Call a Specialist Today! 888-785-4380
Free Shipping! Free Shipping!

Juniper Networks JSA3800
Scalable Security Management for Medium-Sized to Large Companies


Juniper Networks JSA3800

Juniper Networks Products
JSA Series Appliances
USA: FREE Ground ShippingJSA3800 Base Appliance
#JSA3800-BSE
List Price: $34,500.00
Our Price: $27,773.00

Click here to jump to more pricing!

Overview:

Juniper Networks JSA3800 Secure Analytics platform is an enterprise-class appliance that provides a scalable network security management solution for midsize to large companies, including globally deployed organizations. It is also the base platform for an enterprise-class scalable Secure Analytics solution.

JSA3800 enables collection and correlation of events and flows from Juniper and non-Juniper devices for visibility, reporting, and advanced threat detection across the entire infrastructure. It includes onboard event collection, correlation, and extensive reporting capabilities, and is expandable with additional JSA Series Secure Analytics appliances acting as event and flow collectors on a single appliance.

JSA3800 can be deployed as an all-in-one appliance or in a distributed setup as a dedicated event, flow, or combination processor. It can also be deployed as a store and forward event collector.

Product Description

The integrated approach of JSA Series Secure Analytics, used in conjunction with unparalleled data collection, analysis, correlation, and auditing capabilities, enables organizations to quickly and easily implement a corporate-wide security management program that delivers security best practices. These include superior log analytics with distributed log collection and centralized viewing; threat analytics that deliver realtime surveillance and detection information; and compliance management capabilities—all viewed and managed from a single console.

Juniper Networks JSA Series Secure Analytics combine, analyze, and manage an unparalleled set of surveillance data—network behavior, security events, vulnerability profiles, and threat information—to empower companies to efficiently manage business operations on their networks from a single console.

  • Log Analytics: JSA Series provides scalable log analytics by enabling distributed log collection across an organization, and a centralized view of the information.
  • Threat Analytics: JSA Series provides an advanced network security management solution that bridges the gap between network and security operations to deliver realtime surveillance and detect complex IT-based threats.
  • Compliance Management: JSA Series brings to enterprises, institutions, and agencies the accountability, transparency, and measurability that are critical factors to the success of any IT security program required to meet regulatory mandates.
  • Vulnerability Management: Deployed as a standalone solution or working in conjunction with Threat Analytics, JSA Series can function as a full-featured vulnerability scanner.
  • Risk Management: JSA Series helps security professionals stay ahead of advanced threats by proactively quantifying risks from vulnerabilities, configuration errors and anomalous network activity, preventing attacks that target high value assets and data.

With preinstalled software, a hardened operating system, and a web-based setup process, the JSA Series lets you get your network security up and running quickly and easily. The bottom line of the JSA Series is simple deployment, fast implementation, and improved security, at a low total cost of ownership.

Architecture and Key Components:

JSA Secure Analytics Appliances

The Juniper Networks Secure Analytics appliances provide a scalable solution for security event management. The JSA3800 and JSA5800 are enterprise-class solutions that can be deployed as an all-in-one solution with integrated event collection, correlation and extensive reporting, or as a dedicated event and/or flow collector. The JSA7500 is a carriergrade solution and is NEBS certified.

JSA Virtual Appliance

Juniper Networks JSA Virtual Appliance (JSA VM) Secure Analytics is a virtualized platform that provides Secure Analytics functionality. JSA VM is designed to run with VMWare ESX 5.0 and ESX 5.1, and requires a configuration with a minimum of two CPUs (1 socket x 2 cores or 2 sockets x 1 core) and 8GB of RAM. It processes a maximum of 20,000 events per second or 600,000 flows per minute, with 16 cores and 24 GB of RAM.

