Juniper Networks announces its Cloud Workload Protection

Spread the love

The company is thrilled to announce Juniper Cloud Workload Protection to automatically defend application workloads in any cloud or on-premises data center environment against application exploits as they happen, including the Open Web Application Security Project (OWASP) Top 10 and memory-based attacks.

 

Juniper Cloud Workload Protection is a lightweight software agent that controls application execution and monitors the application’s behavior and context – what it’s supposed to do against what’s happening in real-time. Vulnerability remediation is done automatically without admin intervention. Juniper Cloud Workload Protection ensures that production applications always have a safety net against vulnerability exploits, keeping business-critical services connected and protected. This new Juniper product provides the following critical capabilities:

 

Signatureless Run-Time Application Self-Protection (RASP) provides real-time protection against attacks. It protects the application from malicious actions, such as exploitation and data theft, without any manual intervention, catching sophisticated attacks that endpoint detection (EDR) and web application firewall (WAF) solutions cannot.

 

Memory-Based Attack Prevention provides real-time protection against advanced memory-based attacks, including fileless, return-oriented programming (ROP) and buffer overflow attacks.

 

Vulnerability Detection continuously assesses vulnerabilities in applications and containers to detect serious and critical exploit attempts as they happen. Juniper Cloud Workload Protection delivers information on the exploit attempt to DevSecOps teams to better understand where the vulnerability exists, so they can remediate.

 

Comprehensive Telemetry provides rich application-level security event generation and reporting, including application connectivity, topology and detailed information about the attempted attack.

 

Optimized Control Flow Integrity (OCFI) technology minimizes false alerts by validating the execution of applications and detecting attacks without using behavior or signatures.

 

Zero Trust Microsegmentation shields application resources from lateral threat propagation and integrates with Juniper vSRX Virtualized Firewalls to restrict access based on risk, even as workloads and virtual environments change. Automated threat response with built-in, real-time telemetry helps security teams detect threats once and block them across the entire network.

 

Juniper Cloud Workload Protection continues the drumbeat of Juniper Connected Security by supporting every type of workload and providing a safety net for applications. Customers no longer need to trade-off between limiting their risk of a data breach or missing release deadlines, especially those in production.

 

Organizations can keep applications connected and protected, providing application teams the means to deliver, operate and ensure that their data center environments are following compliance rules while continuously looking out for anomalies.

 

Strengthening Zero Trust Data Center Architecture

 

Juniper Cloud Workload Protection is the newest part of Zero Trust data center architecture. Our world-class data center networking solutions and Connected Security strategy connect and orchestrate application infrastructure across multiple data center environments and secure every point of connection along the way, from the DC gateway to the interconnect, between servers and within application workloads.

 

Juniper Connected Security is based on the premise that networking and security must converge, on-premises and in the cloud, securing data transactions from client to workload. Visibility, intelligence and enforcement must extend to every point of connection on the network to effectively safeguard users, applications and infrastructure. That’s what Juniper Cloud Workload Protection and the Zero Trust data center architecture deliver, connecting and protecting applications in any cloud while ensuring great user experiences.

Related posts

Leave a Comment

85 + = 86