Skip to main content
TrustRadius
Juniper Secure Analytics

Juniper Secure Analytics

Overview

What is Juniper Secure Analytics?

Juniper Secure Analytics is a security information and event management (SIEM) system designed to consolidate and analyze event data from various devices, endpoints, and applications in near real time. According to the vendor, this solution is suitable for organizations of all sizes and caters to the...

Read more
Recent Reviews

TrustRadius Insights

Users have found this product to be a cost-effective option compared to Splunk, making it an attractive choice for data collection from …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Juniper Secure Analytics?

Juniper Network Secure Analytics (JSA) is a network security management platform that facilitates the comparison of data from the broadest set of devices and network traffic. It combines log management, SIEM, and network behavior anomaly detection (NBAD), into a single integrated end-to-end network…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

What is Microsoft Sentinel?

Microsoft Sentinel (formerly Azure Sentinel) is designed as a birds-eye view across the enterprise. It is presented as a security information and event management (SIEM) solution for proactive threat detection, investigation, and response.

Return to navigation

Product Details

What is Juniper Secure Analytics?

Juniper Secure Analytics is a security information and event management (SIEM) system designed to consolidate and analyze event data from various devices, endpoints, and applications in near real time. According to the vendor, this solution is suitable for organizations of all sizes and caters to the needs of IT security professionals, network administrators, security operations centers (SOCs), managed security service providers (MSSPs), and enterprise organizations across industries such as finance, healthcare, retail, government, and telecommunications.

Key Features

JSA Virtual Appliance: The JSA Virtual Appliance is a virtual SIEM that collects, analyzes, and consolidates security data from networked devices to detect and remediate security incidents.

99.9% Security Effectiveness: According to the vendor, Juniper Secure Analytics demonstrates a 99.9% exploit block rate with zero false positives, as evidenced by its "AAA" rating in CyberRatings' 2023 Enterprise Network Firewall Report.

RAM: The JSA Virtual Appliance is equipped with 24 GB of RAM, which the vendor claims ensures smooth performance and efficient processing of security events and logs.

Canned Reports: Juniper Secure Analytics offers 1300 pre-built reports that cover various aspects of security monitoring and analysis, including threat detection, compliance management, and incident response.

Maximum Flows per Minute: The JSA Virtual Appliance supports a maximum of 600,000 flows per minute, enabling comprehensive monitoring and analysis of network traffic in real time.

Juniper Secure Analytics Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(1)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have found this product to be a cost-effective option compared to Splunk, making it an attractive choice for data collection from large enterprises with over 70k users. The software has effectively reduced the risk of security breaches on networks, providing enhanced protection for sensitive financial data. It is also valued for its ability to protect infrastructure and mitigate vulnerabilities from emerging threats, contributing to the overall security of networks and customer networks.

The software is utilized for various purposes such as network monitoring, inventory accountability, and traffic monitoring. Companies have also utilized the firewall security feature to enhance their security measures. Additionally, the software serves as a virtualized SIEM system, consolidating data from various devices, endpoints, and applications into actionable intelligence. It has been used by users for system administration tasks, particularly in securing enterprise financial data.

The capability of allowing remote work has proven highly beneficial, improving employee morale and enabling more efficient interviewing processes. Organizations consider this software as one of the top three SIEM tools used for analyzing security incidents on network devices and assets.

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use this capability to analyze all of our security incidents on the network devices with the support of Splunk as well. It is not our main SIEM tool, but it is in the top 3 for the organization. We use this from an Enterprise perspective for over 100k assets.
  • Analytics.
  • Network monitoring/behavior.
  • Security issue detection.
  • User training.
  • Capability for other products.
This is an amazing tool if you have a Juniper infrastructure. It has served us well in dealing with networking monitoring, security event analysis, and analyzing all the data that transverses our network. We haven't run into any situations where this isn't a good product to utilize unless we are dealing with other manufacturers like Cisco products.
  • Data analytics.
Security Information and Event Management (SIEM) (14)
95%
9.5
Centralized event and log data collection
90%
9.0
Correlation
90%
9.0
Event and log normalization/management
100%
10.0
Deployment flexibility
90%
9.0
Integration with Identity and Access Management Tools
100%
10.0
Custom dashboards and workspaces
90%
9.0
Host and network-based intrusion detection
90%
9.0
Log retention
90%
9.0
Data integration/API management
100%
10.0
Behavioral analytics and baselining
100%
10.0
Rules-based and algorithmic detection thresholds
90%
9.0
Response orchestration and automation
100%
10.0
Reporting and compliance management
100%
10.0
Incident indexing/searching
100%
10.0
  • Found issues before our other tools.
Not even a close comparison between these two. Juniper is an amazing product with unlimited capabilities while FortiSIEM wasn't quite ready to be deployed. We like how much time, effort, and energy went into the development of Juniper's product.
Return to navigation