Juniper Networks expands Spotlight Secure to stop malware

Open security intelligence platform enables SRX firewall customers to take quick action on data from varied threat detection feeds to enhance protection of high-IQ networks.

Juniper Networks has announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways. These new advanced security capabilities empower customers to quickly take action on intelligence from varied threat detection technologies by immediately pushing enforcement rules to SRX firewalls to cut off command-and-control (C&C) traffic, isolate infected systems and effectively combat a diversity of threats targeting networks. This novel approach frees customers to choose the most appropriate threat detection technologies available – including feeds customized to their business – rather than being locked into only the intelligence data offered by their firewall vendor.

As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies.

“We have transformed our security solution to address the challenges and constraints that our customers face with traditional firewalls. By creating an open framework that enables the aggregation of intelligence data from multiple feeds, we can provide application and user-level visibility. In addition, this solution is able to increase agility to effectively combat evolving threats in order to keep High-IQ networks secure,” said Jonathan Davidson, Juniper Nework’s Senior Vice President and General Manager of Security, Switching, and Solutions Business Unit.

As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many Next-Generation Firewalls (NGFW) include integrated capabilities, such as Intrusion Prevention System (IPS), anti-virus signatures and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers.

Juniper’s expanded Spotlight Secure platform addresses these challenges and constraints by aggregating threat feeds from multiple sources to deliver open, consolidated and actionable intelligence to SRX firewalls across the organization. These sources include Juniper threat feeds, third-party threat feeds and threat detection technologies that the customer can deploy. Administrators are now able to define enforcement policies from all feeds via a single, centralized management point.

More information can be found at Juniper Networks or connect with Juniper on Twitter and Facebook.

Website | + posts

Andrew McLean is the Studio Director at Disruptive Live, a Compare the Cloud brand. He is an experienced leader in the technology industry, with a background in delivering innovative & engaging live events. Andrew has a wealth of experience in producing engaging content, from live shows and webinars to roundtables and panel discussions. He has a passion for helping businesses understand the latest trends and technologies, and how they can be applied to drive growth and innovation.

CIF Presents TWF - George Athannassov

Newsletter

Related articles

Generative AI: Three CXO challenges and opportunities

Infrastructure, data governance and culture change provide CXOs with...

Hybrid IT Infrastructure: Integrating On-Premises and Cloud Solutions

Blending traditional on-site tech with cloud services creates a...

Why APIs are the new frontier in cloud security

Organisations are seeing a proliferation of APIs (Application Programming...

Tackling AI challenges in ethics, data, and collaboration

We can safely say that artificial intelligence (AI) was...

The evolution of the CISO

What began as a technical innovation on the hacker...

Subscribe to our Newsletter