Juniper's Unified Access Control (UAC) is a standards-based, scalable, comprehensive access control solution that granularly and dynamically controls user access based on identity, device security state and location information. UAC protects networks by guarding critical applications and sensitive data, identity-enables access control and security, and provides comprehensive visibility and monitoring. UAC addresses challenges, such as insider threats, guest access, outsourcing/off-shoring and regulatory compliance.
The tool delivers significant competitive differentiation. UAC provides full Layer 2-7 policy enforcement on a wide array of enforcement points. UAC's policies are enforced at Layer 2 by any vendor's 802.1X-enabled wireless access points or switches, including Juniper Networks' EX Series Ethernet Switches; at Layers 3-7 via any Juniper firewall platform; and full Layer 7 application layer policy enforcement via standalone IDP series appliance. UAC is one of the most scalable NAC solution available.
UAC combines some of the best access control
and security technologies while leveraging existing security and network infrastructure investments. User identity, device state and network location is determined by the dynamically deployable, cross-platform UAC Agent or via UAC's agent-less mode, useful where installing a software client is not feasible, such as for guest access. UAC also dynamically delivers role- and resource-based access control of unmanageable devices – such as networked printers,
VoIP handsets, health monitoring devices, etc. – making simpler and faster-to-deploy access control across a network regardless of device manageability.
Juniper's Unified Access Control also meets regulatory compliance by ensuring endpoints are assessed
pre-/post-admission for security and access policy compliance; applies industry-leading, dynamic anti-spyware/anti-malware protection to endpoints attempting network access; offers secure, encrypted data transport from endpoints into and throughout the network; and correlates user identity and role information to network and application usage, providing significant business and technical advantages for enterprises and SME.