• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Saturday, April 18, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Juniper offer Zero Trust Cloud Workload Protection

Juniper offer Zero Trust Cloud Workload Protection

August 3, 2021
in All
A A

Juniper Networks introduced a Zero Trust Data Center architecture to automatically defend application workloads in any cloud or on-premises data center environment against application exploits as they happen, including the Open Web Application Security Project (OWASP) Top 10 and memory-based attacks.

Juniper Cloud Workload Protection is a lightweight software agent that controls application execution and monitors the application’s behavior and context, with vulnerability remediation is done automatically without admin intervention. 

The company says its new product provides the following critical capabilities:

  • Signatureless Run-Time Application Self-Protection (RASP) provides real-time protection against attacks. It protects the application from malicious actions, such as exploitation and data theft, without any manual intervention, catching sophisticated attacks that endpoint detection (EDR) and web application firewall (WAF) solutions cannot.
  • Memory-Based Attack Prevention provides real-time protection against advanced memory-based attacks, including fileless, return-oriented programming (ROP) and buffer overflow attacks.
  • Vulnerability Detection continuously assesses vulnerabilities in applications and containers to detect serious and critical exploit attempts as they happen. Juniper Cloud Workload Protection delivers information on the exploit attempt to DevSecOps teams to better understand where the vulnerability exists, so they can remediate.
  • Comprehensive Telemetry provides rich application-level security event generation and reporting, including application connectivity, topology and detailed information about the attempted attack.
  • Optimized Control Flow Integrity (OCFI) technology minimizes false alerts by validating the execution of applications and detecting attacks without using behavior or signatures.
  • Zero Trust Microsegmentation shields application resources from lateral threat propagation and integrates with Juniper vSRX Virtualized Firewalls to restrict access based on risk, even as workloads and virtual environments change. Automated threat response with built-in, real-time telemetry helps security teams detect threats once and block them across the entire network.

Connecting and Protecting Applications within a Zero Trust Data Center Architecture with Juniper Cloud Workload Protection

Tags: Blueprint columnsData CentersJuniperSecurity
ShareTweetShare
Previous Post

STL collaborates with Facebook Connectivity on Evenstar radio units

Next Post

Google teams with Sparkle on 2 subsea cables

Staff

Staff

Related Posts

Photonic Innovation at the HPE Juniper Aspiration Dome with Optica + APC
Optical

Photonic Innovation at the HPE Juniper Aspiration Dome with Optica + APC

October 22, 2025
HPE Finalizes Juniper Acquisition, Launching Full-Stack AI-Native Networking
Financials

HPE Finalizes Juniper Acquisition, Launching Full-Stack AI-Native Networking

July 2, 2025
Spirent debuts CF400 security and application delivery test platform
Data Centers

Spirent and Juniper Demo Ultra Ethernet Transport at Interop Tokyo

June 30, 2025
Juniper names Chris Kaddaras as Chief Revenue Officer
All

HPE and Juniper Settle DOJ Case, Pave Way for $14B Merger

June 28, 2025
xAI raises $6 billion to propel its AI ambitions
Quantum

Turkcell, Juniper, and ID Quantique Test Quantum-Safe 5G Backhaul

June 26, 2025
xAI raises $6 billion to propel its AI ambitions
Quantum

Juniper Demonstrates Post-Quantum Cloud Connectivity Using QKD

May 22, 2025
Next Post
Google teams with Sparkle on 2 subsea cables

Google teams with Sparkle on 2 subsea cables

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version