Features and Benefits:


Features Feature Description Benefits
All-in-one appliances Event collection, flow collection event processing, flow processing, correlation, analysis, and reporting are all embedded within JSA Series Secure Analytics.
  • All core functions are available within the system and it is easy for users to deploy and manage in minutes.
  • JSA Series architecture provides a streamlined solution for secure and efficient log analytics.
Distributed support JSA Series has the ability to scale to large distributed deployments that can support up to 5 million events per second.
  • Users have the flexibility to scale to large deployments as their business grows. • JSA Series can be easily deployed in large distributed environments.
HDD implementation JSA Series utilizes SAS HDD in RAID 1 and RAID 10 setups.
  • SAS HDD is designed for 24x7 operations.
  • RAID 1/10 implementation provides best possible performance and redundancy.
Easy and quick install JSA Series comes with an easy, out-of-the-box setup wizard. Users can install and manage JSA Series appliances in a couple of steps.
Automatic updates Secure Analytics automatically downloads and deploys reputation feeds, parser updates, and patches. Users don’t need to worry about maintaining appliance and OS updates and patches.
High availability (HA) Users can deploy all JSA Series appliances in HA mode Users can deploy JSA Series with full active/ passive redundancy. This supports all deployment scenarios, all-in-one and distributed.
Built-in compliance reports Out-of-the-box compliance reports are included with the JSA Series. JSA Series provides 500+ out-of-the-box compliance reports.
Reporting and alerting capabilities for control framework
  • Control Objectives for Information and related Technology (CobiT)
  • International Organization for Standardization (ISO) ISO/IEC 27002 (17799)
  • Common Criteria (CC) (ISO/IEC 15408) NIST special publication 800-53 revision 1 and Federal Information Processing
  • Standard (FIPS) 200
JSA Series enables repeatable compliance monitoring, reporting, and auditing processes.
Compliance-focused regulation workflow
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes-Oxley Act (SOX)
  • Graham-Leach-Bliley Act (GLBA)
  • Federal Information Security Management
  • Act (FISMA)
  • JSA Series supports multiple regulations and security best practices.
  • Includes compliance-driven report templates to meet specific regulatory reporting and auditing requirements.
Management-level reports on overall security state The JSA Series reports interface allows you to create, distribute, and manage reports that are generated in PDF, HTML, RTF, XML, or XLS formats. Users can use the report wizard to create executive and operational level reports that combine any network traffic and security event data in a single report.
One stop support Juniper Networks Technical Assistance Center (JTAC) supports all aspects of the JSA Series. Users don’t need to go to several places to get support, even for multivendor issues.

Log Analytics

JSA Series provides a comprehensive log analytics framework that includes scalable and secure log analytics capabilities integrated with real-time event correlation, policy monitoring, threat detection, and compliance reporting.

Features Feature Description Benefits
Comprehensive log management JSA Series delivers scalable and secure log analytics with storage capabilities from GB to TB of data storage. Provides long term collection, archival, search, and reporting of event logs, flow logs, and application data that enables logging taxonomy from a centralized view.
Comprehensive reporting JSA Series comes with 1,300+ canned reports. Report Wizard allows users to customize and schedule daily, weekly, and monthly reports that can be exported in PDF, HTML, RTF, Word, Excel, and XML formats. Provides users not only the convenience of canned reports but also the flexibility to create and customize their own reports according to their business needs.
Log management and reporting only option JSA Series provides a comprehensive log management and reporting solution with a distributed log analytics only solution to collect, archive, customize, and analyze network security event logs. Allows users to start with a log management and reporting only option and then upgrade to full blown JSA Series functionality as their business need grows—without upgrading their existing hardware.
Log retention and storage JSA Series database can easily archive logs and integrate into an existing storage infrastructure for long-term log retention and hassle-free storage. Enables organizations to archive event and flow logs for whatever time period is specified by a specific regulation.
Tamperproof data
  • Event and flow logs are protected by SHA-x (1- 256) hashing for tamper proof log archives.
  • Support of extensive log file integrity checks including National Institute of Standards and Technology (NIST) log management standards.
Provides secure storage based on industry regulations.
Real-time event viewing JSA Series allows users to monitor and investigate events in real time or perform advanced searches. The event viewer indicates what events are being correlated to offenses and which are not.
  • Users have the ability to quickly and effectively view and filter real-time events.
  • Provides a flexible query engine that includes advanced aggregating capability and IT forensics
Data warehousing JSA Series includes a purpose-built data warehouse for high speed insertion and retrieval of data archive of all security logs, event logs, and network activity logs (flow logs). Enables full audit of all original events and flow content without modification.

