Firewall Analyzer for Juniper

Juniper firewall rules/policies, configuration & log Analyzer

With Firewall Analyzer's reporting capability for Juniper devices, you can now collect and analyze Juniper device logs and generate security and forensic reports with ease.

Log Forensics

Firewall Analyzer enables you to search raw logs to track errors whenever a security event occurs. You can convert Firewall Analyzer's advanced search option, which focuses on raw firewall logs, into report profiles for easier analysis. You can also import archived logs to perform security incident mining on raw logs.

Log Analysis

Firewall Policy Management

Firewall Policy Optimization

Firewall policy anomaly reporting captures and rectifies anomalies in Juniper devices' firewall policies, securing the network from external attacks. These reports help you not only optimize policies and plug security holes, but also enhance the performance of your firewalls. The less complex you can make the rule set, the faster traffic will be evaluated by the system, and the easier it will be for network engineers to manage access on a day-to-day basis.

Network Bandwidth Management and Monitoring

Monitor internet traffic in real-time with Firewall Analyzer's Near Live Reports. Using the logs Firewall Analyzer captures from Juniper devices, you'll get granular reports on user-based and protocol-based bandwidth consumption, and you'll be able to identify intranet and internet traffic usage, which host is taking up the most bandwidth, and so on. The Firewall Traffic Reports can help you determine which employees are misusing their internet allotment, and will notify you about anomalies such as sudden spikes in their bandwidth usage.

Near Real-time Bandwidth Monitoring

Change tracking Reports

Change tracking Reports

Monitor and track any changes on implementation details in SRX devices. Firewall Analyzer offers an exhaustive set of compliance reports for Juniper devices that help address security audit, configuration audit, and compliance audit requirements. The change tracker ensures that all the configurations and subsequent changes made in the devices are captured periodically, and are stored in the database.

The Change Management Report provides detailed information on various categories of reports such as the: 

Running Configuration Changes Report, which provides information on differences between any two running configuration changes.

Configuration Changes Report, which helps track the changes between running (current) configurations and startup (default) configurations.

A single platter for comprehensive Network Security Device Management