Policy Enforcer, a Junos Space Security Director component, is a user intent-based threat management policy modification and distribution tool. It allows updated security policies to be deployed across Juniper SRX Series firewalls, MX Series 5G Universal Routing Platforms, EX Series Ethernet Switches, QFX Series Switches, and third-party network devices. The software helps automate threat remediation and microsegmentation policies across your entire network.
With Policy Enforcer, information security is controlled and managed by security software. New devices are automatically covered by security policies instead of identifying their IP address as with other solutions. These software-defined environments can be moved without affecting security policies and controls already in place.
Armed with advanced threat intelligence collected by Juniper Advanced Threat Prevention (ATP) Cloud and the Juniper ATP Appliance, Policy Enforcer dynamically adapts to new threats, automatically updates policies across the network and takes action to stop lateral threat propagation. With an extensible framework, Policy Enforcer enables third-party vendors to integrate their products with the software for advanced security capabilities such as threat remediation.
- Infected host tracking and blocking
- Custom threat feeds
- Metadata-based dynamic access control policies
- Threat mitigation for private and public cloud deployments
- DDoS mitigation
Features + Benefits
Policy Definition and Enforcement
Define and enforce consistent security policies across both on-premises and cloud deployments.
Automate security policies across the network, including firewalls, routers, and switches, for accurate enforcement, consistent security, and compliance.
New Threat Detection
Detect new threats and deploy new enforcement policies automatically to network firewalls and switches.
Scalable Security Policy
Extend a security policy across tens of thousands of SRX Series firewalls and site locations, while granularly managing several logical system instances for each individual SRX Series device.
Logging and Reporting
Get detailed reporting with logging capabilities through integration with the Juniper Log Director application.
Banca di San Marino Safeguards Financial Assets with Unified Cybersecurity
Perimeter security alone is no longer enough to keep sophisticated cybercriminals at bay. To comply with new banking and data privacy regulations while maintaining the security of more than €200 million in total assets, Banca di San Marino turned to unified, adaptive cybersecurity.
Centralized orchestration that automates policy across your network and security stack, including Juniper and third-party products, to distribute enforcement and better secure your network.
Centralized security management, analytics, and unified policy orchestration delivered to users, devices, and applications wherever they go, on-premises, in the cloud, and around the world.
Juniper security products and solutions offers threat detection, enforcement, and remediation through a comprehensive portfolio. This includes next-generation firewalls, advanced threat prevention, threat intelligence, security orchestration, management, and analytics to extend security across every point of connection across the network.
Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.
Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.
Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.
Secure Access Service Edge (SASE) architecture brings together networking and security, providing direct, secure access to applications as they move to the cloud.
Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Adam Hils and Jeremy D’Hoinne, 10 November 2020.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.