The Juniper Networks® SRX5400, SRX5600, and SRX5800 are next-generation firewalls (NGFWs) that deliver outstanding protection, market-leading performance, six nines reliability and availability, scalability, and services integration. These devices are ideally suited for service provider, large enterprise, and public sector networks, including: - Cloud and hosting provider data centers
- Mobile operator environments
- Managed service providers
- Core service provider infrastructures
- Large enterprise data centers
The SRX5400, SRX5600, and SRX5800 are an integral part of the Juniper Connected Security framework, which is built to protect users, applications, and infrastructure from advanced threats. Delivering the highest level of protection against exploits, malware, and command and control (C&C) communications, these platforms feature a carrier-grade next-generation firewall and advanced security services such as application security, Content Security, intrusion prevention system (IPS), and integrated threat intelligence services. For advanced protection, the SRX Series offers integrated threat intelligence services via Juniper Networks Advanced Threat Prevention (ATP), Juniper's open threat intelligence platform in the cloud. Juniper ATP Cloud delivers actionable security intelligence to SRX Series devices to enable advanced protection against C&C-related botnets and Web application threats, as well as allowing policy enforcement based on GeoIP data-all based on Juniper-provided feeds. Customers may also leverage their own custom and third-party feeds for protection from advanced malware and other threats unique to their business environment. This advanced, customer-relevant, and consolidated threat intelligence service is delivered to the SRX Series on-premises from the cloud. The SRX5400, SRX5600, and SRX5800 are supported by Juniper Networks Security Director, which enables distributed security policy management through an intuitive, centralized interface that enables enforcement across emerging and traditional risk vectors. Using intuitive dashboards and reporting features, administrators gain insight into threats, compromised devices, risky applications, and more. |