Industry Report: Eight Reasons to Build a Cloud-Enabled Enterprise Campus Network Asset
|learn|
|white-paper|
|cloud-and-containerized|

Learn about the important trends impacting enterprise networks and how cloud-enabled campus network architectures, such as those offered by Juniper Networks can be a viable option to future-proof your enterprise network.

Rate and give feedback:          
   

Industry Report: Eight Reasons to Build a Cloud-Enabled Enterprise Campus Network Asset

Innovations in campus networking enabled by the cloud, unified wired/wireless network access, and SDN can build a bridge from legacy network architectures to the architecture needed to meet new challenges. The flexibility that cloud-enabled networking provides around application deployment, policy management, and scalability can be a critical business enabler for enterprises struggling with legacy infrastructure. This report from IDC addresses how optimization for cloud applications is critical for modern enterprise network infrastructures and discusses the role that Juniper Networks plays in this important market.

Community: Network Security: It’s a Zero-Sum Game
|learn|
|community|
|all|

Learn how the new, enhanced portfolio of security solutions from Juniper Networks help you effectively secure your enterprise.

Rate and give feedback:          
   

Community: Network Security: It’s a Zero-Sum Game

Rajoo Nagar, Product Marketing Manager at Juniper Networks, discusses how the new, enhanced portfolio of security solutions from Juniper Networks stop threats faster while providing network wide visibility, deeper and broader security efficacy, and new policy management capabilities at speeds and price points that are the best in the industry.

Community: Juniper Aims to Simplify Enterprise Networking with “Unite” Architecture
|learn|
|community|
|all|

The IT environment, particularly in the network, is more complex than ever before. Learn how the Juniper Unite architecture aims to resolve that.

Rate and give feedback:          
   

Community: Juniper Aims to Simplify Enterprise Networking with “Unite” Architecture

Zeus Kerravala, founder and principal analyst with ZK Research, discusses how the Juniper Unite reference architecture can help customers deploy a multi-vendor network that can meet the security, scalability, and resiliency requirements of the cloud, and also be simple to deploy, manage, and operate.

Community: Rearchitecting the Enterprise: Why Now Is the Time
|learn|
|community|
|all|

Learn why you should focus on re­designing and re­architecting your enterprise infrastructure—starting today.

Rate and give feedback:          
   

Community: Rearchitecting the Enterprise: Why Now Is the Time

Johna Till Johnson, CEO Nemertes Research, explains why it is important for enterprise architects to focus on re-designing and re-architecting enterprise infrastructure because legacy infrastructure, with its layers of complexity, cannot keep up with the demands of the future. She provides some fundamental design principles to guide architects to best tackle the challenge of designing a next‐generation architecture.

Community: Juniper Unite: What Is “Cloud Enabled Enterprise” to Juniper?
|learn|
|community|
|all|

Learn about Juniper's vision of a cloud-enabled enterprise.

Rate and give feedback:          
   

Community: Juniper Unite: What Is “Cloud Enabled Enterprise” to Juniper?

Jonathan Davidson, Executive Vice President of Juniper Networks, provides a high level overview of how the Juniper Unite architecture helps customers become cloud-enabled enterprises.

Community: Kevin Walker Blog: Time to Place a Thumb on the Scale
|learn|
|community|
|all|

Kevin Walker’s blog about how the proliferation of cloud services and the current trend of ‘anytime/anywhere access’ are forcing practitioners to fundamentally rethink how we address securing the networks.

Rate and give feedback:          
   

Community: Kevin Walker Blog: Time to Place a Thumb on the Scale

Our Software-Defined Secure Networks is engineered to shift the cybersecurity paradigm by offering a solution that not only resolves today’s most challenging security concerns, but also provides an extensible and resilient framework that leverages the full strength and potential of the network to anticipate threats and defend ahead of attacks. This is the thumb on the scale that practitioners genuinely need.

White Paper: The Best Ways to Manage Shadow IT
|learn|
|white-paper|
|all|

Learn about trends that are driving the rise of shadow IT, the drawbacks and benefits it offers, and how designing and building the right network is essential for your preferred shadow IT strategy.

Rate and give feedback:          
   

White Paper: The Best Ways to Manage Shadow IT

As you run your network, you are faced with a choice. Reject shadow IT or embrace it, manage it, and make it part of your enterprise campus network. This white paper discusses the following:

  • • How the cloud and mobile have changed the enterprise
  • • How to manage the security risks of shadow IT
  • • Benefits and adoption strategies for shadow IT
  • • How the Juniper Networks Unite architecture can help in managing shadow IT

Industry Report: Top Strategies to Automate Across Your Enterprise Network
|learn|
|white-paper|
|all|

Learn about the business case for automating your cloud-enabled enterprise network and the key features and functions to look for in a network management platform.

Rate and give feedback:          
   

Industry Report: Top Strategies to Automate Across Your Enterprise Network

One of the most important decision points in network design centers around simplifying the network infrastructure by using technology solutions that leverage advanced automation processes. With automation, IT can accelerate and simplify deployments, making the network much more agile, scalable and cost-efficient. In this report, Tech Target discusses the business case for automating your cloud-enabled enterprise network and describes some of the key features and functions to look for in a network management platform.

Industry Report: How Teamwork Will Improve Your IT's Security Intelligence
|learn|
|white-paper|
|all|

Executive view point of Jennifer Blatnik, Vice President, Cloud and Enterprise Portfolio Marketing at Juniper Networks, on how IT can best mitigate risk.

Rate and give feedback:          
   

Industry Report: How Teamwork Will Improve Your IT's Security Intelligence

Today’s security landscape demands comprehensive, real-time, and sustained action to combat emerging and evolving threats in cyberspace. Both security intelligence and enforcement capability are central to the effectiveness of solutions. Translating intelligence into implementation is beset with the challenges of emerging threat patterns, integrating diverse security services, and centralizing management. Read this executive view point to understand why security is a critical need that calls for collaboration at all levels of the enterprise architecture and how IT staff need to work together to mitigate security risks by adopting a comprehensive security solution.

White Paper: Networks That Know Security
|learn|
|white-paper|
|all|

Learn how to safeguard virtual and physical workloads and get always-on protection to reduce vulnerabilities.

Rate and give feedback:          
   

White Paper: Networks That Know Security

In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago—the cloud, for instance. However, with every new technology, there are new security challenges. With an ever-increasing number of users of and devices deployed to use the latest technologies, and the huge amount of data generated as a result, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks, and network instability. Read this eBook to understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era. Learn how to safeguard virtual and physical workloads and get always-on protection to reduce vulnerabilities.

Industry Report: The Campus Network of Tomorrow: Simplicity, Security and Flexibility
|learn|
|white-paper|
|all|

Learn why simplicity, security, and flexibility are key to building a future-proof enterprise campus network.

Rate and give feedback:          
   

The Campus Network of Tomorrow: Simplicity, Security and Flexibility

4 Pages311 KB9/1/15
In this report, TechTarget reviews the increasing demands being placed on networks and network professionals, outlines barriers that prevent many enterprises from meeting those demands, and describes how technology partners like Juniper Networks can help you build crucial qualities such as simplicity and automation, comprehensive and integrated security, and flexibility and agility into your networks.
 
White Paper: 3 Major Challenges to Securing Your Data
|learn|
|white-paper|
|all|

Learn about the three major security challenges that you must overcome to secure your data as your organization evolves into a cloud-enabled enterprise.

Rate and give feedback:          
   

3 Major Challenges to Securing Your Data

4 Pages547 KB9/1/15
Designing and building an enterprise campus network today is more difficult than ever-thanks to the security threats posed by mobile devices, social media, and cloud-based technologies. This report from TechTarget identifies three major security challenges that you must overcome to secure your data as your organization evolves into a cloud-enabled enterprise and provides an overview of how Juniper Networks helps you address these challenges.
 
Industry Report: Top 6 Security Measures for the Enterprise Campus Network
|learn|
|white-paper|
|all|

Learn about the important considerations for securing your enterprise campus network.

Rate and give feedback:          
   

Top 6 Security Measures for the Enterprise Campus Network

4 Pages283 KB9/1/15
Your business is growing exponentially, which means it’s critical to not fall victim to a piecemeal security strategy. It’s time for a unified security front. In this paper from TechTarget, you will examine:
  • • Key considerations for building security into your architecture
  • • The value of an integrated and automated security strategy
  • • How the Juniper Networks Unite architecture enables it all
 
Industry Report: Key Decision Points For Deploying a Cloud-Enabled Campus Network
|learn|
|white-paper|
|all|

Learn about the key decisions you must make today for deploying a cloud-enabled campus network.

Rate and give feedback:          
   

Key Decision Points For Deploying a Cloud-Enabled Campus Network

4 Pages615 KB9/1/15
As an IT leader, one of your main responsibilities is setting priorities. While this has always been the case, the stakes are higher for you now than ever before: The decisions you make today about which technologies to deploy, and which vendors to partner with, are absolutely vital to your future and the future of your company. In this report, TechTarget discusses the key decisions you must make today for deploying a cloud-enabled campus network and choosing the right partner to help you build a network infrastructure that enables a simple and secure path to the future.
 
Industry Report: 4 Strategies for Keeping Critical Networks Secure
|learn|
|white-paper|
|all|

Understand how you can find a long-term network security partner who can address today’s needs and has the vision, resources, and track record to anticipate and address tomorrow’s challenges.

Rate and give feedback:          
   

4 Strategies for Keeping Critical Networks Secure

4 Pages240 KB9/1/15
In this report, TechTarget discusses the criteria for selecting a network security partner who can address today’s security needs and also have the vision, resources, and track record to support you in the future. It then evaluates how Juniper Networks with its proven track record of providing world-class networking and security solutions for the most demanding mission-critical environments in the world, is an ideal partner to help you achieve high performance, high reliability and comprehensive security against evolving threats.
 
Industry Report: Top 3 Ways to Modernize Your Enterprise Campus Network
|learn|
|white-paper|
|all|

Learn about the important factors you should consider in deciding upon the right vendor to help you modernize your enterprise campus network.

