Product
Juniper Secure Analytics Virtual Appliance
The Juniper Secure Analytics (JSA) Virtual Appliance security information and event management (SIEM) is optimized for virtualized IT and cloud environments. It consolidates security events collected from thousands of devices, endpoints, and applications distributed throughout your network. Using big data analysis, it distills that information into an actionable list of offenses that accelerates incident analysis and remediation.
The JSA Virtual Appliance can be orchestrated to scale as needed and is ideally suited for cloud-based deployments. Processing up to 20,000 events per second (eps) and 600,000 flows per minute, it helps security analysts understand, in real time, what’s occurring in their virtualized IT infrastructures and avoid costly damage from cyberthreats.
Key Features
24 GB
1300
600,000
Features + Benefits
Comprehensive Visibility
Delivers centralized insight into logs, flows, and events across on-premises, SaaS, and IaaS environments.
Incident Response
Discovers, aggregates, and tracks security incidents to help stop cyberattacks before they occur.
Powerful Analytics
Uses out-of-the-box analytics to automatically detect threats and generate prioritized, actionable alerts.
Regulatory Compliance
Collects, correlates, and reports on compliance-related activity to help you meet regulatory mandates that pertain to your industry and organization.
Threat Management
Quickly identifies threats for swift, accurate response and remediation while generating detailed data access and user activity reports.
Security Intelligence
Reduces risk in cloud environments by integrating external and internal threat, security, and business intelligence across your entire organization.
Multitenancy Support
Helps managed service providers (MSPs) deliver security intelligence solutions cost-effectively with multitenant support enabled by a unified master console.
99.9% Security Effectiveness
Juniper received a “AAA” Rating in CyberRatings’ Enterprise Network Firewall Report, demonstrating a 99.9% exploit block rate with zero false positives.
Resource Center
Practical Resources
Technical Documentation
Day One Books
Training and Community
Training
Background Information
Learn More
Blogs
CUSTOMER SUCCESS
Beeline automates its network to help customers improve workforce agility
Consultants, freelancers, independent contractors, and other non-employees are a vital part of the global workforce. Beeline, a leader in extended workforce management software, helps companies acquire this type of talent and improve visibility and controls over their contingent workers.
An agile, automated, and threat-aware network from Juniper supports Beeline’s AI-powered SaaS platform and its global business operations as more companies and people seek flexible work.

JSA Virtual Appliance
A virtual security information and event management (SIEM) that collects, analyzes, and consolidates security data from global networked devices to quickly detect and remediate security incidents.
Technical Features | |
RAM | 24 GB |
Canned Reports | 1300 |
Maximum Flows per Minute | 600,000 |
JSA7800 Appliance
A physical security information and event management (SIEM) appliance that collects, analyzes, and consolidates security data from global networked devices to quickly detect and remediate security incidents.
Technical Features | |
Memory | 128 GB |
Maximum Events per Second | 40,000 |
Maximum Flows per Minute | 1.2 million |
Discover 283% ROI with Juniper Connected Security
Live Events and On-Demand Demos
Related Solutions
Security
Juniper security products offer threat detection, enforcement, and remediation through a comprehensive portfolio. Our next-generation firewalls, advanced threat prevention, threat intelligence, security orchestration, management, and analytics extend security across every point of connection across the network.
Next-Generation Firewall
Juniper next-generation firewalls reduce the risk of attack and provide granular control of data, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.