index > products > JSA3800 Security Management Appliance Juniper Networks

JSA3800 Security Management Appliance Juniper Networks

security team for response effectively by real-time network threat in order to prevent the company by the invasion of this important requirement is very understanding.Due to continuous from different angles of attack, they will resist change.Cybercriminals ongoing advanced persistent threats often quietly damage enterprise defense system, hunting for valuable data, and can be detected in before it disappeared.In addition, the internal personnel direct access to the company data will also pose a threat, once they leak these data, the peripheral security is useless.

to do this, you need an end-to-end threat management, will every day, millions of security incidents happened easily comes down to a practical manageable suspicious against the list.Long time of the capability of detection and tracking of malicious activities help to find usually missing threat in other ways.Increasingly distribution is changed as the IT infrastructure and increasingly vulnerable, security information and event management (SIEM) technique for real-time alarm, analysis and review more and more important.

extensible security management

juniper networks JSA3800 safety analysis device can help security analyst real-time understand the changes in IT infrastructure and prevent the damage caused by malicious activity.

jsa3800 can integrate distribution on you the whole network from the thousands of network devices, endpoints, and the application in the collection of thousands of security incidents.Through data analysis, the equipment will be the information extraction as can help detect anomalies, found that high threat and to distinguish the security incident priority list feasible attacks.

jsa3800 provide extensible network security management.It can handle up to 5000 events per second (eps) and flow of up to 100000 per minute, is ideal for small and medium-sized enterprises.

features

end-to-end visibility and test can detect whether the endpoints hosts

visited the show is about to launch attacks signs of potential malicious sites.

found

incident response and evidence collection, monitoring, tracking and extracting security incidents, to prevent network attacks.

regulatory compliance

provides to the collection, correlation and compliance related activities, in order to meet the stringent regulations.

the dashboard report

provides event data graphics and dashboard.

flow test with the aid of traffic detection,

May take active measures against security threats.

strong analysis engine

analysis engines were used to detect irregularities and anomalies.

integrated

provides built-in support for GeoIP and reputation.

high capacity to support as many as 5000 eps

each event handler.

CATEGORIES

switch

INQUIRY

CCIT offers around the clock, seven days availability to serve you,Call us and leave message.

Get Pricing/Info
Online customer service
Online customer service system