Rate and give feedback:          
   

Top 3 Ways to Modernize Your Enterprise Campus Network

4 Pages502 KB9/1/15
This report from TechTarget discusses the important considerations for choosing a vendor to help you modernize and secure your enterprise campus networks to facilitate a successful transition to a cloud-enabled enterprise. It also looks at some of the innovative solutions that are available today and contrasts the approaches of some of the leading network and security suppliers.
 
Solution Brief: Building the Cloud Enabled Enterprise Campus to Meet Today's Network Needs
|learn|
|ref-arch|
|all|

IDC’s assessment of the Juniper Networks cloud-enabled campus solution as a viable contender for enterprises that are refreshing legacy network architectures and are considering moving to some degree of cloud networking.

Rate and give feedback:          
   

IDC TECHNOLOGY SPOTLIGHT

5 Pages231 KB1/15/15
In this technology spotlight, IDC considers the Juniper Networks cloud-enabled campus solution is a viable contender for enterprises that are refreshing legacy network architectures and are considering moving to some degree of cloud networking. Built on high-performance EX Series Ethernet Switches and SRX Series Services Gateways, as well as MX Series 3D Universal Edge Routers, this solution provides advanced network management, architectural simplification, visibility, and analytics for performance monitoring, as well as an open framework for integrating with WLAN and collaboration tools.
 
Solution Brief: Juniper Unite Cloud Enabled Enterprise Reference Architecture
|learn|design|
|ref-arch|
|cloud-and-containerized|

Learn how Juniper Unite Cloud Enabled Enterprise can help you achieve agility by simplifying and securing your enterprise campus network

Rate and give feedback:          
   

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

6 Pages222 KB9/1/15
Juniper’s Unite Cloud Enabled Enterprise is a comprehensive reference architecture that allows business organizations to build a secure, high-performance enterprise campus network.
 
Solution Brief: Juniper Networks and Aerohive Networks: Cloud-Enabled Solutions for the Enterprise
|learn|
|ref-arch|
|cloud-and-containerized|

Together, Juniper Networks and Aerohive Networks deliver easy-to-manage wired and wireless solutions for today’s mobile-first enterprise.

Rate and give feedback:          
   

Juniper Networks and Aerohive Networks: Cloud-Enabled Solutions for the Enterprise

3 Pages215 KB9/1/15
Juniper and Aerohive deliver a simple-to-deploy, easy-to manage cloud-based wired and wireless enterprise network infrastructure. Aerohive provides simplified cloud management for its fast 802.11ac-based WLAN access points, while Juniper offers high-performance campus and branch switching, routing, and security.
 
Solution Brief: Juniper and Vectra Networks Add New Class of Advanced Persistent Threat (APT) Defense
|learn|
|ref-arch|
|next-gen-firewall|

Learn how Juniper and Vectra’s APT solution provides real-time detection and analysis of active network breaches so that they can be stopped in their tracks.

Rate and give feedback:          
   

Juniper and Vectra Networks Add New Class of Advanced Persistent Threat (APT) Defense

2 Pages256 KB12/1/15
Protecting networks against malicious attacks requires constant vigilance. Network traffic must be continuously monitored for threat activity. Once potential attacks are identified, the threat must be contained and malicious activity blocked. The combination of Juniper and Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within your network.
 
Solution Brief: Building a Software-Defined Secure Network for Financial Services
|learn|
|ref-arch|
|all|

Learn about Juniper Networks’ Software-Defined Secure Networks (SDSN) solution that enables digital transformation at financial services firms by eliminating threats inside and out.

Rate and give feedback:          
   

Building a Software-Defined Secure Network for Financial Services

6 Pages489 KB5/1/16
Juniper’s Software-Defined Secure Network creates a holistic security ecosystem that enables financial services firms to react in near real time to current and evolving intelligence to protect their networks against unknown threats. Juniper Networks’ Software-Defined Secure Networks (SDSN) solution delivers a zero trust model for information security.
 
Tools: SNMP MIB Explorer
|learn|
|proddoc|
|all|

Search for and view information about various MIBs, MIB objects, and SNMP notifications supported on Juniper Networks devices.

Rate and give feedback:          
   

Tools: SNMP MIB Explorer

Search for and view information about various MIBs, MIB objects, and SNMP notifications supported on Juniper Networks devices.

Tools: System Log Explorer
|learn|
|proddoc|
|all|

Search for and view information about various system log messages.

Rate and give feedback:          
   

Tools: System Log Explorer

Search for and view information about various system log messages.

Tools: Compliance Advisor
|learn|
|proddoc|
|all|

Find regulatory compliance information, namely Common Criteria, FIPS, Homologation, RoHS2, and USGv6 for Juniper Networks products.

Rate and give feedback:          
   

Tools: Compliance Advisor

Find regulatory compliance information, namely Common Criteria, FIPS, Homologation, RoHS2, and USGv6 for Juniper Networks products.

Tools: Pathfinder
|learn|design|configure|
|proddoc|
|all|

Find Juniper Networks product information from authentic sources.

Rate and give feedback:          
   

Tools: Pathfinder

Find Juniper Networks product information from authentic sources.

Case Study: Automation Creates Nimble Security Operations at Leading Financial Institution
|learn|
|casestudy|
|next-gen-firewall|

Learn how Juniper security solutions helped a leading global financial institution to use security automation to meet the demands of business units that required rapid response to fast moving opportunities.

Rate and give feedback:          
   

AUTOMATION CREATES NIMBLE SECURITY OPERATIONS AT LEADING FINANCIAL INSTITUTION

2 Pages70 KB3/15/15
Case study on how a leading global financial institution deployed a combination of virtual and physical firewalls to rightsize its security infrastructure without sacrificing performance and meet the aggressive service-level agreements (SLAs) of its business units. The security automation deployed with vSRX eliminated the need to install and manage hardware in the bank’s many locations around the world.
 
Case Study: Particle Physics Research Institute Builds Virtualized Core Network
|learn|
|casestudy|
|next-gen-firewall|

Learn how Juniper Networks enabled Nikhef to increase the performance of its core network from 10GbE to 100GbE and create a highly virtualized environment capable of segmenting traffic and control between multiple stakeholders.

Rate and give feedback:          
   

Particle Physics Research Institute Builds Virtualized Core Network

3 Pages340 KB10/1/15
Case study on how the National Institute for Nuclear Physics and High Energy Physics (Nikhef) deployed Juniper Networks EX Series Ethernet Switches and SRX Series Services Gateways to build a high-performance core network with capacity to grow as future research programs generate even greater volumes of data, and a virtualized network that can be used by multiple research institutes.
 
Datasheet: Spotlight Secure
|learn|
|datasheet|
|threat-mitigation|

Spotlight Secure is an open and scalable threat intelligence platform that aggregates threat feeds from multiple sources to deliver actionable intelligence to firewalls across the organization.

Rate and give feedback:          
   

Spotlight Secure

4 Pages735 KB1/10/14
Spotlight Secure is an open and scalable threat intelligence platform that aggregates threat feeds from multiple sources to deliver open, consolidated, actionable intelligence to SRX Series Services Gateways (firewalls) across the organization. Administrators can define enforcement policies from all feeds easily from a single management interface—Junos Space Security Director.
 
Datasheet: vSRX Services Gateway
|learn|
|datasheet|
|cloud-and-containerized|

vSRX (formerly known as Firefly Perimeter) empowers security professionals to deploy and scale firewall protection in highly dynamic environments.

Rate and give feedback:          
   

vSRX Services Gateway

6 Pages763 KB1/9/15
vSRX Services Gateway delivers a complete virtual firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for service providers and enterprises.
 
Datasheet: SRX300 Line of Services Gateways for the Branch
|learn|
|datasheet|
|next-gen-firewall|

The SRX300 line of services gateways deliver a next-generation networking and security solution that supports the changing needs of cloud-enabled enterprise networks.

Rate and give feedback:          
   

SRX300 Line of Services Gateways for the Branch

6 Pages1.09 MB1/5/16
The SRX300 line of services gateways combines security, routing, switching, and WAN interfaces with next-generation firewall and advanced threat mitigation capabilities for cost effective, secure connectivity across distributed enterprise locations. By consolidating fast, highly available switching, routing, security, and next generation firewall capabilities in a single device, enterprises can remove network complexity, protect and prioritize their resources, and improve user and application experience in a highly economical manner.
 
Datasheet: SRX1500 Services Gateway
|learn|
|datasheet|
|next-gen-firewall|

The SRX1500 Services Gateway is a high-performance next-generation firewall that protects mission-critical enterprise campuses, regional headquarters, and data center networks.

Rate and give feedback:          
   

SRX1500 Services Gateway

4 Pages916 KB1/7/16
The SRX1500 Services Gateway is a next-generation firewall offering outstanding protection, performance, scalability, availability, and security service integration. Designed for port density, a high-performance services architecture, and seamless integration of networking and security in a single platform, the SRX1500 is best suited for client protection in enterprise campus or regional headquarters with a focus on application visibility and control, intrusion prevention, and advanced threat protection.
 
Datasheet: Junos Space Security Director
|learn|
|datasheet|
|security-management|

Junos Space Security Director, an application on the Junos Space Network Management Platform, provides extensive security scale, granular policy control, and policy breadth across the network.

Rate and give feedback:          
   

Junos Space Security Director

4 Pages915 KB9/1/15
Junos Space Security Director provides security policy management for physical, logical and virtual firewalls through an intuitive, centralized web-based interface that offers enforcement across emerging and traditional risk vectors. It helps administrators quickly manage all phases of the security policy life cycle for stateful firewall, unified threat management (UTM), intrusion prevention system (IPS), application firewall (AppFW), VPN, and Network Address Translation (NAT).
 
Datasheet: JSA Series Secure Analytics
|learn|
|datasheet|
|security-management|

Juniper Networks JSA Series Secure Analytics combine, analyze, and manage an unparalleled set of surveillance data—network behavior, security events, vulnerability profiles, and threat information—to empower companies to efficiently manage business operations on their networks from a single console.

Rate and give feedback:          
   

JSA Series Secure Analytics

8 Pages1.11 MB9/15/15
The integrated approach of JSA Series Secure Analytics, used in conjunction with unparalleled data collection, analysis, correlation, and auditing capabilities, enables organizations to quickly and easily implement a corporate-wide security management program that delivers security best practices. These include superior log analytics with distributed log collection and centralized viewing; threat analytics that deliver real time surveillance and detection information; and compliance management capabilities—all viewed and managed from a single console.
 
