Best Software for 2025 is now live!
Save to My Lists
Unclaimed
Unclaimed

Juniper Firewall Features

What are the features of Juniper Firewall?

Administration

  • Policy Management
  • Concurrent Sessions

Top Rated Juniper Firewall Alternatives

Filter for Features

Security - Unified Threat Management

Antivirus

Tools to protect a system from viruses by scanning and quarantining any threats.

Not enough data

Whitelists

The ability to green light a specific URL or system to bypass the scanning process.

Not enough data

Antispam Filtering

Tools to prevent spam emails and other spam from entering the network.

Not enough data

Content Filtering

Tools to filter specific content based on the MME type or file extension.

Not enough data

Web Filtering

Tools to block certain websites from being viewed by those in a network.

Not enough data

Firewall

Tools to block off a network or system from outside networks or systems to protect the data within.

Not enough data

Administration

Reports & Analytics

The ability to digest a large amount of data into visual representations and analytics.

Not enough data

Dashboard

The ability to view a large amount of data in one place using customizable widgets.

Not enough data

Policy Management

As reported in 10 Juniper Firewall reviews. Provides network security features to customize network access rules, workflows, and compliance requirements.
83%
(Based on 10 reviews)

Logging and Reporting

Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis.

Not enough data

Application Gateway

Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers.

Not enough data

Concurrent Sessions

Determines the number of connections a firewall is able to track and facilitate securely. 10 reviewers of Juniper Firewall have provided feedback on this feature.
85%
(Based on 10 reviews)

Monitoring

Load Balancing

Monitors traffic and distribute resources and scales infrastructure workloads to match traffic.

Not enough data

Continuous Analysis

Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.

Not enough data

Intrusion Prevention

Enforces security paramaters to prevent unauthorized access.

Not enough data

Intrusion Detection

Detects unauthorized access and use of privileged systems.

Not enough data

Functionality

Virtual Private Network (VPN)

Provides a virtualized network for client network to mask identity, location, and other sensitive information.

Not enough data

Antivirus

Provides malware protection capabilities in addition to traditional firewall barrier technology.

Not enough data

URL Filtering

Provides access control tools to categorize and block traffic and match traffic to firewall policies.

Not enough data

Availability

Deploys firewall(s) configured in sync to prevent network failure and provide business continuity.

Not enough data