(117)
4.3 out of 5
Visit Website
Sponsored
Antivirus | Tools to protect a system from viruses by scanning and quarantining any threats. | Not enough data | |
Whitelists | The ability to green light a specific URL or system to bypass the scanning process. | Not enough data | |
Antispam Filtering | Tools to prevent spam emails and other spam from entering the network. | Not enough data | |
Content Filtering | Tools to filter specific content based on the MME type or file extension. | Not enough data | |
Web Filtering | Tools to block certain websites from being viewed by those in a network. | Not enough data | |
Firewall | Tools to block off a network or system from outside networks or systems to protect the data within. | Not enough data |
Reports & Analytics | The ability to digest a large amount of data into visual representations and analytics. | Not enough data | |
Dashboard | The ability to view a large amount of data in one place using customizable widgets. | Not enough data | |
Policy Management | Provides network security features to customize network access rules, workflows, and compliance requirements. This feature was mentioned in 11 Juniper Firewall reviews. | 85% (Based on 11 reviews) | |
Logging and Reporting | Captures logs for all firewall functions, storing information, incidents, and activity for user reference and analysis. This feature was mentioned in 10 Juniper Firewall reviews. | 83% (Based on 10 reviews) | |
Application Gateway | As reported in 10 Juniper Firewall reviews. Application-level proxy that applies security mechanisms to connect clients to applications while concealing client network and computers. | 85% (Based on 10 reviews) | |
Concurrent Sessions | Determines the number of connections a firewall is able to track and facilitate securely. This feature was mentioned in 11 Juniper Firewall reviews. | 82% (Based on 11 reviews) |
Load Balancing | Based on 10 Juniper Firewall reviews. Monitors traffic and distribute resources and scales infrastructure workloads to match traffic. | 83% (Based on 10 reviews) | |
Continuous Analysis | Based on 10 Juniper Firewall reviews. Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering. | 75% (Based on 10 reviews) | |
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. | Not enough data | |
Intrusion Detection | Detects unauthorized access and use of privileged systems. | Not enough data |
Virtual Private Network (VPN) | Based on 10 Juniper Firewall reviews. Provides a virtualized network for client network to mask identity, location, and other sensitive information. | 78% (Based on 10 reviews) | |
Antivirus | Provides malware protection capabilities in addition to traditional firewall barrier technology. | Not enough data | |
URL Filtering | As reported in 10 Juniper Firewall reviews. Provides access control tools to categorize and block traffic and match traffic to firewall policies. | 83% (Based on 10 reviews) | |
Availability | As reported in 10 Juniper Firewall reviews. Deploys firewall(s) configured in sync to prevent network failure and provide business continuity. | 85% (Based on 10 reviews) |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |
AI Firewall | Utilizes AI to monitor network traffic, identify anomalies, and block attacks. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data |