Juniper Networks Connected Security Overview
IN THIS SECTION
Benets of Juniper Networks Connected Security | 3
The Juniper Networks Connected Security provides end-to-end network visibility, allowing enterprises
to secure their enre network, both physical and virtual. Using threat detecon and policy enforcement,
an Juniper Connected Security soluon automates and centrally manages security in a mul-vendor
environment.
The Juniper Connected Security soluon is comprised of the following components:
• A threat detecon engine—Cloud-based Juniper ATP Cloud detects known and unknown malware.
Known threats are detected using feed informaon from a variety of sources, including command
control server and GeoIP. Unknown threats are idened using various methods such as sandboxing,
machine learning, and threat decepon.
• Centralized policy management—Junos Space Security Director, which also manages SRX Series
devices, provides the management interface for the Juniper Connected Security soluon called Policy
Enforcer. Policy Enforcer communicates with Juniper Networks devices and third-party devices
across the network, globally enforcing security policies and consolidang threat intelligence from
dierent sources. With monitoring capabilies, it can also act as a sensor, providing visibility for intra-
and inter-network communicaons.
• Expansive policy enforcement—In a mul-vendor enterprise, Juniper Connected Security enforces
security across Juniper Networks devices, cloud-based soluons, and third-party devices. By
communicang with all enforcement points, Juniper Connected Security can quickly block or
quaranne threat, prevenng the spread of bi-lateral aacks within the network.
• User intent-based policies—Create policies according to logical business structures such as users,
user groups, geographical locaons, sites, tenants, applicaons, or threat risks. This allows network
devices (switches, routers, rewalls and other security devices) to share informaon, resources, and
when threats are detected, remediaon acons within the network.
With user intent-based policies, you manage clients based on business objecves or user and group
proles. The following are two examples of a user intent policy:
•Quaranne users in HR in Sunnyvale when they’re infected with malware that has a threat score
greater than 7.
2