-40%

Juniper IDP-600C Intrusion Detection Appliance 365Day Wrnty FreeShip NS-IDP-600C

$ 140.18

Availability: 100 in stock
  • Item must be returned within: 30 Days
  • Condition: Used
  • MPN: NS-IDP-600C
  • Type: IDP
  • Brand: Juniper
  • All returns accepted: Returns Accepted
  • Restocking Fee: No
  • Refund will be given as: Money Back
  • Return shipping will be paid by: Buyer

    Description

    Juniper IDP-1100C Intrusion Detection App NS-IDP-1100C
    Free Shiping If You Elect To Buy It Now!
    Items ship same day on credit card transactions (contingent upon credit card address)
    This unit is in great shape and ships to you with a 365 day hardware warranty.  This equipment has been tested working.  You are bidding on the following:
    1x Juniper NS-IDP-600C - IDP 600C Intrusion Detection and Prevention Appliance
    Features and Benefits Key features and benefits of the Juniper Networks IDP 600C solutions include:
    Multi-method detection system that includes compound signatures, stateful signatures, protocol anomaly and backdoor detection
    Extensive signature customization to improve the ability to detect unique attacks and tailor the signature specific to the customer's requirements
    Rate limiting capability at the application level (via Diffserv marking) to ensure QoS for mission-critical applications
    Enhanced network visibility with support for new protocol decodes covering VoIP solutions, database accesses and wireless data communication
    Closed loop investigation process to quickly see the big picture and then drill down to the appropriate level of detail to make informed security decisions
    Enterprise Security Profiler (ESP) to gain insight into network and attack activity that accelerates inline deployment and facilitates attack investigation
    Security Explorer to view the network activities through a graphical, easy to understand and interactive user interface
    Policy Editor to create and deploy granular security policies based on what traffic to look at, what attacks to look for in that traffic and how to respond when an attack has been detected
    Log Viewer to investigate specific security incidents with the ability to customize the way information is processed within the system
    Common management solution as Juniper Networks FW/VPN and integrated FW/VPN/IDP appliances for centralized rule-based management across multiple security appliances
    Fully customizable reporting to generate up to the minute status on network activity
    Role-based administration to logically divide administrator accesses based on business practices
    IDP clustering to enable stateful, standalone high availability minimizing the risk of a single point of failure and maximizing network protection
    List Price ** ,000.00 **
    For more information please
    click here
    The Juniper Networks Intrusion Detection and Prevention products (Juniper Networks IDP) provide comprehensive and easy to use inline protection to stop network and application-level attacks before they inflict any damage, minimizing the time and costs associated with intrusions. Using industry recognized stateful detection and prevention techniques, Juniper Networks IDP provides zero-day protection against worms, Trojans, spyware, keyloggers, and other malware from penetrating the network and spreading from already infected users to others. Juniper Networks IDP not only helps protect networks against attacks, it provides information on rogue servers and applications that may have unknowingly been added to the network. Armed with the knowledge that unauthorized applications such as peer-to-peer or instant messaging have been added to the network allows administrators to more easily enforce security policies and maintain compliance with corporate application use policy. Combined with a centralized, rule-based management approach, which offers granular control over the system’s behavior and easy access to extensive logging and fully customizable reporting, it is easy to see why Juniper Networks IDP is the best way to keep critical information assets safe.