Juniper Networks Releases New VPN Application Combined with Risk-Based Access Control Capabilities to Improve Overall Network Visibility

 Beijing, China, October 22, 2020 - Juniper Networks, a leader in delivering secure, artificial intelligence-driven networks, today announced Adaptive Threat Identification based on Juniper Networks® Advanced Threat Protection (ATP) Cloud, WootCloud HyperContext® integration for device identification and Juniper Networks Secure Connect VPN application, providing enterprises with deep network visibility that extends security policies and access control beyond the branch office.




  Extensive network visibility and consistent policy enforcement across all devices is the foundation of effective security and the key to reducing risk. IT professionals need to see problems in the network first before they can take action to ensure security, so they are often busy quickly adapting protection to new network attacks, especially when faced with attacks that target remote users and IoT devices. And this year's exceptional environment has dramatically changed where and how many enterprises' employees work, greatly expanding the attack surface and exacerbating such challenges almost overnight.


  Juniper Networks helps organizations effectively address these challenges by extending visibility and security policies to any device in any location, enabling adjustments to network access and threat protection as attacks occur. This further implements Juniper's Connected Security strategy of providing a consistent user experience and ensuring that policies are enforced across all connections to the network.


  Adaptive Threat Profiling


  To better address new and emerging threats, enterprises can use Adaptive Threat Profiling in the Advanced Threat Protection Cloud to automatically generate security threat intelligence feeds based on who and what is attacking the network and the target of the attack, and then automatically close the loop on the entire network infrastructure with real-time threat intelligence from SecIntel. Adaptive Threat Identification leverages Juniper Networks Security Services to generate customized threat intelligence feeds based on endpoint operating system classification traffic, which can then be used for further inspection or blocking at multiple points of execution, helping enterprises respond to attacks in real-time at scale.


  - Nearly unlimited ability to adapt to changing threats and network conditions - Security policies can be enhanced with an adaptive threat identification feed. This source automatically functions when an intrusion occurs, blocking attacks before they have an impact.


  - Improved security return on investment through more flexible deployment architectures - Juniper Networks® SRX Series firewalls can act as sensors for TAP ports throughout the network, identifying intelligence and sharing it with tandem devices, automatically initiating real-time enforcement where it is needed most.


  WootCloud HyperContext Integration with Juniper Networks' Network and Security Products


  To effectively mitigate risk, organizations must have complete visibility into all devices in the network and their vulnerability to attack, including the often-overlooked variety of connected IoT devices. WootCloud HyperContext integrates with SRX Series firewalls, Advanced Threat Protection Cloud and Juniper Networks Mist Cloud for device identification, threat detection and automated micro-segmentation and access control to reduce risk. The integration extends attack visibility to cover traffic and connection points in the network that were previously invisible to IT security personnel.


  - Identify and isolate anomalous IoT devices - Automatically detect security-compromised IoT devices in the network and place them in an isolated virtual LAN to cut off propagation.


  - Ensure access to high-value assets with authorization - If a device poses an increased risk to the network, perform secondary authentication or systematically restrict device access to the network.


  Juniper Networks Secure Connect


  The importance of secure and reliable network connectivity is reaffirmed by the fact that enterprises have been moving to distributed networks long before today's workforce began to work from home. Juniper Networks Secure Connect provides remote access, supports IPSec and SSL-VPN (Secure Sockets Layer-Virtual Private Network) with a simple configuration process and built-in automation capabilities to ensure optimal performance and connectivity.


  - Confidential data security and protection - Keep remote users connected and productive while ensuring business continuity and security.


  - A network that scales to changing needs - Juniper Networks Secure Connect and Juniper Networks SD-WAN and WAN Assurance powered by Mist artificial intelligence allow organizations to quickly and easily scale, adjusting to changing conditions at network boundaries and attack surfaces.


  Juniper Networks Secure Connect helps enterprises quickly achieve dynamic, flexible and highly adaptable connectivity from any location, on any device, extending visibility and enforcement capabilities from the client to the cloud, thereby reducing risk.


  Related quote.


  "In response to evolving threats, many vendors are talking about zero trust and starting to provide end-to-end secure access, especially with the large number of employees accessing corporate networks remotely from home and the growing number of IoT devices. But Juniper Networks truly delivers on this vision. We extend security by turning "dumb pipes" into intelligent sensors and enforcement points that can dynamically optimize protection in the event of an attack. We can provide comprehensive visibility across the enterprise into who and what is in the network, allowing users to limit risk while minimizing the impact on end users."


  - Samantha Madrid, Vice President, Security Business and Strategy, Juniper Networks


  "Juniper's Connected Security strategy is resonating with customers. Juniper has powerful, quality-delivered security components that perfectly match the strength of its infrastructure. Customers are especially affirming Juniper's threat protection performance and are looking forward to seeing solutions that deliver outstanding performance and integrate seamlessly with existing Juniper routers and get consistent security with Juniper SRX."


  - David Holmes, senior analyst at Forrester Research, writes in The Forrester Wave™: Enterprise Firewalls, 3Q 2020

Comments