Juniper Security Director Cloud service
Network security management is how administrators operationalize their firewall architecture, provide visibility across individual deployments, policies, and traffic, and gain insight from threat analytics across the entire network traffic.
Features
- Security Director Insights
- Policy Enforcer
- Firewall policy analysis
- Firewall rule placement guidance
- Firewall policy hit count
- Live threat map
- Simplified threat management
- Policy lifecycle management
- VPN auto provisioning and import
- REST APIs for automation
Benefits
- Collects and automatically correlates data across multiple security layers
- Creates and centrally manages security policies
- Provides the ability to schedule reports
- Analyzes the existing firewall rule base to recommend optimal position
- Shows hit counts for each firewall
- Displays where threats originate
- Automate security policies across the network
- Reports where threats are originating
- Provides the ability to manage all phases of security policy
- Provides RESTful APIs used in conjunction with automation tools.
Pricing
£191 to £18,983 a device a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 0 9 2 4 6 1 0 4 7 2 0 0 0 1
Contact
Xpertex
Louise Carter
Telephone: 08450341412
Email: louise.carter@xpertex.com
Service scope
- Service constraints
- Requires Juniper Networks devices
- System requirements
- Juniper SRX devices and/or Secure Service Edge
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer 4hr, 8hr or Next Business Day (NBD) SLA's according to the customer requirements and in line with ITIL processes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Web chat is available either via our ticketing portal, or direct supplier to customer Teams instant messaging.
- Web chat accessibility testing
- None.
- Onsite support
- Yes, at extra cost
- Support levels
- Xpertex can provide 4hr, 8hr, or NBD on site support. Pricing varies, but please refer to the SFIA rate card for engineer rates to give indicative pricing.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Customer can use our Managed Solutions team and/or Juniper online documentation - https://www.juniper.net/documentation/us/en/quick-start/software/sd-cloud/sd-cloud-quick-start/topics/topic-map/step-1-begin.html
Juniper offers an "all you can eat" training pass for circa £5500 for access to all Juniper online and in -person training courses. - Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Online
- Helpdesk
- Online or onsite training
- End-of-contract data extraction
- Device configurations can be exported and some analytics via report export. The users can then delete the firewalls and their configuration data is deleted.
- End-of-contract process
- Configuration can be exported. Cloud instance can be wiped clean if desired.
Using the service
- Web browser interface
- Yes
- Using the web interface
- Full configuration and management of Juniper SRX firewalls and security policies, including UTM features.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
-
Delivers full-stack Security Service Edge (SSE) capabilities, including FWaaS, SWG, CASB with DLP, ZTNA, and advanced threat protection to protect access to web, SaaS, and on-premises applications and provide users with security that follows them wherever they go.
Collects and automatically correlates data across multiple security layers— email, endpoint, server, cloud workloads and network—so threats are detected faster, and security teams can improve investigation and response times. Prevents future attacks with mitigation rules.
Creates and centrally manages security policies through a user intentbased system, evaluating threat intelligence from multiple sources while dynamically enforcing policies in near real-time across the network.
Enforces threat management policies at firewalls and access switches, aggregating threat feeds from Advanced Threat Prevention Cloud, SecIntel, and on-premises custom threat intelligence solutions with allow list and blocklist support.
Provides the ability to schedule reports that show shadow or where
redundant firewall rules are and recommends actions to fix all reported issues.
Displays where threats originate in near real-time and allow you to take action to stop them.
Automate security policies across the network, including firewalls and routers, for accurate enforcement, consistent security, and compliance - Web interface accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
- Provides RESTful APIs used in conjunction with automation tools. Automates configuration and management of physical, virtual, or containerized SRX Series firewalls.
- API automation tools
-
- Ansible
- Chef
- OpenStack
- Puppet
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Other
- Using the command line interface
- Full management and configuration, complete control of the platform.
Scaling
- Scaling available
- Yes
- Scaling type
- Automatic
- Independence of resources
- Not really relevant as the portal is used only to adminster firewalls. No real user volumes, so the underlying Cloud platform manages this.
- Usage notifications
- Yes
- Usage reporting
- Other
- Other usage reporting
- Alert within portal
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- Memory
- Network
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Juniper Networks
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- No
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
Juniper Networks will use commercially reasonable efforts to make the Cloud Services fully available and operable over the internet in full conformity with the Cloud Service specifications for access and use by Customer, as measured over the course of each calendar month, an average of 99.99% of the time.
All scheduled maintenance work and planned downtime will be during the hours from 7:00 p.m. PST to 7:00 a.m. PST on any day. Planned downtime is not expected to occur more than once or twice per year and is not expected to exceed 120 minutes in any given month.
Note that availability of the Secure Edge service means the service is available to accept Customer’s end-user traffic, and Customer has properly configured its CPE (customer premises equipment) and end-user devices to leverage Secure Edge’s redundant infrastructure.
Juniper will use commercially reasonable efforts to enable Secure Edge to process Customer’s traffic with an average latency of 100 milliseconds or less for the 95th percentile of traffic. Processing latency of the Secure Edge means the time it takes for the incoming traffic to traverse the Secure Edge service. - Approach to resilience
-
By leveraging the public cloud, the infrastructure components and services of the Cloud Service are deployed redundantly (across AWS clusters and zones) in an effort to provide 24 x 7 availability. In addition, the Cloud Service is divided into microservices, so issues with one microservice do not directly affect other microservices. The
Cloud Service buffers data in the event of a component disaster, such as the loss of backend microservice. Once the disaster has been addressed, the data is replayed to fill in the lost analytics. System upgrades and feature introductions also benefit from microservices to avoid impact to the Cloud Service when performing either. This reduces the need for planned downtime. The Cloud Service has a scheduled downtime during the release upgrade, and Customers are notified 48 hours in advance of any such downtime. Minor updates and patches can be performed without any downtime. - Outage reporting
- Via API, email and partner Slack channel
Identity and authentication
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- This is a management service so ALL users perform management functions.
