Catalog excerpts
juniper • * v-v-t; NETWORKS Product Overview The integrated approach of JSA Series Secure Analytics, used in conjunction with unparalleled data collection, analysis, correlation, and auditing capabilities, enables organizations to quickly and easily implement a corporate-wide security management program that delivers security best practices. These include superior log analytics with distributed log collection and centralized viewing; threat analytics that deliver realtime surveillance and detection information; and compliance management capabilities—aLL viewed and managed from a singLe consoLe. Product Description Juniper Networks® JSA Series Secure Analytics combine, analyze, and manage an unparaLLeLed set of surveiLLance data—network behavior, security events, vuLnerabiLity profiles, and threat information—to empower companies to efficiently manage business operations on their networks from a single console. • Log Analytics: JSA Series provides scalable log analytics by enabling distributed log collection across an organization, and a centralized view of the information. • Threat Analytics: JSA Series provides an advanced network security management solution that bridges the gap between network and security operations to deliver realtime surveillance and detect complex IT-based threats. • Compliance Management: JSA Series brings to enterprises, institutions, and agencies the accountability, transparency, and measurability that are critical factors to the success of any IT security program required to meet regulatory mandates. • Vulnerability Management: Deployed as a standalone solution or working in conjunction with Threat Analytics, JSA Series can function as a full-featured vulnerability scanner. • Risk Management: JSA Series helps security professionals stay ahead of advanced threats by proactively quantifying risks from vulnerabilities, configuration errors and anomalous network activity, preventing attacks that target high value assets and data. With preinstalled software, a hardened operating system, and a web-based setup process, the JSA Series lets you get your network security up and running quickly and easily. The bottom line of the JSA Series is simple deployment, fast implementation, and improved security, at a low total cost of ownership. Architecture and Key Components JSA Secure Analytics Appliances The Juniper Networks Secure Analytics appliances provide a scalable solution for security event management. The JSA3800 and JSA5800 are enterprise-class solutions that can be deployed as an all-in-one solution with integrated event collection, correlation and extensive reporting, or as a dedicated event and/or flow collector. The JSA7500 is a carrier-grade solution and is NEBS certified. JSA Virtual Appliance Juniper Networks JSA Virtual Appliance (JSA VM) Secure Analytics is a virtualized platform that provides Secure Analytics functionality. JSA VM is designed to run with VMWare ESX 5.0 and ESX 5.1, and requires a configuration with a minimum of two CPUs (1 socket x 2 cores or 2 sockets x 1 core) and 8GB of RAM. It processes a maximum of 20,000 events per second or 600,000 flows per minute, with 16 cores and 24 GB of RAM.
Open the catalog to page 1JSA Series Secure Analytics Data Sheet Table 1. JSA Series Secure Analytics Features and Benefits Feature Description All-in-one appliances Event collection, flow collection event processing, flow processing, correlation, analysis, and reporting are all embedded within JSA Series Secure Analytics. All core functions are available within the system and it is easy for users to deploy and manage in minutes. JSA Series architecture provides a streamlined solution for secure and efficient log analytics. Distributed support JSA Series has the ability to scale to large • Users have the...
Open the catalog to page 2JSA Series Secure Analytics Data Sheet Log Analytics JSA Series provides a comprehensive log analytics framework that includes scalable and secure log analytics capabilities integrated with real-time event correlation, policy monitoring, threat detection, and compliance reporting. Table 2. Log Analytics Features and Benefits Features Feature Description Benefits Comprehensive log management JSA Series delivers scalable and secure log Provides long term collection, archival, search, and analytics with storage capabilities from GB to TB of reporting of event logs, flow logs, and...
Open the catalog to page 3JSA Series Secure Analytics Data Sheet Table 3. Threat Analytics Features and Benefits JSA Series Secure Analytics Data Sheet Feature Description Provides hundreds of out-of-the-box correlation rules that provide immediate value. Users can create their own rules by using the JSA Series rule wizard to generate automated alerts and enable real-time policy enforcement. Out-of-the-box correlation rules JSA Series correlation rules allow users to detect specific or sequential event flows or offenses. A rule consists of tests and functions that perform a response when events match. Offense...
Open the catalog to page 4JSA Series Secure Analytics Data Sheet Risk Management Juniper Secure Analytics Risk Manager is an integral component of a complete security intelligence solution, helping security professionals detect and mitigate advanced threats. The ability to proactively quantify risk from vulnerabilities, configuration errors, anomalous network activity, and other outside threats can help organizations prevent exploits that target high-value assets and data. Table 5. Risk Management Features and Benefits Features Feature Description Benefits Risk Manager Topology Viewer Enables users to see...
Open the catalog to page 5JSA Series Secure Analytics Data Sheet Dimensions and Power Dimensions (W x H x D) Weight Rack mountable AC power supply 17.2 x 1.7 x 23.5 in (43.7 x 4.3 x 56.7 cm) 28 lb (12.7 kg) 1U (rails and screws included) Standard: 650W high-efficiency AC-DC Redundant power: Support hot-swap AC Input: - 100-127 V, 78 Amp; - 200-240 V, 3.8 Amp, 60/50 Hz 17.2 x 3.5 x 24.8 in (43.7 x 8.9 x 63 cm) 42 lb (19 kg) 2U (rails and screws included) Standard: 920W high-efficiency (94%+) AC-DC redundant power; support hot-swap AC Input: - 100-240 V, 50-60 Hz, 11-4.4 Amp Optional: 650W high-efficiency redundant DC...
Open the catalog to page 6All Juniper Networks catalogs and technical brochures
-
EX2300 ETHERNET SWITCH
12 Pages
-
QFX5200 SWITCH
13 Pages
-
QFX5210 SWITCH
9 Pages
-
EX9250 Ethernet Switch
12 Pages
-
EX9200 Ethernet Switch
15 Pages
-
EX4650 Ethernet Switch
11 Pages
-
EX4600 ETHERNET SWITCH
14 Pages
-
EX4300 LINE OF ETHERNET SWITCHES
15 Pages
-
EX3400 ETHERNET SWITCH
11 Pages
-
AP550
2 Pages
-
AP250
2 Pages
-
AP150W
2 Pages
-
AP245X
2 Pages
-
PTX1000
4 Pages
-
SRX300
6 Pages
-
SRX1500
4 Pages
-
SRX4000
5 Pages
-
ISG Series
11 Pages
-
vSRX
6 Pages
-
ACX500
7 Pages
-
LN1000 Mobile Secure Router
6 Pages
-
JSA Series Secure Analytics
12 Pages
-
EX4550 Ethernet Switch
12 Pages
-
EX4300 Ethernet Switch
12 Pages
-
WLA Series Antenna Matrix
2 Pages
-
QFX3100 QFabric Director
4 Pages
-
EX Series Ethernet Switches
20 Pages
-
QFX3500 Switch
12 Pages
-
QFX3600 Switch
12 Pages
-
QFabric System
12 Pages
-
QFX5100 Ethernet Switch
12 Pages
-
Unified Access Control
12 Pages
-
DDoS Secure
4 Pages
-
LN2600 Rugged Secure Router
6 Pages
-
1100018
6 Pages
-
1000195
6 Pages
-
1000300
4 Pages
-
backgrounder
4 Pages
-
VXA Series
4 Pages
-
SRX1400 Services Gateway
8 Pages
-
Security Services Gateways
8 Pages
-
T Series Core Routers
8 Pages
-
JCS1200 Control System
6 Pages
-
J Series Services Routers
16 Pages
-
BX7000 Multi-Access Gateway
4 Pages