Threat Analytics

JSA Series Secure Analytics’ network security management solution takes an innovative approach to managing computerbased threats in the enterprise. Recognizing that discrete analysis of security events is not enough to properly detect threats, the JSA Series was developed to provide an integrated approach to threat analytics that combines the use of traditionally siloed information to more effectively detect and manage today’s complex threats. Specific information that is collected includes:

  • Network Events: Events generated from networked resources, including switches, routers, servers, and desktops.
  • Security Logs: Includes log data generated from security devices like firewalls, VPNs, intrusion detection/prevention, antivirus, identity management, and vulnerability scanners.
  • Host and Application Logs: Includes log data from industry-leading host operating systems (Microsoft Windows, UNIX, and Linux) and from critical business applications (authentication, database, mail, and Web).
  • Network and Application Flow Logs: Includes flow data generated by network devices and provides an ability to build a context of network and protocol activity.
  • User and Asset Identity Information: Includes information from commonly used directories, including Active Directory and Lightweight Directory Access Protocol (LDAP). By incorporating patent pending “offense” management technology, this integrated information is normalized and correlated by the JSA Series, resulting in automated intelligence that quickly detects, notifies, and responds to threats missed by other security solutions with isolated visibility.
Features Feature Description Benefits
Out-of-the-box correlation rules JSA Series correlation rules allow users to detect specific or sequential event flows or offenses. A rule consists of tests and functions that perform a response when events match.
  • Provides hundreds of out-of-the-box correlation rules that provide immediate value.
  • Users can create their own rules by using the JSA Series rule wizard to generate automated alerts and enable real-time policy enforcement.
Offense management The offense manager allows you to investigate offenses, behaviors, anomalies, targets, and attackers on your network. The JSA Series can correlate events and network activity with targets located across multiple networks in the same offense and ultimately the same network incident.
  • This allows users to effectively investigate each offense in their network.
  • Users can navigate the common interface to investigate the event details to determine the unique events that caused the offense.
QID mappings JSA Series associates or maps a normalized or raw event to a high-level and low-level category.
  • Allows users to see real-time events mapped to appropriate categories
  • This enables the mapping of unknown device events to known JSA Series events in order to be categorized and correlated appropriately
Historical profiling JSA Series collects and stores entire event data for later use, enabling extensive use of historical profiling for improved accuracy. Allows users to view historical data at any given point as well as views into incident management and the tracking of events.
JSA Series magistrate JSA Series magistrate component prioritizes the offenses and assigns a magnitude value based on several factors that include the number of events, severity, relevance, and credibility.
  • Allows users to see prioritized security events rather than looking through thousands of log events.
  • Enables users to see what events have the most impact on their business and respond quickly to threats.
Offense manager API JSA Series provides a set of open APIs to modify and configure incident management parameters like “create, close, and open.” Allows users to integrate third-party customer care applications like Remedy and other ticketing solutions.
Flow support Flow support includes NetFlow, J-Flow, sFlow, and IPFIX
  • Enables collection, visibility, and reporting of network traffic.
  • Includes Network Behavior Anomaly Detection (NBAD) to detect rough servers, and APTs based on network activity.

Vulnerability Management:

As a member of the JSA Series Secure Analytics network security management solution, Juniper Secure Analytics Vulnerability Manager helps organizations minimize the chances of a network security breach by proactively finding security weaknesses and mitigating potential risks. Using Juniper Secure Analytics Vulnerability Manager, organizations can perform rapid network scans, discover and highlight high-risk vulnerabilities from an integrated dashboard, and automate regulatory compliance through powerful collection, correlation and reporting tools.

Features Feature Description Benefits
Vulnerability overview Juniper Secure Analytics Vulnerability Manager maintains a current view of all discovered vulnerabilities, including details such as when they were found, when they were last seen, what scan jobs reported them, and to whom the vulnerability was assigned for remediation or mitigation. Provides the insight needed to make informed decisions.
Vulnerability dashboard The vulnerability dashboard provides a single, integrated view into multiple vulnerability assessment feeds and threat intelligence sources, allowing security teams to quickly identify exposures that pose the greatest risks. Makes it easy to identify and prioritize vulnerabilities.
Rapid network scans Scans can be scheduled or performed dynamically to identify and locate security weaknesses to minimize risks. Allows network vulnerabilities to be quickly found, analyzed and remediated.
Automated regulatory compliance Conducts regular network scans and maintains detailed audit trails to facilitate compliance with federal or industry regulations. Makes compliance easy and automatic.