Datasheet: Juniper Sky Advanced Threat Prevention
|learn|
|datasheet|
|threat-mitigation|

Sky Advanced Threat Prevention is a cloud-based service that provides complete advanced malware protection. Integrated with SRX Series Services Gateways and the Spotlight Secure threat intelligence platform, Sky Advanced Threat Prevention delivers a dynamic anti-malware solution that can adapt to an ever-changing threat landscape.

Rate and give feedback:          
   

Juniper Sky Advanced Threat Prevention

3 Pages692 KB9/1/15
Juniper Networks Sky Advanced Threat Prevention delivers advanced anti-malware protection against sophisticated “zero-day” and unknown threats by monitoring ingress and egress network traffic looking for malware and other indicators of compromise. Using a pipeline of technologies in the cloud, Sky Advanced Threat Prevention delivers progressive verdicts that assess the risk level of each potential attack, providing a higher degree of accuracy in threat prevention. Hosted securely in the cloud, Sky Advanced Threat Prevention integrates with Juniper Networks SRX Series Services Gateways to deliver deep inspection, inline malware blocking, and actionable reporting.
 
Deep Dive: Juniper Ambassadors Cookbook for Enterprise (Day One)
|design|configure|operate|
|dayone|
|next-gen-firewall|security-management|

Get tried and tested recipes from the Juniper Ambassadors on how to keep your enterprise network running.

Rate and give feedback:          
   

Deep Dive: Juniper Ambassadors Cookbook for Enterprise (Day One)

In this Day One cookbook, the Juniper Ambassadors take on some of the top support issues and provide clear-cut solutions and frank discussions on how to keep your enterprise network running. From creating an aggregate link between a Juniper and Cisco switch, to deploying IPsec VPN using Junos Space, to connecting two networks using a SRX Series, the sixteen recipes in this cookbook are meant to provide quick and tested solutions to everyday issues.

Deep Dive: Deploying the SRX Series for Enterprise Security (NCE)
|configure|
|proddoc|
|next-gen-firewall|

Learn how to deploy SRX Series Services Gateways to secure your enterprise network.

Rate and give feedback:          
   

Deploying the SRX Series for Enterprise Security

42 Pages745 KB4/15/15
Juniper Networks SRX Series Services Gateways are high-performance network security solutions for enterprises and service providers that deliver security, routing, and networking capabilities. SRX Series offers next-generation firewall, application visibility and control, IPS, as well as other security services. This document provides a step-by-step example for configuring next-generation security features on an SRX Series device in an enterprise network.
 
Solution Brief: Juniper Networks and Pulse Secure Deliver Unified Secure Network Access
|learn|
|ref-arch|
|next-gen-firewall|

Together, Juniper Networks and Pulse Secure deliver a comprehensive, standards-based solution for secure network access control.

Rate and give feedback:          
   

Juniper Networks and Pulse Secure Deliver Unified Secure Network Access

4 Pages222 KB7/1/15
EX Series Ethernet switches and SRX Series Services Gateways are fully integrated with Pulse Secure Policy Secure and Pulse Secure Profiler, delivering a complete 802.1X standards-based NAC solution with powerful pre- and post-admission access control management and enforcement.
 
Solution Brief: Building the Cloud Enabled Enterprise Campus to Meet Today's Network Needs
|learn|
|ref-arch|
|cloud-and-containerized|

IDC’s assessment of the Juniper Networks cloud-enabled campus solution as a viable contender for enterprises that are refreshing legacy network architectures and are considering moving to some degree of cloud networking.

Rate and give feedback:          
   

IDC TECHNOLOGY SPOTLIGHT

5 Pages222 KB1/15/15
In this technology spotlight, IDC considers the Juniper Networks cloud-enabled campus solution is a viable contender for enterprises that are refreshing legacy network architectures and are considering moving to some degree of cloud networking. Built on high-performance EX Series Ethernet Switches and SRX Series Services Gateways, as well as MX Series 3D Universal Edge Routers, this solution provides advanced network management, architectural simplification, visibility, and analytics for performance monitoring, as well as an open framework for integrating with WLAN and collaboration tools.
 
Solution Brief: Juniper Networks and Aruba Networks Deliver the Best User Experience
|learn|
|ref-arch|
|next-gen-firewall|

Juniper Networks’ broad portfolio of switching, routing, security, and network management solutions integrates seamlessly with Aruba Networks’ WLAN and policy management products to provide a simple and secure network that delivers the best user experience in the industry.

Rate and give feedback:          
   

Juniper Networks and Aruba Networks Deliver the Best User Experience

3 Pages433 KB2/1/15
Aruba and Juniper have partnered to create an open, converged network that delivers an exceptional user experience for today’s demanding workforce. Aruba offers best-in-class high performance 802.11ac wireless hardware designed for high traffic loads. This includes smart Wi-Fi with airtime fairness and patented ClientMatch™ technology to optimize traffic distribution in dense areas. Juniper offers a comprehensive portfolio of best-in-class switching, routing, and security solutions that deliver a scalable, secure, high-performance enterprise network, all under the same management interface, Juniper Networks® Junos® Space.
 
Solution Brief: Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks
|learn|
|ref-arch|
|next-gen-firewall|

Together, Juniper Networks and Ruckus Wireless leverage their carrier wired and wireless networking experience to deliver powerful, open, integrated wired and wireless solutions that address the needs of enterprise customers today while positioning organizations for the open networks of the future.

Rate and give feedback:          
   

Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks

5 Pages604 KB6/1/15
Juniper Networks and Ruckus Wireless bring open, standards-based, carrier-grade enterprise campus and branch networking solutions that scale with the latest technology trends and demands while simplifying operations. Juniper’s innovative switching, security and management products and Ruckus’ advanced wireless LAN solutions work together, delivering high performance, scalable and cost effective carrier-class solutions for the enterprise.
 
Solution Brief: AutoVPN: Easy Cost-Effective Deployment of IPsec VPN Networks on SRX Series Services Gateways
|learn|
|ref-arch|
|next-gen-firewall|

Learn how AutoVPN delivers easy, no touch deployment for site-to-site IPsec VPN configurations.

Rate and give feedback:          
   

AutoVPN

2 Pages174 KB1/1/13
Implementing and configuring IPsec VPNs can be time consuming, complex, and not easily scalable. AutoVPN, a key feature available with Juniper Networks SRX Series Services Gateways simplifies the planning, design, and provisioning process by enabling you to configure the routing, interfaces, Internet Key Exchange (IKE), and IPsec hub settings only once even when new VPN spoke devices are deployed at a later time.
 
Solution Brief: Group VPN – Better Management, Better VPN
|learn|
|ref-arch|
|next-gen-firewall|

Learn how group VPN is a better way to provide secure, any-to-any VPN connectivity between branch offices and anywhere within your network.

Rate and give feedback:          
   

Group VPN – Better Management,Better VPN

3 Pages214 KB4/1/14
As corporations expand physical locations and become more distributed, the complexity of creating and managing secure VPN networks increases. High-bandwidth applications degrade in quality in secure networks. Group VPN simplifies the management issue brought on by growing networks while improving performance for bandwidth-heavy applications.
 
Solution Brief: Automated Threat Containment with Cyphort and SRX Series Firewalls
|learn|
|ref-arch|
|next-gen-firewall|

Understand how you can quickly act to mitigate and contain malicious activity by automatically publishing threat containment data from the Cyphort Advanced Threat Defense Platform to SRX Series Services Gateways.

Rate and give feedback:          
   

Automated Threat Containment with Cyphort and SRX Series Firewalls

2 Pages214 KB9/1/15
Protecting networks against malicious attacks requires constant vigilance. Once potential attacks are identified, the threat must be contained and malicious activity blocked. Threat detection, however, is typically performed by one solution, while the threat mitigation and containment is performed by another. Working together, Cyphort and Juniper Networks have delivered a comprehensive security solution that leverages the best of both product portfolios to protect today’s enterprise networks from intruders.
 
Fundamentals: Advanced Threat Prevention
|learn|
|learn-about|
|threat-mitigation|

Learn about advanced threat prevention (ATP) and an anti-malware solution from Juniper Networks called Sky Advanced Threat Prevention (ATP).

Rate and give feedback:          
   

Learn About Advanced Threat Prevention

10 Pages799 KB4/1/16
Targeted malware uses sophisticated methodology to evade traditional security defenses and embed itself in the target’s infrastructure. Once attached, the malware can carry out undetected data theft, espionage, and disruption or destruction of network infrastructure and processes. This Learn About examines advanced threat prevention (ATP) and an anti-malware solution from Juniper Networks called Sky Advanced Threat Prevention (ATP), both of which address vulnerabilities in today’s networks.
 
Deep Dive: Deploying Secure Multicast Market Data Services for Financial Services Environments (NCE)
|design|configure|
|proddoc|
|next-gen-firewall|

Configure and deploy multicast in your financial services environment by using SRX Series and QFX Series devices.

Rate and give feedback:          
   

Deploying Secure Multicast Market Data Services for Financial Services Environments

114 Pages861 KB07/06/16
Financial trading enterprises, such as stock exchanges, futures exchanges, brokerage houses, and software integrators, typically deploy multicast for market data delivery. These organizations deploy large-scale multicast infrastructures to enable trading and e-commerce. This network configuration example (NCE) provides an overview and a step-by-step example for configuring and deploying multicast in a financial services environment. The NCE defines multicast deployment for market data delivery and illustrates how multiple feeds flow through an active/active SRX Series Services Gateway cluster.
 
Solution Brief: Juniper and Attivo Networks Add Inside-the-Network Threat Detection as a Next Layer of Defense
|learn|
|ref-arch|
|next-gen-firewall|

Learn how Juniper and Attivo’s joint solution mitigates the threat posed by bots and advanced persistent threats (APTs) on the network before they can do any harm.

