Juniper Networks has revealed new offerings as part of its Juniper Networks Advanced Threat Prevention (JATP) Appliances, enabling enterprises to detect malware, understand behavior and mitigate threats with just one touch. Sixty-four percent of security teams surveyed said that speeding up threat analysis and prioritizing threats with automation would improve their security posture, according to a Juniper Networks and Ponemon Institute study.
Juniper Networks’ new capabilities build upon the open architecture of its unified cybersecurity platform. Now security teams can easily create custom data collectors right in the JATP Appliances platform, enabling the ingestion of threat data from any Juniper or third-party firewall. Leveraging an intuitive user interface without the need for custom code or pre-defined integrations, Juniper is simplifying operations in multi-vendor environments. This new capability introduces easy-to-use customization controls for security analysts to collect, parse and pinpoint specific data without relying on outsourced customizations. It also automatically integrates with the single, comprehensive timeline view offered by the JATP Appliances, streamlining investigation and remediation by bringing the most important threat behavior details to the forefront more quickly. The JATP Appliances provide up to 12x productivity gains over manual processes for malware investigations.
Commenting on the new offerings, Samantha Madrid, vice president of security business and strategy at Juniper Networks, said, “We are immensely proud of the progress we have made to date with our unified cybersecurity platform and are excited to announce the newest addition to our portfolio, JATP400 Appliance, along with the addition of our latest threat detection capabilities. The new custom data collectors, in particular, will give our customers a fast and flexible way to gain a better view of their network from all angles, using their security data to quickly identify advanced threats directly from the JATP Appliances. We look forward to bringing these new capabilities to enterprises and taking another step toward truly secure networks.”