Risk Management:

Juniper Secure Analytics Risk Manager is an integral component of a complete security intelligence solution, helping security professionals detect and mitigate advanced threats. The ability to proactively quantify risk from vulnerabilities, configuration errors, anomalous network activity, and other outside threats can help organizations prevent exploits that target high-value assets and data.

Features Feature Description Benefits
Risk Manager Topology Viewer Enables users to see network devices and their respective relationships, including subnets and links. Helps visualize current and potential network traffic patterns with a network topology model, based on security device configurations.
Device configuration management Automates the collection, monitoring, and auditing of device configurations across an organization’s switches, routers, firewalls, and intrusion detection system/intrusion prevention system (IDS/IPS) devices. Provides centralized network security device management, reducing configuration errors and simplifying firewall performance monitoring.
Advanced investigative network topology, traffic and forensics tools Two network visualization security tools provide unique, risk-focused, graphical representations of the network, providing network and security teams with critical vulnerability information before, during, and after an exploit. Quantifies and prioritizes risks with a policy engine that correlates network topology, asset vulnerabilities, and actual network traffic, enabling risk-based remediation and facilitating compliance.

Compliance Management

Organizations of all sizes across almost every vertical market face a growing set of requirements from IT security regulatory mandates. Recognizing that compliance with a policy or regulation will evolve over time, many industry experts recommend a compliance program that can demonstrate and build upon the following key factors:

  • Accountability: Providing surveillance that reports on who did what and when
  • Transparency: Providing visibility into the security controls, business applications, and assets that are being protected
  • Measurability: Metrics and reporting around IT risks

Licensing

Secure Analytics is available in two different licensing options:

  • Log Analytics: Enables event searching, custom dashboards, and scheduled reporting
  • Threat Analytics: All log analytics features + flow support, advanced correlation, and vulnerability assessment Integration

Specifications:


