Juniper Networks and Leading Identity and Access Management Partners Deliver Superior Network Access Control

Interoperability With Juniper's Unified Access Control Provides Solid Foundation for Reducing Security Risk, Increasing ROI From Existing Enterprise Security Investments


SAN FRANCISCO, CA -- (MARKET WIRE) -- February 6, 2007 -- RSA CONFERENCE -- Juniper Networks, Inc. (NASDAQ: JNPR) today announced the company is teaming with industry leaders that provide identity and access management (IAM) solutions, as well as with top firms providing authentication, authorization and auditing (AAA) solutions, to enable best-in-class network access control deployments. These solutions work in conjunction with Juniper Networks' Unified Access Control (UAC) solution to help enterprises effectively manage user access to critical business assets from a wide range of network endpoints. Some of Juniper's growing list of partners in the IAM and AAA markets includes Arcot Systems, Entrust, Microsoft, Nominum, Oracle, PassGo Technologies, RSA, The Security Division of EMC, Secure Computing and Sun Microsystems.

Juniper Networks' UAC 2.0 solution leverages user identity information in conjunction with device security state and network location information to create a unique access control policy for each user. IAM and AAA help automate the provisioning, validation and ongoing management of individual user identities in the enterprise. By delivering interoperability between IAM/AAA solutions and UAC 2.0, Juniper is providing a comprehensive and flexible approach to network access control that enables enterprises to maximize their investments in best-in-class security infrastructure, lower total cost of ownership and improve their overall security posture.

"RSA is pleased to partner with Juniper to provide information-centric security solutions for business acceleration and help the world's leading organizations succeed by solving their most complex and sensitive security challenges," said Toffer Winslow, vice president of product management and product marketing at RSA, The Security Division of EMC. "We're working with Juniper to enable customers to cost-effectively secure critical information assets and online identities, because with the proper network access controls in place, our joint customers can confidently protect their private consumer, employee and partner data throughout the information infrastructure."

As enterprise networks grow increasingly complex and mobile, with users including employees, guests, partners and contractors requiring access to critical business information, Juniper Networks' UAC 2.0 solution solves the problem of balancing access controls and threat mitigation. In many enterprises, network endpoints are often poorly managed, unmanaged, and in some cases, unmanageable. Business requirements demand that users and devices get access to resources and applications, but providing such access without sufficient controls opens the enterprise to a number of business and security risks and regulatory compliance challenges. By binding user identity, endpoint integrity and location information with access controls, UAC 2.0 allows for dynamic policy management that can be enforced in real-time throughout the network.

"Without the ability to collect and verify user identity information, access control cannot be effective," said Eric Skinner, vice president of product marketing at Entrust. "By taking an open standards-based approach to network access control, and providing out-of-the-box interoperability with authentication solutions such as Entrust IdentityGuard, Juniper Networks is making it easier and more cost-effective for Entrust customers to implement network access control."

"Effective access control is only possible by leveraging a combination of critical elements, including user identity information and endpoint security state, to determine and manage a user's access rights," said Karthik Krishnan, product line manager at Juniper Networks. "Through interoperability with leading solutions in the IAM/AAA market, Juniper Networks' UAC solution can help customers achieve greater value from their existing investments, provides them with a flexible means to implement granular access control rules and effectively addresses the user identity piece of the access control equation."

About Juniper Networks, Inc.

Juniper Networks develops purpose-built, high performance IP platforms that enable customers to support a wide variety of services and applications at scale. Service providers, enterprises, governments and research and education institutions rely on Juniper to deliver a portfolio of proven networking, security and application acceleration solutions that solve highly complex, fast-changing problems in the world's most demanding networks. Additional information can be found at www.juniper.net.

Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. RSA is a registered trademark of RSA Security Inc. in the U.S. and/or other countries. EMC is a registered trademark of EMC Corporation. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Contact Information: Public Relations Contacts: Roger T. Fortier Juniper Networks (408) 936-7631 Email Contact Kim Markle Juniper Networks (408) 936-7673 Email Contact Investor Relations Contact: Michelle Levine Juniper Networks (408) 936-2775 Email Contact