Will Juniper Deliver on Access Control Promises
Will latest release of network access control framework live up to the hype?
But that's changing, according to Juniper Networks. The networking vendor says that NAC -- as embodied in a new version of its Unified Access Control (UAC) framework and new hardware -- is well beyond the hype phase, and is actively solving enterprise access control needs.
The new UAC 2.2 release will also be the first from Juniper (NASDAQ: JNPR) to support Microsoft's (NASDAQ: MSFT) Network Access Protection. It's all part of Juniper's larger effort to develop a comprehensive end-to-end security framework that competes effectively with rival Cisco's Self Defending Network strategy.
On the scalability front, the UAC 2.2 release is being accompanied by Juniper's first hardware refresh for its Infranet controller (IC) product in three years. The new IC 4500 and IC6500 replace the older IC400 AND IC6000 appliances that debuted in 2005.
Back when they first appeared, the Infranet controllers were part of Juniper's Infranet strategy, which has been supplanted in recent years by the newer UAC technology. The new IC's according to Campagna offer greater scalability for policy control with the IC6500 able to support up to 30,000 users.
The need for increased scalability is a result of the wider deployments that UAC is now experiencing.
"One of the problems with NAC in the last couple of years is that because it has been billed as such a huge thing for so many different needs, it has caused confusion, and in some cases, customer hesitation," Campagna said. "Now we're seeing that it's into people's heads why they need NAC. We're seeing people move beyond pilots into full enterprise-wide deployments of UAC across a lot of different verticals."
Campagna explained that Juniper is seeing its UAC used as a solution for protection against insider threats as well as for guest access and compliance. UAC performs both pre- and post-admission access control, and in tandem with other Juniper security solutions, such as their their intrusion prevention system (IPS), it's become part of a broader adaptive threat-management solution.
Next page: Broad threat response