Juniper Networks Introduces Contrail Security to Help Enterprises Protect Applications in Any Cloud
SUNNYVALE, CA--(Marketwired - August 29, 2017) - Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, today announced Juniper® Contrail Security, a new security and microsegmentation solution specifically designed to allow enterprises and Software-as-a-Service (SaaS) cloud providers to protect applications running in multiple cloud environments.
Organizations are building and deploying cloud-native applications across public and private clouds to realize the benefits of scale, flexibility and agility. As these applications scale, their components are distributed across multiple heterogeneous clouds, which can also inadvertently distribute vulnerabilities and increase the risk of a business-impacting security breach. To further complicate matters, the perimeter of cloud environments is blurred, rendering perimeter-based policies ineffective in preventing the lateral spread of threats and creating the need for agile enforcement points that require up-to-date policies. Security administrators are also burdened with having to manually create and manage myriad security policies across multiple environments and do not have clear visibility into how applications interact with each other. These conditions can lead to applications running in opaque environments with ineffective security and limited scalability.
Contrail Security enables an innovative response to the heightened risk brought about by today's cloud workloads and applications. Practitioners will have visibility and control with simplified operations driven by consistent, intent-driven security policies that seamlessly interoperate with existing security controls and virtual environments. With Contrail Security, Juniper Networks is transforming the way enterprises and SaaS cloud providers protect, manage and monitor their cloud-native applications in heterogeneous environments. Contrail Security combined with the automated threat detection and enforcement of Juniper's Software-Defined Secure Networks platform will further fuel the expansion of a truly unified cybersecurity platform, able to adaptively respond to any threat.
Juniper Contrail Security helps enterprises diminish risk to applications running in any cloud environment by enabling automated application traffic discovery with dynamic policy enforcement to stop the spread of inside threats through:
- Consistent Intent-driven Policy: Streamlines policy creation by enabling administrators to define intent using simple terms that allow smart microsegmentation across diverse cloud environments including OpenStack, Kubernetes, bare metal servers, public clouds and more.
- Multiple Enforcement Points: Leverages distributed security and networking policies to orchestrate defense and protect applications from threats. For more comprehensive defense, Contrail Security integrates with next-generation virtual firewalls to enable advanced security services and ensure businesses are protected.
- Application Traffic Visibility and Advanced Analytics: Delivers visualization, analytics and orchestration across hybrid cloud environments while reducing risk from unauthorized traffic with application-to-application flow discovery. Provides deep insight into application interactions, leveraging machine learning to detect anomalies and take corrective actions.
"Contrail Security is a key step forward in our mission to transform how enterprises and SaaS cloud providers secure their cloud-native applications running in all cloud environments. By offering enhanced threat prevention, policy management, visibility and control, and by leveraging our battle-tested Contrail Networking product components, our customers will be able to better protect themselves against threats without compromising scale, performance and interoperability."
-- Pratik Roychowdhury, senior director of product management, Contrail at Juniper Networks
"Juniper Networks has a strong history in both network orchestration and security. The next five years will be critical for companies that are planning to transform their network infrastructure. Security buyers deploying complex SDN-enabled networks would be wise to consider vendors with a deep expertise in network orchestration."
-- Jeff Wilson, research director and advisor, Cybersecurity Technology at IHS Markit
"Myriad and our customers are increasingly relying on both hybrid-cloud and multi-cloud application delivery strategies. In these environments, it has been nearly impossible for security teams to keep up. Contrail Security changes that. The combination of intent-driven policy, consistency across environments, multiple enforcement points, intelligent machine learning and intuitive templates and wizards promise to set a new bar for application security. We believe Contrail Security will prove to be THE tool for stopping the spread of lateral threats without compromising scale or performance across hybrid and multi-cloud environments."
-- Chris Grundemann, principal architect at Myriad Supply
"Once attackers have gained a foothold in enterprise systems, they typically can move unimpeded laterally ("east/west") to other systems. Microsegmentation is the process of implementing isolation and segmentation for security purposes within the virtual data center. Like bulkheads in a submarine, microsegmentation helps to limit the damage from a breach when it occurs. Microsegmentation has been used to describe mostly the east-west or lateral communication between servers in the same tier or zone, but it has evolved to be used now for most of communication in virtual data centers."
-- Gartner Press Release, "Gartner Identifies the Top Technologies for Security in 2017", June 14, 2017 http://www.gartner.com/newsroom/id/3744917
- Blog: Microservices and Cloud-Native Apps Need a Security Revolution - Contrail Security Delivers by Pratik Roychowdhury, senior director of product management, Contrail at Juniper Networks
- Juniper Contrail Security: http://www.juniper.net/contrail-security
- Follow Juniper Networks online: Facebook | Twitter | LinkedIn
- Juniper Blogs and Community: J-Net
- Juniper 1on1 app: Keep up with all things Juniper right from your smartphone. Download the app from iTunes and Google Play store today.
About Juniper Networks
Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Additional information can be found at Juniper Networks (www.juniper.net) or connect with Juniper on Twitter and Facebook.
This press release contains forward-looking statements that involve a number of assumptions, uncertainties and risks including, among other things, statements concerning Juniper Networks' prospects, product availability, future products and performance, and other benefits to customers. Actual results or events could differ materially from those anticipated in those forward-looking statements as a result of certain factors, including delays in scheduled product availability, incompatibility of technologies, the company's failure to accurately predict emerging technological trends, and other factors listed in Juniper Networks' most recent report on Form 10-K and Form 10-Q filed with the Securities and Exchange Commission. All statements made in this press release are made only as of the date of this press release. Juniper Networks undertakes no obligation to update the information in this release in the event facts or circumstances subsequently change after the date of this press release. Any future product, feature, enhancement or related specification that may be referenced in this press release are for information purposes only, are subject to change at any time without notice and are not commitments to deliver any future product, feature, enhancement or related specification. The information contained in this press release is intended to outline Juniper Networks' general product direction and should not be relied on in making a purchasing decision.
Juniper Networks, the Juniper Networks logo, Juniper and Junos are registered trademarks of Juniper Networks, Inc. and/or its affiliates in the United States and other countries. Other names may be trademarks of their respective owners.