Juniper Networks X-Force Integration
Juniper NetworksX-Force security experts use a series of international data centers to collect tens of thousands of malware samples, to analyze web pages and URLs, and to run analysis to categorize potentially malicious IP addresses and URLs. You can use this data to identify and remediate undesirable activity in your environment before it threatens the stability of your network.
For example, you can identify and prioritize these types of incidents:
A series of attempted logins for a dynamic range of IP addresses
An anonymous proxy connection to a Business Partner portal
A connection between an internal endpoint and a known botnet command and control
Communication between an endpoint and a known malware distribution site