Rate and give feedback:          
   

Juniper and Attivo Networks Add Inside-the-Network Threat Detection as a Next Layer of Defense

3 Pages173 KB12/1/15
Organizations must be ever vigilant to protect their networks against malicious attacks. Network traffic needs to be continuously monitored for threat activity, and once potential attacks are identified, the threat must be contained and the malicious activity blocked. Integration of the Attivo BOTsink solution with Juniper Networks Security Intelligence gives SRX Series Services Gateways the ability to block infected nodes from gaining Internet access and exfiltrating valuable company data.
 
Fundamentals: Security Director Onboarding Guide
|learn|configure|operate|
|proddoc|
|security-management|

Learn how to quickly get up and running with Junos Space Security Director.

Rate and give feedback:          
   

Welcome to Security Director

10 Pages2.23 MB05/02/16
This guide introduces you to the Security Director user interface and provides links to videos that help you quickly learn how to use the application.
 
Solution Brief: Unified Threat Management—All-in-One Security for Branch and Small to Medium Offices
|learn|
|ref-arch|
|next-gen-firewall|

Learn how Juniper Networks Unified Threat Management (UTM) offers comprehensive security against malware, viruses, worms, trojans, phishing attacks, intrusions, denial of-service (DoS) attacks, key loggers, spam, and other threats.

Rate and give feedback:          
   

Unified Threat Management—All-in-One Security for Branch and Small to Medium Offices

3 Pages255 KB4/1/12
Juniper Networks® Unified Threat Management is available with Juniper Networks SRX Series Services Gateways, the only carrier-class security solution consolidating UTM content security services with routing and switching in a single, high-performance, and cost-effective network device. UTM security is a comprehensive security approach providing defense-in-depth with layers that include antivirus/anti-malware, intrusion prevention system (IPS), AppSecure, enhanced Web filtering, content filtering, and anti-spam.
 
Day One: ADVPN Design and Implementation
|design|configure|
|dayone|
|next-gen-firewall|

Learn how to use the AutoDiscovery VPN protocol to solve real-world IPsec encryption problems.

Rate and give feedback:          
   

Day One: ADVPN Design and Implementation

Neither the fully-meshed nor hub-and-spoke approaches to IPsec VPNs are optimal for modern network deployments where customers demand both the ease of provisioning encrypted overlay security services and the optimum flow of traffic to minimize application traffic latency. What is needed is an approach that takes the simplified provisioning of hub-and-spoke with the low application latency of fully-meshed. SRX Series Gateways employ a feature called AutoVPN that uses the Auto Discovery VPN (ADVPN) protocol to dynamically establish spoke-to-spoke VPN tunnels.

Fundamentals: Security Virtualization
|learn|
|learn-about|
|cloud-and-containerized|

Learn about the fundamentals of security virtualization and how a virtual security appliance can provide security and networking services in virtualized cloud environments.

Rate and give feedback:          
   

Learn About Security Virtualization

10 Pages1.56 MB4/1/16
This Learn About introduces the fundamentals of security virtualization and explains how a virtual security appliance can provide security and networking services in virtualized private or public cloud environments. For readers who need field knowledge, this Learn About also reviews the core functions of the Juniper Networks vSRX Services Gateway—the Juniper Networks solution for security virtualization—and details how this virtual firewall solution is essential to the network security of businesses and organizations.
 
Fundamentals: Secure Analytics
|learn|
|learn-about|
|security-management|

Learn about the fundamentals of security information and event management (SIEM) and Juniper Secure Analytics (JSA).

Rate and give feedback:          
   

Learn About Secure Analytics

11 Pages799 KB3/1/16
This Learn About introduces you to the fundamentals of security information and event management (SIEM) and Juniper Secure Analytics (JSA) and explains why they are essential in today’s networks. It also reviews the core functions of a SIEM and JSA implementation and describes how a SIEM and JSA are used.
 
Fundamentals: Obtain Quality of Service with Junos CoS
|learn|
|learn-about|
|next-gen-firewall|

Learn how Junos CoS enables you to recognize and control different types of traffic so that you can prioritize traffic flows.

Rate and give feedback:          
   

Obtain Quality of Service with Junos CoS

2 Pages383 KB3/1/16
Junos CoS enables you to prioritize traffic flows over a common path. It offers a means to recognize and control different types of traffic, provides the ability for applications to be considered more or less important, and provides mechanisms to manage congestion.Junos CoS is implemented “hop by hop,” at each device in the data path. This Day One Poster graphically shows the main class-of-service (CoS) configuration elements for a device running Junos OS—forwarding classes, classifiers, policers, schedulers, shapers, and rewrite rules—and provides sample configurations to illustrate how Junos OS uses CoS configuration elements to obtain quality of service for packet flow.
 
Datasheet: SRX5400, SRX5600, and SRX5800 Services Gateways
|learn|
|datasheet|
|next-gen-firewall|

The SRX5400, SRX5600, and SRX5800 Services Gateways are next-generation security platforms that deliver outstanding protection, performance, reliability and availability, scalability, and services integration.

Rate and give feedback:          
   

SRX5400, SRX5600, and SRX5800 Services Gateways

15 Pages1.50 MB10/1/15
The SRX5000 line of services gateways provides unrivaled scalability and performance. Each services gateway can support near-linear scalability—with the addition of Services Processing Cards (SPCs) and I/O Cards (IOCs)—enabling a fully equipped SRX5800 to support up to 2-Tbps firewall throughput with Express Path enabled—an industry first for firewall performance. This datasheet introduces the SRX5000 line of devices and their components, and highlights their features and benefits.
 
Solution Brief: SRX Series Services Gateways: Delivering a Scalable, Secure Solution for Network-Based Managed Services Providers
|learn|
|ref-arch|
|next-gen-firewall|

The SRX Series accelerates service model innovation to drive network profitability for MSPs by easily scaling infrastructure without the delay and additional cost for new hardware installation.

Rate and give feedback:          
   

SRX Series Services Gateways: Delivering a Scalable, Secure Solution for Network-Based Managed Services Providers

4 Pages189 KB7/1/15
As a result of globalization and increasing levels of collaboration, managed service providers (MSPs) must be able to offer secure, scalable, extensible, and cost-effective networking solutions that will help enterprise clients remain competitive. To address this need, Juniper’s SRX Series services delivery platform features a truly integrated architecture that delivers the flexibility required to add new services without incurring additional equipment and rack charges, and the scalability to accommodate the exponential growth of managed services—all within a highly secure operating environment.
 
Industry Report: Gartner’s 2016 Predictions: Security Solutions
|learn|
|white-paper|
|next-gen-firewall|

Learn about Gartner's five predictions about the security industry and how these predictions relate to important changes occurring in the enterprise security space.

Rate and give feedback:          
   

Industry Report: Gartner’s 2016 Predictions: Security Solutions

The security market is in continuous evolution as it needs to address changing threat patterns arising from the Internet of Things, cloud computing, and sophisticated targeted attacks. Use Gartner’s predictions to equip yourself with the preparedness and foresight to preempt the most complex and focused attacks that plague the industry.

White Paper: Top 10: Firewall Shopping Checklist
|learn|
|white-paper|
|cloud-and-containerized|

Learn how to plan your perfect firewall, by using this quick shopping checklist.

Rate and give feedback:          
   

White Paper: Top 10: Firewall Shopping Checklist

Firewall performance is not a single measure but is a result of a combination of factors, which include device performance, next-generation security, availability, and so on. This shopping guide lists the factors you need to consider when you look for your next firewall.

White Paper: Infonetics White Paper: Delivering Security Virtually Everywhere with SDN and NFV
|learn|
|white-paper|
|cloud-and-containerized|

Learn how virtualization technologies such as software-defined networking (SDN) and Network Functions Virtualization (NFV) impact security in the data center.

Rate and give feedback:          
   

White Paper: Infonetics White Paper: Delivering Security Virtually Everywhere with SDN and NFV

Although software-defined networking (SDN) and Network Functions Virtualization (NFV) have applicability beyond security, their implementation has serious impact on security architecture. This white paper details the impact of SDN and NFV on the data center and also explains how their implementation will enable a new generation of security services.

Industry Report: Competitive Landscape: Carrier-Class Network Firewalls
|learn|
|white-paper|
|next-gen-firewall|

In-depth analysis of Gartner's carrier-grade network firewalls, including Juniper Networks SRX Series Services Gateways.

Rate and give feedback:          
   

Industry Report: Competitive Landscape: Carrier-Class Network Firewalls

This report provides essential insights into the competitive landscape of carrier network firewall providers. It delivers relevant information to help firewall product leaders fulfill the current and emerging demands of the complex carrier market.

Industry Report: IDC White Paper: Securing the Data Center from Advanced Threats
|learn|
|white-paper|
|threat-mitigation|

Learn about the most advanced threat mechanisms that target your data center. Learn to use the predictive capabilities and preemptive strategies offered by the latest developments in threat solution intelligence to secure your data center.

Rate and give feedback:          
   

Industry Report: IDC White Paper: Securing the Data Center from Advanced Threats

With data centers having become the heart and soul of the financial industry, the vulnerability of data centers is incessantly challenged by continuously evolving security threats. This report analyzes how to secure the data center infrastructure of hardware, software, and networks by implementing the most reliable security services and how to minimize the impact of the most advanced and intrusive threats.

Solution Brief: Juniper vSRX Services Gateway: Protecting the Hybrid Data Center in an Increasingly Virtualized World
|learn|
|ref-arch|
|cloud-and-containerized|

Learn how the vSRX virtual firewall, Juniper Networks’ solution for security virtualization, provides security and networking services in virtualized cloud environments.

Rate and give feedback:          
   

Solution Brief: Juniper vSRX Services Gateway: Protecting the Hybrid Data Center in an Increasingly Virtualized World

Virtualization and cloud computing technologies continue to introduce new security vulnerabilities that physical legacy security systems cannot adequately protect against. Read this Solution Brief to understand how Juniper Networks’ vSRX delivers a complete virtual solution that includes core firewall, robust networking, advanced security, and automated virtual machine (VM) management capabilities to enterprises and service providers alike in virtualized cloud and hybrid IT environments.

Solution Brief: Combat Escalating Threats to Your Data Center with SRX Series Services Gateways (SRX5000)
|learn|
|white-paper|
|next-gen-firewall|

Learn how to defend your data center with Juniper’s SRX5000 firewalls.