Model: JSA3800 JSA5800 JSA7500
Dimensions (W x H x D) 17.2 x 1.7 x 23.5 in (43.7 x 4.3 x 56.7 cm) 17.2 x 3.5 x 24.8 in (43.7 x 8.9 x 63 cm) 17.2 x 3.5 x 23.5 in (43.7 x 8.9 x 56.7 cm)
Weight 28 lb (12.7 kg) 42 lb (19 kg) 63 lb (28.6 kg)
Rack mountable 1U (rails and screws included) 2U (rails and screws included) 2U (rails and screws included)
A/C power supply Standard: 650W high-efficiency
AC-DC Redundant power: Support hot-swap
AC Input: - 100-127 V, 7.8 Amp; - 200-240 V, 3.8 Amp, 60/50 Hz
Standard: 920W high-efficiency (94%+)
AC-DC redundant power; support hot-swap
AC Input: - 100-240 V, 50-60 Hz, 11-4.4 Amp
Optional: 750W high-efficiency
AC-DC hot swap dual redundant power module
AC input: 100-240 V, 50-60 Hz, 10-6 Amp
DC output: 3 Amp @ +5V standby; 62.5 Amp @ +12V
D/C power supply Optional: 650W high-efficiency redundant DC to DC power supply
Support hot-swap.
DC Input: -44Vdc to -72Vdc, 20A (max)
Optional: 850W/1010W highefficiency redundant DC to DC power supply
Support hot-swap.
DC Input: 850W: -35Vdc to -42Vdc, 30-25A
Standard: 750 W DC power module
DC input: 45 to -60 Vdc, 40A (max)
DC output: 3 Amp @ +5V standby; 62.5 Amp @ +12V
Fans 4 x 5.6 cm counter-rotating PWM fans 3 x 8 cm 9.5K RPM, 4-pin PWM fans Air intake from front and exhausts to rear of unit; 6 x 80 mm redundant hot swap fans
Traffic ports 2x SFP+ 10GbE
4x RJ-45 GbE
2x SFP+ 10GbE
4x RJ-45 GbE
4 x RJ-45 10/100/1000
2 x IOC slots 2/3 height
Console port 1 x RJ-45 DB9 serial console 1 x RJ-45 DB9 serial console 1 x RJ-45 serial console
Hardware Specifications
Maximum events per second (distributed collector) 5,000 20,000 30,000
Flows per minute 100,000 600,000 1.2 million
CPU 1 x Six-Core 2 x Ten-Cores 2 x Octo-Core
Memory 64 GB RAM 128 GB RAM 128 GB RAM
Storage 6 x 900GB 2.5” 10K SAS, RAID 10 8 x 900GB 2.5" 10K SAS, RAID 10 28 x 900 GB HDD, RAID 10
IOC slots None None 2 x 2/3 height
PSU 650W AC (dual included), (DC optional)
Note: Mixing AC and DC supplies is NOT recommended nor supported
920W AC (dual included), (DC optional)
Note: Mixing AC and DC supplies is NOT recommended nor supported
750W DC (dual included), (AC optional)
Note: Mixing AC and DC supplies is NOT recommended nor supported
Environment
Operating Temperature 50° to 104° F (10° to 40° C) 50° to 104° F (10° to 40° C) Normal: 41° to 104° F (5° to 40° C),
Short-term: 23° to 131° F (-5° to 55° C )
Storage Temperature -40° to 158° F (-40° to 70° C) -40° to 158° F (-40° to 70° C) -40° to 158° F (-40° to 70° C)
Relative Humidity (Operating) 8 to 90% noncondensing 8 to 90% noncondensing 8 to 90% noncondensing
Relative Humidity (Storage) 5 to 95% noncondensing 5 to 95% noncondensing 5 to 95% noncondensing
Altitude (Operating) 6,500 ft maximum 6,500 ft maximum 10,000 ft maximum
Altitude (Storage) 35,000 ft maximum 35,000 ft maximum 40,000 ft maximum
Compliance and Safety
Safety Certifications CSA 60950-1 Safety of Information Technology Equipment
  • UL 60950-1
  • EN 60950-1
  • IEC 60950-1
CSA 60950-1 Safety of Information Technology Equipment
  • UL 60950-1
  • EN 60950-1
  • IEC 60950-1
CAN/CSA-C22.2
  • No. 60950-1-03
  • UL60950-1:2003
  • EN60950-1:2001+A11
  • IEC 60950-1:2001
Emissions Certifications
  • 47CFR Part 15, (FCC) Class A
  • ICES-003 Class A
  • EN 55022 Class A
  • CISPR 22 Class A
  • EN 55024
  • CISPR 24
  • EN 300 386
  • VCCI Class A
  • AS/NZA CISPR22 Class A
  • KN22 Class A
  • CNS13438 Class A
  • EN 61000-3-2
  • EN 61000-3-3
  • 47CFR Part 15, (FCC) Class A
  • ICES-003 Class A
  • EN 55022 Class A
  • CISPR 22 Class A
  • EN 55024
  • CISPR 24
  • EN 300 386
  • VCCI Class A
  • AS/NZA CISPR22 Class A
  • KN22 Class A
  • CNS13438 Class A
  • EN 61000-3-2
  • EN 61000-3-3
  • FCC Class A
  • EN 55022 Class A
  • EN 55024 Immunity
  • EN 61000-3-2
  • VCCI Class A
Warranty Hardware one year and software 90 days Hardware one year and software 90 days Hardware one year and software 90 days
NEBS No No NEBS Level 3/Verizon NEBS certified by METLABS
RoHS Yes Yes Yes

Views:


Top Front View
Top Front View

Front View
Front View
Rear View
Rear View
Left Angle View
Left Angle View
Right Angle View
Right Angle View

Pricing Notes:

