Protect against Log4J without patching
Learn More
Protect against Log4J without patching
Learn More

UncategorizedJuniper vSRX Firewalls | Application Workload Security | OWASP Top 10


February 24, 2020 By Timothy Chiu, VP of Marketing
K2 Integrates with Juniper vSRX Firewalls for Complete Workload Security

As part of the annual RSA 2020 Security Conference in San Francisco, K2 is pleased to announce our integration of K2 Workload Protection Platform with Juniper vSRX Firewalls, enabling organizations to block zero-day attacks in real-time. With the increasing number of attacks targeting application workloads, breaches resulting from these attacks continue to be a primary concern for enterprises. Firewalls like the Juniper vSRX, offer network protection and an ideal orchestration point for battling web application and workload-based cyberattacks. The integration between the Juniper vSRX Firewall and K2 Platform enables the combination of advanced next generation workload security and the ability to securely block and prevent future attacks in real-time using the Juniper vSRX Firewall.

More vulnerabilities than ever are being found in web applications. Last year, the US-CERT vulnerability database reported a record 17,311 vulnerabilities discovered in 2019, and 2020 is already on track to beat that number with almost 2,000 new vulnerabilities found in January 2020 alone. Web applications are also reusing more code, by integrating 3rd party and open source code, with one estimate claiming that over 70% of web applications have 3rd party or open source code integrated into the application, making them susceptible to the vulnerabilities in that code.

With the increase in vulnerabilities, any organization, no matter how well protected, can be breached. Which leads us to the requirement that organizations need to be able to block threats in real-time, without having to worry about false alerts compromising operations that are mission critical. The bottom line is that organizations need to protect applications.

K2 Cyber Security’s Workload Protection Platform delivers signature-less runtime workload protection with no false alerts and protects against sophisticated attacks including OWASP Top 10 and memory-based attacks. K2’s Platform protects against zero-day attacks aimed at application vulnerabilities and provides detailed attack telemetry, including the attackers IP address and sessionID in real-time for faster remediation. K2’s unique Optimized Control Flow Integrity (OCFI), uses a “DNA” map of the applications for validating the correct execution of applications and detecting attacks without relying on behavior or signatures, resulting in no false alerts.

The Juniper vSRX Firewall delivers a complete firewall solution, including advanced security, robust networking, and automated virtual machine life cycle management capabilities for highly dynamic environments.

With each new attack, the integration of K2 Platform and Juniper vSRX allows the attacker’s information, including IP address and sessionID to be delivered from the K2 Platform and added to an automated block list on the Juniper firewall, preventing any future attack from the attacker and protecting the organization in real-time.

For more information on the Juniper + K2 integration, you can download our Juniper + K2 solution brief.

If you’re looking for an application security solution that meets today’s needs for security, with true zero-day attack detection and no false alerts, you can request a demo or follow up from our sales team.

Share this

Leave a Reply

Your email address will not be published. Required fields are marked *


K2 Cyber Security delivers the Next Generation Application Security Platform to secure web applications and container workloads against sophisticated attacks in OWASP Top 10 and provides exploitable vulnerability detection during pre-production. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production/QA servers for interactive application security testing to identify the location of the vulnerable code. K2’s solution generates almost no false positives, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools like Web Application Firewalls and host based EDR, finds missed exploitable vulnerabilities and dramatically reduces security cost. K2 Cyber Security is headquartered in the USA and provides cyber security solutions globally.


K2 Cyber Security, Inc.

2580 N. First Street, #130

San Jose, CA 95131