Overview; Jatp700 System Overview; Jatp700 Appliance Description; Benefits Of The Jatp700 Appliance - Juniper JATP700 Hardware Manual

Appliance
Hide thumbs Also See for JATP700:
Table of Contents

Advertisement

CHAPTER 1

Overview

JATP700 System Overview

JATP700 Appliance Description

Copyright © 2019, Juniper Networks, Inc.
JATP700 System Overview on page 17
JATP700 Chassis on page 18
JATP700 Appliance Description on page 17
JATP700 Appliance Transceiver Interface on page 18
Juniper Networks Advanced Threat Prevention 700 (JATP700) appliance is an advanced
threat prevention platform that is designed to identify and prevent targeted attacks
across multiple threat vectors. The appliance can be deployed as a core device, as a Web
collector, or as an All-In-One device.
The JATP700 appliance is a 2-rack-unit (2-U), rack-mountable chassis with dual AC
power supplies (or optional dual DC power supplies), eight hard disk drives that support
RAID, 128-GB memory, and two 10-Gigabit Ethernet SFP+ interfaces and four 1-Gigabit
Ethernet interfaces.

Benefits of the JATP700 Appliance

Multivector traffic inspection
of Web, e-mail, and lateral spread traffic moving through the network.
Multistage threat detection
through the kill chain, detecting phishing, exploits, malware downloads, command and
control communications, and internal threats.
Multistage threat analysis
analyses, as well as malware reputation analysis, and continuously adapts to the
changing threat landscape by leveraging Juniper Networks Global Security Service, a
cloud-based service that offers the latest threat detection and mitigation information.
Threat analytics
—Offers a holistic view of identity and threat activity gathered from a
diverse set of sources such as Active Directory, endpoint antivirus, firewalls, secure
Web gateways, intrusion detection systems, and endpoint detection and response
tools. The analytics component receives data from these sources, identifies advanced
—Provides continuous, multistage detection and analysis
—Monitors network traffic to identify threats as they progress
—Performs static, payload, machine learning, and behavior
17

Advertisement

Table of Contents
loading

Table of Contents