View

Sorting

Products found: 6

logo
Offer a reference bonus
1.80

Juniper Networks IDP Series

Stateful signature The IDP rulebase attack object signatures are bound to protocol context. As a result, this detection method produces few false positives. Protocol anomaly The IDP rulebase attack objects detect protocol usages that violate published RFCs. This method protects your network from undiscovered vulnerabilities. Traffic anomaly The Traffic Anomalies rulebase uses heuristic rules to detect unexpected traffic patterns that might indicate reconnaissance or attacks. This method blocks distributed denial-of-service (DDoS) attacks and prevents reconnaissance activities. Backdoor The Backdoor rulebase uses heuristic-based anomalous traffic patterns and packet analysis to detect Trojans and rootkits. These methods prevent proliferation of malware in case other security measures have been compromised. IP spoofing The IDP appliance checks the validity of allowed addresses inside and outside the network, permitting only authentic traffic and blocking traffic with a disguised source. Layer 2 attacks The IDP appliance prevents Layer 2 attacks using rules for Address Resolution Protocol (ARP) tables, fragment handling, connection timeouts, and byte/length thresholds for packets. These methods prevent a compromised host from polluting an internal network using methods such as ARP cache poisoning. Denial of service (DoS) The SYN Protector rulebase provides two, alternative methods to prevent SYN-flood attacks. Network honeypot The IDP appliance impersonates vulnerable ports so you can track attacker reconnaissance activity.
... Learn more
ROI-
-
17
20
logo
Offer a reference bonus
1.40

Juniper Networks IDP Серии

Защита от атак на уровне сети и приложений, прежде чем сети будет причинен ущерб, и минимизация временных и материальных затрат, связанных с поддержанием безопасности сети.
... Learn more
ROI-
-
17
9
logo
Offer a reference bonus
2.20

Juniper Next-Generation Firewall (NGFW)

Available on all SRX platforms, our security services reduce the attack surface in real-time and stop cyber criminals before they can breach your organization’s defenses. Identifying Application Risks Juniper AppSecure, an NFGW Services component, is a suite of services that provides deep application visibility and control in your network:
  • AppTrack identifies applications on the network to assess their security risk and address user behavior. Contextual information helps you gain insight into which applications are permitted and the risk they may pose.
  • AppFW provides policy-based enforcement and control, blocking access to high-risk applications and enforcing user-defined policies. Reports on application bandwidth usage deliver further insight, and you can throttle any application traffic not sanctioned by the enterprise.
Protection from Network Borne Attacks Juniper Intrusion Prevention System (IPS) and Sky Advanced Threat Prevention (ATP) work together to provide comprehensive threat detection and protection against known and unknown threats that use the network as an attack vector. The capabilities provide immediate protection from malicious malware. Continual monitoring for new exploits and vulnerabilities keeps protection up to date. The system immediately blocks threats on client and server systems inline before damage can take place. Safeguards Against Malware Although modern cyber criminals favor today’s sophisticated, turnkey techniques, they have not abandoned the tried and true approach of tucking malware into signature-based viruses and volume-based email. Integrated with our SRX platforms, Sophos Live Protection combines cloud-based reputation intelligence with on-box horsepower to deliver lightweight and fast security. Web Browsing Defense The Web is full of deception designed to get unsuspecting users to click on malicious links that might install advanced malware. Attackers regularly compromise websites by tricking users into providing their user credentials. Juniper has partnered with Forcepoint to provide URL filtering that fights such attacks. The service is constantly and globally updated in real time to provide an always-current worldwide database of malicious URLs that protect against user compromise. Avoiding Unauthorized Access and Use Every user in an enterprise must be able to access certain applications to perform specific tasks. But allowing users unlimited access to corporate resources outside their sphere of responsibility can enable the proliferation of insider threats. Our User Firewall service restricts application usage on a per-user basis by tightly integrating with Microsoft Active Directory (AD) and the Lightweight Directory Access Protocol (LDAP). As a result, you gain visibility and control of application and network use segmented by user-defined roles, enabling secure access to authorized applications. Features Advanced Application Visibility and Control You can identify applications running on your network regardless of port, protocol, and encryption. This visibility lets you immediately block evasive applications inline at the SRX firewall. Nested Application Support You can accurately identify applications embedded in common network protocols such as HTTP or HTTPS traffic. This capability also provides visibility into and granular control over applications hidden inside encrypted SSL traffic. User and Role-Based Policies Tight integration with Microsoft AD and LDAP allow you to set and enforce user- and role-based security policies. Policy setting becomes simpler and more secure, because you reduce the number of policies needed to account for user location, IP address, and so on. SSL Inspection Inline decryption and inspection of inbound and outbound Secure Sockets Layer (SSL) connections at the SRX firewall provide visibility and protection against threats embedded in SSL encrypted traffic. Junos OS Integration Integration with Juniper’s operating system consolidates and optimizes services on SRX devices for maximum scale.
... Learn more
ROI-
-
4
3
logo
Offer a reference bonus
1.40

