Updates to the Juniper Advanced Threat Prevention portfolio leverages third-party firewalls and security data sources to offer enterprises a fast, flexible and automated defense against malicious activity
 
Juniper Networks, an industry leader in automated, scalable and secure networks, today announced new offerings as part of its Juniper Networks® Advanced Threat Prevention (JATP) Appliances, enabling enterprises to detect malware, understand behaviour and mitigate threats with just one touch. This solution leverages data from any third-party firewall or security data source, avoiding unnecessary vendor lock-in. Eliminating complex, time-consuming data collection configurations, Juniper is helping security teams improve their organisation’s security posture by simplifying and accelerating security operations.
 
Sixty-four percent of security teams surveyed said that speeding up threat analysis and prioritising threats with automation would improve their security posture, according to a Juniper Networks and Ponemon Institute study. High volumes of incident data generated by numerous, disparate sources make threat detection and mitigation increasingly difficult. To uncover critical threat behaviour, already-understaffed security teams spend significant time analysing and correlating alerts, ultimately increasing time to remediation. Security teams also face the manual tasks of creating one-off custom integrations to ingest relevant data from these sources.
 
To address these challenges, Juniper Networks today revealed new capabilities that build upon the open architecture of its unified cybersecurity platform. Now security teams can easily create custom data collectors right in the JATP Appliances platform, enabling the ingestion of threat data from any Juniper or third-party firewall. Leveraging an intuitive user interface without the need for custom code or pre-defined integrations, Juniper is simplifying operations in multi-vendor environments. This new capability introduces easy-to-use customisation controls for security analysts to collect, parse and pinpoint specific data without relying on outsourced customisations. It also automatically integrates with the single, comprehensive timeline view offered by the JATP Appliances, streamlining investigation and remediation by bringing the

View Entire Article on ComparetheCloud.com