SHARE
Facebook X Pinterest WhatsApp

Juniper Networks Closes Software-Defined Security Loop

5 Essential Incident Response Checklists At a NXTWORK 2016 user conference today, Juniper Networks unveiled extensions to its software-defined security architecture that enable security policies to be enforced all the way down to specific network ports. Scott Miles, senior director of cloud, enterprise and security portfolio marketing for Juniper Networks, says new Policy Enforcer software […]

Written By
MV
Mike Vizard
Oct 4, 2016
Slide Show

5 Essential Incident Response Checklists

At a NXTWORK 2016 user conference today, Juniper Networks unveiled extensions to its software-defined security architecture that enable security policies to be enforced all the way down to specific network ports.

Scott Miles, senior director of cloud, enterprise and security portfolio marketing for Juniper Networks, says new Policy Enforcer software both automates the enforcement of security policies across and quarantines infected endpoints by invoking a Junos Space Security Director software that Juniper Networks previously developed.

At the same time, Juniper Networks announced a SRX4000 series of firewalls aimed at the midmarket, along with announcing that Juniper Networks Sky Advanced Threat Prevention (ATP) software is now available on both the vSRX Virtual Firewall as well as across the SRX Series Services Gateways.

Miles says that IT organizations today need to be able to dynamically apply policies and quarantine systems in response to changing IT security conditions.

“IT organizations want to be able to act in real time,” says Miles.

For the moment, Policy Enforcer only works with networking gear and security appliances manufactured by Juniper Networks. But Miles says it’s only a matter of time before Juniper Networks makes use of industry standard application programming interfaces (APIs) to extend the reach of Policy Enforcer out to third-party networking and security equipment.

As IT security threats increase in volume and sophistication, IT organizations are clearly going to have to embrace software-defined approaches to IT security that allow a limited number of IT security professionals to combat an ever increasing number of threats as quickly as they can be discovered. After all, there’s a direct correlation between how long it takes to fix a vulnerability and the potential damage that might be inflicted.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top ETL Tools 2022
Collins Ayuya
Jul 14, 2022
Snowflake vs. Databricks: Big Data Platform Comparison
Surajdeep Singh
Jul 14, 2022
Identify Where Your Information Is Vulnerable Using Data Flow Diagrams
Jillian Koskie
Jun 22, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.