Juniper Endpoint Profiler

Size: px
Start display at page:

Download "Juniper Endpoint Profiler"

Transcription

1 Juniper Endpoint Profiler Product Overview Discovering, locating, documenting, and provisioning every endpoint device connected to an enterprise network, regardless of its participation in the authenticated network, is a time-consuming and labor-intensive challenge. Most organizations don t maintain an updated list of endpoints connected to their network. Juniper Endpoint Profiler delivers dynamic discovery, identification, and monitoring of all network-attached endpoints. Its comprehensive database of endpoint device, location, and behavioral information eases provisioning of newly acquired endpoints, secures the network against threats, aids in network troubleshooting, and facilitates network-based machine imaging. Product Description In order to deploy an authentication solution, enterprises and their IT teams must inventory all endpoint devices connected to their network. The challenge is that many of these network-attached endpoints will not have a user associated with them, which means there will be no username to track, password to check, nor is multifactor-based authentication even possible. Also, some of these endpoints attached to the enterprise network which may include voice over IP (VoIP) handsets and devices, wireless LAN (WLAN) access points, networked printers or fax machines, point-of-sale (POS) systems or cash registers, even heating, ventilation, and air conditioning (HVAC) systems or vending machines are unable to run even a basic authentication client. And, with the growth of Bring Your Own Device (BYOD) initiatives, enterprises and their IT teams are challenged to ensure that any device, even personal mobile devices, attempting to connect to an enterprise network is identified and authenticated. Enterprises deploying an authentication solution or adopting a BYOD initiative will highly benefit from Juniper Endpoint Profiler. Juniper Endpoint Profiler provides a comprehensive accounting of any and all endpoints attached to a network. Providing enterprises and their IT teams with a dynamic, real-time view of every network-attached device s location, media access control (MAC) address, IP address, identity and behavior, as well as an historical view of these attributes, Juniper Endpoint Profiler simplifies the deployment of an 802.1X network. It alleviates the organization s need to discover all enterprise endpoints manually. Juniper Endpoint Profiler saves valuable resources, time, and cost, while helping to ensure network security and reliability. Juniper Endpoint Profiler can be deployed in concert with the Juniper Networks Unified Access Control solution, comprised of the Juniper Networks Junos Pulse client, Junos Pulse Access Control Service running on Juniper Networks MAG Series Junos Pulse Gateways or as a virtual appliance, and enforcement points, including any 802.1X switch or wireless access point, including Juniper Networks EX Series Ethernet Switches, WLA Series Wireless LAN Access Points, and WLC Series Wireless LAN Controllers, as well as any Juniper firewall, including the Juniper Networks SRX Series Services Gateways. Juniper s UAC solution interacts with Juniper Endpoint Profiler to monitor the state of all networkconnected endpoints, even those unable to run an authentication client or those which are not user-enabled. Together, Juniper Endpoint Profiler and Unified Access Control are able to locate, profile, and ensure appropriate network access for network-attached endpoints incapable of running a client including VoIP handsets, networked printers or faxes and other similar devices, or if an endpoint device is new to the enterprise and requires immediate or temporary network access. Your ideas. Connected. 1

2 MAG SM360 running Junos Pulse Access Control Service 802.1X EX Series Ethernet Switches or any non-juniper wired switch MAC Authentication MAG Series Junos Pulse Gateway MAG SM360-PROFILER running Juniper Endpoint Profiler WLA Series WLAN Access Points or any non-juniper WLAN infrastructure Figure 1: Juniper Endpoint Profiler deployed with Juniper Networks Unified Access Control solution As a comprehensive network access control (NAC) solution with Juniper Networks Unified Access Control, Juniper Endpoint Profiler is capable of enabling assured, secure authentication for any connected device over an entire enterprise network, while avoiding the costly and unwieldy need to manually configure network ports. Architecture and Key Components Available as a blade to run in MAG Series Junos Pulse Gateways, the diverse profiling and collection techniques of Juniper Endpoint Profiler allow organizations to utilize the best, most advantageous approach for identifying network-connected endpoints, given their specific requirements and capabilities. It discovers endpoints connected to an enterprise network dynamically yet in a passive manner, and it easily creates and modifies identity profiles. Juniper Endpoint Profiler gathers a great deal of valuable information regarding network-connected endpoint devices, including: MAC address IP address Network location data Operating system Device manufacturer Protocol and application usage Many other attributes The device information gathered by Juniper Endpoint Profiler is used to improve the operational efficiency of the enterprise and its network. The collected data can be leveraged for asset control, rapidly locating devices. The same data can be utilized to quickly and efficiently troubleshoot device, network, and connectivity issues, addressing incident responses in a timely manner. The gathered network-connected data can also help reduce Mean Time to Repair (MTTR), prepare for impending network migrations, as well as a host of other complex use cases in today s dynamic enterprise network environment, including: Simplifying and speeding successful Bring Your Own Device (BYOD) initiatives, ensuring that every endpoint which connects to an enterprise network even personal mobile devices that have not yet been provisioned onto the enterprise network is identified and authenticated. Easing the enablement and deployment of an 802.1X network by profiling, collecting, and compiling a database of all network-attached endpoint devices, differentiating between those devices able to accept an 802.1X supplicant from those that cannot, and identifying and monitoring all network-connected devices. Mitigating network threat events, including MAC spoofing, port swapping, and more. Juniper Endpoint Profiler is also very useful in machine-tomachine environments, and is leveraged in process control and highly regulated environments to ensure cybersecurity such as protecting the electrical grid, identifying and protecting critical 2

