Policy Enforcer

Policy Enforcer, a Junos Space Security Director component, is a user intent-based threat management policy modification and distribution tool. It allows updated security policies to be deployed across Juniper SRX Series firewalls, MX Series 5G Universal Routing Platforms, EX Series Ethernet Switches, QFX Series Switches, and third-party network devices. The software helps automate threat remediation and microsegmentation policies across your entire network.

With Policy Enforcer, information security is controlled and managed by security software. New devices are automatically covered by security policies instead of identifying their IP address as with other solutions. These software-defined environments can be moved without affecting security policies and controls already in place.

Armed with advanced threat intelligence collected by Juniper Advanced Threat Prevention (ATP) Cloud and the Juniper ATP Appliance, Policy Enforcer dynamically adapts to new threats, automatically updates policies across the network and takes action to stop lateral threat propagation. With an extensible framework, Policy Enforcer enables third-party vendors to integrate their products with the software for advanced security capabilities such as threat remediation.

Key Features


  • Infected host tracking and blocking
  • Custom threat feeds
  • Metadata-based dynamic access control policies
  • Threat mitigation for private and public cloud deployments
  • DDoS mitigation

Features + Benefits

Policy Definition and Enforcement

Define and enforce consistent security policies across both on-premises and cloud deployments.

Policy Automation

Automate security policies across the network, including firewalls, routers, and switches, for accurate enforcement, consistent security, and compliance.

New Threat Detection

Detect new threats and deploy new enforcement policies automatically to network firewalls and switches.

Scalable Security Policy

Extend a security policy across tens of thousands of SRX Series firewalls and site locations, while granularly managing several logical system instances for each individual SRX Series device.

Logging and Reporting

Get detailed reporting with logging capabilities through integration with the Juniper Log Director application.

CyberRatings Enterprise Firewall Test

Juniper receives highest security effectiveness rating. 

Read report

Resource Center

Practical Resouces

Technical Documentation

Support
Training and Community

Training

Learn More

Datasheets and Specifications

CUSTOMER SUCCESS

Banca di San Marino Safeguards Financial Assets with Unified Cybersecurity

Perimeter security alone is no longer enough to keep sophisticated cybercriminals at bay. To comply with new banking and data privacy regulations while maintaining the security of more than €200 million in total assets, Banca di San Marino turned to unified, adaptive cybersecurity.

banca-di-san-marino Image

Security Products

Policy Enforcer

Centralized orchestration that automates policy across your network and security stack, including Juniper and third-party products, to distribute enforcement and better secure your network.

Technical Features
  • Infected host tracking and blocking
  • Custom threat feeds
  • Metadata-based dynamic access control policies
  • Threat mitigation for private and public cloud deployments
  • DDoS mitigation
Currently viewing
Security Director

Centralized security management, analytics, and unified policy orchestration delivered to users, devices, and applications wherever they go, on-premises, in the cloud, and around the world.

Technical Features
  • Manage tens of thousands of sites simultaneously.
  • Create policies for validated threat prevention, user and application access control, secure connectivity, and more—and apply them anywhere.
  • Protect private and public cloud workloads with metadata-based security controls.
  • Correlate and analyze each stage of an attack in sequence, regardless of which product made the detection.
  • Stop threats across your network with Policy Enforcer’s one-click mitigation.
Want to see every Juniper security product?
Gartner Names Juniper a Magic Quadrant Challenger in Enterprise Network Firewalls
Learn how we’re challenging the status quo in network security.
Live Events and On-Demand Demos
Explore the journey to a transformed network.
Find Policy Enforcer in these solutions
Security

Juniper security products and solutions offers threat detection, enforcement, and remediation through a comprehensive portfolio. This includes next-generation firewalls, advanced threat prevention, threat intelligence, security orchestration, management, and analytics to extend security across every point of connection across the network.

Next-Generation Firewall

Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.

Public Cloud Security

Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.

Data Center Security

Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.

Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) architecture brings together networking and security, providing direct, secure access to applications as they move to the cloud.

Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Adam Hils and Jeremy D’Hoinne, 10 November 2020.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.