SOURCE: Juniper Networks

February 06, 2007 08:00 ET

Juniper Networks Unified Access Control Delivers Interoperability With Leading Endpoint Security Solutions

Endpoint Security Partners Team With Juniper to Help Enterprises Reduce Costs and Simplify Deployment of Network Access Control

SAN FRANCISCO, CA -- (MARKET WIRE) -- February 6, 2007 -- RSA CONFERENCE -- Juniper Networks, Inc. (NASDAQ: JNPR) today announced the company's Unified Access Control 2.0 (UAC 2.0) is helping customers leverage their existing investments in endpoint security to establish effective network access policies. Juniper Networks' UAC 2.0 solution helps reduce the total cost of network access control through seamless interoperability with a growing list of endpoint security partners includes eEye Digital Security, Elemental Security, Great Bay Software, Kaspersky Lab, SignaCert, SkyRecon Systems, Wave Systems Corp. (NASDAQ: WAVX), and Webroot.

Without a means to get information about the security state of an endpoint device, network access control is missing an essential element. Juniper Networks' UAC 2.0 solution binds user identity, endpoint integrity and location information with access controls to effectively establish policy compliance and the trustworthiness of endpoint devices. The Juniper Networks UAC 2.0 solution allows enterprises to create a unique access control policy for each user and enables dynamic policy management that is enforced in real-time throughout the network.

"All companies providing network access control solutions should partner with endpoint security companies, as there is value in vetting additional default security protection," said Steve Orenberg, president, Kaspersky Lab, Inc., a Juniper Networks J-Partner. "We chose to partner with Juniper because their network access control solution offers customers robust security with an open and layered approach that leverages the proactive threat prevention of our advanced anti-malware protection."

Juniper Networks' UAC 2.0 solution interoperates with leading endpoint security solutions via the Trusted Computing Group's Trusted Network Connect (TNC) open specifications and custom APIs. The TNC specifications are designed to help network administrators solve the difficult task of enforcing security policies for network access in heterogeneous networks with an increasingly diverse mix of devices and software. By taking advantage of these open standards, customers benefit from a greater choice of trusted tools that do not require extensive interoperability testing prior to deployment, leading to greater return on investment and lower overall total cost of ownership for network access control.

"Through the use of dedicated standards-based security hardware, our Embassy Endpoint Enforcer works in concert with Juniper Networks' UAC 2.0 solution to verify the health of the endpoint and helps to ensure an endpoint can be trusted prior to passing control to the Juniper UAC 2.0 solution for ongoing policy enforcement," said Brian Berger, EVP of Marketing at Wave Systems Corp., a Juniper Networks J-Partner. "This partnership will empower customers with the best security technologies to audit endpoint configurations and impose enterprise security policies before network connectivity is established."

"We're committed to helping customers deploy best-in-class security architectures through the use of industry standards that offer them the broadest choice of endpoint security products that interoperate with our UAC solution," said Karthik Krishnan, product line manager at Juniper Networks. "The partnerships we have formed represent the next phase in the evolution of security -- going beyond client-side checks to enable true interoperability or integration and enable enterprises to assess, quarantine and remediate non-compliant clients."

About Juniper Networks, Inc.

Juniper Networks develops purpose-built, high performance IP platforms that enable customers to support a wide variety of services and applications at scale. Service providers, enterprises, governments and research and education institutions rely on Juniper to deliver a portfolio of proven networking, security and application acceleration solutions that solve highly complex, fast-changing problems in the world's most demanding networks. Additional information can be found at

Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Contact Information

  • Public Relations Contacts:
    Roger T. Fortier
    Juniper Networks
    (408) 936-7631
    Email Contact

    Kim Markle
    Juniper Networks
    (408) 936-7673
    Email Contact

    Investor Relations Contact:
    Michelle Levine
    Juniper Networks
    (408) 936-2775
    Email Contact