3 cyber assets (North American Electric Reliability Corporation s CIP Cyber Security Critical Cyber Asset Identification regulation), and maintaining a real-time view of critical information regarding devices in a supervisory control and data acquisition (SCADA) network. Juniper Endpoint Profiler and Juniper Networks Unified Access Control Juniper Endpoint Profiler, which runs in a blade on the MAG Series gateways, can be deployed in concert with Juniper Networks Unified Access Control solution, comprised of the same MAG Series gateways running a different blade with Junos Pulse Access Control Service. Combining Juniper Endpoint Profiler with Unified Access Control enables authentication of existing network-connected devices and new endpoint devices including personal mobile devices which have yet to be provisioned onto the network. This ensures network security by knowing who or which devices from which ports are accessing the enterprise network. Juniper UAC and Juniper Endpoint Profiler create an integrated, comprehensive solution for secure authentication and NAC, which delivers a level of security and automation necessary for today s growing, complex enterprise networks. As enterprises continue to implement systems which must adhere to regulatory and government compliance mandates, a Juniper UAC Juniper Endpoint Profiler integrated solution delivers many additive benefits to address and to easily and quickly maintain compliance with these requirements. Junos Pulse Access Control Service, running on a MAG Series gateway, sends Lightweight Directory Access Protocol (LDAP) queries to the Juniper Endpoint Profiler. Based on the response to the LDAP query, Junos Pulse Access Control Service may perform MAC authentication on the appropriate network-connected endpoint device. Also, the information stored within Juniper Endpoint Profiler on each device connected to the network is leveraged by Junos Pulse Access Control Service on the MAG Series gateway to securely authenticate endpoints which are not running or are incapable of using an 802.1X supplicant or client. Juniper Endpoint Profiler, like Juniper UAC, is based on industry standards and protocols that include the Trusted Computing Group s (TCG) Trusted Network Connect (TNC) industry standards, including the Interface for Metadata Access Point (IF-MAP) standard specification. IF-MAP operates much like a client/server environment, collecting device information from vendor-agnostic network appliances (which have implemented IF-MAP), and sharing the information with other IF-MAP compatible devices in the network. Since both Juniper Endpoint Profiler and Junos Pulse Access Control Service are TNC-based, and both utilize the TNC s IF-MAP protocol, they can share device information via IF-MAP. If a network-connected endpoint begins to exhibit unacceptable behavior for example, a previously defined port to which a networked printer has been connected suddenly attempts to access the Finance servers that information can be shared by Juniper Endpoint Profiler with Junos Pulse Access Control Service. Junos Pulse Access Control Service can then dynamically distribute the appropriate policy-based behavior to the relevant policy enforcement points (PEPs) on the network, to ensure that access to the Finance servers is denied from that specific port. And, Juniper Endpoint Profiler will re-profile the device now attached to the port, since it no longer is acting appropriately for a defined network printer. Juniper Endpoint Profiler and Juniper Networks EX Series Ethernet Switches Juniper Endpoint Profiler works with any vendor-agnostic 802.1X-compatible Ethernet switch, and offers extended integration for EX Series Ethernet Switches. For example, 802.1X-compatible switches, including EX Series switches and intelligent routers can send SNMP traps to Juniper Endpoint Profiler, aiding in determining the location of networkconnected endpoints, and also helping to learn an endpoint s MAC address. EX Series switches and other 802.1X-compatible switches can also send J-Flow traffic and data to Juniper Endpoint Profiler for analysis. This aids Juniper Endpoint Profiler in learning UDP/TCP from the connected endpoint s communications. Finally, EX Series switches and other 802.1X switches may set Dynamic Host Configuration Protocol (DHCP) Option 82 for location, which can aid Juniper Endpoint Profiler in learning additional endpoint location information, when configured. Juniper Endpoint Profiler Features and Benefits Juniper Endpoint Profiler delivers unparalleled profiling, real-time and historical data collection and storage, flexible enough for any environment. 3

