Juniper Advanced Threat Prevention

Juniper Advanced Threat Prevention (ATP) is the threat intelligence hub for the network, with a litany of built-in advanced threat services that use the power of AI to detect attacks and optimize enforcement.  Juniper ATP finds and blocks commodity and zero-day cyberthreats within files, IP traffic, and DNS requests. The service assesses risk from encrypted and decrypted network traffic and connecting devices, including IoT, and distributes that intelligence throughout the network to stop attacks and drastically decrease the attack surface before a breach occurs.

Key Features


  • Automatically discover and mitigate known and unknown threats
  • Encrypted Traffic Insights: Detect and stop threats hiding within encrypted traffic without decrypting
  • Adaptive Threat Profiling: Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses
  • SecIntel: Curate and distribute threat feeds verified by Juniper Threat Labs across the network to routers, switches, access points, and firewalls for orchestrated action

Features + Benefits

SecIntel

Use verified threat intelligence feeds to detect and block verified threats, compromised devices, and malicious connections in real time.

Threat Mitigation

Block or segment  malicious outbreaks on the network using an SRX Series firewall, MX Series router, or an EX Series or QFX Series switch. Integrates with existing network access control (NAC) solutions and  third-party firewalls, switches, and wireless technology.

Encrypted Traffic Insights

Analyzes encrypted traffic to detect threats without decrypting, which means privacy and security are no longer at odds.

Adaptive Threat Profiling

Uses your existing infrastructure to create security intelligence feeds based on real-time events happening on your network. You have the flexibility to take action against emerging threats as they are detected.

AI-Driven Risk Profiling

Assess the risk of user and IoT devices connecting to Mist AI-managed wired and wireless solutions based on endpoint information and behavior. Pinpoint and mitigate potential compromise with geospatial location and one-touch mitigation.

Analytics

Provides a real-time window into security events that security operations staff can use to quickly correlate activity and remediate issues.

Malware Sandboxing

Detect and stop zero-day and commodity malware within web, email, data center, and application traffic targeted for Windows, Mac, and IoT devices.

Flexible Deployment

Runs as a cloud-enabled service on an SRX Series firewall. or as a hardware appliance deployed locally. MX Series routers support SecIntel threat intelligence feeds to identify and block malicious traffic at line rate.

A Magic Quadrant Challenger

Gartner positions Juniper Networks as a Challenger in the 2022 Gartner® Magic Quadrant™ for Network Firewalls.

Read report

CUSTOMER SUCCESS

America’s Test Kitchen Cooks Up a Radically Simpler Data Center Network

Fueled by consumers’ rising interest in at-home cooking, America’s Test Kitchen has a fast-growing media business, which includes popular television shows, magazines, websites, books, and an online cooking school. To support growth and expansion at scale, America’s Test Kitchen built a brand-new IT infrastructure.

Related Products

Teal shield, cloud, and lightning bolt graphic representing Juniper’s Advanced Threat Prevention (ATP) that’s also cloud ready.

Advanced Threat Prevention

The threat intelligence hub for your network, available as a cloud service or on-premises appliance. Protect against known and unknown threats, assess and verify device and IoT risk, and analyze encrypted traffic.

Technical Features
  • Automatically discover and mitigate known and unknown threats
  • Encrypted Traffic Insights: Detect and stop threats hiding within encrypted traffic without decrypting
  • Adaptive Threat Profiling: Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses
  • SecIntel: Curate and distribute threat feeds verified by Juniper Threat Labs across the network to routers, switches, access points, and firewalls for orchestrated action
Currently viewing
SecIntel UI Map

SecIntel

Threat intelligence feeds verified by Juniper Threat Labs provide real-time, continuous updates to identify and block attack traffic at line-rate speeds.

Technical Features
  • Uses curated threat feeds on malicious IPs, URLs, and domains
  • Uses infected host and custom threat feeds of all known infected hosts on your network
  • Allows data from third-party sources, such as industry-specific threat mitigation and prevention input, through custom threat feeds
Two software engineers working on Juniper's Next Generation Firewall services on a laptop in an office.

Next-Generation Firewall Services

Reduce risk of attack and safeguard users, applications, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.

Technical Features
  • Identify and take action on high-risk applications
  • Protect against network-level exploits
  • Block known malware
  • Control web browsing through robust URL filtering categories, and block malicious web sites
  • Prevent unauthorized use with user-based security policies and segmentation
  • Extend security policies to remote users with Secure Edge Firewall-as-a-Service or Secure Connect VPN

Discover 283% ROI with Juniper Connected Security

Check out the recent Forrester Total Economic Impact of Juniper Connected Security Report to learn more.

Live Events and On-Demand Demos

Explore the journey to a transformed network.

Find Juniper Advanced Threat Prevention in these solutions

Connected Security

Juniper Connected Security safeguards users, applications, and infrastructure by extending security to every point of connection, from client to cloud, across the entire network.

Threat Detection and Mitigation

Juniper security applications provide actionable threat intelligence with the context needed to effectively stop advanced threats, providing a seamless and secure experience for end users.

Next-Generation Firewall

Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.

AI-Driven SD-WAN

Enrich user experiences across the WAN with AI-driven insight, automation, action, and native security.

Public Cloud Security

Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.

Zero Trust Data Center Security

Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.

Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Adam Hils, Thomas Lintemuth, 19, December, 2022.

Gartner Critical Capabilities for Network Firewalls, by Rajpreet Kaur, Adam Hils, 17 January 2022.

Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Gartner®, Magic Quadrant and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.