Rate and give feedback:          
   

Solution Brief: Combat Escalating Threats to Your Data Center with SRX Series Services Gateways (SRX5000)

Juniper’s next-generation SRX5000 firewalls deliver a high-performance, highly resilient solution to support huge workloads in the data center while minimizing the impact of attacks on the network.

Datasheet: cSRX Container Firewall
|learn|
|datasheet|
|cloud-and-containerized|

Learn about cSRX container firewall that delivers a complete virtual firewall solution, including advanced security and automated life cycle and policy management.

Rate and give feedback:          
   

cSRX Container Firewall

2 Pages685 KB4/1/16
The cSRX container firewall delivers a complete virtual firewall solution that provides advanced levels of security, automated life cycle, and effective policy management and is also agile and light-weight. Service providers can effect significant cut down in overheads while enhancing their security coverage, strength, and preparedness in highly dynamic environments.
 
Case Study: Expedient Keeps Customers' Networks Safe and Highly Available with vSRX
|learn|
|white-paper|
|cloud-and-containerized|

Learn how Juniper Networks vSRX virtual firewall, part of the MetaFabric data center architecture, helps Expedient develop and deliver highly customized, managed security services faster than ever.

Rate and give feedback:          
   

Case Study: Expedient Keeps Customers' Networks Safe and Highly Available with vSRX

Expedient deployed Juniper Networks vSRX Services Gateway to support its managed security service in a flexible scenario; one in which each customer can implement a dedicated firewall without complexities. With vSRX, customers can leave the traditional, monolithic firewall environment behind for a new solution that offers granular security control. vSRX provides fail-safe security along with the performance and scalability demanded by today’s virtualized world, and a rich range of networking and routing options delivered in a virtual machine implementation.

Fundamentals: The Virtual Firewall Buyer's Guide
|learn|
|learn-about|
|cloud-and-containerized|

Find the right answers to the eight critical questions you need to ask before purchasing a virtual security device by going through this infographic—the virtual firewall buyer's guide.

Rate and give feedback:          
   

Fundamentals: The Virtual Firewall Buyer's Guide

An infographic that helps you find answers to the most important questions to be considered when it comes to buying a virtual security device. Make the right choice based on the latest and authentic risk-perception analyses, predictions, and caveats from experts and industry leaders.

Deep Dive: Configuring Authentication and Enforcement Using SRX Series Services Gateways and Aruba ClearPass Policy Manager (NCE)
|design|configure|
|proddoc|
|next-gen-firewall|

Step-by-step instructions for configuring SRX Series services gateways, EX Series switches, and ClearPass Policy Manager (CPPM) to protect network resources by enforcing security at the user identity level.

Rate and give feedback:          
   

Configuring Authentication and Enforcement Using SRX Series Services Gateways and Aruba ClearPass Policy Manager

46 Pages5.96 MB07/29/16
This network configuration example illustrates with a host of step-by-step instructions how SRX Series services gateways, EX Series switches, and ClearPass Policy Manager (CPPM) are configured to collaborate in ensuring security in environments where they are deployed together.
 
Deep Dive: How to Set Up Your SRX300 Services Gateway
|learn|configure|
|proddoc|
|next-gen-firewall|

This document describes how to set up a basic configuration for an SRX300 Services Gateway for the first time.

Rate and give feedback:          
   

How to Set Up Your SRX300 Services Gateway

8 Pages1.44 MB07/29/16
The SRX300 Services Gateway consolidates security, routing, switching, and WAN interfaces for small retail offices. Equipped with advanced threat mitigation capabilities, the services gateway provides cost-effective and secure connectivity. This quick start guide walks you through the steps for setting up and configuring your SRX300 for the first time.
 
Deep Dive: How to Set Up Your SRX1500 Services Gateway
|learn|configure|
|proddoc|
|next-gen-firewall|

This quick start guide walks you through the steps for setting up and configuring an SRX1500 services gateway for the first time.

Rate and give feedback:          
   

How to Set Up Your SRX1500 Services Gateway

8 Pages1.40 MB07/29/16
The Juniper Networks SRX1500 Services Gateway is a next- generation secure connectivity device for the cloud-enabled distributed enterprise edge and small to medium data centers. Equipped with advanced security and threat mitigation capabilities, the SRX1500 is suitable for small to medium enterprises. Read this quick start guide to learn how to set up and configure your SRX1500 for the first time.
 
Deep Dive: Juniper Sky Advanced Threat Prevention Quick Start
|learn|configure|
|proddoc|
|threat-mitigation|

Use the instructions in this quick start to obtain your Juniper Sky ATP license key, establish a secure connection between the Sky ATP cloud server and the SRX Series device, and configure Sky ATP policies on the SRX Series device.

Rate and give feedback:          
   

Juniper SKY ADVANCED THREAT PREVENTION

1 Page308 KB01/01/16
The instructions in this guide walk you quickly through the tasks you need to perform for availing the advanced threat countering services of Sky ATP—from obtaining the license key, to creating a login account, and configuring the security intelligence policy that guards your network assets against malware and threats.
 
Solution Brief: Protecting Traditional and Cloud Data Centers with Security Intelligence
|learn|
|ref-arch|
|threat-mitigation|

Learn how to improve security efficacy through Spotlight Secure, Juniper’s dynamic intelligence service and threat intelligence platform.

Rate and give feedback:          
   

Protecting Traditional and Cloud Data Centers with Security Intelligence

4 Pages207 KB8/1/15
SRX Series Services Gateways offer adaptive security intelligence services that help you optimize security policies and thwart cyberattacks. These firewalls help ensure that your security posture is calibrated to effect timely action against real-time and emerging threats of the most intrusive and advanced designs. Read this solution brief to learn how Spotlight Secure—Juniper’s cloud-based dynamic intelligence service and related threat intelligence system—works with SRX Series services gateways to enable effective network protection
 
Solution Brief: Extending Enterprise Security to Public and Hybrid Clouds
|learn|
|ref-arch|
|threat-mitigation|

Learn how Juniper Networks’ broad portfolio of solutions work together to provide comprehensive and cost-effective security to public and hybrid clouds.

Rate and give feedback:          
   

Extending Enterprise Security to Public and Hybrid Clouds

5 Pages388 KB5/1/16
The rapid migration of enterprises toward public or hybrid clouds creates an urgent need to extend the level of security found in traditional networks to the new cloud landscape. Read about Juniper Networks’ security solutions that seamlessly extend across public and hybrid clouds without compromising flexibility and manageability. With highly evolved security intelligence and simple, centralized management and automation tools, Juniper makes monitoring and enforcing security across existing and new data centers easy and cost-effective.
 
Case Study: VirtualArmor Uses Open Security Intelligence to Guard Customers Against Cyberthreats
|learn|
|casestudy|
|threat-mitigation|

Learn how organizations such as VirtualArmor leverage Juniper’s open intelligent solutions to offer managed security services tailored to mitigate customers’ business risks.

Rate and give feedback:          
   

VirtualArmor Uses Open Security Intelligence to Guard Customers Against Cyberthreats

2 Pages348 KB3/1/15
As cybercrime becomes more complex and sophisticated, many organizations turn to their consulting partners with deep security expertise in order to mitigate advanced cyberattacks. At its network operations centers in Colorado and the U.K., VirtualArmor leverages Juniper’s high-performance, scalable, and intelligent security solutions—including Juniper Networks Spotlight Secure, vSRX Services Gateway, SRX Series Services Gateways, and Junos Space Security Director—to provide customers with rapid, coordinated protection against advanced threats.
 
Services: Juniper Networks Services and Support
|learn|
|ref-arch|
|all|

Learn how Juniper Networks Services and Support can help design, deploy, and maintain your network.

Rate and give feedback:          
   

Services: Juniper Networks Services and Support

Your business depends on your network. The network can provide access to and communications between your critical applications—or maybe it is the business, as in the case of network operators and service providers. Being able to plan, build, and operate networks presents a big challenge because of budget and resource constraints or simply a lack of experience and in-depth expertise to implement critical changes. Juniper Services and Support help you assess, design, and deploy your network solution with Juniper’s Core and Edge Practice, Data Center Practice, and Security Practice services.

Services: Planning Your Software-Defined Secure Network
|design|
|ref-arch|
|all|

Ready to plan your software-defined secure network? Learn how Juniper Services and Support can assist you.

Rate and give feedback:          
   

Services: Planning Your Software-Defined Secure Network

Effective planning of a next-generation network and security architecture is critical to the project's success. Most organizations have in-depth knowledge of existing operations and technology, but can benefit from help when defining a roadmap for the future and deciding how to incorporate new technology that enables them to achieve their goals. Juniper Services and Support help you plan your new or enhanced network and security environments and provide guidance for implementing the associated high-level and low-level designs. You can also call on our Partners who are ready to help you with your technical needs.

Services: Building Your Network and Security Architecture
|configure|
|ref-arch|
|all|

Ready to build your software-defined secure network? Learn how Juniper Services and Support can assist you.

Rate and give feedback:          
   

Services: Building Your Network and Security Architecture

After you have decided where to build or enhance your network and security architecture, you need to implement the high-level design by acquiring and deploying the necessary hardware and software. Juniper Services and Support help accelerate the building process and reduce the time it takes to get value from your new network design. Working with our team—including our Partners—enables you to follow best practices and leverage our expertise in deploying Juniper products.

Services: Maintaining and Optimizing Your Network
|operate|
|ref-arch|
|all|

Your business operates 24 hours a day, seven days a week, 365 days a year. Learn how Juniper Services and Support can help keep your network up and running.

Rate and give feedback:          
   

Services: Maintaining and Optimizing Your Network

Juniper Networks Support is with you 24 hours a day, seven days a week, 365 days a year, helping you keep your network up and running at optimum efficiency. Juniper offers Support Services that complement traditional maintenance activities to optimize network utility. You can contact our global service organization by phone or through our Customer Support Center. Understand how Juniper Networks offers different levels of support based on your needs and the complexity of your network. With every service contract, you receive the benefits of our service automation tools—Junos Space Service Now and Service Insight.