4 Table 1: Juniper Endpoint Profiler Features and Benefits Feature Automated discovery of all networkattached endpoint devices Real-time and historical views of connected endpoint data Unified authentication of all network-attached endpoints Addresses regulatory and government compliance requirements Single hardware platform Complete solution from one vendor Benefit Assigns a profile and enables device type classification to all network-attached endpoints providing increased visibility for the IT administrator. Eliminates the need for manually discovering and documenting network-attached endpoints. Alleviates a labor-intensive, time-consuming process, saving time, cost, and most importantly human capital. Simplifies BYOD and secure network access by personal mobile devices. Helps to achieve a better understanding of the state of all network-connected endpoints. Enables the mining and leveraging of device location, previous addressing, and behavioral attributes and data. When deployed together with UAC specifically Junos Pulse Access Control Service on a MAG Series gateway Juniper Endpoint Profiler s database may be leveraged for the authentication of all network-enabled devices. Centralizes authentication, dramatically reduces NAC deployment time, and facilitates the mobility of networked devices and users that today s businesses demand. In concert with Junos Pulse Access Control Service, discovers and takes appropriate action against rogue devices. Tracks user/device locations. Maintains a real-time and historical account of all network-attached devices. Helps support organizations to meet regulatory and government compliance requirements. Deployed as a blade on MAG Series Junos Pulse Gateways. Can be deployed on the MAG Series gateways as a standalone profiling solution to automate discovery, identification and monitoring of network-attached endpoints or, in conjunction with Junos Pulse Access Control Service on separate blades on the same MAG Series gateway, can allow dynamic access provisioning for network-attached endpoints. Saves deployment, maintenance, and administrative cost and IT staff time. All product components, support, and services are available from a single vendor Juniper Networks. Specifications Juniper Endpoint Profiler is comprised of three components: Juniper Endpoint Profiler software is available as collector only, which collects and forwards pertinent data such as MAC address, IP address, etc. from network-connected endpoint devices to the profiling server; standalone profiling server only, which allows for profiling of endpoints based on the data forwarded by collectors suitable for networks with multiple deployed collectors; or as combined profiler and collector. MAG Series Junos Pulse Gateways, specifically MAG6610 or MAG6611, which support two or four Juniper Networks Junos Pulse service blades, respectively. MAG-SM360-PROFILER blade, which runs Juniper Endpoint Profiler (Collector only, Profiler server only, or combined Collector and Profiler), and is deployed in the MAG Series gateways. Juniper Networks Services and Support Juniper Networks is the leader in performance-enabling services that are designed to accelerate, extend, and optimize your high-performance network. Our services allow you to maximize operational efficiency while reducing costs and minimizing risk, achieving a faster time to value for your network. Juniper Networks ensures operational excellence by optimizing the network to maintain required levels of performance, reliability, and availability. For more details, please visit en/products-services. Ordering Information The following is the ordering information for Juniper Endpoint Profiler, including the respective Juniper Endpoint Profiler software (Collector only, Profiler server only, or combined Collector and Profiler), and the MAG-SM360-PROFILER blade. Model Number Description MAG SM360 Profiler Blade MAG-SM360- PROFILER MAG SM-360 Hardware Blade for Juniper Endpoint Profiler Profiler Server and Collector Software 1000D 2500D 5000D 10KD Collector Only Software 1000D 2500D 5000D 10KD Profiler Server Only Software ACCESSX600-PF-SO- 15KD functionality for 1,000 devices functionality for 2,500 devices functionality for 5,000 devices functionality for 10,000 devices functionality for 1,000 devices functionality for 2,500 devices functionality for 5,000 devices functionality for 10,000 devices Endpoint Profiler Server (only) functionality for up to 15,000 devices 4

5 Model Number High Availability X600-PF-SC-1000D- X600-PF-SC-2500D- X600-PF-SC-5000D- X600-PF-SC-10KD- X600-PF-SO-15KD- Description license for 1,000 devices license for 2,500 devices license for 5,000 devices license for 10,000 devices license for 15,000 devices About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters Juniper Networks, Inc Innovation Way Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC and EMEA Headquarters Juniper Networks International B.V. Boeing Avenue PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: Fax: Copyright 2015 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN May 2015

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.