JSA Series Appliances
USA: FREE Ground ShippingJSA3800 Base Appliance
#JSA3800-BSE
List Price: $34,500.00
Our Price: $27,773.00
Juniper Care
Juniper Care Core Support for JSA3800-BSE
#SVC-COR-JSA3800-B
List Price: $2,290.00
Our Price: $2,212.00
Juniper Care Core Plus Support for JSA3800-BSE
#SVC-CP-JSA3800-B
List Price: $2,512.00
Our Price: $2,427.00
Juniper Care Next Day Support for JSA3800-BSE
#SVC-ND-JSA3800-B
List Price: $2,760.00
Our Price: $2,666.00
Juniper Care Next Day Onsite Support for JSA3800-BSE
#SVC-NDCE-JSA3800-B
List Price: $3,588.00
Our Price: $3,466.00
Juniper Care Same Day Support for JSA3800-BSE
#SVC-SD-JSA3800-B
List Price: $4,830.00
Our Price: $4,666.00
Juniper Care Same Day Onsite Support for JSA3800-BSE
#SVC-SDCE-JSA3800-B
List Price: $6,044.00
Our Price: $5,839.00
Spares
JSA3800 FRU 700W AC Replacement Power Supply
(Ships with redundant AC; JSA3800-DC-PS is a FRU option; cannot mix DC & AC in the same system)
#JSA3800-AC-PS
List Price: $995.00
Our Price: $801.00
JSA3800 FRU 650W DC Replacement Power Supply
(Ships with redundant JSA3800-AC-PS; JSA3800-DC-PS is a FRU option; cannot mix DC & AC in the same system)
#JSA3800-DC-PS
List Price: $1,295.00
Our Price: $1,042.00
JSA 3800 & 5800 FRU HDD: 2.5" 900GB SAS 6Gb/s 10K RPM
#JSA3800-5800-HDD
List Price: $2,150.00
Our Price: $1,731.00
JSA Flow
JSA Flow Increase 25K SW Licenses
#JSA-AD25KFLO
List Price: $32,300.00
Our Price: $26,002.00
JSA Flow Increase 50K SW Licenses
#JSA-AD50KFLO
List Price: $46,100.00
Our Price: $37,111.00
JSA Flow Increase 100K SW Licenses
#JSA-AD100KFLO
List Price: $109,000.00
Our Price: $87,745.00
JSA Flow Increase 25K for DR Site
#JSA-AD25KFLODR
Our Price: $16,300.00
JSA Flow Increase 50K for DR Site
#JSA-AD50KFLODR
Our Price: $23,200.00
JSA Flow Increase 100K for DR Site
#JSA-AD100KFLODR
Our Price: $54,600.00
JSA Data Node
JSA Data Node SW Licenses
#JSA-DN
List Price: $15,000.00
Our Price: $12,075.00
JSA Data Node SW Failover Feature Licenses
#JSA-DNHA
List Price: $7,500.00
Our Price: $6,038.00
JSA Log Management
JSA Log Management EPS Increase 100 SW License
#JSA-LMAD100EPS
Our Price: $4,880.00
JSA Log Management EPS Increase 500 SW License
#JSA-LMAD500EPS
List Price: $24,000.00
Our Price: $19,320.00
JSA Log Management EPS Increase 1500 SW License
#JSA-LMAD1500EPS
List Price: $23,000.00
Our Price: $18,515.00
JSA Log Management EPS Increase 2500 SW License
#JSA-LMAD2500EPS
List Price: $47,800.00
Our Price: $38,479.00
JSA Log Management EPS Increase 100 SW for DR Site
#JSA-LMAD100EPSDR
Our Price: $2,440.00
JSA Log Management EPS Increase 500 SW for DR Site
#JSA-LMAD500EPSDR
List Price: $7,560.00
Our Price: $6,086.00
JSA Log Management EPS Increase 1500 SW for DR Site
#JSA-LMAD1500EPSDR
Our Price: $11,500.00
JSA Log Management EPS Increase 2500 SW for DR Site
#JSA-LMAD2500EPSDR
Our Price: $23,900.00
JSA Log Management All-In-One SW License 500 EPS and 750 log sources included
#JSA-LMAIO
List Price: $64,300.00
Our Price: $51,762.00
JSA Log Management All-In-One SW Failover Feature License
#JSA-LMAIOHA
List Price: $32,100.00
Our Price: $25,841.00
JSA Log Management Console SW License 500 EPS and 750 log sources included
#JSA-LMCON
List Price: $60,900.00
Our Price: $49,025.00
JSA Log Management Console SW Failover Feature License
#JSA-LMCONHA
Our Price: $30,500.00
JSA Log Management Event Collector SW Licenses
#JSA-LMEC
List Price: $15,200.00
Our Price: $14,683.00
JSA Log Management Event Processor SW License 2500 EPS included
#JSA-LMEP
List Price: $71,100.00
Our Price: $68,683.00
JSA Log Management Event Processor SW Failover Feature License
#JSA-LMEPHA
Our Price: $35,500.00
JSA Risk Manager
JSA Risk Manager 50 Source Increase SW License
#JSA-RMAD50SRC
List Price: $50,100.00
Our Price: $40,331.00
JSA Risk Manager 100 Source Increase SW License
#JSA-RMAD100SRC
List Price: $62,600.00
Our Price: $50,393.00
JSA Risk Manager 250 Source Increase SW License
#JSA-RMAD250SRC
List Price: $150,000.00
Our Price: $120,750.00