Community: Secure the Network - Not Just the Endpoints
|learn|
|community|
|all|

Learn about Juniper Networks’ Software-Defined Secure Networks (SDSN) solution, which enables digital transformation at financial services firms by providing end-to-end network visibility to secure the entire network.

Rate and give feedback:          
   

Community: Secure the Network - Not Just the Endpoints

For financial services firms that are planning to move to the cloud, ensuring adequate levels of security is perhaps, the foremost priority as well as the most daunting challenge. Traditional network security that focuses on providing perimeter defense is no longer sufficient because, advanced threats are programmed to breach perimeter security defenses, enter trusted networks, and remain undetected. Increasing the number of devices is no longer reliable as a strategy that can ensure the levels of safeguard networks need in the current scenario. Read this article to understand How Juniper’s Software Defined Secure Networks (SDSN) expands threat visibility and enforcement capabilities to enable comprehensive security coverage that spans the entire network infrastructure.

Day One: Scaling Beyond a Single Juniper SRX in the Data Center
|design|configure|operate|
|dayone|
|all|

This Day One book offers unique insight into how to provide security to outbound traffic at levels that can scale to meet the needs of even the largest networks. It walks you through an engaging proof of concept before presenting the configuration.

Rate and give feedback:          
   

Day One: Scaling Beyond a Single Juniper SRX in the Data Center

The traditional approach of putting dedicated firewalls within a given physical location to provide security services is no doubt, capable of scaling, but the scalability often comes at the trade-off of cost. Furthermore, within large-scale data center networks, using firewall clusters for securing data might not be feasible, especially if the data has grown to proportions that no single firewall cluster is capable of handling. Go through this Day One book to understand how you can configure an SRX Series device to address the issue of persistent demands for enhancing scalability and how the device provides security to outbound traffic at levels that can scale to meet the exacting security demands of even the largest networks.

Fundamentals: Intrusion Detection and Prevention
|learn|
|learn-about|
|next-gen-firewall|security-management|

Learn how to use IDP technology to block known attacks across your network, how Juniper implements IDP on SRX Series devices, and how to manage SRX packet capture by using Juniper Secure Analytics (JSA).

Rate and give feedback:          
   

Learn About Intrusion Detection and Prevention

10 Pages1.0 MB9/1/16
In today’s complex network scenario where security is a primary concern, although every data center and enterprise is protected by a firewall, the threat from sophisticated attacks is hardly mitigated. Intrusion detection and prevention (IDP) technology enables your network security device to block malicious traffic, detect virus threats, serve as a network-monitoring point, assist in meeting compliance requirements, and act as a network-sanitizing agent. Learn how Juniper Networks implements this technology on SRX Series Services Gateways to keep the network reliable and secure. Also, learn how SRX packet capture is managed using Juniper Secure Analytics (JSA).
 
Fundamentals: AppSecure
|learn|
|learn-about|
|next-gen-firewall|

Learn about application visibility and control and how Juniper Networks AppSecure uses this technology to deliver a complete and integrated security solution.

Rate and give feedback:          
   

Learn About Intrusion Detection and Prevention

10 Pages1.0 MB9/1/16
With the industry rapidly migrating to newer technology areas such as mobility and virtualization, applications are increasingly being deployed in a dynamic environment that includes mobile devices, mobile apps, hosted virtual desktops, and hybrid clouds. Effective application visibility and control, which is imperative for managing and monitoring users of a variety of media, has become a major challenge across the industry. Learn about Juniper Networks’ AppSecure suite of application-aware security services for the SRX Series devices and how it classifies traffic flows, while enabling greater visibility, enforcement, control, and protection to your network security. Learn how AppSecure helps prevent application-borne security threats that are difficult to detect and stop.
 
Solution Brief: Build an Intelligent Network Optimized for Virtualization
|learn|
|ref-arch|
|next-gen-firewall|

Learn how Juniper Networks solutions help build an intelligent WAN optimized for virtualization that supports long-distance workload mobility, data center migration, and business continuity.

Rate and give feedback:          
   

Build an Intelligent Network Optimized for Virtualization

3 Pages173 KB4/1/15
Federal agencies need to ensure that their applications are readily available and performing to meet mission objectives. Although server virtualization ensures application availability and workload balancing within data centers, enabling virtual workload mobility across geographically dispersed data centers remains a challenge. Read this Solution Brief to understand how Juniper Networks solutions help you build an intelligent WAN or data center interconnect to support long-distance workload mobility and data center migration, and also meet disaster recovery requirements. Federal agencies can leverage key capabilities available on Juniper Networks MX Series 3D Universal Edge Routers and Juniper Networks SRX Series Services Gateways to provide virtual machine (VM) mobility between data centers by using Ethernet VPN (EVPN), optimize VM mobility traffic, and ensure dynamic, secure VPNs.
 
Solution Brief: Juniper Networks Cloud CPE Solution
|learn|
|ref-arch|
|cloud-and-containerized|

Learn how Juniper Networks automates service delivery with its carrier-grade Cloud CPE solution.

Rate and give feedback:          
   

Juniper Networks Cloud CPE Solution

6 Pages438 KB6/1/16
More than ever, enterprises are relying on managed services to support their communications, operations, and transactions. However, restricted scalability of managed customer premises equipment (CPE) services and their time-consuming, manual deployment do not align with the dynamic market requirements of today’s enterprises. Read this solution brief to understand how Juniper automates service delivery with the truly scalable, carrier-grade Cloud CPE solution. Based on Juniper’s end-to-end Network Functions Virtualization (NFV) capabilities, Cloud CPE enables flexible and accelerated service creation and delivery with multiple deployment models that incorporate an open framework for third-party virtual network functions (VNFs).
 
Fundamentals: Network Security Management
|learn|
|learn-about|
|security-management|

Learn about the challenges of network security management and how Security Director secures your network by providing centralized security and policy management.

Rate and give feedback:          
   

Learn About Network Security Management

9 Pages1.57 MB9/1/16
With the threat landscape evolving rapidly, protecting the network and its assets has become a formidable challenge. Network administrators need an effective and easy-to-use tool that empowers them with the ability to anticipate, identify, and proactively respond to threats. Learn about the various challenges of network security management and how Juniper Networks facilitates centralized security and policy management across the network through an intuitive, easily manageable, and powerful web-based interface.
 
Deep Dive: Migrate Cisco ASA to Juniper SRX Series (Day One)
|design|configure|operate|
|dayone|
|next-gen-firewall|

Learn how to create a successful Cisco ASA to SRX Series migration path that can be used repeatedly in your network or the networks of your clients.

Rate and give feedback:          
   

Deep Dive: Migrate Cisco ASA to Juniper SRX Series (Day One)

Many hardware platforms have finite life spans, which calls for upgrading platforms such as firewalls to keep pace with the future. Some of the key considerations that qualify a platform for an upgrade are its scalability, resilience, and security performance. When you migrate to Juniper’s SRX Series, you stand to gain all the benefits of high-performance security with advanced, integrated threat intelligence, delivered on the industry's most scalable and resilient platform. This Day One Guide documents a best practice change process with detailed steps that will ease, and actually simplify the migration from Cisco Adaptive Security Appliance (Cisco ASA) to the SRX Series. This migration plan will also help you familiarize yourself with Junos OS and the SRX Series.

Community: Ransomware in the Cloud
|learn|
|community|
|cloud-and-containerized|threat-mitigation|

Learn how ransomware can attack medium and large companies, even if the data is not stored on one machine.

Rate and give feedback:          
   

Community: Ransomware in the Cloud

In this creative blog from Roman Sinayev, read how attacks have evolved from traditional malware to cloud-aware ransomware, and what enterprises can do to mitigate the attacks.

Community: Visibility Into Network Security Threats and Risks Using Junos Space Security Director
|learn|
|community|
|security-management|

Learn about the two new features Juniper just released that help network security administrators get better visibility into their network.

Rate and give feedback:          
   

Community: Visibility Into Network Security Threats and Risks Using Junos Space Security Director

As malware and viruses continue to threaten to cripple businesses by carrying out data theft, espionage, and disruption of network infrastructure and processes, organizations need complete visibility of the usage patterns of the applications over the Internet accessed by their users. This visibility can help detect and block malicious or unauthorized network traffic. To address this need, Juniper Networks introduces two new features – application usage statistics and threat maps. Application usage statistics help in better management of the network by defining application-specific QoS, and Threat Map introduces the ability to visualize threats on the World Map.

Community: New Threats in July 2016
|learn|
|community|
|threat-mitigation|

Read the first post in a monthly series highlighting some of the new threats detected by Sky ATP's deep analysis engines.

Rate and give feedback:          
   

Community: New Threats in July 2016

In July alone, Sky ATP detected tens of thousands of malicious applications and documents as they were intercepted by SRX firewalls. While most of these were known threats, Sky ATP also detected new malware strains, including multiple forms of ransomware as well as assorted trojans, spyware, and other potentially harmful programs. In this post, we look at two new ransomware variants, plus an old threat that has evolved into a highly-evasive (almost) fileless malware and how SKY ATP’s perceptive risk-detection intelligence tracks them.

Community: Containerized Security: The Next Evolution of Virtualization?
|learn|
|community|
|cloud-and-containerized|

Learn how using containers can help keep your security functions ahead of the curve.

Rate and give feedback:          
   

Community: Containerized Security: The Next Evolution of Virtualization?

Putting security functions into containers is one of the promising new approaches toward building secure, scalable, cost-effective virtualized infrastructures. Just as containers provide a wide range of benefits for applications that need to migrate between computing environments, there are also benefits to using them to secure networks. As all of your security operations run through only one container that uses one operating system, you save on operational cost while achieving massive scalability and a significant increase in speed of services.

Fundamentals: Software-Defined Secure Networks Solution
|learn|
|learn-about|
|all|

Learn about SDSN—Juniper Networks’ security vision—that provides a solid foundation for creating secure networks through policy, detection, and enforcement.

Rate and give feedback:          
   

Learn About Software-Defined Secure Networks (SDSN)

7 Pages1.75 MB9/1/16
Traditionally, the foundation of network security has been based on a trust/no trust model—trust what is inside the network, but do not trust what is coming from outside. However, with the changing threat landscape, which has increased the “surface area of attack,” a truly secure network needs to be based on a zero-trust model. Read this Learn About to understand how Juniper’s Software-Defined Secure Networks (SDSN) delivers a comprehensive security solution that integrates threat detection and adaptive policy control for networkwide enforcement.
 