- Access restriction testing frequency
- Less than once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
- Devices users manage the service through
-
- Dedicated device on a segregated network (providers own provision)
- Dedicated device on a government network (for example PSN)
- Dedicated device over multiple services or networks
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- Between 1 month and 6 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS Internation
- ISO/IEC 27001 accreditation date
- 30/01/2020
- What the ISO/IEC 27001 doesn’t cover
- Customer technology services, such as cloud services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO9001
- FIPS 140-2
- Common Criteria
- DDIN APL
- CSfC
- USGv6
- NDAA section 889 compliance
- TAA compliance
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
As an ISO 27001 certified organisation Xpertex follow a suite of processes that support our policies that themselves have been derived from our Statement of Applicability (SoA).
Examples of our documentation suite –
1. Risk Assessment
2. Business Continuity and Disaster Recovery
3. Non-conformance and Breaches
4. Physical Security
5. Personnel Security including remote working
6. Network Security
7. Technology estate
8. Crypto Management (where required)
9. Supply Chain Assurance (via the Rizikon toolset)
8. User SyOps
10. Asset Management including safe Destruction and Disposal
11. Change Control
12. Data Classification and Handling
We have an over-arching Security Management Plan (SMP), that covers all aspects of our Information Security estate and is available upon request.
We re-certify to ISO 27001 every 3 years, but we are subject to annual maintenance audits (next audit due in June 2022).
The Security Controller has responsibility to audit compliance against the controls in the ISO standard, these audit records form part of continual improvement posture we have that is driven by our ISO 9001 Quality Management System (that has recently been recertified).
Monthly board meetings include a standing agenda from the security controller where all security matters are discussed and minuted.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All part of our standard Impact Assessment, ITL lifecycle management and Change Management processes.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Juniper PSIRT - https://www.juniper.net/security/report-vulnerability/
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Xpertex provide protective monitoring services to our customers. Internally, we use AlienVault software in line and accordance with our CE+ and ISO 27001 and ISO 9001 certfications.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
Details of impact of specific failures and associated priorities and SLA's are be discussed and agreed with customers in line with ITIL best practice. Our Service Manager will work to resolve service incidents to meet target performance level (KPI's and SLA's) and can escalate our response through the Service Director.
Incidents are reported by telephone our email through to our service desk and are reported in accordance with the support contract in place between us and the customer at that time.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Xpertex is committed to continually improving our environmental performance and monitoring. Xpertex has started the process to gain the following two environmental ISO accreditations:
ISO 14001 Environmental Management System
ISO 50001 Energy Management System
This is on top of our existing ISO9001, ISO27001 and Cyber Essentials PLUS accreditations.
Critical to our core operation is our IT infrastructure and Data Centre, which house our IT equipment, along with connectivity to our cloud Infrastructure. Xpertex recognises that energy efficient practices, and reducing our carbon footprint, are paramount in achieving our corporate sustainability goals.
Xpertex also works with its customers to help them reduce their carbon footprint where appropriate.
Full social value statement https://xpertex.com/social-values/Tackling economic inequality
We are committed to equal pay for our workforce. To address our gender pay gap, we have several initiatives in place, to not only attract more talent, but to encourage a more balanced, and rewarding workplace.
Working with educational institutions to help attract more women into STEM focused roles.
We have a mentoring programme available for all, to encourage progression into senior roles.
Training is available to cover areas like Equality & Diversity, Unconscious Bias, etc.
We have established a Women’s Working Group who assist in supporting the attraction, retention and promotion of our female talent across the business.
Full social value statement https://xpertex.com/social-values/Equal opportunity
Xpertex is committed to developing, supporting and sustaining a diverse workforce. It strives to create a working environment where everyone can to do their job, to the best of their ability, without having to face discrimination, harassment or victimisation. Xpertex avoids unlawful discrimination in all aspects of employment including recruitment, promotion, training opportunities, pay and benefits, discipline and selection for redundancy. Any decisions concerning employment, promotion and training will be based on objective, job-related criteria and merit. Disability and personal/home commitments will not form the basis of employment decisions except where absolutely reasonable and permissible within anti-discrimination law.
Xpertex monitors the ethnic, gender, age composition of our existing workforce as well as the number of people with disabilities within these groups and will consider and take any appropriate action to address any problems that may be identified by the monitoring process.
Full social value statement https://xpertex.com/social-values/Wellbeing
Xpertex has an Employee Assistance Programme available to all staff which provides access to advice, counselling and support. Workplace mental health is especially important to the company with information and advice issued on a regular basis. We give every employee a day off on their birthday and additional holiday allowances are in place to recognise length of service milestones. We conduct an annual staff survey which provides opportunity for any issues to be raised to the senior management. Processes exist where concerns can be raised without fear of negative consequences for the individual raising the concerns. Flexible working practises developed during the Covid pandemic are in place giving all staff the ability to work from home where possible. We are continuing to provide these flexible working practices post-pandemic. Flexible working hours are encouraged and were invaluable during the pandemic and enabled parents with school age children to home-school their children, and those with responsibilities to the elderly to provide the support they wish to give. Staff are also encouraged to volunteer to continue to volunteer in the community. Xpertex participated in a local initiative to offer IT equipment to under-privileged children in the local community allowing them to conduct their schooling from home. When staff started to return to the office, all sensible precautions have been maintained. A cycle to work and an electric car salary sacrifice scheme are also available to all employees.
Full social value statement https://xpertex.com/social-values/
Pricing
- Price
- £191 to £18,983 a device a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30 day limited