Sunday, July 12, 2009

Juniper Announces Adaptive Threat Management for Distributed Enterprises

Seeking to close the security threat window-of-vulnerability from months to minutes or seconds, Juniper Networks is evolving its network security solution to enable dynamic and intelligent responses across all enterprise locations -- including data center, campus, branch, remote and partner/extranet locations. To do this, Juniper is making its platforms both identity-aware and application-aware.

The Adaptive Threat Management Solutions include: the new Juniper Networks WX Client for application acceleration; a new release of Juniper's network access control (NAC) solution, Unified Access Control (UAC) 3.1; new market-leading SA Series SSL VPN version 6.5 software with new standards-based interoperability functionality; new Intrusion Prevention System (IPS) technology; and new releases of Juniper Networks Security Threat Response Manager (STRM) 2009.1 and Network and Security Manager (NSM) 2009.1 for network-wide, centralized visibility and control.

  • Identity-Based Security and WAN Acceleration: The WX Client automatically downloads and launches upon starting a Network Connect SSL VPN session, so users transparently start receiving the benefits of application acceleration immediately, tailored and based on their identity. Scenarios commonly seen in networks can achieve an average of 9X performance improvement for company-based web applications and an average of 12X improvement in file transfer time network-wide.


  • Dynamically Provisioned Anti-Spyware and Anti-Malware: Juniper's anti-spyware and anti-malware solution is a license available on SA SSL VPN version 6.5 and UAC 3.1 software releases, which enables the delivery of the industry's first access control solution to dynamically provision anti-spyware and anti-malware software to endpoint devices regardless of the user or location. Independently validated as having the world's most scalable and deployed SSL VPN technology--up to 10,000 concurrent user sessions on a single box, Juniper delivers the performance and flexibility businesses require to consistently enforce global policies for any user or role, including employees, contractors, partners and offshore users wherever they are located. Juniper also offers application-aware policy enforcement and broadened support for mobile devices, as well as robust endpoint assessment.


  • Identity-Based, Application-Specific Enforcement with Visibility and Control: Juniper is also offering an access control solution that supports full Layer 2-7 role-based policy enforcement. With new IPS technology integrated with SA SSL VPN and UAC, Juniper delivers a role-based application policy enforcement with ‘follow-me' user access policies and application usage. This allows companies to enable IPS at all locations to detect and stop application misuse and sophisticated attacks before damage occurs, effectively eliminating security breaches before they happen.


Additionally, Juniper delivers an integrated management, visibility and control solution that can correlate applications, users and user sessions for granular security control and share policies across multiple Juniper product families to maximize security across the network infrastructure.

http://www.juniper.net