Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • phoenixNAP Reviews & Ratings
    6 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Kamatera Reviews & Ratings
    151 Ratings
    Company Website
  • Fastly Reviews & Ratings
    822 Ratings
    Company Website
  • ThreatLocker Reviews & Ratings
    469 Ratings
    Company Website
  • Blumira Reviews & Ratings
    131 Ratings
    Company Website
  • Thinfinity Workspace Reviews & Ratings
    14 Ratings
    Company Website
  • Google Cloud Platform Reviews & Ratings
    56,320 Ratings
    Company Website
  • Kasm Workspaces Reviews & Ratings
    123 Ratings
    Company Website
  • Site24x7 Reviews & Ratings
    750 Ratings
    Company Website

What is vSRX Virtual Firewall?

As companies increasingly migrate their operations to the cloud to leverage the benefits of virtualization, they must also confront the new security challenges that arise during this process. The vSRX Virtual Firewall provides comprehensive and adaptable security measures designed specifically for private, public, and hybrid cloud settings. This advanced firewall empowers organizations to fully adopt cloud solutions while ensuring they have effective defenses against various potential threats. By integrating such security measures, businesses can enhance their overall resilience in the ever-evolving digital landscape.

What is Symantec Data Center Security?

Thorough protection, management, and micro-segmentation of workloads are crucial for private cloud and on-premises data center environments. This process involves strengthening security protocols and offering monitoring solutions tailored for private cloud systems and physical data centers, while also accommodating Docker containerization support. The use of agentless protection for Docker containers enables comprehensive application control and simplifies management efforts. To counteract zero-day vulnerabilities, it is imperative to implement application whitelisting, detailed intrusion prevention strategies, and real-time file integrity monitoring (RT-FIM). Furthermore, securing OpenStack deployments necessitates a diligent hardening of the Keystone identity service module. Ongoing surveillance of data center security is essential for ensuring safe operations in both private clouds and physical setups. In addition, improving security efficacy in VMware environments can be facilitated through the adoption of agentless antimalware solutions, along with network intrusion prevention and file reputation services, which together enhance overall security resilience. Ultimately, the implementation of robust security measures is critical for protecting sensitive information within these infrastructures, as the stakes for data breaches continue to rise. Ensuring that these protections are kept up-to-date will further fortify defenses against evolving threats.

Media

Media

Integrations Supported

Armis
Azure Marketplace
CA Auditor for z/OS
Cloud Customer Certification Lab
EnCase Forensic
FortiSandbox
GREYCORTEX Mendel
Genian NAC
HP-UX
HPE OpenVMS
Juniper Cloud Workload Protection
Juniper Mist AI
NorthStar Navigator
OctoXLabs

Integrations Supported

Armis
Azure Marketplace
CA Auditor for z/OS
Cloud Customer Certification Lab
EnCase Forensic
FortiSandbox
GREYCORTEX Mendel
Genian NAC
HP-UX
HPE OpenVMS
Juniper Cloud Workload Protection
Juniper Mist AI
NorthStar Navigator
OctoXLabs

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Juniper Networks

Date Founded

1996

Company Location

United States

Company Website

www.juniper.net/us/en/products/security/srx-series/vsrx-virtual-firewall.html

Company Facts

Organization Name

Broadcom

Date Founded

1991

Company Location

United States

Company Website

www.broadcom.com/products/cybersecurity/endpoint/hybrid-cloud/data-center-security

Categories and Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Categories and Features

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Center Management

Audit Trail
Behavior-Based Acceleration
Cross Reference System
Device Auto Discovery
Diagnostic Testing
Import / Export Data
JCL Management
Multi-Platform
Multi-User
Power Management
Sarbanes-Oxley Compliance

Popular Alternatives

FortiGate NGFW Reviews & Ratings

FortiGate NGFW

Fortinet

Popular Alternatives

Fidelis Halo Reviews & Ratings

Fidelis Halo

Fidelis Security
Runecast  Reviews & Ratings

Runecast

Runecast Solutions
Forcepoint NGFW Reviews & Ratings

Forcepoint NGFW

Forcepoint
Palo Alto Networks NGFW Reviews & Ratings

Palo Alto Networks NGFW

Palo Alto Networks