Juniper SRX is a high-performance network security solution for companies and service providers that provides security, routing and network capabilities. Specifically for security, the SRX Series offers the next generation firewall, application and control visibility, IPS, and other security services. SRX tools provide a complete security solution to protect and control your business assets.
The SRX Service Series service is based on Junos, the Juniper operating system which is proven to provide advanced security and protection services, the foundation of the world’s largest network. Junos also supports rich routing capabilities, and Junos unique architecture provides reliable operation and service management, even under the highest load.
The cost effectiveness and versatility of the SRX platform produces some of the best price-performance ratios in the industry. Hardware and OS consolidation, operational flexibility, and unmatched performance simplify deployment and operation resulting in attractive low TCO.
SRX Services for Small Businesses and Branch Offices
The SRX branch presents a secure and managed network of up to thousands of sites. A wide selection of products efficiently supports various performance, functionality, security, and budget requirements, connecting and protecting from a handful of people to thousands of users.
Routing consolidation, WAN connectivity, switching, and Unified Threat Management (UTM) simplify deployment and administration while providing fast and consistent quality of service regardless of the user’s location. UTM services include Anti-Virus, Anti-Spam, URL filters, firewalls / VPNs, and best-in-class AppSecure application security levels that allow SRX branches to become full-featured solutions. Routing services include IPv4 and IPv6 unicast and multicast, extensive NAT, QoS, performance monitoring and SLA, and flow management features.
Network security segmentation: Security zones, virtual LANs (VLANs), IPSec VPNs, and virtual routers allow administrators to adjust security and network policies for various subgroups of internal, external, and demilitarized zones (DMZ).
Fully integrated Unified Threat Management (UTM): Allows companies to take advantage of the appropriate level of security required at certain sites instead of using multi-device solutions. Includes two antivirus options (on-premise or cloud-based), intrusion prevention system (IPS), antispam, and Web filtering.