Juniper Networks has presented its new products at the 2013 RSA Conference

Feb 25, 2013 21:11 GMT  ·  By

At the 2013 RSA Conference in San Francisco, Juniper Networks unveiled its latest data center security solution and the Junos Spotlight Secure, a global attack intelligence service that provides valuable information on threats, attackers and individual devices.

The new products are designed to protect enterprises against a wide range of threats, including data exfiltration and website outages.

Spotlight Secure will be integrated into Junos WebApp Secure and Juniper Networks SRX Series Services Gateways.

Spotlight Secure, is a first-of-its-kind service that allows organizations to identify and track global attackers. Unlike other similar solutions, Spotlight Secure creates a fingerprint of the attacker based on more than 200 unique attributes, not just IP addresses.

Once information on an attacker is obtained by a customer via Junos WebApp Secure, it's added to a database that’s accessible to other subscribers as well.

In addition, WebApp Secure also uses the Intrusion Deception technology, which profiles and fingerprints the attackers while misdirecting and misleading them.

The Juniper Networks SRX Series Services Gateways, which is integrated into WebApp Secure, allows enterprises to protect their information networks against botnets and large scale cyberattacks.

Finally, Junos DDOS Secure delivers an automated DDOS protection system for websites and web applications. DDOS Secure can be deployed as a hardware appliance or as a virtual machine in cloud environments.

“Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks. This is only possible if you are able to collect definitive information about attackers,” said Nawaf Bitar, senior vice president and general manager, security business unit, Juniper Networks.

“Junos Spotlight Secure provides the platform to deliver advanced intelligence with device-level attacker tracking. This integrated approach improves security intelligence, provides collective defense against attackers and delivers true defense in-depth for the data center.”