SUNNYVALE, CA–(Marketwired – August 29, 2017) – Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, today announced Juniper® Contrail Security, a new security and microsegmentation solution specifically designed to allow enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.
Organizations are building and deploying cloud-native applications across public and private clouds to realize the benefits of scale, flexibility and agility. As these applications scale, their components are distributed across multiple heterogeneous clouds, which can also inadvertently distribute vulnerabilities and increase the risk of a business-impacting security breach. To further complicate matters, the perimeter of cloud environments is blurred, rendering perimeter-based policies ineffective in preventing the lateral spread of threats and creating the need for agile enforcement points that require up-to-date policies. Security administrators are also burdened with having to manually create and manage myriad security policies across multiple environments and do not have clear visibility into how applications interact with each other. These conditions can lead to applications running in opaque environments with ineffective security and limited scalability.
Contrail Security enables an innovative response to the heightened risk brought about by today’s cloud workloads and applications. Practitioners will have visibility and control with simplified operations driven by consistent, intent-driven security policies that seamlessly interoperate with existing security controls and virtual environments. With Contrail Security, Juniper Networks is transforming the way enterprises and SaaS cloud providers protect, manage and monitor their cloud-native applications in heterogeneous environments. Contrail Security combined with the automated threat detection and enforcement of Juniper’s Software-Defined Secure Networks platform will further fuel the expansion of a truly unified cybersecurity platform, able to adaptively respond to any threat.
Juniper Contrail Security helps enterprises diminish risk to applications running in any cloud environment by enabling automated application traffic discovery with dynamic policy enforcement to stop the spread of inside threats through:
Consistent Intent-driven Policy: Streamlines policy creation by enabling administrators to define intent using simple terms that allow smart microsegmentation across diverse cloud environments including OpenStack, Kubernetes, bare metal servers, public clouds and more.
Multiple Enforcement Points: Leverages distributed security and networking policies to orchestrate defense and protect applications from threats. For more comprehensive defense, Contrail Security integrates with next-generation virtual firewalls to enable advanced security services and ensure businesses are protected.
Application Traffic Visibility and Advanced Analytics: Delivers visualization, analytics and orchestration across hybrid cloud environments while reducing risk from unauthorized traffic with application-to-application flow discovery. Provides deep insight into application interactions, leveraging machine learning to detect anomalies and take corrective actions.
“Contrail Security is a key step forward in our mission to transform how enterprises and SaaS cloud providers secure their cloud-native applications running in all cloud environments. By offering enhanced threat prevention, policy management, visibility and control, and by leveraging our battle-tested Contrail Networking product components, our customers will be able to better protect themselves against threats without compromising scale, performance and interoperability.”
— Pratik Roychowdhury, senior director of product management, Contrail at Juniper Networks
“Juniper Networks has a strong history in both network orchestration and security. The next five years will be critical for companies that are planning to transform their network infrastructure. Security buyers deploying complex SDN-enabled networks would be wise to consider vendors with a deep expertise in network orchestration.”
— Jeff Wilson, research director and advisor, Cybersecurity Technology at IHS Markit
“Myriad and our customers are increasingly relying on both hybrid-cloud and multi-cloud application delivery strategies. In these environments, it has been nearly impossible for security teams to keep up. Contrail Security changes that. The combination of intent-driven policy, consistency across environments, multiple enforcement points, intelligent machine learning and intuitive templates and wizards promise to set a new bar for application security. We believe Contrail Security will prove to be THE tool for stopping the spread of lateral threats without compromising scale or performance across hybrid and multi-cloud environments.”
— Chris Grundemann, principal architect at Myriad Supply
“Once attackers have gained a foothold in enterprise systems, they typically can move unimpeded laterally (“east/west”) to other systems. Microsegmentation is the process of implementing isolation and segmentation for security purposes within the virtual data center. Like bulkheads in a submarine, microsegmentation helps to limit the damage from a breach when it occurs. Microsegmentation has been used to describe mostly the east-west or lateral communication between servers in the same tier or zone, but it has evolved to be used now for most of communication in virtual data centers.”
— Gartner Press Release, “Gartner Identifies the Top Technologies for Security in 2017”, June 14, 2017 http://www.gartner.com/newsroom/id/3744917