{"id":36003,"date":"2020-07-10T17:37:00","date_gmt":"2020-07-10T17:37:00","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/"},"modified":"2020-07-10T17:37:00","modified_gmt":"2020-07-10T17:37:00","slug":"juniper-targets-security-portfolio-at-sase-race","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/","title":{"rendered":"Juniper targets security portfolio at SASE race"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/10\/cso_secure_windows_data_management_lock_key_binary_code_circuits_by_jan_alexander_cc0_via_pixabay_2400x1600-100812639-large.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>The conga line around <a href=\"https:\/\/www.networkworld.com\/article\/3545778\/sase-could-bolster-security-for-remote-workers.html\">secure-access service edge (SASE)<\/a>, continues to grow with Juniper this week becoming the latest to join the dance.<\/p>\n<p>Just as other big networking players with extensive security portfolios including Cisco and VMware have recently done, Juniper says it will build off its offerings to address the SASE blueprint.<\/p>\n<aside class=\"fakesidebar\">\n<p><strong>Read about edge networking<\/strong><\/p>\n<\/aside>\n<p>As defined by Gartner in 2019, SASE features a wide variety of components that Juniper summarized and includes:<\/p>\n<ul>\n<li>Cloud-hosted architectures, so that services can be easily deployed on-demand and at scale.<\/li>\n<li>Identity-driven policies, whereby network access and security can be customized based on individual user requirements.<\/li>\n<li>Localized policy inspection\/enforcement to deliver applications and services as close to users as possible to minimize latency.<\/li>\n<\/ul>\n<p>\u201cBy integrating network and security elements together in a single platform, Juniper customers can seamlessly and cost effectively take advantage of advanced security services like Application Security for broader visibility and control, Advanced Threat Prevention, Intrusion Detection and Prevention along with Data Loss Prevention. All with no additional hardware or software required,\u201d wrote Samantha Madrid vice president of product management in the Security Business &amp; Strategy business at Juniper Networks in a <a href=\"https:\/\/blogs.juniper.net\/en-us\/security\/it-takes-more-than-marketing-to-implement-a-sase-solution\" rel=\"nofollow\">blog<\/a> about the vendors SASE directions.<\/p>\n<p>\u201cSASE customers can identify and defend against new zero-day malware and targeted attacks, mitigate risks by updating existing security controls to defend against identified and unknown threats, reduce the time and cost to remediate threats and, overall, reduce exposure to advanced threats.\u201d<\/p>\n<p>Juniper has a variety of security goods under its <a href=\"https:\/\/www.juniper.net\/documentation\/en_US\/release-independent\/solutions\/topics\/concept\/sg-006a-sdsn-product-components.html\" rel=\"nofollow\">Connected Security<\/a> architecture to make a serious SASE play. For example, its cloud-based Advanced Threat Prevention (ATP), offers advanced malware protection. In addition, Juniper SRX and vSRX firewalls offer remote configuration and security, networking and application policy monitoring.<\/p>\n<aside class=\"nativo-promo nativo-promo-1 smartphone\" id> <\/aside>\n<p>Another key component will include Juniper&#8217;s effort to incorporate artificial intelligence&nbsp; in its key security components as well as its MX Series routers, and its EX and QFX Series switches. &nbsp;<\/p>\n<p>The company bought wireless and AI-software maker Mist in 2019 for $405 million and has been integrating the technology across its portfolio ever since. Most recently, Juniper said it would integrate its Security Intelligence (<a href=\"https:\/\/blogs.juniper.net\/en-us\/security\/juniper-networks-unleashes-the-power-of-a-threat-aware-network?utm_medium=website&amp;utm_source=pressrelease&amp;utm_campaign=LNCH_AMER_ENT_SEC_20Q1_RSA\" rel=\"nofollow\">SecIntel<\/a>) security package to the Mist platform for wireless access. SecIntel includes threat detection software, local and cloud-based security-information and control software with a next-generation <a href=\"https:\/\/www.networkworld.com\/article\/3230457\/what-is-a-firewall-perimeter-stateful-inspection-next-generation.html\">firewall<\/a> system.&nbsp;<\/p>\n<aside class=\"nativo-promo nativo-promo-1 tablet desktop\" id> <\/aside>\n<p>With the SecIntel integration, Mist customers can receive threat alerts detected by Juniper SRX Series Firewalls and ATP Cloud, letting administrators quickly assess security risks and take appropriate action, Juniper said.<\/p>\n<p>A future area of Mist AI integration will include <a href=\"https:\/\/www.networkworld.com\/article\/3487801\/juniper-broadens-sd-branch-management-switch-options.html\">Juniper\u2019s SD-WAN<\/a> technology, Juniper\u2019s CEO Rami Rahim <a href=\"https:\/\/www.networkworld.com\/article\/3544025\/junipers-big-push-ai-in-all-areas-of-enterprise-networking.html\">told Network World<\/a> recently.&nbsp;<\/p>\n<p>\u201cCustomers need the ability to assure solid connectivity across the entire path of network \u2013 that includes wireless and wired connections \u2013 and the path traffic takes from a particular location \u2013 be it at home or the data center or to the cloud \u2013 and it would be a natural extension to include the <a href=\"https:\/\/www.networkworld.com\/article\/3518992\/top-10-underused-sd-wan-features.html\">SD-WAN<\/a>. That\u2019s a work in progress,\u201d Rahim said.<\/p>\n<p>Juniper uses AI-driven automation, insight and actions across the LAN, WLAN and WAN to optimize the end-to-end user experience, Madrid stated. This includes customized Service Level Expectations, event correlation across the LAN and WAN for rapid fault isolation and resolution, AI-driven support with proactive notifications and an interactive Virtual Network Assistant (VNA) called Marvis to provide recommended actions and\/or keep the network humming autonomously, Madrid stated.<\/p>\n<aside class=\"nativo-promo nativo-promo-2 tablet desktop smartphone\" id> <\/aside>\n<p>Juniper\u2019s SASE plans come on the heels of recent announcements by other key players in what is expected to be a hot market.&nbsp;<\/p>\n<p>For example, VMware in June said it was <a href=\"https:\/\/www.networkworld.com\/article\/3564154\/vmware-offers-up-a-sase-service-with-sd-wan-built-in.html\">advancing secure access<\/a> for remote and mobile workers by mixing its Workspace ONE offering with its SD-WAN package. The resulting VMware SD-WAN Zero Trust Service promises to help enterprises&nbsp; handle growing distributed workloads for remote workers. The service also represents a big step toward SASE, the company said.