![]() ![]() Provides a real-time and historical view of the threat landscape across the network, including from third-party security solutions Offers the ability to block known and unknown threats Offers inline blocking when an SRX Series firewall is deployed Provides a broad range of protocol support to cover the most common methods for malware and ransomware distribution Protects multiple vectors, including Web, e-mail, and lateral spread Juniper Networks Advanced Threat Prevention Appliances Features and Benefits Feature Working with Juniper Networks EX Series Ethernet Switches, Juniper Networks QFX Series switches, or other third-party switches, JATP Appliances can also isolate threats and leverage one-touch mitigation to quarantine compromised hosts, limiting lateral spread. The ATP Appliance can also be configured to update policies on third-party firewalls from vendors such as Palo Alto Networks, Fortinet, and Cisco. Once a threat is detected, the ATP Appliance sends firewall policy updates to the SRX Series firewalls. Collected data is sent to an on-premises ATP Appliance for further processing by the ATP Appliance core, which identifies known and unknown threats and provides comprehensive analytics detailing the threat's progression within the environment by mapping detections to the attack kill chain. Juniper ATP Appliances collect web, e-mail, and lateral traffic using either the Juniper Networks SRX Series Firewalls or its own built-in collector, making it an ideal fit for organizations employing multiple firewall solutions. The virtual version of the ATP Appliances, running on either VMware vSphere or ESXi, can be deployed with either 8 or 24 virtual CPU cores to process up to 116,000 files per day. Two hardware platforms are available-the JATP400 Advanced Threat Prevention Appliance and JATP700 Advanced Threat Prevention Appliance-which scale to support up to 130,000 processed files per day. Juniper Networks ® Advanced Threat Prevention Appliances address the need for both on-premises physical and virtual threat detection and mitigation solutions. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |