LAN and WAN, making it more effective at blocking, detecting and removing spyware threats than competitive solutions.
  • With the industry’s fastest IPS at 30Gbps and the most extensive portfolio including standalone IDP Series Intrusion Detection and Prevention Appliances and fully integrated SRX Series Services Gateways, Juniper delivers unmatched integrated security.

Demand More Intelligent Security and Performance

“With Juniper’s Adaptive Threat Management Solutions, we don’t have to compromise on security or performance to ensure the reliability and stability of our business-critical services,” said Scotty Bevill, IT project manager at Intermatic, Inc., a leading global manufacturer of consumer and industrial energy control products. “We are able to deliver consistent security that also meets our regulatory and administrative requirements across the infrastructure—from the data center to our remote and branch offices—all with a single and simple management platform that gives us full visibility and control. We’ve seen significant productivity gains by 70 percent and have reduced overhead and TCO by 50 percent.”

  • Identity-Based Security and WAN Acceleration: Application acceleration is particularly important for a more distributed enterprise where mission-critical applications must be securely and efficiently delivered without delay. The WX Client automatically downloads and launches upon starting a Network Connect SSL VPN session, so users transparently start receiving the benefits of application acceleration immediately, tailored and based on their identity. Scenarios commonly seen in networks can achieve an average of 9X performance improvement for company-based web applications and an average of 12X improvement in file transfer time network-wide.
  • Dynamically Provisioned Anti-Spyware and Anti-Malware: Juniper’s anti-spyware and anti-malware solution is a license available on SA SSL VPN version 6.5 and UAC 3.1 software releases, which enables the delivery of the industry’s first access control solution to dynamically provision anti-spyware and anti-malware software to endpoint devices regardless of the user or location. Independently validated as having the world’s most scalable and deployed SSL VPN technology—up to 10,000 concurrent user sessions on a single box, Juniper delivers the performance and flexibility businesses require to consistently enforce global policies for any user or role, including employees, contractors, partners and offshore users wherever they are located. Juniper also offers application-aware policy enforcement and broadened support for mobile devices, as well as robust endpoint assessment.
  • Identity-Based, Application-Specific Enforcement with Visibility and Control: Juniper is also offering the industry’s first access control solution to support full Layer 2-7 role-based policy enforcement. With new IPS technology integrated with SA SSL VPN and UAC, Juniper is the first to deliver role-based application policy enforcement with ‘follow-me’ user access policies and application usage. This allows companies to enable IPS at all locations to detect and stop application misuse and sophisticated attacks before damage occurs, effectively eliminating security breaches before they happen.

    Additionally, Juniper delivers an integrated management, visibility and control solution that can correlate applications, users and user sessions for granular security control and share policies across multiple Juniper product families to maximize security across the network infrastructure. Juniper’s STRM can provide rapid threat detection with real-time streaming of thousands of events per second. With NSM, customers can centrally manage their device configuration and policy provisioning lifecycle to deliver significant cost savings while maintaining security across the distributed enterprise. Together, NSM and STRM can help businesses significantly reduce their OPEX and CAPEX.

“As today’s enterprise networks enable teleworking and expand to more locations and into data centers and public clouds, the need for intelligent, identity-aware security with consistent application delivery becomes even more paramount to the success of the business,” said Mark Bauhaus, executive vice president and general manager of Service Layer Technologies at Juniper Networks. “Only Juniper’s Adaptive Threat Management Solutions offer the most dynamic and flexible solutions that provide the real-time network-wide visibility needed to make the infrastructure more secure and efficient, yielding a significant competitive advantage for distributed enterprises.”

About Juniper Networks

Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at www.juniper.net.

Juniper Networks, JUNOS and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of ...
DXWorldEXPO LLC, the producer of the world's most influential technology conferences and trade shows has announced the 22nd International CloudEXPO | DXWorldEXPO "Early Bird Registration" is now open. Register for Full Conference "Gold Pass" ▸ Here (Expo Hall ▸ Here)
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...