Juniper Advanced Threat Prevention
Juniper Advanced Threat Prevention (ATP) is the threat intelligence hub for the network, with a litany of built-in advanced threat services that use the power of AI to detect attacks and optimize enforcement. Juniper ATP finds and blocks commodity and zero-day cyberthreats within files, IP traffic, and DNS requests. The service assesses risk from encrypted and decrypted network traffic and connecting devices, including IoT, and distributes that intelligence throughout the network to stop attacks and drastically decrease the attack surface before a breach occurs.
- Automatically discover and mitigate known and unknown threats
- Encrypted Traffic Insights: Detect and stop threats hiding within encrypted traffic without decrypting
- Adaptive Threat Profiling: Detect targeted attacks on your network, including high-risk users and devices, and automatically mobilize your defenses
- SecIntel: Curate and distribute threat feeds verified by Juniper Threat Labs across the network to routers, switches, access points, and firewalls for orchestrated action
Features + Benefits
Use verified threat intelligence feeds to detect and block verified threats, compromised devices, and malicious connections in real time.
Block or segment malicious outbreaks on the network using an SRX Series firewall, MX Series router, or an EX Series or QFX Series switch. Integrates with existing network access control (NAC) solutions and third-party firewalls, switches, and wireless technology.
Encrypted Traffic Insights
Analyzes encrypted traffic to detect threats without decrypting, which means privacy and security are no longer at odds.
Adaptive Threat Profiling
Uses your existing infrastructure to create security intelligence feeds based on real-time events happening on your network. You have the flexibility to take action against emerging threats as they are detected.
AI-Driven Risk Profiling
Assess the risk of user and IoT devices connecting to Mist AI-managed wired and wireless solutions based on endpoint information and behavior. Pinpoint and mitigate potential compromise with geospatial location and one-touch mitigation.
Provides a real-time window into security events that security operations staff can use to quickly correlate activity and remediate issues.
Detect and stop zero-day and commodity malware within web, email, data center, and application traffic targeted for Windows, Mac, and IoT devices.
Runs as a cloud-enabled service on an SRX Series firewall. or as a hardware appliance deployed locally. MX Series routers support SecIntel threat intelligence feeds to identify and block malicious traffic at line rate.
Training and Community
America’s Test Kitchen Cooks Up a Radically Simpler Data Center Network
Fueled by consumers’ rising interest in at-home cooking, America’s Test Kitchen has a fast-growing media business, which includes popular television shows, magazines, websites, books, and an online cooking school. To support growth and expansion at scale, America’s Test Kitchen built a brand-new IT infrastructure.
Advanced Threat Prevention
The threat intelligence hub for your network, available as a cloud service or on-premises appliance. Protect against known and unknown threats, assess and verify device and IoT risk, and analyze encrypted traffic.
Threat intelligence feeds verified by Juniper Threat Labs provide real-time, continuous updates to identify and block attack traffic at line-rate speeds.
Next-Generation Firewall Services
Reduce risk of attack and safeguard users, applications, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.
Discover 283% ROI with Juniper Connected Security
Live Events and On-Demand Demos
Find Juniper Advanced Threat Prevention in these solutions
Juniper Connected Security safeguards users, applications, and infrastructure by extending security to every point of connection, from client to cloud, across the entire network.
Threat Detection and Mitigation
Juniper security applications provide actionable threat intelligence with the context needed to effectively stop advanced threats, providing a seamless and secure experience for end users.
Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.
Enrich user experiences across the WAN with AI-driven insight, automation, action, and native security.
Public Cloud Security
Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.
Zero Trust Data Center Security
Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.
Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Adam Hils, Thomas Lintemuth, 19, December, 2022.
Gartner Critical Capabilities for Network Firewalls, by Rajpreet Kaur, Adam Hils, 17 January 2022.
Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
Gartner®, Magic Quadrant and Peer Insights™ are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.