Story image

Juniper simplifies data integration to improve threat detection

06 Dec 18

Secure networks provider Juniper Networks has announced new offerings as part of its Juniper Networks Advanced Threat Prevention (JATP) Appliances, enabling enterprises to detect malware, understand behaviour and mitigate threats with just one touch. 

This solution leverages data from any third-party firewall or security data source, avoiding unnecessary vendor lock-in.

Eliminating complex, time-consuming data collection configurations, Juniper is helping security teams improve their organisation’s security posture by simplifying and accelerating security operations.

Sixty-four percent of security teams surveyed said that speeding up threat analysis and prioritising threats with automation would improve their security posture, according to a Juniper Networks and Ponemon Institute study.

High volumes of incident data generated by numerous, disparate sources make threat detection and mitigation increasingly difficult.

To uncover critical threat behaviour, already-understaffed security teams spend significant time analysing and correlating alerts, ultimately increasing time to remediation.

Security teams also face the manual tasks of creating one-off custom integrations to ingest relevant data from these sources.

To address these challenges, Juniper Networks today revealed new capabilities that build upon the open architecture of its unified cybersecurity platform.

Now security teams can easily create custom data collectors right in the JATP Appliances platform, enabling the ingestion of threat data from any Juniper or third-party firewall.

Leveraging an intuitive user interface without the need for custom code or pre-defined integrations, Juniper is simplifying operations in multi-vendor environments.

This new capability introduces easy-to-use customisation controls for security analysts to collect, parse and pinpoint specific data without relying on outsourced customisations.

It also automatically integrates with the single, comprehensive timeline view offered by the JATP Appliances, streamlining investigation and remediation by bringing the most important threat behaviour details to the forefront more quickly.

The JATP Appliances provide up to 12x productivity gains over manual processes for malware investigations.

With the continual advancement of its unified cybersecurity platform powered by Software-Defined Secure Networks (SDSN), Juniper helps security teams pinpoint evasive threats hiding deep in the network while showing a temporal view of behaviour to stop threats as quickly and effectively as possible. 

News highlights:

  • Seamless integration of security data from any network source: Building upon the platform’s open architecture, the JATP Appliances can now capture, parse and leverage data from all security sources in the network through built-in custom data collectors, eliminating the need for outsourced and time-consuming configurations. Once the dataset is defined, it seamlessly flows into the JATP Appliances threat behaviour timeline, empowering security teams to quickly see what happened and when in an intuitive user interface. This new capability supports multiple log format types, including XML, JSON and CSV, and is complementary to existing SIEM functionality.
     
  • Juniper Networks JATP400 advanced threat prevention appliance for distributed enterprises: As part of Juniper’s efforts to provide protection from malicious activity, this new on-premises device is the ideal option for security teams that require automated threat prevention capabilities across their distributed enterprise. The JATP400 Appliance works alongside any existing firewall, reducing the need for complex integrations and with the built-in timeline view, security teams are able to mitigate threats with just one touch.
McAfee named Leader in Magic Quadrant an eighth time
The company has been once again named as a Leader in the Gartner Magic Quadrant for Security Information and Event Management.
Symantec and Fortinet partner for integration
The partnership will deliver essential security controls across endpoint, network, and cloud environments.
Review: Blue Mic’s Satellite headphones are good but...
Blue Mic’s newest wireless headphones deliver on sound, aesthetic, and comfort - but there is a more insidious issue at hand.
Is Supermicro innocent? 3rd party test finds no malicious hardware
One of the larger scandals within IT circles took place this year with Bloomberg firing shots at Supermicro - now Supermicro is firing back.
IDC: Smartphone shipments ready to stabilise in 2019
IDC expects year-over-year shipment growth of 2.6% in 2019, while the world's largest market is still forecast to be down 8.8% in 2018.
Microsoft NZ bids Goldie a “fond farewell”
Microsoft New Zealand director of commercial and partner business takes new role across the Tasman. The search for his replacement has begun.
Object-based storage over-looked by Aussies, survey shows
Hitachi Vantara has sponsored an IDC survey looking at the technology’s usage and adoption barriers across Asia Pacific.
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.