Containers Expo Blog Authors: Yeshim Deniz, Pat Romanski, Liz McMillan, Flint Brenton, Elizabeth White

News Feed Item

Juniper Networks Expands Spotlight Secure to Stop Advanced Malware and Emerging Threats

Open Security Intelligence Platform Enables SRX Firewall Customers to Take Quick Action on Data from Varied Threat Detection Feeds to Enhance Protection of High-IQ Networks

SUNNYVALE, CA -- (Marketwired) -- 09/09/14 -- Juniper Networks (NYSE: JNPR), the industry leader in network innovation, today announced new advancements in its security capabilities that extend the Juniper Networks® Spotlight Secure threat intelligence platform and link it with firewall policies in Juniper Networks SRX Series Services Gateways. These new advanced security capabilities empower customers to quickly take action on intelligence from varied threat detection technologies by immediately pushing enforcement rules to SRX firewalls to cut off command-and-control (C&C) traffic, isolate infected systems and effectively combat a diversity of threats targeting networks. This novel approach frees customers to choose the most appropriate threat detection technologies available -- including feeds customized to their business -- rather than being locked into only the intelligence data offered by their firewall vendor.

As the threat landscape continues to accelerate and evolve, the security industry continues to respond with a variety of disparate new detection technologies. Unfortunately, this approach results in customers struggling to manage a patchwork of uncoordinated security tools, leaving a gap between detection and enforcement at the firewall. Many Next-Generation Firewalls (NGFW) include integrated capabilities, such as Intrusion Prevention System (IPS), anti-virus signatures and proprietary reputation feeds, but they are closed systems that are not capable of taking full advantage of the highly diverse third-party and custom feeds utilized by customers.

Juniper's expanded Spotlight Secure platform addresses these challenges and constraints by aggregating threat feeds from multiple sources to deliver open, consolidated and actionable intelligence to SRX firewalls across the organization. These sources include Juniper threat feeds, third-party threat feeds and threat detection technologies that the customer can deploy. Administrators are now able to define enforcement policies from all feeds via a single, centralized management point.

News Highlights
Juniper is announcing major enhancements to the Spotlight Secure platform including:

  • Threat Protection: New threat feeds for Spotlight Secure provide C&C and GeoIP feeds that not only adapt protection and firewall policies based on the severity of threats in the network, but also recognize and block traffic from specified countries and send selected traffic through additional security services. These new feeds augment Juniper's industry-only attacker-device fingerprinting service, which is already available via Spotlight Secure.

  • Tight Integration with the Network: Enhanced integration between Juniper Networks Junos® Space Security Director and Spotlight Secure links cloud-based threat feeds to the customer firewalls and provides a single aggregation point for multiple feeds into the firewall.

  • Intelligent Firewall: Enhancements to the SRX firewall allow it to now consume and enforce policy based on the aggregated threat intelligence from detection technologies and feeds that reside both on premises and in the cloud.

This combination of new capabilities helps customers more effectively combat advanced threats in their networks. Key advantages to Spotlight Secure integrated with the SRX firewall include:

  • Open and Scalable Security Intelligence Platform: The open approach to the Spotlight Secure platform allows customers to bring diverse threat intelligence and detection capable of providing timely, actionable enforcement on the firewall. The platform also provides increased scalability, which allows over one million entries in custom feeds, as well as the ability to manage the large number of feeds conveniently with a single point of management. This approach provides comprehensive enforcement to stop a broad spectrum of threats.

  • Higher Security Effectiveness: Customers are now free to use and enforce the most effective technologies available provided by Juniper and other industry leaders -- including feeds customized to their industry or even their specific organization. By providing real-time integration between threat feeds and the firewall, only the latest and most relevant intelligence is sent to firewalls. This approach reduces the need for manual transfer of new threat information to firewall enforcement ensuring fast time-to-enforcement and low false positive rates with the latest intelligence.

  • Improved Operational Efficiency: With Spotlight Secure's simplified enforcement model, companies can dramatically reduce administrative overhead.

    • Centralized Management: Firewall policies, threat intelligence feeds, and reporting on enforcement and actions are all available in a single pane view with Security Director.

    • Automated: The latest aggregated threat intelligence can now automatically syndicate across the entire firewall estate, with no need to update or commit firewall policy changes.

Supporting Quotes
"We have transformed our security solution to address the challenges and constraints that our customers face with traditional firewalls. By creating an open framework that enables the aggregation of intelligence data from multiple feeds, we can provide application and user-level visibility. In addition, this solution is able to increase agility to effectively combat evolving threats in order to keep High-IQ networks secure."
-- Jonathan Davidson, senior vice president and general manager, Security, Switching, and Solutions Business Unit, Juniper Networks

"Our customers deploy a variety of applications and infrastructure components using a combination of physical data centers, virtualization technologies, and the cloud. In doing so, they are looking for security solutions that provide consistent policy enforcement and protections against the latest security threats. Juniper Networks' SRX Firewalls offer a fresh approach to incorporating security intelligence that is highly scalable, open and effective at stopping even the most persistent attackers. This, combined with VirtualArmor's threat feed, provides our customers with better security through more dynamic policy enforcement."
-- Mark Precious, chief technology officer, VirtualArmor

"As we have seen in recent news headlines, cyber criminals are increasingly able to evade perimeter security software. As a leader in identifying any phase of an ongoing cyber attack, the Vectra X-series can leverage the open interface of the Spotlight Secure platform to communicate real-time detections that Juniper perimeter security systems can then block."
-- Mike Banic, vice president of marketing, Vectra Networks

"To effectively defend against targeted cyber attacks that contain evasive malware and advanced persistent threats, organizations must be able to consume best-in-class security data to accurately identify targeted attacks and respond quickly. By integrating Lastline's Advanced Threat Intelligence with Juniper's SRX Firewall, customers can obtain greater visibility and protect themselves from Advanced Targeted Attacks."
-- Brian Laing, vice president of product & business development, Lastline

Additional Resources

About Juniper Networks
Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks' innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Media Relations:
Corey Olfert
Juniper Networks
1 408.936.6064
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The IoT Will Grow: In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is ...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...