Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Juniper Delivers With Simply Connected Portfolio

Big vendors like Cisco, HP, IBM and Juniper are big on creating big programs that do big things. The problem? The programs are often long on vision and short on details because the purpose isn’t to define product road maps, but to state direction.

Juniper, however, has great vision and follow-through. Juniper's Simply Connected program, which debuted in October, aims to simplify access anywhere and anytime. New additions extend the company’s management framework into more devices and better access controls. That's great news if you’re a Juniper shop, but does little for you if you aren't.

More Insights


More >>

White Papers

More >>


More >>

Juniper’s Simply Connected portfolio allows enterprises to uniformly apply a user or device policy to any device anywhere and at any time. Having a uniform policy lays the foundation of a consistent user experience while letting IT set adequate controls on IT assets or user-owned devices. Juniper is extending its security portfolio down into entry-level products like the SRX 110 appliance, which supports all the unified threat management (UTM) features of its larger SRX brethren but is aimed at small-office locations. Juniper also announced two entry-level access points, the WLA 322 and WLA 321, which support the same access control features as Juniper’s higher-end APs.

Juniper is adding user- and role-based access policies on the wireless access points, the SRX and its AppSecure application firewall. While address-based policies work well in a server environment where hosts are known ahead of time or many users are accessing a common server, controlling user access requires discovering and communicating user and role information to policy decision points so the correct policy is applied wherever a user connects.

AppSecure, which runs on SRX appliances, controls access to Web applications based on user or role. Web applications are sophisticated and modular in nature: While Facebook is a Web application, it also has thousands of other applications that run and interact with the user. AppSecure can control what users can do within Web applications such as Facebook, enterprise Web-based applications, or communications software like Skype and IM.

Juniper is also enhancing its mobile client Junos Pulse with the ability to monitor and control applications on mobile devices such as Apple's iOS and Android. The iOS Pulse client had posture checking and that same capability is on Android. Like its desktop host checking tool, Juniper's SRX, UAC and other equipment can use the posture check to determine access rights. The Pulse client communicates with the SRX appliances, EX switches and wireless access points using Juniper UAC Enforcement Protocol. Junos Pulse uses the same user-based policy management, allowing IT to enforce policies that target groups, rather than taking a one-size-fits-all approach.

Juniper isn’t alone in trying to unify user access policies across devices, access methods and locations. Cisco's TrustSec offers a similar promise to unify security policies and features across its campus, data, remote-office and mobile product lines. Like most programs, these overarching policy management products tend to support a limited set of products.

Standards like the Trusted Computing Group’s Trusted Network Connect, some of which is co-developed in the IETF Network Endpoint Assessment working group, would help foster a broader set of vendor products, if only more vendors would adopt the standard or get involved with the process. If you want unified access policies across numerous vendor products, you're generally out of luck.

Mike Fratto is editor of Network Computing. You can email him, follow him on Twitter, or join the Network Computing group on LinkedIN. He's not as grumpy as he seems.

Related Reading

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers