InvestorsHub Logo
icon url

Countryboy

08/18/10 12:31 AM

#197490 RE: Countryboy #197489

Aruba Juniper and UAC 2.

Juniper Networks to Acquire Funk Software
Acquisition Will Extend Leadership in Delivering Standards-based Security Solutions


SUNNYVALE, CA - November 14, 2005 - Juniper Networks, Inc. (Nasdaq: JNPR) today announced it has signed a definitive agreement to acquire Funk Software, a leading provider of standards-based network access security solutions, in a cash transaction valued at approximately $122 million. This acquisition will bring key technology to enhance Juniper Networks' recently announced unified access control solution and further its strategy to secure and assure the delivery and performance of applications over an IP network. The move also reinforces Juniper's commitment to delivering standards-based solutions that protect customers' current investments, enabling them to secure the infrastructure they have today and overlay additional functionality as their needs evolve. With the addition of Funk Software's technology, Juniper will be delivering the most comprehensive, open and broadly deployed network access solution available.

"Juniper is committed to delivering standards-based solutions that enable customers to secure the infrastructure they already have, allowing them to protect their technical and financial investments. The addition of Funk Software's technology to Juniper's security products portfolio will reinforce that commitment. Once again Juniper Networks is taking a leadership role as we continue to add value and intelligence to the network," commented Rob Sturgeon, executive vice president and general manager, Security Products Group, Juniper Networks.
Funk Software develops products and technologies that protect the integrity of the network by ensuring both the user and the device meet an organization's security policies before they are granted access. These solutions include market leading products such as its RADIUS/AAA server, Steel-Belted Radius, Odyssey Client, an 802.1X client for wireless and wired networks and its recently introduced Endpoint Assurance Product suite for network-based enforcement of endpoint integrity.

Built on open standards, including those developed by the Trusted Computing Group's Trusted Network Connect (TNC) subgroup, Funk Software's products are interoperable with products from a broad range of security and infrastructure vendors and are in widespread use on every type of network, public and private, wired and wireless. These solutions complement Juniper Networks' existing endpoint intelligence, policy control and enforcement capabilities with Layer 2 support, thereby ensuring comprehensive security across both wired and wireless networks.

Aruba Networks Teams with Juniper Networks to Deliver Secure Enterprise Mobility Solutions

Sunnyvale, Calif., June 19, 2006 - Aruba Networks, the Mobile Edge Company, today announced it has joined the Juniper Networks, Inc. (Nasdaq: JNPR) J-Partner Solutions Alliances program, enabling joint customers to extend their investment in Juniper's security products across their mobile workforces. The joint collaboration ensures that Aruba mobility controllers are pre-tested for interoperability with Juniper's firewall/VPN devices and AAA/802.1X solutions to save enterprises the operational costs of integrating multiple systems.

The key beneficiaries of the joint effort are:

Mobile Enterprises that require secure, standards-based access to networks and resources: With 802.11i now established as the proven security standard for a wireless LAN deployment, Aruba and Juniper deliver a secure standards-based enterprise WLAN solution. Aruba mobility controllers interoperate with Juniper Steel-Belted Radius Server and with Odyssey 802.1X Access Clients to create the joint solution.

• Distributed Enterprises that have mission-critical wireless networks in branches: Wireless is quickly becoming the primary connectivity method for enterprise branch offices where multiple mission-critical applications including data, voice, barcode scanning, inventory management, active RFID and asset tracking need to be supported. The Aruba 200 series mobility controller is purpose-built for such deployments and controls up to six access points and can be deployed as the sole network services device for a retail outlet by setting up a secure IPSEC VPN tunnel to any Juniper firewall/VPN device.

• Government Organizations: The Department of Defense's directive 8100.2 requires Layer 2 encryption for wireless deployments and Aruba and Juniper can deliver a complete FIPS 140-2 validated 802.11i solution today. Additionally, xSec, a FIPS 140-2 validated security protocol provides 802.1X and AES encryption as an interim step to enable 802.11i class security for wired and legacy wireless clients.

• Healthcare and Educational Institutions that need to provide open access (i.e., no encryption) for unmanaged wireless clients: Enterprises can protect information assets and defend against malware, worms or viruses entering the open access wireless infrastructure by ensuring that all unsecured traffic passes through Juniper's deep packet inspection firewall capabilities.

Juniper Networks Launches New Unified Access Control Solution With Expanded Interoperability And Functionality

Published January 1st, 2007

Juniper Networks, Inc. (Nasdaq: JNPR) today launched the new Unified Access Control (UAC) 2.0 solution, helping enterprises more effectively manage user access to critical business assets from a wide range of network endpoints. With UAC 2.0, Juniper Networks has completed integration of its market-leading 802.1X components with existing UAC functionality, including elements of the Odyssey® Access Client (OAC) and Steel-Belted Radius® (SBR). UAC 2.0 is an open standards-based Layer 2 and Layer 3 access control solution that can be rolled out in a flexible array of deployment scenarios to give enterprises real-time visibility and granular policy control throughout the network. The UAC 2.0 solution supports current and future interoperability within multi-vendor environments via support for both the IEEE 802.1X standard and Trusted Computing Group’s Trusted Network Connect (TNC), a set of non-proprietary specifications that enables open standards-based access control.

“Juniper has delivered on the promise it made less than a year ago when we acquired Funk Software, combining Funk’s market-leading 802.1X components and Radius technologies with our existing UAC solution,” said Hitesh Sheth, vice president of security products at Juniper Networks. “With UAC 2.0, we have set the bar in the network access control market for deployment flexibility and interoperability, enabling customers to use Juniper’s firewalls and/or any 802.1X-enabled switch or wireless access point as enforcement points to secure access to applications and resources across distributed networks.”
“Enterprise networks are increasingly complex and distributed, with a multitude of users including employees, partners and contractors requiring access to critical business information from network endpoints that may be poorly managed, unmanaged, or in many cases, completely unmanageable. The threat from dangerous and vulnerable endpoints has made network access control a critical security process for enterprises,” said Lawrence Orans, research director at Gartner. “As the access control market evolves and access control deployments increase in scale and scope, enterprises will require solutions that enable them to leverage existing investments in network and security infrastructure, and are capable of interoperating seamlessly within heterogeneous IT environments.”

UAC Balances Access and Security Controls for Customers
Juniper Networks’ UAC solution helps customers solve the problem of balancing access and security controls by binding user identity, endpoint integrity and location information with access controls for dynamic policy management that is enforced in real-time throughout the network. Some of Juniper Networks’ UAC customers include China Mobile, one of China’s leading mobile services providers; Fredrikstad Kommun, a municipal authority in Norway; and KAMO Electric Cooperative, Inc. (KAMO Power), an Oklahoma-based Generation and Transmission cooperative.
“Juniper understands access control. With the new UAC 2.0 solution, they’ve given our organization complete flexibility with regard to our IT and network infrastructure, and a method to provide very granular control using open standards,” said Robert Lemm, IS supervisor at KAMO Power. “The Juniper UAC solution allows us to not only ensure policy compliance of devices and users prior to login and issuance of an IP address, but also to dynamically control access to resources and applications during the entire duration of the user session for meaningful access control. This approach has the potential to meet a wide range of challenges related to controlling our network.”

Integration of Funk’s 802.1X and Radius Technologies into UAC 2.0
Juniper Networks’ UAC solution is comprised of several elements, including the Infranet Controller, which serves as a centralized policy manager; the UAC Agent, which is dynamically downloadable endpoint software; and a flexible array of policy enforcement points which include Juniper Networks firewalls and any 802.1X-enabled switch or wireless access points. In UAC 2.0, both the Infranet Controller and the UAC Agent contain integrated features from Juniper’s acquisition of Funk Software, including the OAC 802.1X supplicant and SBR. Both OAC and SBR are also available as standalone products.

Flexible Access Control and Security to Support All Enterprise Environments

Juniper Networks is introducing a solution that offers dynamic access control from the start of the session, before the issuance of an IP address, all the way through to very granular resource-level controls. The UAC solution’s flexible enforcement options allow customers to instantly support access control across wired and wireless campus, data center and branch office locations. Customers can choose to use firewalls, integrated content security and intrusion detection capabilities as an overlay on existing networks to protect mission critical LAN assets, and over scale the solution to support 802.1X enforcement at Layer 2. Alternatively, customers can immediately roll out the UAC solution to leverage their existing 802.1X infrastructure, and use the overlay deployment scenario to provide more granular access over time. Customers can seamlessly add to their deployment without having to redeploy new UAC Agents or a new Infranet Controller.

Intelligent and Adaptive Security Policy Assessment, Enforcement and Remediation

Juniper Networks’ UAC solution delivers a unified agent that can support user identity and endpoint verification at both Layer 2 and Layer 3 across an 802.1X infrastructure. A comprehensive set of endpoint assessment checks, both native functionality as well as pre-defined checks for antivirus, spyware, firewall, patch management, configuration management, OS and malware checks, can be leveraged as part of the access control policies. The agent is capable of initiating remediation actions to bring the endpoint into compliance prior to granting access. Access control can also be provided in agentless mode if required.