- Consistent Intent-driven Policy: Streamlines policy creation by enabling administrators to define intent using simple terms that allow smart microsegmentation across diverse cloud environments including OpenStack, Kubernetes, bare metal servers, public clouds and more.
- Multiple Enforcement Points: Leverages distributed security and networking policies to orchestrate defense and protect applications from threats. For more comprehensive defense, Contrail Security integrates with next-generation virtual firewalls to enable advanced security services and ensure businesses are protected.
- Application Traffic Visibility and Advanced Analytics:Delivers visualization, analytics and orchestration across hybrid cloud environments while reducing risk from unauthorized traffic with application-to-application flow discovery. Provides deep insight into application interactions, leveraging machine learning to detect anomalies and take corrective actions.
Wednesday, August 30, 2017
Juniper Networks Introduces Contrail Security to Help Enterprises Protect Applications in Any Cloud
, an industry leader in automated, scalable and secure networks, today announced Juniper® Contrail Security, a new security and micro segmentation solution specifically designed to allow enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.
Organizations are building and deploying cloud-native applications across public and private clouds to realize the benefits of scale, flexibility and agility. As these applications scale, their components are distributed across multiple heterogeneous clouds, which can also inadvertently distribute vulnerabilities and increase the risk of a business-impacting security breach. To further complicate matters, the perimeter of cloud environments is blurred, rendering perimeter-based policies ineffective in preventing the lateral spread of threats and creating the need for agile enforcement points that require up-to-date policies. Security administrators are also burdened with having to manually create and manage myriad security policies across multiple environments and do not have clear visibility into how applications interact with each other. These conditions can lead to applications running in opaque environments with ineffective security and limited scalability.
Contrail Security enables an innovative response to the heightened risk brought about by today’s cloud workloads and applications. Practitioners will have visibility and control with simplified operations driven by consistent, intent-driven security policies that seamlessly interoperate with existing security controls and virtual environments. With Contrail Security, Juniper Networks is transforming the way enterprises and SaaS cloud providers protect, manage and monitor their cloud-native applications in heterogeneous environments. Contrail Security combined with the automated threat detection and enforcement of Juniper’s Software Defined Secure Networks platform will further fuel the expansion of a truly unified cybersecurity platform, able to adaptively respond to any threat.
Juniper Contrail Security helps enterprises diminish risk to applications running in any cloud environment by enabling automated application traffic discovery with dynamic policy enforcement to stop the spread of inside threats through:
“Contrail Security is a key step forward in our mission to transform how enterprises and SaaS cloud providers secure their cloud-native applications running in all cloud environments. By offering enhanced threat prevention, policy management, visibility and control, and by leveraging our battle-tested Contrail Networking product components, our customers will be able to better protect themselves against threats without compromising scale, performance and interoperability,” says Pratik Roychowdhury, senior director of product management, Contrail at Juniper Networks
“Juniper Networks has a strong history in both network orchestration and security. The next five years will be critical for companies that are planning to transform their network infrastructure. Security buyers deploying complex SDN-enabled networks would be wise to consider vendors with a deep expertise in network orchestration,” remarks Jeff Wilson, research director and advisor, Cybersecurity Technology at IHS Markit
“Myriad and our customers are increasingly relying on both hybrid-cloud and multi-cloud application delivery strategies. In these environments, it has been nearly impossible for security teams to keep up. Contrail Security changes that. The combination of intent-driven policy, consistency across environments, multiple enforcement points, intelligent machine learning, and intuitive templates and wizards promise to set a new bar for application security. We believe Contrail Security will prove to be THE tool for stopping the spread of lateral threats without compromising scale or performance across hybrid & multi-cloud environments,” adds Chris Grundemann, principal architect at Myriad Supply.