Juniper Policy Enforcer Network management

SKU
SDSN-PE-100
Login for pricing
In Stock
Software-Defined Secure Networks Policy Enforcer, 100 devices
More Information
SKU SDSN-PE-100
Manufacturer Juniper
Availability In Stock
Attacks on corporate networks have exposed the shortcomings of traditional “perimeter only” security architectures, proving that they are insufficient for providing complete and holistic protection. There are several key reasons why perimeter only solutions are inadequate:
- A single application or endpoint breach inside the perimeter leaves the entire network vulnerable because attacks inside the perimeter cannot be blocked.
- Networks are entirely vulnerable to insider attacks. Malware-infected endpoints are best isolated at the network connectivity source to limit the possibility of lateral attack propagation.
- When an internal attack moves laterally inside an organization, visibility and intelligence from perimeter devices show no evidence of malicious activity. Without this visibility, security teams can’t effectively secure the network.

Juniper Networks® Connected Security offers a comprehensive approach that addresses these security concerns. Specifically, Juniper Connected Security delivers:
- Pervasive Security: Juniper’s Connected Security enables pervasive security across the entire network, supporting both physical and virtual switches, routers, and security devices for on-premise scenarios, leveraging SDN solutions such as Juniper Networks Contrail and VMware NSX to orchestrate networking functionality where needed, along with applications hosted in public cloud platforms such as Amazon Web Services (AWS), and Microsoft Azure. Each network element can also act as a security sensor, providing visibility into and intelligence about intra- and inter-network communications.
- Policy Orchestration: A simplified policy framework based on business- oriented items such as users, user groups, geographic locations, devices, sites, tenants, applications, and threats, this solution allows switches, routers, firewalls, and other network devices to work in concert by sharing data and resources, orchestrating remediation actions within the network.
- SecIntel: Juniper Connected Security provides the ability to aggregate threat information from multiple local (such as security information and event management), cloud-based (such as Juniper ATP Cloud), and even third party threat detection solutions.

As a component of Junos® Space Security Director, Policy Enforcer provides a more straightforward, user intent based threat management policy modification and distribution tool. It allows updated policies to be deployed on Juniper Networks EX Series Ethernet Switches and QFX Series switches, as well Juniper virtual and physical SRX Series Firewalls.
License
TypeNetwork management
Software typeLicense
Number of devices supported100
Technical details
Software typeLicense
Number of devices supported100

You may also be interested in

Compare Products
Product Juniper Policy Enforcer Network management Juniper Policy Enforcer Network manage... Login for pricing
Juniper S-QFX5K-C2-P1-3 networking software Switch / Router 1 license(s) 3 year(s) Juniper S-QFX5K-C2-P1-3 networking sof... Login for pricing
Juniper S-QFX5K-C2-P1-5 networking software Switch / Router 1 license(s) 5 year(s) Juniper S-QFX5K-C2-P1-5 networking sof... Login for pricing
Juniper S-QFX5K-C2-P1-P networking software Switch / Router 1 license(s) Juniper S-QFX5K-C2-P1-P networking sof... Login for pricing
Cisco 2.5G to 20Gbps upgrade License for ASR 1 Network management
New
Cisco 2.5G to 20Gbps upgrade License f... Login for pricing
Cisco Meraki LIC-MX105-SDW-5Y networking software Switch / Router 5 year(s) Cisco Meraki LIC-MX105-SDW-5Y networki... Login for pricing
SKU
SDSN-PE-100
S-QFX5K-C2-P1-3
S-QFX5K-C2-P1-5
S-QFX5K-C2-P1-P
FLSA1-1X-2.5-20G
LIC-MX105-SDW-5Y
Manufacturer
Juniper
Juniper
Juniper
Juniper
Cisco
Cisco
Type
Network management
Switch / Router
Switch / Router
Switch / Router
Network management
Switch / Router