Policy Enforcer, a Junos Space Security Director component, is a user intent-based threat management policy modification and distribution tool. It allows updated security policies to be deployed across Juniper SRX Series firewalls, MX Series 5G Universal Routing Platforms, EX Series Ethernet Switches, QFX Series Switches, and third-party network devices. The software helps automate threat remediation and microsegmentation policies across your entire network.
With Policy Enforcer, information security is controlled and managed by security software. New devices are automatically covered by security policies instead of identifying their IP address as with other solutions. These software-defined environments can be moved without affecting security policies and controls already in place.
Armed with advanced threat intelligence collected by Juniper Advanced Threat Prevention (ATP) Cloud and the Juniper ATP Appliance, Policy Enforcer dynamically adapts to new threats, automatically updates policies across the network and takes action to stop lateral threat propagation. With an extensible framework, Policy Enforcer enables third-party vendors to integrate their products with the software for advanced security capabilities such as threat remediation.
- Infected host tracking and blocking
- Custom threat feeds
- Metadata-based dynamic access control policies
- Threat mitigation for private and public cloud deployments
- DDoS mitigation
Features + Benefits
Policy Definition and Enforcement
Define and enforce consistent security policies across both on-premises and cloud deployments.
Automate security policies across the network, including firewalls, routers, and switches, for accurate enforcement, consistent security, and compliance.
New Threat Detection
Detect new threats and deploy new enforcement policies automatically to network firewalls and switches.
Scalable Security Policy
Extend a security policy across tens of thousands of SRX Series firewalls and site locations, while granularly managing several logical system instances for each individual SRX Series device.
Logging and Reporting
Get detailed reporting with logging capabilities through integration with the Juniper Log Director application.
Training and Community
Banca di San Marino Safeguards Financial Assets with Unified Cybersecurity
Perimeter security alone is no longer enough to keep sophisticated cybercriminals at bay. To comply with new banking and data privacy regulations while maintaining the security of more than €200 million in total assets, Banca di San Marino turned to unified, adaptive cybersecurity.
Centralized orchestration that automates policy across your network and security stack, including Juniper and third-party products, to distribute enforcement and better secure your network.
Centralized security management, analytics, and unified policy orchestration delivered to users, devices, and applications wherever they go, on-premises, in the cloud, and around the world.
Discover 283% ROI with Juniper Connected Security
Live Events and On-Demand Demos
Find Policy Enforcer in these solutions
Juniper security products and solutions offers threat detection, enforcement, and remediation through a comprehensive portfolio. Our next-generation firewalls, advanced threat prevention, threat intelligence, security orchestration, management, and analytics to extend security across every point of connection across the network.
Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.
Public Cloud Security
Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.
Zero Trust Data Center Security
Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.
Secure Access Service Edge (SASE)
Secure Access Service Edge (SASE) architecture brings together networking and security, providing direct, secure access to applications as they move to the cloud.
Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Jeremy D'Hoinne, Nat Smith, Adam Hils, 02 November, 2021.
Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.