Juniper Networks announced a new cloud-based global attacker intelligence service at RSA Conference 2013 in San Francisco. The new Junos Spotlight Secure service will provide greater intelligence into threats, attackers and individual devices.
Juniper Networks is aiming to take a new approach to dealing with security threats with the announcement of a cloud-based global attacker intelligence service. Dubbed Junos Spotlight Secure, the new cloud service was designed to provide customers with "definitive intelligence about threats, attackers and individual devices across a wide number of networks and Juniper security products."
Spotlight Secure is meant to be the next evolution in dealing with attackers, moving beyond the traditional security method of tracking reputation feeds of IP addresses. According to Juniper, that's the old way of doing things, and Spotlight Secure will be identifying individual attackers at the device level and then tracking them through a global database.
The gist is it provides additional intelligence in dealing with security threats to protect organizations from attackers, taking tracking of dangerous individuals right down to the device level.
"Next-generation security must be built on automated and actionable intelligence that can be quickly shared to meet the demands of modern and evolving networks. This is only possible if you are able to collect definitive information about attackers," said Nawaf Bitar, senior vice president and general manager of the Security Business Unit at Juniper Networks, in a prepared statement.
According to Bitar, the Junos Spotlight Secure approach will improve security intelligence and provide customers with collective defense against attackers in the data center. The end goal is, of course, better accuracy over the IP address approach, reducing false positives and improving the precision of identifying attackers.
The cloud-based service was designed to identify and fingerprint attackers based on the subscriber's network using Junos WebApp Secure (also announced at RSA), the database will be able to immediately share the attacker's profile with other service subscribers for advanced real-time threat prevention across multiple networks.
"With the growing sophistication of threats, there is a clear need for network security to become more intelligent in how it identifies and stops attacks. Companies are looking for security solutions that not only detect attacks but also provide definitive information about attackers and integrate with core network security controls," said Jon Oltsik, senior principal analyst at Enterprise Strategy Group in a prepared statement.