VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
Bolstered Intrusion Prevention and Security Management
Juniper Networks, Inc.
announced its next-generation Intrusion Detection and Prevention (IDP) platform and new security management software designed to provide increased application visibility and control across the network. The new IDP version 4.0 software provides advanced control over enterprise applications including voice-over-Internet-protocol (VoIP), internal local area network (LAN) and cellular communications, while Juniper Networks' new NetScreen Security Manager (NSM) 2006.1 software provides easy-to-use, centralized management of the enterprise security infrastructure, including IDP systems.
Application use often varies from one enterprise to the next and is often accompanied by a myriad of servers and software versions running on the network at any given time. While many applications are justified for business use, others may exist that are unknown to the security administrator. Additionally, the security state of approved applications may also be unknown, creating open doors for threats to enter the network. With Juniper Networks' new IDP 4.0 solution and NSM management platform, organizations can discover the risks created by known and unknown applications on the network with pinpoint accuracy. Once identified, administrators can leverage the power of the IDP solution to apply granular control over the application, including peer-to-peer (P2P), instant messaging (IM) and many other Internet-based applications.
"Visibility and control over all types of network traffic and emerging applications such as VoIP is vital to delivering a quality managed security service," said Patrick Foxhoven, CIO for CentraComm Communications, a leading managed security service provider (MSSP). "The new Juniper Networks intrusion prevention system and new NSM software give us a competitive edge in delivering high-quality threat prevention and application control to our customers. Enhanced protocol support on the IDP allows us to secure voice communications, while new Security Explorer technology helps us quickly understand and control potential threats to an organization."
Graphical Visibility of Applications and Endpoints
The integration of new IDP and NSM software provides administrators with new levels of visibility into the state of the network. New Security Explorer technology in NSM 2006.1 provides user-friendly graphical views of host, application, server and user activity on the network. The graphical views offer detailed insight into the types and versions of applications running, as well as who is running the applications, what the applications are doing, and the type of attacks coming to or from a particular server, device, user or IP address. Network and application visibility is also augmented by the NSM Security Profiler technology, which provides administrators with critical information captured from network traffic. This includes information on operating system versions, browsers, and the type of communications happening among endpoints. The network-wide correlated information allows security administrators to make focused, incremental security policy adjustments on the IDP platforms in real-time as needed.
"As Internet-based application use increases across the enterprise, the need for application visibility and security management scalability becomes essential to enabling accurate, comprehensive security," said Charles Kolodgy, research director of security products for leading analyst firm IDC. "Juniper Networks new intrusion prevention system gives customers the granular threat awareness and protection needed to thwart threats throughout the network -- essentially IDP for everywhere in the network."
Comprehensive Application Control
The Juniper Networks IDP system leverages the increased visibility provided by the IDP and NSM software to provide focused application protection and control. The new IDP system has been expanded to include application control of VoIP networks through the decoding of the H.225 VoIP control protocol, which enables enterprises to securely use H.323-based VoIP solutions. Control of this protocol is important as VoIP use transcends beyond traditional voice transmissions to include video, data and other multi-media mediums. Additionally, Juniper Networks has expanded application control to include inspection of GTP traffic for threats, which are very prevalent in cellular wireless networks. This allows customers to securely leverage the unmatched reach of cellular networks. Juniper Networks has also enhanced the platform with a unique anomaly engine to protect against potential database threats.
New application marking capabilities in the IDP system allow enterprises and managed security service providers to more efficiently manage the network by prioritizing traffic based on specific business practices. This might include allowing employees to use peer-to-peer applications, but at a lower priority compared to enterprise-approved applications. This level of granular control enables administrators to provide maximum bandwidth allocation for business-critical applications.
"Detailed insight into applications running on the network is essential to understanding the security risk within a company, and is required for accurate and precise threat prevention. It also helps ensure the appropriate application use policies are implemented and enforced on the network," said Hitesh Sheth, vice president of security products for Juniper Networks. "With the combined power of Juniper Networks' new IDP and NSM software, customers can obtain a detailed assessment of what is occurring on their network and can take the necessary action to control it. The result is a better security posture, and reduced cost for the enterprise. For managed security service providers, it means a more targeted and cost-effective service."
The Juniper Networks IDP products provide zero day protection against worms, trojans, spyware, keyloggers and other malware. Juniper Networks is the first vendor to offer daily signature updates for IDP customers, critical in maintaining effective threat coverage and attack response. All of the Juniper Networks IDP platforms are supported by the efforts of Juniper Networks' J-Security Center, which is comprised of a dedicated team of researchers who operate in geographically distributed locations around the clock to monitor new threats and deliver comprehensive protection. With backgrounds in network security, defense and penetration testing, J-Security Center researchers lend their expertise in protocol analysis, engineering, vulnerability research and signature development to our intrusion prevention platforms. Customers also benefit from trusted partnerships with technology vendors, managed security service providers and independent security research firms that help Juniper Networks quickly deliver the most up-to-date protection against existing and emerging threats. The Juniper Networks J-Security Center and can be accessed at http://security.juniper.net.
Availability and Pricing
The Juniper Networks IDP 4.0 and NSM 2006.1 software are both available today for immediate download for existing IDP appliance and NSM customers. The IDP appliances with version 4.0 software are priced and sized to fit any organization, and list pricing for the IDP appliances starts at $9,000 for the IDP 50. Software upgrades are available for customers with active support contracts. A 5-device license of NSM 2006.1 is included with every IDP appliance purchase and upgrade licenses are also available for purchase. For more information and product details, please visit http://juniper.net/products/intrusion and
http://www.juniper.net/products/intrusion/ns_sm.html
.
Posted on Jun 13, 2006
Reviews
|
Share
|
Digg
Filed in:
Security
|
VoIP Software
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
SolarWinds Introduces Free VoIP Management Tool - VoIP Call Detail Record Tracker
•
SolarWinds Strengthens VoIP Performance Monitoring and Proactive WAN Performance Analysis
•
netTALK Announces Free Advanced Privacy Features Added to its DUO VoIP Devices
•
Ingate Debuts Full Lineup of Software SIParator and Firewall E-SBCs
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)