In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Firewalls can be defined in many ways according to your level of understanding. A firewall establishes a barrier between a trusted, secure internal network and another network (e.g., the Internet) that is not assumed to be secure and trusted.
Juniper Networks SSG Series Secure Services Gateways
The SSG Series Secure Services Gateways deliver high performance WAN connectivity and security, and the muscle to protect high-speed LANs against internal network and application-level attacks. They simultaneously stop content-based attacks.
Unified threat management
Unified threat management (UTM) is a solution in the network security industry, and since 2004 it has gained currency as a primary network gateway defense solution for organizations. In theory, UTM is the evolution of the traditional firewall into an all-inclusive security product able to perform multiple security functions within one single appliance: network firewalling, network intrusion prevention and gateway antivirus (AV), gateway anti-spam, VPN, content filtering, load balancing, data leak prevention and on-appliance reporting.
Juniper Networks SRX Series Services Gateways
SRX Series Services Gateways are high-performance network security solutions for enterprises and service providers that pack high port-density, advanced security, and flexible connectivity, into easily managed platforms.
These versatile and cost-effective solutions support fast, secure, and highly-available, data center and branch operations, with unmatched performance to deliver some of the industry’s best price-performance ratios and lowest TCOs
Virtual private network
A virtual private Network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption.
Juniper Networks SA Series SSL VPN Appliances
Juniper Networks SA Series SSL VPN Appliances and the Networks SA Series SSL VPN Virtual Appliance provide a complete range of remote access appliances for all size companies. The SA Series includes Junos Pulse Secure Access Service with its simple, intuitive user interface that provides secure, authenticated access for mobile and remote users from any web-enabled device.
Network Access Control
Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. A basic form of NAC is the 802.1X standard.
Juniper Networks Unified Access Control
Unified Access Control (UAC) is a standards-based, scalable, granular access control solution that creates and propagates dynamic policies based on user identity and role, device type and integrity, and location.