JUNOS PULSE Ing Stephen Vella Computime Ltd. Head of Technology Solutions.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
McAfee One Time Password
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Power BI Sites and Mobile BI. What You Will Learn Sharing and Collaboration Introducing Power BI Exploring Power BI Features and Services Partner Opportunities.
Meraki Mobile Device Management
Protection notice / Copyright notice HiPath MobileConnect Delivering on the Promise of Enterprise FMC February 2007.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
Secure Mobility Mobile Connectivity with Network Integrity via SSL VPNs & Mobile Clients Raymond Cushman Territory Manager Great Lakes District.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Conferencing & Enterprise ROI Randy Knaub Director of Marketing.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
User and Device Management
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
MAG SERIES JUNOS PULSE GATEWAYS April Copyright © 2011 Juniper Networks, Inc. AGENDA 1.Overview of MAG Series 2.MAG Series Models.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Barracuda NG Firewall ™
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
PrinterOn Mobile Printing Platform
CudaLaunch for Barracuda NG Firewall.
Barracuda NextGen Firewalls
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Customized Solutions to your needs
2016 Citrix presentation.
Forefront Security ISA
Access and Information Protection Product Overview October 2013
Check Point Connectra NGX R60
System Center Marketing
Presentation transcript:

JUNOS PULSE Ing Stephen Vella Computime Ltd. Head of Technology Solutions

2 Copyright © 2010 Juniper Networks, Inc. Trends, Challenges and Opportunities Junos Pulse Overview Junos Pulse for Windows Overview Junos Pulse for Mobile OS Overview Junos Pulse Gateways Summary Q&A AGENDA

3 Copyright © 2010 Juniper Networks, Inc. MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES…

4 Copyright © 2010 Juniper Networks, Inc. MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES… Freedom and Flexibility to Use Any Device

5 Copyright © 2010 Juniper Networks, Inc. EXPLOSIVE GROWTH IN MOBILITY World's mobile worker population to surpass 1B people in 2010 and grow to > 1/3 of world's workforce by 2013* 14% of information workers use smartphones in 2010 to access data; expected to reach 30% by 2013** By 2012, smartphone penetration to roughly double globally (~9% to 20%)* About 1/4 of employees use smartphones that are not “corporate-standard” or managed* *Forrester Research; ** IDC

6 Copyright © 2010 Juniper Networks, Inc. Copyright © 2010 Infonetics Research, Inc. SECURITY CLIENT ADOPTION GROWTH PC shipments grew 1% in 2009 Smartphones continued to fly off shelves Combined with very successful launch of Microsoft Windows 7 and continuing development of an incredibly hostile threat environment, client security revenue increased almost 10% in 2009 Security Client Revenue by Category

7 Copyright © 2010 Juniper Networks, Inc. WHAT IS JUNOS PULSE? Applications (of any type) Junos Pulse Gateways Junos Pulse Client Juniper Extensive “Clientless”/ Browser Support MAGSeries SSL VPN IC Series UAC WXC Series Application Acceleration

8 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE AS AN INTEGRATION PLATFORM Junos Pulse ClientJunos Pulse Gateways APP1APP1P APP2APP2P APP3APP3P APP4APP4P APP1APP1P APP2APP2P APP3APP3P APP4APP4P Junos Pulse Platform Base OS JunosPulseApplications NOTE: Applications different per OS Junos Pulse is also an integration platform for select 3 rd party applications and services Applications SSL VPN NAC Application Acceleration EES and more

9 Copyright © 2010 Juniper Networks, Inc of Fortune 25 are using one core Pulse service: Juniper SA Series SSL VPN 24 of Fortune 25 are using one core Pulse service: Juniper SA Series SSL VPN Covers majority of all desktop, laptop, netbook, and smartphones worldwide BASED ON SUCCESSFUL, TESTED, LEADING TECHNOLOGY Over 25M people use Juniper client software to securely access corporate data Only Converged Solution Secure application access for mobile and non-mobile devices Support for many thousands of users Broadest Device Coverage Most Scalable Only Standards- based Solution

10 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE ANYTIME/ANYWHERE ENTERPRISE MOBILITY Microsoft Windows and Apple Mac OS – Full-featured connectivity + security + acceleration + collaboration Mobile OS - Appropriate functionality, evolving with the industry  Secure Access to Applications, Web Applications and Full Layer 3 Access to Corporate Applications Junos Pulse v1.0: Q210 Standalone clients available TODAY

11 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS Builds on Juniper’s market leading SA Series SSL VPN, UAC solution, and WXC Series technology! Dynamically provisioned software client (Junos Pulse) for:  Connectivity  Security  Acceleration  Collaboration Integrated multi-service gateways to terminate/control client Location awareness and session migration deliver anytime/anywhere access automatically, without user intervention Identity-enabled Standards-based, future-proofing network investments Integration platform for select 3 rd party apps Integrated multi-service network client delivering anytime/anywhere/everywhere connectivity, security, and acceleration with a simplified user experience