White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc. White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3

More information

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!

More information

Junos Space Virtual Control

Junos Space Virtual Control Proiduct Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these virtual network elements in conjunction

More information

Juniper Care Plus Services

Juniper Care Plus Services Juniper Care Plus Services Service Overview In today s dynamic marketplace, organizations are under constant pressure to meet market demand while maintaining or increasing return on investment. IT departments

More information

Reasons to Choose the Juniper ON Enterprise Network

Reasons to Choose the Juniper ON Enterprise Network Reasons to Choose the Juniper ON Enterprise Network Juniper s enterprise access products meet the always-on needs of today s enterprises by delivering solutions that are reliable, simple, and smart. The

More information

Reasons Healthcare. Prefers Juniper Wireless

Reasons Healthcare. Prefers Juniper Wireless Reasons Healthcare Prefers Juniper Wireless Juniper s WLAN solution delivers the highest levels of reliability, scalability, management, and security to meet the mobility needs of healthcare. Wireless

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Service Automation Made Easy

Service Automation Made Easy Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their

More information

White Paper. Five Steps to Firewall Planning and Design

White Paper. Five Steps to Firewall Planning and Design Five Steps to Firewall Planning and Design 1 Table of Contents Executive Summary... 3 Introduction... 3 Firewall Planning and Design Processes... 3 Step 1. Identify Security Requirements for Your Organization...

More information

Reasons Enterprises. Prefer Juniper Wireless

Reasons Enterprises. Prefer Juniper Wireless Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.

More information

Juniper Optimum Care. Service Description. Continuous Improvement. Your ideas. Connected. Data Sheet. Service Overview

Juniper Optimum Care. Service Description. Continuous Improvement. Your ideas. Connected. Data Sheet. Service Overview Juniper Optimum Care Service Overview An Ongoing Proactive Service Creating a Partnership for Optimum Network Performance Network operations managers are facing a triple mandate optimize the network, avoid

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency

More information

Junos Pulse: A Day in the Life of the Mobile Worker

Junos Pulse: A Day in the Life of the Mobile Worker Junos Pulse: A Day in the Life of the Mobile Worker Junos Pulse and the MAG Series Enable Fast, Secure Network, Cloud, and Application Access 1 Table of Contents Executive Summary... 3 Introduction Creating

More information

Juniper Networks Automated Support and Prevention Solution (ASAP)

Juniper Networks Automated Support and Prevention Solution (ASAP) Juniper Networks Automated Support and Prevention Solution (ASAP) An ecosystem of tools, applications, and systems to streamline operations, bring operational efficiency, reduce downtime, and increase

More information

JUNOS SPACE VIRTUAL CONTROL

JUNOS SPACE VIRTUAL CONTROL DATASHEET JUNOS SPACE VIRTUAL CONTROL Product Overview The proliferation of virtual switches in the data center has presented data center operators with a significant challenge namely, how to manage these

More information

Juniper Networks MetaFabric Architecture

Juniper Networks MetaFabric Architecture Juniper Networks MetaFabric Architecture Enabling a Simple, Open, and Smart Data Center 1 Table of Contents Executive Summary... 3 Introduction... 3 Data Center Myths vs. Realities...4 Myth #1: The data

More information

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS

JUNIPER CARE PLUS ADVANCED SERVICES CREDITS DATASHEET JUNIPER CARE PLUS ADVANCED SERVICES CREDITS Service Overview Today s organizations are under constant pressure to meet dynamic market demands while increasing their return on investment. IT departments

More information

Easing the File Download Process on SRX Series Services Gateways for the Branch

Easing the File Download Process on SRX Series Services Gateways for the Branch APPLICATION NOTE Smart Download Manager Easing the File Download Process on SRX Series Services Gateways for the Branch Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3

More information

JUNOS PULSE APPCONNECT

JUNOS PULSE APPCONNECT White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Build the Best UC&C Network for an Optimized Microsoft Lync Deployment

Build the Best UC&C Network for an Optimized Microsoft Lync Deployment Build the Best UC&C Network for an Optimized Microsoft Lync Deployment The only Microsoft-certified Unified Communications and Collaboration (UC&C) choice for wired and wireless network access service

More information

Transforming Service Life Cycle Through Automation with SDN and NFV

Transforming Service Life Cycle Through Automation with SDN and NFV Transforming Service Life Cycle Through Automation with SDN and NFV Automated workflows improve TCO for service delivery 1 Table of Contents Executive Summary... 3 Introduction... 3 Today s Challenges...

