News

Encrypted Traffic Analysis for Juniper Advanced Threat Prevention and SecIntel for Mist Wireless

A Threat-Aware Network by securing more traffic, in more areas of the network

Juniper delivers on the benefits of a Threat-Aware Network by securing more traffic, in more areas of the network

Juniper Networks announced on February 24th encrypted traffic analysis for Juniper Advanced Threat Prevention (ATP) Cloud and SRX Series firewalls. Juniper also announced the integration of SecIntel to the Mist Wireless platform for wireless access. Encrypted traffic analysis provides a layered security approach that helps organizations reduce and manage risk. With these additions to the Juniper Connected Security solution portfolio, Juniper delivers a complete offering to secure all traffic within an organization, whether encrypted or unencrypted, throughout all parts of the network, whether access, campus, WAN or data center.

Juniper Encrypted Traffic Analysis

Encrypted traffic analysis is the latest feature to Juniper ATP Cloud and SRX Series firewalls, capable of detecting malicious botnet traffic that is “going dark” via encryption. It permits organizations greater visibility and policy control over encrypted traffic, without requiring resource-intensive SSL Decryption. For customers running Juniper SRX firewalls, it also does not require additional hardware or network changes to set up and manage.

Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As decryption is fast becoming a technical challenge with the adoption of Transport Layer Security 1.3, traditional information security tools cannot readily identify threats hiding in encrypted traffic. To effectively detect threats — such as botnets — hiding within encrypted traffic, Juniper’s encrypted traffic analysis allows for meaningful inspection by detecting traffic patterns. In addition, in combination with technologies like SecIntel, encrypted traffic analysis provides a layered security approach that helps organizations reduce and manage risk.

Expansion of SecIntel to Mist Wireless

SecIntel for Mist represents a major step toward complete integration of wireless access into the Juniper Connected Security strategy. Mist customers can now get threat alerts detected by Juniper SRX Series Firewalls and ATP Cloud, allowing administrators to quickly assess security risks when users and devices connect to wireless networks and take appropriate action via the Mist cloud or APIs, such as quarantining or enforcing policies.

This adds another layer of security to the robust mechanisms already in place within the Mist WLAN platform and builds upon Juniper’s vision of a Threat-Aware Network that leverages AI in IT for tighter security, lower operational costs and optimized user experiences.

Network monitoring to detect malicious encrypted communication

Juniper Networks is one of only a few vendors offering encrypted traffic analysis today and is differentiated because it offers network monitoring to detect malicious encrypted communication without having to decrypt the traffic. This approach provides a more efficient way for organizations to identify threats hiding in encrypted traffic tools and adds an additional layer of protection beyond traditional information security solutions.

With these updates, Juniper Connected Security continues to equip organizations with the tools to guard against the latest advanced cyber-security threats, automate information security tasks and combine multiple defenses in order to achieve a whole that is more powerful than the sum of its individual parts.

Your dedicated Juniper Networks Elite partner experts

Infradata is an award-winning Juniper Elite Partner with advanced security and enterprise routing specialties, and the distinction of multiple certified engineers on staff. Our engineers are recognized by Juniper as technical experts and advocates of Juniper solutions. That means you can count on Infradata for the technical know-how and hands-on experience to accurately assess your networking requirements, and design, implement, and manage a Juniper-based solution to suit your needs.

February 27 2020

Share this page:

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here.