Firewall

Web Firewall

Remote Work and Secure Connection

DDoS Security

Security Information and Event Management

Privileged Access Management (PAM)

Juniper Policy Enforcer

Rayan Nik Tajhiz Company

Policy Enforcer is a component of Junos Space Security Director that integrates with ATP to provide you with a central threat management system and monitoring of network protection programs and the ability to integrate threat intelligence into other solutions. Based on this intelligence, you can deal with risks from a control center.

 

 

This feature can also automatically distribute defined security rules across the network and quarantine infected endpoints to prevent the risk of spreading to firewalls and switches. Sky ATP protects you against border risks and intra-network risks. For example, if a user downloads a file from the Internet and that file passes through the SRX series firewall with no problems, it can be sent to the Sky ATP cloud service to check the possibility of the file being infected with malware. If the file is found to be infected, the Policy Enforcer, MAC Address, and IP of the person who has downloaded the file will be identified. Based on the desired rules, the user can be quarantined in a VLAN, or his access to the Internet can be cut off.

 

 

 

If the file is infected, the Policy Enforcer, MAC Address, and IP of the person who downloaded the file will be identified. Based on the desired rules, the user can be quarantined in a VLAN, or his access to the Internet can be cut off.

 

 

Technologies supported by Policy Enforcer:

• Client to Layer 2 switch to Layer 3 SRX (IRB)

• Client to Layer 2 switch to Layer 3 switch (IRB)

• Client to Layer 2/Layer 3 switch (IRB)

Access control based on rules to manage threats:

Policy Enforcers can act as a threat management system through special settings and access levels. Users without the required level of access cannot view any Policy Enforcer and Sky ATP page in the Security Director user interface.

The risk management system will include the following functions:

• Threat Management Policy                                                                                       • Dynamic Address Group                                  

•  Create Threat Management Policy                                                                         • Create Dynamic Address                                          

• Change Threat Management Policy                                                                         • Delete Dynamic Address

• Delete Threat Management Policy                                                                          • Modify Dynamic Address