Know your gear
The STRM Series surveys the entire network using J-Flow sources in a customer's routing infrastructure to form layer 3 and layer 4 analysis of application behavior and a detailed history of all network flow activity. Leveraging J-Flow as a source, STRM Series discovers the rate, volume and nature of network traffic to detect issues that affect service levels, and offers early detection of security threats that would otherwise go unnoticed. STRM Series analyzes these traffic flows to create a flow record that contains details of the conversation, including a deep packet inspection that identifies the actual application (regardless of port).
What the STRM Series detects from J-Flow also helps to create a picture of the assets that exist within an environment, their vulnerability level and business value. These asset profiles are then used as a contextual correlation source for other incoming Juniper security events.
What the STRM Series detects from J-Flow also helps to create a picture of the assets that exist within an environment, their vulnerability level and business value. These asset profiles are then used as a contextual correlation source for other incoming Juniper security events.