Reference Architecture: Midsize Enterprise Campus Design
|design|
|ref-arch|
|all|

Describes the reference architecture and design considerations for a midsize enterprise campus.

Rate and give feedback:          
   

Midsize Enterprise Campus Design

24 Pages943 KB10/14/14
The Juniper Networks midsize enterprise campus solution addresses the end-to-end validated architecture required to deliver a design and implementation strategy for today’s campus environments, built upon a reliable and secure Juniper foundation. Validation comes through testing that encompasses not only the basic connectivity required to provide service for the campus, but also tests the scale and policy on the entire design, resulting in an architecture that the customers can trust.
 
Deep Dive: Midsize Enterprise Campus Solution (NCE)
|design|configure|
|ref-arch|
|all|

Describes the reference architecture for a midsize enterprise campus and provides recommendations and examples for configuring a highly available, secure network that delivers a high quality of services.

Rate and give feedback:          
   

Midsize Enterprise Campus Solution

166 Pages2.53 MB9/1/14
The Juniper Networks midsize enterprise campus solution addresses the end-to-end validated architecture required to deliver a design and implementation strategy for today’s campus environments, built upon a reliable and secure Juniper foundation. Validation comes through testing that encompasses not only the basic connectivity required to provide service for the campus, but also tests the scale and policy on the entire design, resulting in an architecture that the customers can trust.
 
Deep Dive: MetaFabric Data Center
|design|install|configure|operate|
|proddoc|ref-arch|
|all|

Harness the power of virtualization in your data center network with the validated MetaFabric 1.0 solution.

Rate and give feedback:          
   

Deep Dive: MetaFabric Data Center

318 Pages21.7 MB3/18/14
This MetaFabric 1.0 validated solution includes compute, network, and storage requirements for your data center, as well as considerations for business-critical applications, high availability, class of service, security, and network management.
 
Solution Brief: Juniper vSRX Services Gateway: Protecting the Hybrid Data Center
|learn|
|ref-arch|
|cloud-and-containerized|

Read this solution brief to understand how Juniper's vSRX extends the capabilities of SRX Series service gateways to hybrid environments, enabling you to dynamically provision and scale protection to overwhelm advanced threat strategies.

Rate and give feedback:          
   

vSRX Services Gateway: Protecting the Hybrid Data Center

5 Pages627 KB6/1/15
A shift to virtualization and cloud computing technologies does not completely eliminate the physical data center. Instead, it creates a hybrid environment, incorporating physical and virtual computing technologies—including both public and private clouds. And with this, threats targeting virtualized environments also need to be addressed along with those that target physical environments. The strategy of protecting virtual assets with physical security mechanisms is no longer effective, with the sophistication levels and damage potential of threats increasing rapidly. Read this solution brief to understand how Juniper's vSRX employs the power of Juniper’s award-winning SRX Series services gateways to deliver a complete virtual solution that secures virtual, cloud, and hybrid IT environments against the most advanced threats while providing robust networking and VM management capabilities.
 
Fundamentals: Software-Defined Secure Networks (Poster)
|learn|
|learn-about|
|all|

Learn about the components of Juniper Networks’ SDSN solution, its features and functionality, and the steps for deploying it.

Rate and give feedback:          
   

SDSN: Software-Defined Secure Networks

1 Page1.69 MB3/1/16
Software-Defined Secure Networks (SDSN) is Juniper’s vision of the future for secure networks. It is a security and network portfolio that provides building blocks for a platform of scalable, effective network security enforcement for the future. This poster depicts the components of SDSN, highlights its features and functionality, and lists the steps required for deploying it.
 
Fundamentals: Junos Space Security Director (Poster)
|learn|
|learn-about|
|security-management|

Learn the smarter and easier way of securing your network with the enhanced Junos Space Security Director.

Rate and give feedback:          
   

Junos Space Security Director

1 Page1.50 MB3/1/16
This poster shows the enhanced usability features offered by the Security Director application—such as the configurable dashboard, enhanced policy management options for controlling usage of specific applications, actionable intelligence, explicit logs and informative reports, and so on. A powerful and easy-to-deploy solution, Security Director enables you to effectively secure your network by creating and implementing firewall policies, intrusion detection and prevention (IPS) policies, IPsec VPNs, and Network Address Translation (NAT) policies. You have the flexibility to customize configurations to meet your specific needs.
 
Fundamentals: SRX Series Product Portfolio (Poster)
|learn|
|learn-about|
|all|

Learn about the Juniper Networks SRX Series Services Gateways portfolio, which comprises devices that provide high-performance security with advanced, integrated threat intelligence.

Rate and give feedback:          
   

SRX Series Security Services

1 Page876 KB3/1/16
This poster presents all supported SRX Series Services Gateways—including the new SRX300, SRX320, SRX340, SRX345, and SRX1500—and provides brief information about vSRX, Junos Space Security Director, Sky Advanced Threat Prevention (Sky ATP), and threat intelligence.
 
Fundamentals: Service Provider Edge Security
|learn|
|learn-about|
|all|

Learn about the role security plays at the edge of an ISP's evolving network for its customers, and security issues affecting telecom cloud providers.

Rate and give feedback:          
   

Learn About Service Provider Edge Security

12 Pages1.24 MB9/1/16
Service Provider's/ISP's networks are subject to both active and passive attacks from various malicious sources that cause infection throughout the network. Security must be ingrained everywhere – in the protocols, the systems, the elements, the provisioning, and in the business surrounding the network. Learn about how to deploy security measures similar to those that financial institutions and governments use to protect their networks, devices, and data.
 
Webinar: SDSN – Juniper’s Innovation in Secure Enterprise Networks
|learn|
|video|
|all|

Watch this webinar to understand why it is no longer sufficient to secure the perimeter of mission-critical systems and why new strategies, such as SDSN, are essential to combat increasingly-sophisticated threat actors and actions.

Rate and give feedback:          
   

Webinar: SDSN – Juniper’s Innovation in Secure Enterprise Networks

Watch this webinar to understand why it is no longer sufficient to secure the perimeter of mission-critical systems and why new strategies, such as SDSN, are essential to combat increasingly-sophisticated threat actors and actions.

Webinar: Five Strategies for Protecting Users Across All Enterprise Locations
|learn|
|video|
|all|

This webinar illustrates the current realm of network threats and provides five strategic recommendations that can help secure campus and branch networks.

Rate and give feedback:          
   

Webinar: Five Strategies for Protecting Users Across All Enterprise Locations

This webinar illustrates the current realm of network threats and provides five strategic recommendations that can help secure campus and branch networks.

Webinar: Top Strategies for Securing App Infrastructure in Data Center and Cloud   
|learn|
|video|
|all|

This webinar outlines the current realm of threats and provides recommendations for securing the application infrastructure in your data center and cloud environments.

Rate and give feedback:          
   

Webinar: Top Strategies for Securing App Infrastructure in Data Center and Cloud  

This webinar outlines the current realm of threats and provides recommendations for securing the application infrastructure in your data center and cloud environments.

Webinar: Secure Your Network Smarter and Faster with Security Director
|learn|
|video|
|all|

This webinar illustrates security management solutions, lists the features and functionalities of security management platforms, presents a demo of the features, and details licensing mechanisms and current promotions.

Rate and give feedback:          
   

Webinar: Secure Your Network Smarter and Faster with Security Director

This webinar illustrates security management solutions, lists the features and functionalities of security management platforms, presents a demo of the features, and details licensing mechanisms and current promotions.

Tools: Network Product Selector
|learn|design|
|proddoc|
|all|

Choose the right products for your network.

Rate and give feedback:          
   

Tools: Network Product Selector

The Juniper Networks Network Product Selector is a great guide to help you select the optimal platform for your network.

Day One: Learn About Software-Defined Secure Networks (SDSN)
|learn|
|dayone|
|all|

Learn about the newest security measures from Juniper Networks that provide end-to-end visibility into your entire network, both virtual and physical. SDSN transforms your network into a single, holistic defense domain where every element becomes an enforcement point.

Rate and give feedback:          
   

LEARN ABOUT SOFTWARE-DEFINED SECURE NETWORKS (SDSN)

88 Pages5.15 MB9/1/16
As the scale and sophistication of cybercrime continues to increase, businesses need to rethink their defense strategies. To be truly effective, next-generation security must be built around automated and actionable intelligence that can be shared quickly within the network to identify and arrest threats. Read this Day One book to understand how Juniper’s SDSN gives you end-to-end network visibility by leveraging cloud economics to secure the entire network, physical and virtual, and to neutralize threats faster than perimeter firewalls. Discover how the building blocks of SDSN work collectively to enable ease of enforcement and provide complete control through centralized security and policy management. Explore the adaptive capabilities of the dynamic anti-malware solution that surpass the volatile threat landscape and finally learn about Juniper Networks’ rich portfolio of security products that ensure pervasive, integrated, end-to-end cloud security that safeguards both enterprises and service providers...
 
Fundamentals: What Is SDN?
|learn|
|learn-about|
|all|

This article on software-defined networking is part of Juniper’s new series of articles to answer common “What is?” questions regarding key networking technologies.

Rate and give feedback:          
   

Fundamentals: What Is SDN?

Software-defined networking (SDN) is a network virtualization approach that seeks to optimize network resources and quickly adapt networks to changing business needs, applications, and traffic. Read this network technology article to understand the SDN technology, the problems that it can help you solve, and fundamental functions and uses of the technology.

Datasheet: Policy Enforcer
|learn|
|datasheet|
|threat-mitigation|security-management|

Policy Enforcer, a component of Junos Space Security Director, provides a simple tool for threat management policy modification and distribution that allows updated policies to be deployed on EX Series and QFX Series switches, as well as on virtual and physical SRX Series services gateways.