For more than 250 source, please use our Quote Request Form!

JSA Threat Management
JSA Threat Management EPS Increase 100 SW License
#JSA-TMAD100EPS
List Price: $6,900.00
Our Price: $5,555.00
JSA Threat Management EPS Increase 500 SW License
#JSA-TMAD500EPS
List Price: $30,000.00
Our Price: $24,150.00
JSA Threat Management EPS Increase 1500 SW License
#JSA-TMAD1500EPS
List Price: $70,600.00
Our Price: $56,833.00
JSA Threat Management EPS Increase 2500 SW License
#JSA-TMAD2500EPS
List Price: $92,800.00
Our Price: $74,704.00
JSA Threat Management EPS Increase 100 SW for DR Site
#JSA-TMAD100EPSDR
Our Price: $3,500.00
JSA Threat Management EPS Increase 500 SW for DR Site
#JSA-TMAD500EPSDR
Our Price: $15,000.00
JSA Threat Management EPS Increase 1500 SW for DR Site
#JSA-TMAD1500EPSDR
Our Price: $35,300.00
JSA Threat Management EPS Increase 2500 SW for DR Site
#JSA-TMAD2500EPSDR
Our Price: $46,500.00
JSA Threat Management All-In-One SW License 500 EPS, 25k Flows and 750 log sources included
#JSA-TMAIO
List Price: $102,000.00
Our Price: $82,110.00
JSA Threat Management All-In-One SW Failover Feature License
#JSA-TMAIOHA
Our Price: $50,900.00
JSA Threat Management Combined Event/Flow Processor SW Licenses1K eps and 25K Flows Included
#JSA-TMCOMBO
Our Price: $83,000.00
JSA Threat Management Combined Event/Flow Processor SW Failover Feature Licenses
#JSA-TMCOMBOHA
Our Price: $41,600.00
JSA Threat Management Console SW License 750 log sources included
#JSA-TMCON
Our Price: $79,700.00
JSA Threat Management Console SW Failover Feature License
#JSA-TMCONHA
Our Price: $39,900.00
JSA Threat Management Event Collector SW Licenses
#JSA-TMEC
List Price: $15,200.00
Our Price: $12,236.00
JSA Threat Management Event Processor SW License 2500 EPS included
#JSA-TMEP
List Price: $113,000.00
Our Price: $90,965.00
JSA Threat Management Event Processor SW Failover Feature License
#JSA-TMEPHA
Our Price: $56,800.00
JSA Threat Management Flow Processor SW Licenses 100K Flows Included
#JSA-TMFP
List Price: $113,000.00
Our Price: $90,965.00
JSA Threat Management Flow Processor SW Failover Feature Licenses
#JSA-TMFPHA
Our Price: $56,800.00
JSA Vulnerability & Risk Manager
JSA Vulnerability & Risk Manager Standalone SW Licenses 255 Scanning Assets Included
#JSA-VM
List Price: $15,500.00
Our Price: $12,478.00
JSA Vulnerability Manager Scanning Assets Increase by 256
#JSA-VMAD256AST
List Price: $11,000.00
Our Price: $8,855.00
JSA Vulnerability Manager Scanning Assets Increase by 1024
#JSA-VMAD1024AST
List Price: $34,300.00
Our Price: $27,612.00
JSA Vulnerability Manager Scanning Assets Increase by 2048
#JSA-VMAD2048AST
List Price: $49,000.00
Our Price: $39,445.00
JSA Vulnerability Manager Scanning Assets Increase by 4096
#JSA-VMAD4096AST
List Price: $65,900.00
Our Price: $53,050.00

For more than 4096, please use our Quote Request Form!