Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Networking

    Juniper Updates Access Control Software

    By
    Matt Hines
    -
    November 13, 2006
    Share
    Facebook
    Twitter
    Linkedin

      Juniper Networks released a revamped version of its unified access control platform on Nov. 13, adding new features that promise faster installation and improved ability to enforce corporate security policies.

      The companys Unified Access Control 2.0 package, which competes head-to-head with the NAC (Network Access Control) technologies marketed by longtime rival Cisco Systems, offers a number of upgrades over the previous iteration of the product, including the addition of technologies acquired by Juniper through its Nov. 2005 buyout of network security software provider Funk Software.

      One of the primary benefits of UAC 2.0, compared to Ciscos NAC technologies, is that the system does not require enterprises to adopt Junipers networking gear throughout their operations, said company officials.

      As such, businesses can use the software to begin layering new security functions on top of their existing infrastructure without investing significantly in additional network hardware, Juniper said.

      Both Juniper and Ciscos access control technologies, and those made by other software providers, are meant to help companies protect their IT operations by carefully screening information about devices attempting to log onto their networks, and enforcing corporate security polices for endpoint systems including PCs.

      For instance, if a users laptop has not been updated with the latest anti-virus signatures, or the device has been stolen and manipulated to load malware onto a companys network, it would be denied access by UAC until the system has remedied any problems.

      With the addition of Funks Odyssey Access Client and Steel-Belted Radius tools, Juniper has added to its ability to provide access control across multivendor networks, giving the Sunnyvale Calif. company a significant leg up over Ciscos proprietary NAC technologies, said Karthik Krishnan, senior product line manager at Juniper.

      “People want the advantages of access control solutions today, but they dont want to be forced to rip out all their hardware just to improve security,” Krishnan said.

      He added that with the addition of the tools Juniper acquired from Funk, the company has become the vendor with the greatest ability to allow companies to implement access control quickly while leveraging their existing investments in network infrastructure.

      In addition to allowing for external access to networks, the UAC 2.0 release also grants users of the software more ability to control admittance to corporate resources and applications, such as ERP (enterprise resources planning) systems.

      Also, if a user begins behaving suspiciously while logged into such an application during a UAC-protected session, the technology can automatically suspend network and applications access until administrators investigate the activity.

      Juniper specifically added elements of the Funk software tools that provide support for the 802.1x industry standard, including the softwares Infranet Controller, which serves as a centralized access control policy manager, and its UAC Agent, which is the systems downloaded endpoint software.

      The technologies are used as a so-called 802.1x supplicant to authenticate or deny access to devices that integrate with access control systems.

      Krishnan said that in doing so, UAC 2.0 has become the most flexible access control package on the market, based on its multivendor management capabilities.

      The Odyssey Access Client and Steel-Belted Radius tools are also being made available by Juniper as stand-alone products.

      While some experts have begun to point out potential weaknesses in access control systems, such as the ability to spoof the IP address of a trusted network device to sneak onto a protected environment, Juniper maintains that its product does not allow for such hacks.

      /zimages/6/28571.gifJuniper sees higher revenue in the third quarter. Click here to read more.

      For instance, UAC allows administrators to authenticate an endpoint devices identity before the system assigns an IP address, closing off that attack vector.

      In another nod to emerging security concerns attributed to access control software, Junipers product forsakes the use of DHCP (dynamic host configuration protocol), a set of rules used by a device to request and obtain an Internet address from a server.

      Some experts maintain that DHCP proxies, utilized in many access control technologies sold today, make it far easier for attackers to dupe network security tools.

      Krishnan disputed security experts who have said that access control technologies remain immature, and too porous for businesses to trust completely.

      “The market is still pretty nascent and our biggest challenge is education of customers, because as much as the whole concept seems well defined, there are a whole range of uses and applications that people may not have considered,” said Krishnan.

      Krishnan said that for some, there may not be strong correlation between the problem they are trying to solve and all the capabilities of access control, but “we hear from a lot of enterprises who cant depend on patching to protect themselves anymore and need this additional layer of security that oversees all network access.”

      /zimages/6/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on servers, switches and networking protocols for the enterprise and small businesses.

      Matt Hines
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×