Info Image

Juniper Networks Intros Contrail Security for Multi-Cloud Environments

Juniper Networks Intros Contrail Security for Multi-Cloud Environments Image Credit: Juniper Networks

Juniper Networks, Tuesday announced Juniper Contrail Security as an enhanced threat prevention, policy management, visibility and control offering for enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.

Juniper Networks said the new Contrail Security enables an innovative response to the heightened risk brought about by today's cloud workloads and applications. It helps enterprises diminish risk to applications running in any cloud environment by enabling automated application traffic discovery with dynamic policy enforcement to stop the spread of inside threats through:

Consistent Intent-driven Policy: Streamlines policy creation by enabling administrators to define intent using simple terms that allow smart microsegmentation across diverse cloud environments including OpenStack, Kubernetes, bare metal servers, public clouds and more.

Multiple Enforcement Points: Leverages distributed security and networking policies to orchestrate defense and protect applications from threats.

For more comprehensive defense, Contrail Security integrates with next-generation virtual firewalls to enable advanced security services and ensure businesses are protected.

Application Traffic Visibility and Advanced Analytics: Delivers visualization, analytics and orchestration across hybrid cloud environments while reducing risk from unauthorized traffic with application-to-application flow discovery. Provides deep insight into application interactions, leveraging machine learning to detect anomalies and take corrective actions.

Pratik Roychowdhury, Senior Director of Product Management Contrial, Juniper Networks
Contrail Security is a key step forward in our mission to transform how enterprises and SaaS cloud providers secure their cloud-native applications running in all cloud environments.

Jeff Wilson, Research Director and Advisor, Cybersecurity Technology, IHS Markit
Security buyers deploying complex SDN-enabled networks would be wise to consider vendors with a deep expertise in network orchestration.

Author

Ray is a news editor at The Fast Mode, bringing with him more than 10 years of experience in the wireless industry.

For tips and feedback, email Ray at ray.sharma(at)thefastmode.com, or reach him on LinkedIn @raysharma10, Facebook @1RaySharma

PREVIOUS POST

Nokia to Focus on Network Slicing to Develop 5G Use Cases Under EU's MoNArch Project

NEXT POST

Turkcell Rolls Out NB-IoT Network Across Turkey