vSRX Virtual Firewall
The Juniper vSRX Virtual Firewall offers the same features as physical SRX Series firewalls, including core and next-gen firewall capabilities, networking, and automated lifecycle management, all in a virtualized form factor. It delivers security services scalable to match network demand and operates at speeds up to 100 Gbps.
The vSRX supports Juniper Contrail software-defined networking (SDN) and third-party SDN solutions. It also integrates with cloud orchestration tools such as OpenStack. Junos Space Security Director with Policy Enforcer automates policy enforcement and provides centralized visibility and management of physical and virtual assets through a common interface.
Features + Benefits
Advanced Threat Prevention
Dynamic threat protection with Juniper Advanced Threat Prevention, including malware sandboxing, threat intelligence feeds, and Encrypted Traffic Insights to detect malware hidden in SSL-encrypted traffic.
Detect and mitigate threats through software-enabled next-generation firewall (NGFW) features, including intrusion prevention system (IPS), application security (AppSecure), user ID and role-based access controls, and content security (network anti-virus, anti-spam, and enhanced Web filtering).
Juniper Secure Connect
Offers dynamic, adaptive secure SSL-VPN access to corporate and cloud resources for employees working remotely.
Supports SDN and Network Functions Virtualization (NFV) through integration with Contrail and third-party SDN solutions.
Fast and Scalable
Scales up to 100 Gbps for ultra-high-performance protection across public and private clouds.
Lets you automate management and orchestration via powerful, versatile APIs in Junos OS, using tools such as REST APIs, NETCONF, Ansible, and Vagrant.
Offers simple, flexible, and scalable licensing models to match different business requirements, including Pay-As-You-Go (PAYG) and Bring-Your-Own-License (BYOL) options for public clouds.
Logging and Reporting
Get detailed reporting with logging capabilities through integration with the Juniper Log Director application.
Supports VMware ESXi, NSX, and KVM (Centos, Ubuntu) platforms, as well as orchestration with vRealize Orchestrator and OpenStack.
Day One Books
Training and Community
Banca di San Marino Safeguards Financial Assets with Unified Cybersecurity
Perimeter security alone is no longer enough to keep sophisticated cybercriminals at bay. To comply with new banking and data privacy regulations while maintaining the security of more than €200 million in total assets, Banca di San Marino turned to unified, adaptive cybersecurity.
Discover 283% ROI with Juniper Connected Security
Live Events and On-Demand Demos
Find vSRX in these solutions
Juniper Connected Security safeguards users, applications, and infrastructure by extending security to every point of connection, from client to cloud, across the entire network.
Enrich user experiences across the WAN with AI-Driven insight, automation, action, and native security.
Juniper next-generation firewalls reduce the risk of attack and provide granular control of applications, users, and devices through identity-based policies, microsegmentation, VPN connectivity, and validated threat prevention.
Public Cloud Security
Accelerate public cloud adoption securely with simple deployment, consistent security, and unified management at every level: within workloads, between applications and instances, and across environments.
Zero Trust Data Center Security
Connect applications while protecting data wherever it resides, with validated data center threat mitigation, reliability, and scalable solutions that support your data center architecture initiatives and business requirements.
Gartner Magic Quadrant for Network Firewalls, by Rajpreet Kaur, Jeremy D'Hoinne, Nat Smith, Adam Hils, 02 November, 2021.
Gartner and Magic Quadrant are registered trademarks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.