<\/p>\n<p>\u201cSpeed and data are two of the most valuable business currencies in today\u2019s rapid growth environment, both of which have rendered traditional security deployments insufficient and ineffective,\u201d VMware <a href=\"https:\/\/blogs.vmware.com\/velocloud\/2020\/05\/05\/securing-sd-wan-without-compromising-security\/\" rel=\"nofollow\">stated<\/a>. \u201cEnterprises need to take advantage of SD-WAN technology without falling prey to increased threats. The ability of cloud-delivered security solutions can combat the increasing sophistication of security threats while reducing latency and costs.\u201d<\/p>\n<p>In May <a href=\"https:\/\/www.networkworld.com\/article\/3546229\/cisco-takes-aim-at-supporting-sase.html\">Cisco said it was embracing the SASE<\/a> architecture with plans to upgrade some of its existing products to reach the goal of delivering access control, security and networking to cloud services. The enterprise shift to SASE will be gradual as they figure out the best way to connect their growing remote workforce to distributed resources delivered from corporate data centers and as cloud services, Cisco says.<\/p>\n<p>\u201cFlexibility will be fundamental as IT chooses among multiple security and networking capabilities that best fit their operations, regulatory requirements, and types of applications,\u201d said Jeff Reed, senior vice president of product, Cisco\u2019s Security Business Group in a <a href=\"https:\/\/blogs.cisco.com\/security\/building-a-bridge-to-secure-access-service-edge\" rel=\"nofollow\">blog<\/a> post.<\/p>\n<p>\u201cThe rapid adoption of <a href=\"https:\/\/www.networkworld.com\/article\/3527194\/multicloud-security-integration-drive-massive-sd-wan-adoption.html\">SD-WAN<\/a> for connecting to <a href=\"https:\/\/www.networkworld.com\/article\/3429258\/real-world-tools-for-multi-cloud-management.html\">multi-cloud<\/a> applications provides enterprises with the opportunity to rethink how access and security are managed from campus to cloud to edge,\u201d Reed stated. \u201cWith 60% of organizations expecting the majority of applications to be in the cloud by 2021 and over 50% of the workforce to be operating remotely, new networking and security models such SASE offer a new way to manage the new normal.\u201d<\/p>\n<div class=\"end-note\"> <!-- blx4 #2005 blox4.html --> <\/p>\n<div id class=\"blx blxParticleendnote blxM2005 blox4_html blxC23909\">Join the Network World communities on <a href=\"https:\/\/www.facebook.com\/NetworkWorld\/\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a> and <a href=\"https:\/\/www.linkedin.com\/company\/network-world\" target=\"_blank\" rel=\"noopener noreferrer\">LinkedIn<\/a> to comment on topics that are top of mind. <\/div>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.networkworld.com\/article\/3566297\/juniper-targets-security-portfolio-at-sase-race.html#tk.rss_security\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\nThe conga line around secure-access service edge (SASE), continues to grow with Juniper this week becoming the latest to join the dance.Just as other big networking players with extensive security portfolios including Cisco and VMware have recently done, Juniper says it will build off its offerings to address the SASE blueprint.<br \/>\nRead about edge networking<br \/>\n How edge networking and IoT will reshape data centers<br \/>\n Edge computing best practices<br \/>\n How edge computing can help secure the IoT <\/p>\n<p>As defined by Gartner in 2019, SASE features a wide variety of components that Juniper summarized and includes:To read this article in full, please click here READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36004,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[738],"tags":[762,307],"class_list":["post-36003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networkworld","tag-networking","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-10T17:37:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Juniper targets security portfolio at SASE race\",\"datePublished\":\"2020-07-10T17:37:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/\"},\"wordCount\":912,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/juniper-targets-security-portfolio-at-sase-race.jpg\",\"keywords\":[\"Networking\",\"Security\"],\"articleSection\":[\"Networkworld\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/\",\"name\":\"Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/juniper-targets-security-portfolio-at-sase-race.jpg\",\"datePublished\":\"2020-07-10T17:37:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/juniper-targets-security-portfolio-at-sase-race.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/juniper-targets-security-portfolio-at-sase-race.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/juniper-targets-security-portfolio-at-sase-race\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/networking\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Juniper targets security portfolio at SASE race\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/","og_locale":"en_US","og_type":"article","og_title":"Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-07-10T17:37:00+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Juniper targets security portfolio at SASE race","datePublished":"2020-07-10T17:37:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/"},"wordCount":912,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg","keywords":["Networking","Security"],"articleSection":["Networkworld"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/","url":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/","name":"Juniper targets security portfolio at SASE race 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg","datePublished":"2020-07-10T17:37:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/07\/juniper-targets-security-portfolio-at-sase-race.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/juniper-targets-security-portfolio-at-sase-race\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking","item":"https:\/\/www.threatshub.org\/blog\/tag\/networking\/"},{"@type":"ListItem","position":3,"name":"Juniper targets security portfolio at SASE race"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36003"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36003\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36004"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}