Contact Information: Public Relations Contacts: Roger T. Fortier Juniper Networks (408) 936-7631 Email Contact Kim Markle Juniper Networks (408) 936-7673 Email Contact Investor Relations Contact: Michelle Levine Juniper Networks (408) 936-2775 Email Contact
Juniper Networks Unified Access Control Delivers Interoperability With Leading Endpoint Security Solutions
Endpoint Security Partners Team With Juniper to Help Enterprises Reduce Costs and Simplify Deployment of Network Access Control
| Source: Juniper Networks
SAN FRANCISCO, CA -- (MARKET WIRE) -- February 6, 2007 -- RSA CONFERENCE -- Juniper Networks, Inc.
(NASDAQ : JNPR ) today announced the company's Unified Access Control 2.0 (UAC 2.0) is helping customers
leverage their existing investments in endpoint security to establish
effective network access policies. Juniper Networks' UAC 2.0 solution helps reduce the total cost of network access control through seamless interoperability
with a growing list of endpoint
security partners includes eEye Digital Security, Elemental Security,
Great Bay Software, Kaspersky Lab, SignaCert, SkyRecon Systems, Wave
Systems Corp. (NASDAQ : WAVX ), and Webroot.
Without a means to get information about the security state of an endpoint
device, network access control is missing an essential element. Juniper
Networks' UAC 2.0 solution binds user identity, endpoint integrity and
location information with access controls to effectively establish policy
compliance and the trustworthiness of endpoint devices. The Juniper
Networks UAC 2.0 solution allows enterprises to create a unique access
control policy for each user and enables dynamic policy management that is
enforced in real-time throughout the network.
"All companies providing network access control solutions should partner
with endpoint security companies, as there is value in vetting additional
default security protection," said Steve Orenberg, president, Kaspersky
Lab, Inc., a Juniper Networks J-Partner. "We chose to partner with Juniper
because their network access control solution offers customers robust
security with an open and layered approach that leverages the proactive
threat prevention of our advanced anti-malware protection."
Juniper Networks' UAC 2.0 solution interoperates with leading endpoint
security solutions via the Trusted Computing
Group's Trusted Network
Connect (TNC) open
specifications and custom APIs. The TNC specifications are designed to
help network administrators solve the difficult task of enforcing security
policies for network access in heterogeneous networks with an increasingly
diverse mix of devices and software. By taking advantage of these open
standards, customers benefit from a greater choice of trusted tools that do
not require extensive interoperability testing prior to deployment, leading
to greater return on investment and lower overall total cost of ownership
for network access control.
"Through the use of dedicated standards-based security hardware, our
Embassy Endpoint Enforcer works in concert with Juniper Networks' UAC 2.0
solution to verify the health of the endpoint and helps to ensure an
endpoint can be trusted prior to passing control to the Juniper UAC 2.0
solution for ongoing policy enforcement," said Brian Berger, EVP of
Marketing at Wave Systems Corp., a Juniper Networks J-Partner. "This
partnership will empower customers with the best security technologies to
audit endpoint configurations and impose enterprise security policies
before network connectivity is established."
"We're committed to helping customers deploy best-in-class security
architectures through the use of industry standards that offer them the
broadest choice of endpoint security products that interoperate with our
UAC solution," said Karthik Krishnan, product line manager at Juniper
Networks. "The partnerships we have formed represent the next phase in the
evolution of security -- going beyond client-side checks to enable true
interoperability or integration and enable enterprises to assess,
quarantine and remediate non-compliant clients."
About Juniper Networks, Inc.
Juniper Networks develops purpose-built, high performance IP platforms that
enable customers to support a wide variety of services and applications at
scale. Service providers, enterprises, governments and research and
education institutions rely on Juniper to deliver a portfolio of proven
networking, security and application acceleration solutions that solve
highly complex, fast-changing problems in the world's most demanding
networks. Additional information can be found at www.juniper.net.
Juniper Networks and the Juniper Networks logo are registered trademarks of
Juniper Networks, Inc. in the United States and other countries. All other
trademarks, service marks, registered trademarks, or registered service
marks are the property of their respective owners.