Juniper offers 11 new solutions for businesses

Security Group has introduced an integrated solution for businesses including standard-based application acceleration, voice over IP, routing and security technologies designed to work with existing networks. Yes of customers.

Juniper strategy has 11 new solutions such as security service gateway security devices (SSG), integrated branch routing with full of unified threat management features (UTM) and fixed devices The line for the J series J4350 and J6350 business line . This strategy also includes a series of new deployments and integration of Avaya's communication features.

Picture 1 of Juniper offers 11 new solutions for businesses Source: sbi-secureit ' Juniper ' firewall / virtual private network technology (firewall / VPN) and Juniper's unauthorized intrusion prevention system can help customers effectively use total cost of ownership, while minimizing risk. business ro , 'said Andy Miller, vice president of the Asia-Pacific Juniper Networks business group.

Security service portal (SSG) using Screen OS 5.4 combines a virtual private firewall / network (FW / VPN) and router with a complete set of UTM security features, including: room anti-virus, anti-spyware (including Anti-Spyware, Anti-Adware, Anti-Phishing), spam (anti-spam), web filtering software (Web Filtering) to protect incoming and outgoing traffic from machine worms computer, spyware, Trojan .

J-series line routers use JUNOS modular software, providing many services (MPLS, IPv6, QoS, Mutilcasting techniques .) and security features (status firewall and IPSec VPN) without requiring Ask the costs incurred. The integration of WXC WAN optimization capabilities into J4350 and J6350 routing products will provide the ability to compress and store data, TCP and special application acceleration, reporting features and control capabilities.

Juniper Networks also plans to add security to the JUNOS operating system. UTM features are becoming increasingly necessary for enterprise branch offices to protect incoming / outgoing data streams from worms, spyware, trojans and other malware. Unified threat management (UTM) includes a set of preeminent security features, such as intrusion prevention, anti-virus (including antispyware, adware, phishing phishing software), anti-spam (spam ) and web filtering.

Xuan Kim