More information

Juniper Networks Solution Portfolio for Public Sector Network Security

Juniper Networks Solution Portfolio for Public Sector Network Security SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Junos Space for Android: Manage Your Network on the Go

Junos Space for Android: Manage Your Network on the Go Junos Space for Android: Manage Your Network on the Go Combining the power of Junos Space and Android SDKs to build powerful and smart applications for network administrators Challenge It is important

More information

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,

More information

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3

More information

SOLUTION BROCHURE. Lifecycle Wireless Infrastructure, Security and Services Management

SOLUTION BROCHURE. Lifecycle Wireless Infrastructure, Security and Services Management SOLUTION BROCHURE Wireless LAN Management Solution Overview Lifecycle Wireless Infrastructure, Security and Services Management Wireless LAN Management Solution Overview A successful wireless LAN (WLAN)

More information

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100

TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 White Paper TOPOLOGY-INDEPENDENT IN-SERVICE SOFTWARE UPGRADES ON THE QFX5100 Juniper Innovation Brings ISSU to Data Center Top-of-Rack Switches Copyright 2014, Juniper Networks, Inc. 1 Table of Contents

More information

Single converged and agile IP infrastructure for data, voice, and video. Rich collaboration features (presence, IM, file sharing) The Challenge

Single converged and agile IP infrastructure for data, voice, and video. Rich collaboration features (presence, IM, file sharing) The Challenge SOLUTION BRIEF Build the Best UC&C Network for an Optimized Microsoft Deployment The only Microsoft-certified Unified Communications and Collaboration (UC&C) choice for wired and wireless network access

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Juniper Networks Unified Access Control (UAC) and EX-Series Switches

Juniper Networks Unified Access Control (UAC) and EX-Series Switches White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Drive Business Innovation in Financial Services with a Service- Aware Network

Drive Business Innovation in Financial Services with a Service- Aware Network Drive Business Innovation in Financial Services with a Service- Aware Network Agile networks enable financial services to capture the next wave of growth 1 Table of Contents Executive Summary... 3 Introduction:

More information

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS

ALTERNATIVES FOR SECURING VIRTUAL NETWORKS White Paper ALTERNATIVES FOR SECURING VIRTUAL NETWORKS A Different Network Requires a Different Approach Extending Security to the Virtual World Copyright 2013, Juniper Networks, Inc. 1 Table of Contents

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Juniper Care Services

Juniper Care Services Services Service Overview Services provide rapid response from Juniper Networks technical service engineers and hardware replacement options that let you choose the right timing and resources for your

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

The Global Attacker Security Intelligence Service Explained

The Global Attacker Security Intelligence Service Explained White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

SEVEN MYTHS OF CONTROLLER- LESS WIRELESS LANS

SEVEN MYTHS OF CONTROLLER- LESS WIRELESS LANS White Paper SEVEN MYTHS OF CONTROLLER- LESS WIRELESS LANS Vendors of controller-less s are making extravagant claims for their products. But how much is reality and how much is hype? Copyright 2014, Juniper

More information

Juniper Networks Secure

Juniper Networks Secure White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3

More information

POLICY SECURE FOR UNIFIED ACCESS CONTROL

POLICY SECURE FOR UNIFIED ACCESS CONTROL White Paper POLICY SECURE FOR UNIFIED ACCESS CONTROL Enabling Identity, Role, and Device-Based Access Control in a Simply Connected Network Copyright 2014, Pulse Secure LLC 1 Table of Contents Executive

More information

vsrx Services Gateway: Protecting the Hybrid Data Center

vsrx Services Gateway: Protecting the Hybrid Data Center Services Gateway: Protecting the Hybrid Data Center Extending Juniper Networks award-winning security products to virtualized, cloud-based, and hybrid IT environments Challenge Virtualization and cloud

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Juniper Unite Cloud-Enabled Enterprise Reference Architecture

Juniper Unite Cloud-Enabled Enterprise Reference Architecture Juniper Unite Cloud-Enabled Enterprise Reference Architecture Achieving agility by simplifying and securing the enterprise network Challenge The enterprise network is no longer just a business necessity.

More information

Unified Wired and Wireless Visibility and Control

Unified Wired and Wireless Visibility and Control Unified Wired and Wireless Visibility and Control There is nothing more important than our customers. Unified Wired and Wireless Visibility and Control Enterprise Wireless LANs (WLAN) deliver significant

More information

Networks that know data center automation

Networks that know data center automation Networks that know data center automation EBOOK AUTOMATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface Over the years and across industries, it has been proven that increased

More information

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3

More information

Juniper Solutions for Turnkey, Managed Cloud Services

Juniper Solutions for Turnkey, Managed Cloud Services Juniper Solutions for Turnkey, Managed Cloud Services Three use cases for hosting and colocation service providers looking to deliver massively scalable, highly differentiated cloud services. Challenge

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

Identity-Based Networking Services

Identity-Based Networking Services . Data Sheet Identity-Based Networking Services Identity-Based Networking Services Overview Cisco Identity-Based Networking Services (IBNS) is an integrated solution that offers authentication, access

More information

Junos Space Network Director

Junos Space Network Director Junos Space Network Director Product Overview Whether in the data center or the campus, today s network managers are learning to overcome many new challenges. Data center network and cloud administrators

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks

Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks Juniper Networks, Ruckus Wireless Deliver Carrier-Class Performance for Enterprise Networks Open, NFV-compliant solution simplifies operations and delivers flexible network architecture Challenge All types

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size

More information

JUNIPER TECHNOLOGY UPDATE. Debbie Montano dmontano@juniper.net Jan 31, 2011

JUNIPER TECHNOLOGY UPDATE. Debbie Montano dmontano@juniper.net Jan 31, 2011 JUNIPER TECHNOLOGY UPDATE Debbie Montano dmontano@juniper.net Jan 31, 2011 DISCLAIMER This statement of direction sets forth Juniper Networks current intention and is subject to change at any time without

More information

UNIFIED ACCESS CONTROL

UNIFIED ACCESS CONTROL PRODUCT CATEGORY BROCHURE UNIFIED ACCESS CONTROL Comprehensive Network Access Control Using the Network You Have Today Juniper Networks Unified Access Control is a comprehensive access control solution

More information

JUNIPER NETWORKS WIRELESS LAN SOLUTION

JUNIPER NETWORKS WIRELESS LAN SOLUTION SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview

More information

PULSE SECURE CARE PLUS SERVICES

PULSE SECURE CARE PLUS SERVICES DATASHEET PULSE SECURE CARE PLUS SERVICES Service Overview In today s dynamic marketplace, organizations are under constant pressure to meet market demand while maintaining or increasing return on investment.

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services WHITE PAPER Infoblox IPAM Integration with Microsoft AD Sites and Local Services Infoblox IPAM Integration with Microsoft AD Sites and Local Services Today s enterprise infrastructure is dynamic, with

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: info@avendasys.com email: sales@avendasys.com Avenda

More information

Enterprise Energy Management with JouleX and Cisco EnergyWise

Enterprise Energy Management with JouleX and Cisco EnergyWise Enterprise Energy Management with JouleX and Cisco EnergyWise Introduction Corporate sustainability and enterprise energy management are pressing initiatives for organizations dealing with rising energy

More information

Pulse Policy Secure. Ruckus WLC Guest Access Integration SmartZone and ZoneDirector. Solution Guide. Product Release 5.3R3. Document Version 1.

Pulse Policy Secure. Ruckus WLC Guest Access Integration SmartZone and ZoneDirector. Solution Guide. Product Release 5.3R3. Document Version 1. Pulse Policy Secure Ruckus WLC Guest Access Integration SmartZone and ZoneDirector Solution Guide Product Release 5.3R3 Document Version 1.0 Published May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite

More information

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

Simplifying the Data Center Network to Reduce Complexity and Improve Performance SOLUTION BRIEF Juniper Networks 3-2-1 Data Center Network Simplifying the Data Center Network to Reduce Complexity and Improve Performance Challenge Escalating traffic levels, increasing numbers of applications,

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

JUNOS SPACE NETWORK DIRECTOR

JUNOS SPACE NETWORK DIRECTOR DATASHEET JUNOS SPACE NETWORK DIRECTOR Product Overview Whether in the campus network or the data center, today s network managers are learning to overcome many new challenges. Data center network administrators

More information

Unified Security TNC EVERYWHERE. Wireless security. Road Warrior. IT Security. IT Security. Conference Room. Surveillance.

