View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
February 26, 2013

Juniper Networks unveils security application for data centre

To provide security against data exfiltration, website outages and other serious threats

By CBR Staff Writer

Juniper Networks has unveiled security products for data centre environments, which claimed to allow enterprises and service providers to provide security against data exfiltration, website outages and other serious threats.

The product will come with Junos Spotlight Secure service which is a global attacker intelligence service to identify individual devices and stop attacks.

Junos Spotlight Secure is a cloud-based global attacker intelligence service that recognises individual attackers at the device level, creates a fingerprint of attacker devices based on over 200 attributes and blocks the attackers, while sharing the attacker profiles with other subscribers to provide advanced real-time security for multiple networks.

Junos WebApp Secure is installed in front of application servers behind the firewall, integrates security intelligence from other sources provided by the Junos Spotlight Secure global attacker intelligence service to mitigate threats.

In addition, Junos WebApp Secure uses the Intrusion Deception technology to misdirect and mislead attackers while profiling and fingerprinting them.

Juniper Networks SRX Series Services Gateways combined with Junos WebApp Secure to block attackers that are identified at the security perimeter, blocks botnets and large scale web attacks.

Junos DDoS Secure will deliver an automated DDoS protection system for websites and web applications by using a behaviour-based approach to DDoS mitigation that offers protection up to 40Gb/s for high-volume attacks, low-and-slow application attacks with less false positives.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

The application can be deployed either as a hardware appliance or as a virtual machine in private, public, or hybrid cloud environments.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU