Juniper SRX is a firewall offering. It provides a variety of modular features, scaled for enterprise-level use, based on a 3-in-1 OS that enables routing, switching, and security in each product.
N/A
Pricing
Cisco IPS Sensor (Discontinued)
Juniper SRX
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco IPS Sensor (Discontinued)
Juniper SRX
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
Cisco IPS Sensor (Discontinued)
Juniper SRX
Features
Cisco IPS Sensor (Discontinued)
Juniper SRX
Firewall
Comparison of Firewall features of Product A and Product B
Cisco IPS Sensor (Discontinued)
-
Ratings
Juniper SRX
8.7
5 Ratings
0% above category average
Identification Technologies
00 Ratings
9.03 Ratings
Visualization Tools
00 Ratings
7.03 Ratings
Content Inspection
00 Ratings
8.04 Ratings
Policy-based Controls
00 Ratings
10.04 Ratings
Active Directory and LDAP
00 Ratings
8.03 Ratings
Firewall Management Console
00 Ratings
7.05 Ratings
Reporting and Logging
00 Ratings
8.05 Ratings
VPN
00 Ratings
10.04 Ratings
High Availability
00 Ratings
10.05 Ratings
Stateful Inspection
00 Ratings
10.04 Ratings
Proxy Server
00 Ratings
9.03 Ratings
Best Alternatives
Cisco IPS Sensor (Discontinued)
Juniper SRX
Small Businesses
LevelBlue USM Anywhere
Score 7.5 out of 10
pfSense
Score 8.8 out of 10
Medium-sized Companies
CrowdStrike Falcon
Score 9.1 out of 10
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Enterprises
CrowdStrike Falcon
Score 9.1 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
IPS sensors are more suited for companies that do not have visibility into their network with third-party analyzing tools. Scenarios would be to place IPS sensors at the perimeter firewalls mainly. IPS sensors are less appropriate for companies that have third-party analyzing tools that will mitigate vulnerabilities and malicious traffic and activities already.
SRXs seem to be well suited at the enterprise level for plain routers, firewalls, and IDP/IDS. They work well on MPLS and Ethernet, including Internet. I have 3 SRXs also performing edge duty, with 2 in a high availability (HA) cluster. The Juniper line of SRXs provides a good range of scaling from small business to extremely large enterprise. Wire speed is a common comparison factor and Juniper shines in that area.
My only real criticism of the product is that it's hard to figure out how to upgrade the firmware from the CLI via TFTP via the docs, but it works great once you get it sorted.
This is the one area where I have a beef with Juniper. When I called into Cisco TAC, 90% of the time, the first person I spoke with was able to resolve my issue. With Juniper TAC, 90% of the time, the first person I speak with is not able to resolve my issue, seems to almost be reading from a script, and must escalate my ticket. All of which takes time.
IPS sensors provides the necessary network visibility my company needs to satisfy its security appetite. By doing so, we have been able to stay compliant and up to date with today's network security requirements and procedures. We are able to be proactive with vulnerabilities and reactive to malicious traffic and intrusions in our day to day operations.
Juniper SRX stands tall compared to all these products for Large Service Provider Networks, where traffic volume is larger. Also, cost comparison with SRX's few other products can also be another contributing factor while selecting this. As well as Juniper Routers, Switches, and multiple products from the same vendor to maintain one single vendor environment. As well as Juniper Support is also really good.
It is a workhorse for our field operations. It provides the last touch for an ISP to the customer. The customer has no view of the device, but with the repeatability of the device, they do not need to.
The ability to roll out a dynamic routing protocol attached to a security zone allows elasticity to the environment that supports growth.
VLAN support on the inside interfaces allow this to be the only device in some smaller deployments we install these in.