Unified Security TNC EVERYWHERE. Wireless security. Road Warrior. IT Security. IT Security. Conference Room. Surveillance. Corporate Governance Employee Cube Road Warrior Surveillance Surveillance IT Security Data Center IT Security Conference Room Wireless security Manufacturing and Control TNC EVERYWHERE Unified Security

More information

Networks that know data center virtualization

Networks that know data center virtualization Networks that know data center virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public

More information

Identity-Based Application and Network Profiling

Identity-Based Application and Network Profiling Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks,

More information

MIGRATING TO A 40 GBPS DATA CENTER

MIGRATING TO A 40 GBPS DATA CENTER White Paper MIGRATING TO A 40 GBPS DATA CENTER Juniper QSFP+ LX4 technology removes cabling cost barriers for migrating from 10 Gbps to in data center networks Copyright 2014, Juniper Networks, Inc. 1

More information

Tackling the Top Five Network Access

Tackling the Top Five Network Access WHITE PAPER Tackling the Top Five Network Access Control Challenges Juniper Networks Unified Access Control and EX Series Ethernet Switches Copyright 2010, Juniper Networks, Inc. Table of Contents Table

More information

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization Solution Brief Branch on Demand Extending and Securing Access Across the Organization Branch on Demand Extending Access to Corporate Resources Across the Organization As organizations extend corporate

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

NETWORK AND SECURITY MANAGER

NETWORK AND SECURITY MANAGER DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching

More information

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe

DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe DECODING SOFTWARE DEFINED NETWORKING (SDN) Nico Siebelink Technical Director Northern Europe JUNIPER AND SDN IN THE NEWS 2 Copyright 2013 Juniper Networks, Inc. www.juniper.net WHY DO WE NEED SOFTWARE

More information

Trusted Network Connect (TNC)

Trusted Network Connect (TNC) Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel

More information

Understanding the Alternatives

Understanding the Alternatives WHITE PAPER VLAN Design for IPTV/Multiplay Networks Understanding the Alternatives Copyright 2009, Juniper Networks, Inc. Table of Contents Table of Figures Executive Summary...1 Introduction...1 VLAN

More information

SIMPLIFYING COMMUNICATIONS FOR THE WAY PEOPLE WORK TODAY

SIMPLIFYING COMMUNICATIONS FOR THE WAY PEOPLE WORK TODAY Services Overview ShoreTel Network Services Portfolio SOLUTION BRIEF SIMPLIFYING COMMUNICATIONS FOR THE WAY PEOPLE WORK TODAY This comprehensive portfolio of data networking services includes Network Design

More information

Junos Pulse: Securing Today s Mobile Life

Junos Pulse: Securing Today s Mobile Life Junos Pulse: Securing Today s Mobile Life An Integrated Approach to Mobile Security, Device and Application Management, and Secure Network Access Today s Mobile Life - Overview Today, our world is digital,

More information

MITEL. Enterprise Management Solutions

MITEL. Enterprise Management Solutions MITEL Enterprise Management Solutions Results-driven Enterprise Wide Management Solutions As business requirements evolve, today s intelligent IP-voice networks are responding by delivering more targeted

More information

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires

More information

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization

Solution Brief. Branch on Demand. Extending and Securing Access Across the Organization Solution Brief Branch on Demand Extending and Securing Access Across the Organization Extending Access to Corporate Resources Across the Organization As organizations extend corporate capabilities to teleworkers

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Networks that virtualization

Networks that virtualization Networks that know virtualization EBOOK VITRUALIZATION Your ideas. Connected. Copyright August 2014, Juniper Networks, Inc. Preface In both legacy IT data centers and emerging private and public clouds,

More information

PCI v2.0 Compliance for Wireless LAN

PCI v2.0 Compliance for Wireless LAN PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

Deploying IP Telephony with EX-Series Switches

Deploying IP Telephony with EX-Series Switches Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Security Coordination with IF-MAP

Security Coordination with IF-MAP Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?

More information

Symantec IT Management Suite 8.0

Symantec IT Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec IT Management Suite Symantec IT Management Suite enables IT administrators to securely manage the entire lifecycle of

More information