Rate and give feedback:          
   

Policy Enforcer

4 Pages719 KB12/1/16
Juniper Networks’ Software-Defined Secure Network (SDSN) platform leverages the entire network, not just perimeter firewalls, as a threat detection and security enforcement domain. Junos Space Security Director engages strongly with SDSN through its Policy Enforcer component. Read this datasheet to learn how Policy Enforcer enables you to orchestrate policies created by Juniper’s cloud-based malware detection solution Sky Advanced Threat Prevention (Sky ATP) and distributes these updated policies to EX Series and QFX Series switches, as well as to physical and virtual SRX Series firewalls.
 
Industry Report: All Together Now: Securing the Internet of Things
|learn|
|white-paper|
|all|

Learn about the important considerations for securing your network as it adopts the Internet of Things solutions.

Rate and give feedback:          
   

Industry Report: All Together Now: Securing the Internet of Things

The Internet of Things (IoT) is at the center of many organizations’ digital transformation strategies today. At the same time, IoT makes networks more vulnerable to cyberattacks. Read this research paper from Nemertes to understand how the IoT makes networks vulnerable, the security measures every organization must take today, and the top two recommended immunity boosters for networks.

White Paper: Software-Defined Secure Networks
|learn|
|white-paper|
|all|

Learn about how Juniper Networks SDSN protects dynamic networks from attacks and secures the entire network, by creating a single, holistic defense domain.

Rate and give feedback:          
   

Understanding Software-defined Security in Modern Softwaredefined Networks

12 Pages564 KB11/1/16
The modern dynamic business environment imposes significant cybersecurity challenges. Organizations need to monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior. Read this white paper to understand why it is worthwhile for IT organizations to examine a network security solution that addresses their specific needs. Juniper Networks’ Software-Defined Secure Networks (SDSN) is one such solution that offers end-to-end network visibility, securing the entire network—physical and virtual. Based on software-defined networking (SDN) methodology, it leverages cloud economics to find and stop threats faster, and combines policy, detection, and enforcement with a comprehensive solution portfolio that centralizes and automates security.
 
White paper: Future-Proof Your Data Center into a Cloud-Based Strategic Business Asset
|learn|design|
|white-paper|
|all|

Read this eBook, to learn how both IT and business stakeholders need to understand that network choices can positively impact the business in terms of access, service, and revenue.

Rate and give feedback:          
   

White paper: Future-Proof Your Data Center into a Cloud-Based Strategic Business Asset

Meeting the challenges of mobility, big data, and social business, the cloud makes the network infinitely more dynamic. Read this eBook to understand the most salient trends in enterprise campus networks, about the cloud technologies that ignite dynamic capabilities, and a wide array of solutions available from Juniper Networks to secure and modernize your data center.

Solution Brief: Move Faster with an On-Demand Hybrid Cloud IT Platform
|learn|
|ref-arch|
|all|

Juniper Unite merges private and public clouds as one platform to help IT achieve flexibility, and streamlined operations, across public and private clouds.

Rate and give feedback:          
   

Move Faster with an On-Demand Hybrid Cloud IT Platform

3 Pages212 KB1/1/17
Enterprises must master multicloud management, adopt a hybrid operations model, and assimilate a plethora of IT technologies to build—and realize the full benefits of—a unified hybrid cloud IT platform. Read this solution brief to understand how Juniper helps build hybrid clouds, where you can interconnect any clouds with secure high performance, realize unified policy seamlessly stitched in and across your cloud software stacks, and advance your hybrid cloud to a true unified IT platform.
 
White Paper: Why Taking a Unified Approach Is Essential to Hybrid Cloud Security
|learn|
|white-paper|
|all|

Juniper Networks provides a unified security platform with cloud-based malware detection to secure your hybrid cloud.

Rate and give feedback:          
   

White Paper: Why Taking a Unified Approach Is Essential to Hybrid Cloud Security

The dramatic growth of hybrid cloud deployments creates new challenges for security professionals that can no longer be addressed with legacy technologies, policies, and processes. As applications and data move fluidly between multiple clouds—private, public, and hybrid—organizations must take a unified approach to security that incorporates a range of products working together to reduce risk and protect the business. This white paper discusses the critical technology solutions that go into developing and deploying a successful hybrid cloud security strategy. It also describes how Juniper Networks delivers a unified security platform to ensure threat prevention, policy management and enforcement, and cloud-based protection from advanced malware.

Industry Report: Seize Control of the Data Explosion
|learn|
|white-paper|
|all|

This industry report discusses the exponential growth of data, what’s driving big data, and challenges to secure the network. This report also discusses how you can transform your network to grow and adapt to keep up with the big data explosion.

Rate and give feedback:          
   

Seize Control of the Data Explosion

11 Pages2.05 MB1/1/17
Data is the fuel for the next-generation enterprise. However, businesses need to stay ahead of the data explosion. They need a network that can handle the massive amounts of data flowing through to endpoints that can be located anywhere in the world. Read this report to understand what is causing the exponential increase in data consumption and how you can build an open, scalable infrastructure with Juniper Networks products and solutions—a network that is capable of accommodating increasing volumes of data, scaling flexibly, and optimizing performance while reducing costs.
 
Industry Report: Accelerating to Agility: An Infrastructure Ready for Technology-Led Transformation
|learn|
|white-paper|
|all|

Read this industry report to understand how digital transformation is rapidly changing the business model today, and why security and network infrastructure are two of the top requirements.

Rate and give feedback:          
   

Accelerating to Agility

10 Pages713 KB1/1/17
Digital transformation is one of the massive waves of technology-driven changes hitting the enterprise. While most businesses are pursuing digital transformation where agility and responsiveness are among the top drivers, security and network infrastructure are seen as top requirements for this transformation. This industry report discusses what infrastructures IT needs to support digital transformation initiatives, to enable a network to drive service delivery that exceeds business needs, enhances business agility, and powers business innovation. It also recommends why IT staff must assess their current networks to determine how compatible they are—technologically and administratively—look for solutions that highlight automation and simplification, and play a robust role in defense-in-depth security.
 
Industry Report: Re-Architecting the Enterprise: The Time Is Now
|learn|design|
|white-paper|
|all|

This industry research paper discusses how unprecedented trends are driving IT teams to reconsider their infrastructures and recommends design principles such as minimizing complexity, using automation for reducing operational costs, and leveraging embedded and integrated security.

Rate and give feedback:          
   

Industry Report: Re-Architecting the Enterprise: The Time Is Now

Network, data center, and security infrastructure is undergoing a major paradigm shift. Enterprises have already virtualized their existing data centers. Now they are moving to the cloud (both private and public) and rethinking how to make the entire infrastructure as agile and cost-effective as their cloud services without sacrificing security. This industry report discusses why it is important to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry applications, and advanced security threats. The report recommends setting design goals to reduce operational cost and architect an improved agile and flexible network with embedded security. It also suggests formulating design principles for minimizing complexity, enabling automation, enhancing security, and relying on virtualization, and finally integrating all of these elements into an ecosystem.

Fundamentals: What is UTM?
|learn|
|learn-about|
|all|

This article on unified threat management (UTM) is part of Juniper’s new series of articles to answer common “What is?” questions regarding key networking technologies.

Rate and give feedback:          
   

Fundamentals: What is UTM?

Unified threat management (UTM) provides multiple security features and services in a single device or service on the network, protecting users from security threats in a simplified way. UTM includes functions such as antivirus, antispam, content filtering, and Web filtering. Read this network technology article to understand UTM, the problems that it can help you solve, and fundamental functions and uses of the technology.

Fundamentals: Juniper Secure Analytics – Risk Manager (Poster)
|learn|
|learn-about|
|security-management|

Learn about the capabilities and benefits of the Juniper Secure Analytics – Risk Manager (JSA Risk Manager) feature, using which you can monitor network topologies and device configurations to reduce risk and increase compliance.

Rate and give feedback:          
   

Junos Space Security Director

1 Page4.55 MB8/12/17
Juniper Secure Analytics – Risk Manager (JSA Risk Manager) enables you to identify and reduce security risks through device configuration monitoring, vulnerability prioritization, and threat simulation and visualization. JSA Risk Manager helps prevent security breaches while improving operational efficiency and compliance. This poster graphically presents an overview of the JSA Risk Manager feature, and lists its capabilities and user benefits.
 
Deep Dive: Software-Defined Secure Networks (SDSN) for Juniper Networks Devices (NCE)
|design|configure|
|ref-arch|
|all|

Configure and deploy Juniper Networks’ Software-Defined Secure Network (SDSN) solution on devices running Junos OS.

Rate and give feedback:          
   
Solution Brief: SDSN: Dynamic, Adaptive Multicloud Security
|learn|
|ref-arch|
|all|

Learn how Juniper Networks' SDSN solution provides a comprehensive security solution based on user-intent policies that features a metadata-based policy model and powerful dynamic policy action capabilities.

Rate and give feedback:          
   

SDSN: Dynamic, Adaptive Multicloud Security

5 Pages350 KB12/1/17
Legacy security policies, which do not dynamically adapt to different security workflows, must be individually configured and managed for every possible deployment option (physical deployment, private cloud, and public cloud). When a network is under attack, the need to rapidly isolate the threat and take corrective action is critical. Read this solution brief to understand how Juniper Networks addresses these challenges with a comprehensive security solution based on user-intent policies. User intent policies leverage unified metadata across deployment realms and dynamically adapt to different security workflows, helping enterprises effectively handle the security challenges of the multicloud era.
 
Solution Brief: Juniper Networks PCI Compliance Architecture
|learn|
|ref-arch|
|all|

Learn how Juniper’s Payment Card Industry (PCI) architecture integrates with your IT team’s workflow, helping to meet and even exceed compliance requirements.

Rate and give feedback:          
   

Juniper Networks PCI Compliance Architecture

6 Pages250 KB6/1/17
Businesses that accept credit cards require an architecture that protects primary account numbers and other confidential cardholder information that is securely processed, transmitted, and stored through a network. Read this solution brief to understand how Juniper’s Payment Card Industry (PCI) solution replaces multiple devices, easily integrating with the comprehensive corporate network, security, and compliance strategy, and increasing the overall security profile of your IT infrastructure. The PCI solution, a secure network architecture for PCI Data Security Standard (DSS) compliance, uses firewalls as the primary building block, and combines additional solutions to create a truly secure network that meets the control objectives of protecting cardholder information.