SAN FRANCISCO, CA -- (MARKET WIRE) -- February 6, 2007 -- RSA CONFERENCE -- Juniper Networks, Inc.
(NASDAQ: JNPR) today announced the Juniper Unified Access Control 2.0 (UAC 2.0) solution interoperates
with a broad ecosystem
of security solutions to help customers more effectively minimize
risk. By combining Juniper Networks' UAC 2.0 solution with products from leading vulnerability
management, secure content management, and security information and event
management partners, enterprises can deploy an information-driven,
multi-layered security infrastructure that streamlines the remediation of
devices that do not comply with network access policies and improves an
organization's overall security posture.
Juniper Networks' business partners in the vulnerability management/remediation markets include Altiris,
BigFix, IBM, PatchLink and Shavlik Technologies. Vulnerability management
and remediation solutions help improve an organization's security posture
in the face of a changing threat landscape and continuing requirements for
regulatory compliance-related initiatives. By linking the Juniper Networks
UAC 2.0 solution to vulnerability management technologies, an enterprise
can improve the overall vulnerability management process by identifying
previously unknown devices on the network and bringing them under full
management, thus reducing the time it takes to locate and patch vulnerable
systems.
"By approaching IT security from a business risk view, and employing
best-in-class systems that interoperate seamlessly, organizations can
reduce IT infrastructure costs, improve business process flow, and lower
exposure to operational and business event risks," said Chris Schwartzauer,
vice president, worldwide field operations at Shavlik Technologies, LLC, a
Juniper Networks J-Partner. "We share Juniper Networks' vision for
leveraging open standards to facilitate broad interoperability amongst
security solutions as the most effective means for helping customers solve
real-world risk management challenges."
Juniper Networks' secure content management partners include Kaspersky Lab, SurfControl and Websense. Secure content
management solutions provide enhanced spam prevention, content inspection
and virus protection for Web and email traffic. By ensuring that UAC
interoperates with leading secure content management solutions, Juniper
Networks enables organizations to develop flexible security policies based
on the unique requirements of different users within an organization.
These comprehensive policies can cover the full range of requirements for
complete access control and network usage, from the time a user first
connects to the network, throughout the session to when the user exits the
network.
"Multi-layered protection at the network and application layers is the only
effective defense against modern blended threats," said Rocco Donnino, vice
president of business development at SurfControl, a Juniper Networks
J-Partner. "SurfControl and Juniper have a long history of delivering
integrated blended threat protection to enterprise customers through
Juniper's Unified Threat Management platforms, and we are excited to extend
our interoperability to Juniper's UAC solution."
Juniper Networks' partners that provide security information and event management (SIEM) solutions
include ArcSight, eIQnetworks, ExaProtect, IBM, Loglogic, netForensics,
Novell, NWG Technologies, Q1 Labs and RSA, The Security Division of EMC.
SIEM systems help enterprises gather, store, correlate and analyze security
log data from many different information systems, including network access
control solutions such as UAC. This data may prove valuable as part of a
network security organization's immediate response to an attack or as part
of post-event computer and network forensic activity. The requirements of
industry regulations such as Sarbanes-Oxley further heighten the need for
tight interoperability between network access control and SIEM solutions.
"Information-based security is the only effective means to ensure the
development of intelligent security policies that can adapt to address
changing security conditions," said Hugh Njemanze, CTO and EVP of Research
and Development at ArcSight, a Juniper Networks J-Partner.
"Interoperability between our ArcSight Logger and ArcSight ESM solutions
and Juniper Networks' UAC 2.0 solution will enable customers to address
their risk management and regulatory compliance requirements across the
spectrum of real-time and historical needs."
As enterprise networks grow increasingly complex and mobile, with users
including employees, guests, partners and contractors requiring access to
critical business information, the Juniper Networks UAC 2.0 solution solves
the problem of balancing access controls and threat mitigation. In many
enterprises, network endpoints are often poorly managed, unmanaged, and in
some cases, unmanageable. By binding user identity, endpoint integrity and
location information with access controls, Junipers Networks' UAC 2.0
solution allows for dynamic policy management that can be enforced in
real-time throughout the network.
"For security policy to be useful, it must be a closed loop -- that is, you
have to be able to implement a policy, see what happens when it is
implemented, and then use the results to make the policy better," said
Karthik Krishnan, product line manager at Juniper Networks. "By providing
interoperability with leading security solutions via open standards such as
the Trusted Computing
Group's Trusted Network
Connect (TNC) open
specifications and our own custom APIs, Juniper Networks enables
enterprises to develop and enforce the most effective access control
policies."
About Juniper Networks, Inc.
Juniper Networks develops purpose-built, high performance IP platforms that
enable customers to support a wide variety of services and applications at
scale. Service providers, enterprises, governments and research and
education institutions rely on Juniper to deliver a portfolio of proven
networking, security and application acceleration solutions that solve
highly complex, fast-changing problems in the world's most demanding
networks. Additional information can be found at www.juniper.net.
Juniper Networks and the Juniper Networks logo are registered trademarks of
Juniper Networks, Inc. in the United States and other countries. RSA is a
registered trademark of RSA Security Inc. in the U.S. and/or other
countries. EMC is a registered trademark of EMC Corporation. All other
trademarks, service marks, registered trademarks, or registered service
marks are the property of their respective owners.
Contact Information: Public Relations Contacts:
Roger T. Fortier
Juniper Networks
(408) 936-7631
Email Contact
Kim Markle
Juniper Networks
(408) 936-7673
Email Contact
Investor Relations Contact:
Michelle Levine
Juniper Networks
(408) 936-2775
Email Contact