Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Network Insights Use Cases

SUMMARY Network Insights provides in-depth visibility into network communications and application content to empower Juniper Secure Analytics to detect threat activity. You can use Network Insights to detect and analyze malware, phishing, insider threats, lateral movement attacks, data exfiltration, and compliance gaps.

Malware Detection and Analysis

Malware frequently morphs to avoid detection. You can use Network Insights to detect malware based on file hashes and file activity, and observe and analyze artifacts such as:

  • Names
  • Properties
  • Movement
  • Suspicious content

Phishing Email and Campaign Detection

Phishing can hide in plain sight by disguising its activity within the volumes of normal emails. You can prepare for and react to malicious emails by using Network Insights to analyze:
  • Sources
  • Targets
  • Subject
  • Content

Insider Threats

You can integrate Network Insights with the User Behavior Analytics app to improve threat detection. Use the Network Insights analytics to recognize:
  • High-risk users
  • Potential targets of phishing
  • Negative sentiment
  • Suspicious behaviors

Lateral Movement Attack Detection

Network Insights can trace anomalous communications:
  • Reconnaissance
  • Data transfers
  • Rogue and malicious actors

Data Exfiltration Protection

Data can be exfiltrated through many methods. Use Network Insights to identify and track suspicious files such as:
  • DNS abnormalities
  • Sensitive content
  • Aberrant connections
  • Aliases

Identify Compliance Gaps

Network Insights allows for continuous monitoring of enterprise, industry, and regulatory compliance.