Juniper Firewall Features
What are the features of Juniper Firewall?
Administration
- Policy Management
- Concurrent Sessions
Top Rated Juniper Firewall Alternatives
(131)
4.5 out of 5
Visit Website
Sponsored
Juniper Categories on G2
Filter for Features
Security - Unified Threat Management
Antivirus | Tools to protect a system from viruses by scanning and quarantining any threats. | Not enough data | |
Whitelists | The ability to green light a specific URL or system to bypass the scanning process. | Not enough data | |
Antispam Filtering | Tools to prevent spam emails and other spam from entering the network. | Not enough data | |
Content Filtering | Tools to filter specific content based on the MME type or file extension. | Not enough data | |
Web Filtering | Tools to block certain websites from being viewed by those in a network. | Not enough data | |
Firewall | Tools to block off a network or system from outside networks or systems to protect the data within. | Not enough data |
Administration
Reports & Analytics | The ability to digest a large amount of data into visual representations and analytics. | Not enough data | |
Dashboard | The ability to view a large amount of data in one place using customizable widgets. | Not enough data | |
Policy Management | As reported in 10 Juniper Firewall reviews. Provides network security features to customize network access rules, workflows, and compliance requirements. | 83% (Based on 10 reviews) | |
Logging and Reporting | Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis. | Not enough data | |
Application Gateway | Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers. | Not enough data | |
Concurrent Sessions | Determines the number of connections a firewall is able to track and facilitate securely. 10 reviewers of Juniper Firewall have provided feedback on this feature. | 85% (Based on 10 reviews) |
Monitoring
Load Balancing | Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. | Not enough data | |
Continuous Analysis | Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | Not enough data | |
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data |
Functionality
Virtual Private Network (VPN) | Provides a virtualized network for client network to mask identity, location, and other sensitive information. | Not enough data | |
Antivirus | Provides malware protection capabilities in addition to traditional firewall barrier technology. | Not enough data | |
URL Filtering | Provides access control tools to categorize and block traffic and match traffic to firewall policies. | Not enough data | |
Availability | Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. | Not enough data |