JSA Series Secure Analytics
12Pages

{{requestButtons}}

Catalog excerpts

JSA Series Secure Analytics - 1

Product Overview The integrated approach of JSA Series Secure Analytics, used in conjunction with unparalleled data collection, analysis, correlation, and auditing capabilities, enables organizations to quickly and easily implement a corporate-wide security management program that delivers security best practices. These include superior log analytics with distributed log collection and centralized viewing; threat analytics that deliver real- time surveillance and detection management capabilities—all viewed and managed from a single console. Product Description Juniper Networks8 JSA Series Secure Analytics combine, analyze, and manage an unparalleled set of surveillance data—network behavior, security events, vulnerability profiles, and threat information—to empower companies to efficiently manage business operations on their networks from a single console. ■ Log Analytics: JSA Series provides scalable log analytics by enabling distributed log collection across an organization, and a centralized view of the information. ■ Threat Analytics: JSA Series provides an advanced network security management solution that bridges the gap between network and security operations to deliver real-time surveillance and detect complex IT-based threats. ■ Compliance Management: JSA Series brings to enterprises, institutions, and agencies the accountability, transparency, and measurability that are critical factors to the success of any IT security program required to meet regulatory mandates. With preinstalled software, a hardened operating system, and a web-based setup process, the JSA Series lets you get your network security up and running quickly and easily. The bottom line of the JSA Series is simple deployment, fast implementation, and improved security, at a low total cost of ownership. Juniper Networks JSA3500 Secure Analytics is an enterprise-class appliance that provides a scalable network security management solution for medium-sized companies up to large global organizations. It is also the base platform for an enterprise-class scalable solution. The JSA3500 includes onboard event collection, correlation and extensive reporting capabilities, and is expandable with additional JSA Series appliances acting as event and flow collectors or a combination of both on a single appliance. JSA3500 can be deployed as an all-in-one appliance or in a distributed setup as a dedicated event, flow, or combination processor. It can also be deployed as a store-and-forward event collector. Juniper Networks JSA5500 Secure Analytics is an enterprise and carrier-class appliance that provides a scalable network security management solution for medium-sized companies up to large global organizations. JSA5500 can be deployed as an all-in-one appliance or in a distributed setup as a console or dedicated event or flow processor. It can also be deployed as a store-and-forward event collector.

Open the catalog to page 1
JSA Series Secure Analytics - 2

Juniper Networks JSA7500 Secure Analytics is an enterprise and carrier-class appliance which provides a scalable network security management solution for large global organizations. JSA7500 can be deployed as a console or distributed event or flow processor. It can also be deployed as a store-and-forward event collector. Juniper Networks JSA Virtual Appliance (JSA VM) Secure Analytics is a virtualized platform that provides Secure Analytics functionality. JSA Virtual Appliance can be deployed as an all-inone or in a distributed setup as a console, event or flow processor. It can also be...

Open the catalog to page 2
JSA Series Secure Analytics - 3

Log Analytics JSA Series provides a comprehensive log analytics framework that includes scalable and secure log analytics capabilities integrated with real-time event correlation, policy monitoring, threat detection, and compliance reporting. Table 2. Log Analytics Features and Benefits Features Feature Description JSA Series delivers scalable and secure log analytics with storage capabilities from GB to TB of data storage. Provides long term collection, archival, search, and reporting of event logs, flow logs, and application data that enables logging taxonomy from a centralized view....

Open the catalog to page 3
JSA Series Secure Analytics - 4

Table 3. Threat Analytics Features and Benefits Features Feature Description Out-of-the-box correlation rules JSA Series correlation rules allow users to detect specific or sequential event flows or offenses. A rule consists of tests and functions that perform a response when events match. • Provides hundreds of out-of-the-box correlation rules that provide immediate value. • Users can create their own rules by using the JSA Series rule wizard to generate automated alerts and enable real-time policy enforcement. Offense management The offense manager allows you to investigate offenses,...

Open the catalog to page 4
JSA Series Secure Analytics - 5

Rack mountable 90 to 264 V, 47-63 Hz, 2-6 A, 250 watt AC power module. Dual redundant option. • Efficiency 80Plus certified • Peak inrush current is: -- ­ 0 A maximum at 115 VAC 4 and 25 C -- 80 A maximum at 240 VAC and 25 90 to 264 V, 47-63 Hz, 6-10 A hot swap dual redundant 560 watt AC power module, 560 watt DC power module, -45 to -60 V DC power supply (optional) • Peak inrush: <60 A • Power module maximum efficiency: -- ­ 0Plus 560 W AC 8 -- ­ 0Plus 560 W DC 8 90 to 264 V, 4763 Hz, 6-10 A hot swap dual redundant 750 watt AC power module, 750 watt DC power module, -45 to -60 V DC power...

Open the catalog to page 5
JSA Series Secure Analytics - 6

Safety certifications CSA 60950-1 (2003) Safety of Information Technology Equipment • UL 60950-1 (2003) • EN 60950-1 (2001) • IEC 60950-1 (2001) • EN 60825-1 +A1+A2 (1994) Safety of Laser Products - Part 1: Equipment Classification • EN 60825-2 (2000) Safety of Laser Safety of Optical Fiber Comm. Systems CSA 60950-1 (2003) Safety of Information Technology Equipment • UL 60950-1 (2003) • EN 60950-1 (2001) • IEC 60950-1 (2001) • EN 60825-1 +A1+A2 (1994) Safety of Laser Products - Part 1: Equipment Classification • EN 60825-2 (2000) Safety of Laser Safety of Optical Fiber Comm. Systems...

Open the catalog to page 6

All Juniper Networks catalogs and technical brochures

  1. QFX5200 SWITCH

    13 Pages

  2. AP550

    2 Pages

  3. AP250

    2 Pages

  4. AP150W

    2 Pages

  5. AP245X

    2 Pages

  6. PTX1000

    4 Pages

  7. SRX300

    6 Pages

  8. SRX1500

    4 Pages

  9. SRX4000

    5 Pages

  10. JSA7500

    8 Pages

  11. ISG Series

    11 Pages

  12. vSRX

    6 Pages

  13. ACX500

    7 Pages

  14. QFX3500 Switch

    12 Pages

  15. QFX3600 Switch

    12 Pages

  16. QFabric System

    12 Pages

  17. DDoS Secure

    4 Pages

  18. 1100018

    6 Pages

  19. 1000195

    6 Pages

  20. 1000300

    4 Pages

  21. backgrounder

    4 Pages

  22. VXA Series

    4 Pages