See how the automated and provisioned slice reacts to a threat that targets a secure network slice.
• Juniper’s cSRX detects network-based attacks as well as vSRX.
• Juniper Secure Analytics (JSA) receives security logs from cSRX and vSRX.
• JSA receives security logs from cSRX and vSRX
• JSA analyzes/processes the alert and correlates with associated data and raises an offense for action through Juniper Secure Analytics XDR (JSA XDR)
• CP4S/JSA XDR provides an automated action with auto-healing capabilities and IP blocking through the Juniper firewall through Security Director
You’ll Learn:
• Integration of security features per catalog
• Automated threat response and remediation
• Observability and Security Analytics
Learn more: https://www.juniper.net/us/en/partners/strategic-alliances/ibm-partnership.html
• Juniper’s cSRX detects network-based attacks as well as vSRX.
• Juniper Secure Analytics (JSA) receives security logs from cSRX and vSRX.
• JSA receives security logs from cSRX and vSRX
• JSA analyzes/processes the alert and correlates with associated data and raises an offense for action through Juniper Secure Analytics XDR (JSA XDR)
• CP4S/JSA XDR provides an automated action with auto-healing capabilities and IP blocking through the Juniper firewall through Security Director
You’ll Learn:
• Integration of security features per catalog
• Automated threat response and remediation
• Observability and Security Analytics
Learn more: https://www.juniper.net/us/en/partners/strategic-alliances/ibm-partnership.html
- Category
- Juniper Networks
- Tags
- Secure Network Slice, Threat Mitigation, Threat Feed Automation
Be the first to comment