index > products > JSA7500 Enterprise and Carrier Grade Security Management Appliance

JSA7500 Enterprise and Carrier Grade Security Management Appliance

organization continues to suffer from various angles of attack, security team must keep up with the situation.Cybercriminals ongoing advanced persistent threats often quietly damage enterprise defense system, hunting for valuable data, and can be detected in before it disappeared.In addition, the internal personnel direct access to the company data will also pose a threat, once they leak these data, the peripheral security is useless.

you need end-to-end threat management, every day, millions of security incidents happened easily reduced to a list of feasible managed suspicious attacks.Long time of the capability of detection and tracking of malicious activities help to find usually missing threat in other ways.Increasingly distribution is changed as the IT infrastructure and increasingly vulnerable, security information and event management (SIEM) technique for real-time alarm, analysis and review more and more important.

worldwide in

against cyber-crime juniper networks JSA7500 safety analysis equipment is necessary weapon against cyber crime on a global scale.JSA7500 is level operators and equipment, can be collected, and associated events and flow, for the big global deployment group provides extensible SIEM solution.It can integrate the distribution in your whole, endpoint thousands of network devices on the network and the application in the collection of thousands of security incidents.Through data analysis, the equipment will be the information extraction as can help detect anomalies, found that high threat and to distinguish the security incident priority list feasible attacks.

jsa7500 can handle up to 35000 events per second (eps) and as many as 1.2 million per minute flow, make the security analyst can understand its global distributed real-time changes in IT infrastructure and help intercept malicious activity in case of damage.

features

end-to-end visibility and test can detect whether the endpoints hosts

visited the show is about to launch attacks signs of potential malicious sites.

incident response and forensics

effective detection, monitoring, tracking and extracting security incidents, to prevent network attacks.

regulatory compliance

provides to the collection, correlation and compliance related activities, in order to meet the stringent regulations.

the dashboard report

provides event data graphics and dashboard.

flow test with the aid of traffic detection,

May take active measures against security threats.

strong analysis engine

analysis engines were used to detect irregularities and anomalies.

high capacity to support as many as 35000 eps

each event handler.

event handler support

each console support as many as 250 event handler.

CATEGORIES

switch

INQUIRY

CCIT offers around the clock, seven days availability to serve you,Call us and leave message.

Get Pricing/Info
Online customer service
Online customer service system