Juniper... What is it NOT good for?
February 27, 2022

Juniper... What is it NOT good for?

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Modules Used

  • JSA3800
  • JSA5800
  • JSA7500
  • JSA7800
  • JSA Virtual Appliance

Overall Satisfaction with Juniper Secure Analytics

We currently use this capability to analyze all of our security incidents on the network devices with the support of Splunk as well. It is not our main SIEM tool, but it is in the top 3 for the organization. We use this from an Enterprise perspective for over 100k assets.
  • Analytics.
  • Network monitoring/behavior.
  • Security issue detection.
  • User training.
  • Capability for other products.
  • Found issues before our other tools.
Not even a close comparison between these two. Juniper is an amazing product with unlimited capabilities while FortiSIEM wasn't quite ready to be deployed. We like how much time, effort, and energy went into the development of Juniper's product.

Do you think Juniper Secure Analytics delivers good value for the price?

Yes

Are you happy with Juniper Secure Analytics's feature set?

Yes

Did Juniper Secure Analytics live up to sales and marketing promises?

Yes

Did implementation of Juniper Secure Analytics go as expected?

Yes

Would you buy Juniper Secure Analytics again?

Yes

This is an amazing tool if you have a Juniper infrastructure. It has served us well in dealing with networking monitoring, security event analysis, and analyzing all the data that transverses our network. We haven't run into any situations where this isn't a good product to utilize unless we are dealing with other manufacturers like Cisco products.

Juniper Secure Analytics Feature Ratings

Centralized event and log data collection
9
Correlation
9
Event and log normalization/management
10
Deployment flexibility
9
Integration with Identity and Access Management Tools
10
Custom dashboards and workspaces
9
Host and network-based intrusion detection
9
Log retention
9
Data integration/API management
10
Behavioral analytics and baselining
10
Rules-based and algorithmic detection thresholds
9
Response orchestration and automation
10
Reporting and compliance management
10
Incident indexing/searching
10