Juniper QFX Series switches

QFX5100 The QFX5100 Switches are low-latency, high-performance 10GbE/40GbE switches that act as a flexible building block for multiple data center fabric architectures. QFX5200 QFX5200 fixed-configuration switches offer flexible connectivity options, from 10GbE to 100GbE, making them ideally suited for leaf deployments in next-generation IP data center fabrics. QFX10000 The QFX10000 Switches are highly scalable, high-density platforms that support a variety of 10GbE/40GbE/100GbE deployments, providing a robust foundation for the most demanding data centers. High performance, low latency With throughput of up to 6 Tbps per slot, QFX Series switches deliver sustained wire-speed switching with low latency and jitter for virtualized data center environments. Highly available Redundant fabrics, power and cooling, combined with separate control and data planes, ensure maximum system availability. Data center fabric building blocks QFX Series switches provide the universal building blocks for multiple data center fabric architectures, including Junos Fusion, QFabric System, Virtual Chassis and Virtual Chassis Fabric. Standards-based Standards-based bridging, routing, VMware NSX Layer 2 gateway, and Fibre Channel technology enable interoperability and easy integration.
... Learn more
-
ROI-
-
15
9
logo
Offer a reference bonus
2.10

Juniper QFX коммутаторы

QFX5100 коммутаторы с низким уровнем задержки, высокопроизводительные 10GbE / 40GbE переключатели, которые действуют в качестве гибкого строительного блока для нескольких архитектур ткани центров обработки данных. QFX5200 коммутаторы фиксированной конфигурации предлагают гибкие варианты подключения, от 10GbE к 100GbE.  В QFX10000 коммутаторы с высокой масштабируемостью, высокой плотностью платформ, которые поддерживают различные развертывания 10GbE / 40GbE / 100GbE, обеспечивая прочную основу для самых требовательных центров обработки данных.
... Learn more
ROI-
-
2
6
logo
Offer a reference bonus
1.40

QFabric System

The QFabric® System is composed of multiple components working together as a single switch. It flattens the network to a single tier to provide high-performance, any-to-any connectivity and management simplicity, making it the ideal network foundation for cloud-ready, virtualized data centers. The QFabric System is composed of multiple components working together as a single switch to provide high-performance, any-to-any connectivity and management simplicity in the data center. The QFabric System flattens the entire data center network to a single tier where all access points are equal, eliminating the effects of network locality and making it the ideal network foundation for cloud-ready, virtualized data centers. QFabric is a highly scalable system that improves application performance with low latency and converged services in a non-blocking, lossless architecture that supports Layer 2, Layer 3, and Fibre Channel over Ethernet capabilities. Distributed switch composed of three components: QFX3500/QFX3600/QFX5100 QFabric Node QFX3600-I/QFX3008-I QFabric Interconnect QFX3100 QFabric Director Features Scales to 40 Tbps to deliver unprecedented capacity beyond 10GbE at the access layer. Ultra-low Deterministic Latency is ideal for supporting latency-sensitive applications, east-west traffic flows, virtualization, cloud, and other high-performance data center initiatives. Single-Switch Management greatly simplifies data center operations with less complexity and lower power, space, cooling, and operational costs. Carrier-Class Solution requires no downtime for reconfiguration or maintenance. Scales to Thousands of Ports within a single-tier network in a "pay-as-you-grow" model. Incremental Design allows conversion of QFX Series switches from top-of-rack to QFabric devices. QFabric System Models QFX3000-M  QFX3000-G 
... Learn more
-
ROI-
-
13
11

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.