throbber
Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 1 of 7
`
`Case 3:17-cv-05659-WHA Document171-11 Filed 07/27/18 Page 1 of 7
`
`EXHIBIT 12
`
`

`

`5/31/2018
`
`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 2 of 7
`
`Products & Services
`
`Products
`
`Products & Services
`Advanced Threat Prevention
`Appliance
`Comprehensive threat and malware detection,
`Application Management & Orchestration
`consolidated security analytics, and quick threat
`mitigation.
`Identity and Policy Control
`
`Network Edge Services
`PRODUCTS & SERVICES  SECURITY   
`
`MORE
`
`Network Management
`
`DATASHEET
`
`Overview
`Network Operating System
`
`REQUEST A QUOTE
`
`The Advanced Threat Prevention Appliance provides comprehensive on-premises protection
`HOW TO BUY
`Packet Optical
`against a sophisticated, ever-changing threat landscape.
`
`With traditional signature-based security tools, zero-day attacks often go undetected. The
`Routers
`Juniper ATP Appliance uses advanced machine learning and behavioral analysis technologies to
`identify existing and unknown advanced threats in near real time. It does this through
`Security
`continuous, multistage detection and analysis of Web, email, and lateral spread traffic moving
`through the network.
`Software Defined Networking
`The ATP Appliance ingests threat data from multiple security devices, applies analytics to
`identify advanced malicious traits, and aggregates the events into a single comprehensive
`Switches
`timeline view of all the threats on the network. Your security team can quickly see how the
`attack unfolded and easily prioritize critical alerts.
`All Products A-Z
`
`Integrated SRX Series firewalls inspect traffic, submit suspicious files to the threat behavior
`End of Life
`engine, and update the ATP Appliance with threat status, accelerating time to detection and
`initiating inline blocking.
`Solutions
`With its open API architecture, the ATP Appliance integrates with third-party security devices for
`seamless, automatic threat mitigation. You can quarantine emails on Google and Office 365
`Cloud
`using REST APIs. Malicious IP addresses are pushed to firewalls to block the communication
`between command-and-control (C&C) servers and infected endpoints. Infected hosts are
`Security
`isolated through integration with network access control devices.
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`1/6
`
`

`

`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`5/31/2018
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 3 of 7
`The Advanced Threat Prevention Appliance is available in physical and virtual form factors. You
`Service Provider
`can deploy physical appliances in all-in-one or distributed mode, and virtual appliances in
`distributed mode only.
`Services
`
`
`
`Up to
`96
`GB Memory
`
`Up to
`80K
`detonations/day
`
`READ LESS
`TechLibrary
`
`Design & Architecture Center
`
`
`Support
`
`Support
`
`MyJuniper
`
`Case Management
`
`Cases/RMAs
`
`Up to
`2
`Gbps Performance
`
`Your Open Cases
`
`Your Open RMAs
`
`Create a Case/RMA
`
`Managing
`
`Contact Support
`
`Product Warranty
`
`Downloads & Docs
`
`SOLUTION: Unified Cybersecurity
`Platforms
`Enforce a consistent security posture across your networks and clouds.
`

`
`Junos
`
`ScreenOS
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`2/6
`
`

`

`5/31/2018
`
`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 4 of 7
`
`Junos Space
`
`All Downloads
`
`Documentation
`DEFENSE EXTENDED
`Cybersecurity that can keep your data and people safe—anywhere.
`TechLibrary
`

`
`Pathfinder
`
`Troubleshooting
`
`Knowledge Base
`
`Service Now
`
`
`
`CYBER CRIMINALS
`Service Insight
`Learn how machine learning and AI can help you beat the bad guys.
`

`
`Problem Report Search
`
`Contracts & Licenses
`
`Contracts/Products
`
`Register New Product
`
`Serial Number Entitlement
`FREE TRIAL
`Experience the power of Juniper Advanced Threat Prevention Appliance.
`Search Contracts/Products
`

`
`Order Status
`Features
`Licenses
`Multivector Traffic Inspection
`Generate Product Licenses
`Inspects traffic across multiple vectors including Web, email, and lateral spread.
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`3/6
`
`

`

`5/31/2018
`
`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 5 of 7
`Multiple File Type Analytics
`Find License Keys
`Analyzes multiple file types, including executables, DLL, Mach-o, Dmg, PDF, Office, Flash,
`ISO, ELF, RTF, APK, Silverlight, Archive, and JAR.
`Security
`
`Effective Detection Techniques
`Security Intelligence
`
`Employs advanced threat detection techniques, including exploit detection, payload
`Report a Vulnerability
`analysis, C&C detection, YARA, and SNORT rules.
`
`Training
`Endpoint Integration
`
`Integrates with Carbon Black Protect and Response (endpoint solution) to allow upload
`Training
`of binaries executed on endpoints.
`
`Training
`Extensive Data Correlation
`
`Correlates events across kill chain stages to monitor threat progress and risk; visualizes
`Courses
`malware activity and groups malware traits to help incident response teams better
`understand malware behavior.
`Schedule of Classes
`
`Contextual Threat Prioritization
`On-Demand Courses
`
`Prioritizes threats based on risk calculated from threat severity, threat progress, asset
`Learning Paths
`value, and other contextual data.
`
`Getting Started
`Host Behavior Timeline
`
`Provides timeline host view to obtain complete context about malware events that have
`Learning Bytes
`occurred on the host.
`
`Certification
`Automated Threat Mitigation on Email, Web, and Lateral Traffic
`
`Quarantines malicious Office 365 and Google emails automatically; integrates with
`Getting Started
`Bluecoat, Checkpoint, Cisco, Fortinet, and Palo Alto Networks solutions to automatically
`block malicious IP addresses and URLs.
`Exam Registration
`
`Juniper Open Learning
`
`Academic Alliance
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`4/6
`
`

`

`5/31/2018
`
`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 6 of 7


`Specifications
`Support
`
`How to Buy
`
`How to Buy
`
`Contact Sales
`

`Training
`

`Technical Documentation
`

`Datasheets
`

`White Papers
`
`Request a Quote
`
`Buy from a Local Partner

`Blogs
`
`Find a Sales Office
`
`All Buying Options
`
`About Juniper
`

`Solution Briefs
`
`Partners
`Services
`About Juniper
`Community
`Partners
`Community
`
`Request a Quote
`
`How to Buy
`
`Feedback
`
`Contact Us
`
`Careers
`
`Image Library
`
`RSS Feeds
`
`Corporate Responsibility
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`5/6
`
`

`

`5/31/2018
`Juniper Networks Advanced Threat Prevention Appliance - Juniper Networks
`Case 3:17-cv-05659-WHA Document 171-11 Filed 07/27/18 Page 7 of 7
`Privacy Policy
`
`Legal Notices
`
`Insights
`
`Site Map
`
`United States
`
`© 1999 - 2018 Juniper Networks, Inc.
`All rights reserved
`
`https://www.juniper.net/us/en/products-services/security/advanced-threat-prevention-appliance/
`
`6/6
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket