Juniper Networks

Advanced Threat Prevention Appliance

Comprehensive threat and malware detection, consolidated security analytics, and quick threat mitigation.

The Advanced Threat Prevention Appliance provides comprehensive on-premises protection against a sophisticated, ever-changing threat landscape.

With traditional signature-based security tools, zero-day attacks often go undetected. The Juniper JATP Appliance uses advanced machine learning and behavioral analysis technologies to identify existing and unknown advanced threats in near real time. It does this through continuous, multistage detection and analysis of Web, email, and lateral spread traffic moving through the network.

Juniper Networds Threat Prevention Appliance

The JATP Appliance ingests threat data from multiple security devices, applies analytics to identify advanced malicious traits, and aggregates the events into a single comprehensive timeline view of all the threats on the network. Your security team can quickly see how the attack unfolded and easily prioritize critical alerts.

Integrated SRX Series firewalls inspect traffic, submit suspicious files to the threat behavior engine, and update the JATP Appliance with threat status, accelerating time to detection and initiating inline blocking.

With its open API architecture, the JATP Appliance integrates with third-party security devices for seamless, automatic threat mitigation. You can quarantine emails on Google and Office 365 using REST APIs. Malicious IP addresses are pushed to firewalls to block the communication between command-and-control (C&C) servers and infected endpoints. Infected hosts are isolated through integration with network access control devices.

The Advanced Threat Prevention Appliance is available in physical and virtual form factors. You can deploy physical appliances in all-in-one or distributed mode, and virtual appliances in distributed mode only.

Your dedicated Juniper Networks security experts

Infradata is an award-winning Juniper Elite Partner with advanced security and enterprise routing specialties, and the distinction of multiple certified engineers on staff. Our engineers are recognized by Juniper as technical experts and advocates of Juniper solutions. That means you can count on Infradata for the technical know-how and hands-on experience to accurately assess your networking requirements, and design, implement, and manage a Juniper-based solution to suit your needs.


Talk with an Expert

Speak with a solutions expert or architect. Give us a call or leave a message. Our team is ready for your business.

Infradata is an award-winning Juniper Networks Partner and reseller. Our seasoned engineers deliver premium support and can execute projects on any scale.


Multivector Traffic Inspection

Inspects traffic across multiple vectors including Web, email, and lateral spread.

Multiple File Type Analytics

Analyzes multiple file types, including executables, DLL, Mach-o, Dmg, PDF, Office, Flash, ISO, ELF, RTF, APK, Silverlight, Archive, and JAR.

Effective Detection Techniques

Employs advanced threat detection techniques, including exploit detection, payload analysis, C&C detection, YARA, and SNORT rules.

Endpoint Integration

Integrates with Carbon Black Protect and Response (endpoint solution) to allow upload of binaries executed on endpoints.

Extensive Data Correlation

Correlates events across kill chain stages to monitor threat progress and risk; visualizes malware activity and groups malware traits to help incident response teams better understand malware behavior.

Contextual Threat Prioritization

Prioritizes threats based on risk calculated from threat severity, threat progress, asset value, and other contextual data.

Host Behavior Timeline

Provides timeline host view to obtain complete context about malware events that have occurred on the host.

Automated Threat Mitigation on Email, Web, and Lateral Traffic

Quarantines malicious Office 365 and Google emails automatically; integrates with Bluecoat, Checkpoint, Cisco, Fortinet, and Palo Alto Networks solutions to automatically block malicious IP addresses and URLs.

Ready to talk?

Get in touch with us today.

Give us a call or leave a message. Our team is ready for your business.

Leave message Call now Request Quote

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Find out more here.