12 Copyright © 2010 Juniper Networks, Inc. SMART LOCATION BASED VPN AND LAN ACCESS For notebooks and netbooks:  Location Awareness – Seamless access as the user moves from remote access to LAN access  Pulse Client auto discovers High Speed/Low Latency connections  Seamless session migration – No need to re-authenticate Branch Office/Locations/Campus Remote Location (Hotel, Partner, etc.) Remote Users/Telecommuters WXC Series SA Series HQ IC Series (UAC) Mobile Users

13 Copyright © 2010 Juniper Networks, Inc. LAN Data Center NY Engineering Server Finance Server SSL VPN UAC SRX Data Center Tokyo Engineering Server Finance Server Corporate Network SSL VPN UAC SRX IF-MAP User: Adam Role: Finance Head Quarters User: Adam Role: Finance Remote Site SSL VPN REMOTE GLOBAL IDENTITY AWARE NETWORKING Adam in Finance attempts to access the Engineering Servers in the NY data center from his wired desktop at HQ, but access is denied. Adam is only allowed access to the Finance Server based on his credentials and access policies. Adam is now remote in Asia and attempts to access the Tokyo data center remotely from his mobile device. The same access policies applied to Adam when at HQ follow him anywhere and anytime he attempts network access.

14 Copyright © 2010 Juniper Networks, Inc. SUPPORT FOR APPLE MAC OS  We have separate SSL VPN and LAN Access Control clients which support Mac OS  These separate clients work with the same gateways (SA Series SSL VPN, UAC) as Junos Pulse and can be used simultaneously with Junos Pulse for Windows  We do not have a converged client (Junos Pulse) for Mac OS notebooks or desktops as yet; however until we do, you may use the separate Mac OS clients

15 Copyright © 2010 Juniper Networks, Inc. MALICIOUS APPS FOUND IN GOOGLE’S ANDROID ONLINE STORE SMARTPHONE FUNDAMENTAL CHANGE IN MOBILE SECURITY Threat landscape has evolved from SMS-based attacks Threat vectors are at the device, application and network level Smartphones ARE computers

16 Copyright © 2010 Juniper Networks, Inc.  Rapid ongoing adoption of smartphones  By 2012, we expect penetration of smartphones to roughly double globally (~9% to 20%)*  Roughly 25% of employees use smartphones that are not “corporate-standard” – expected to further increase rapidly GROWING SMARTPHONE USAGE * Forrester Report, Q4 2009, convergence.tmcnet.com/topics/pbx/articles/ still-lots-room-upside-enterprise-smartphones.htmhttp://fixed-mobile- convergence.tmcnet.com/topics/pbx/articles/ still-lots-room-upside-enterprise-smartphones.htm

17 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE ANYTIME/ANYWHERE ENTERPRISE MOBILITY Windows and Mac – Full-featured connectivity + security + acceleration + collaboration Mobile OS - Appropriate functionality, evolving with the industry  Secure Access to Applications, Web Applications and Full Layer 3 Access to Corporate Applications Junos Pulse v1.0: Q210 Standalone clients available TODAY

18 Copyright © 2010 Juniper Networks, Inc. Mobile Device Growth in the Enterprise  Driven by employees who want to use personal devices  Mobility = Productivity  Good for employees and the company! But why haven’t companies allowed/done it to date?  Lack of encryption  No multifactor authentication  Lack of robust antivirus/anti-malware  Inconsistent security policies  Application rendering (small screens)  Difficult to enter passwords  Wide range of backend applications Increases enterprise productivity by empowering employees to access corporate applications on personal handsets INCREASING ENTERPRISE MOBILE PRODUCTIVITY

19 Copyright © 2010 Juniper Networks, Inc. SECURE ACCESS FROM MOBILE DEVICES Junos Pulse for mobile devices enables smartphone and mobile device access to , Web, and corporate applications Web Apps Web Apps Corporate Apps Corporate Apps Applications More Applications on More Devices Over Time

20 Copyright © 2010 Juniper Networks, Inc. Trends, Challenges and Opportunities Junos Pulse Overview Junos Pulse for Windows Overview Junos Pulse and Mobile OS/Devices Overview Junos Pulse Gateways Summary Q&A AGENDA

21 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE GATEWAYS MAG SERIES, UAC, WXC SERIES Applications (of any type) Junos Pulse Gateways MAGSeries/SSL VPN IC Series/UAC WXC Series/ Application Acceleration Junos Pulse Client Juniper Extensive “Clientless”/ Browser Support

22 Copyright © 2010 Juniper Networks, Inc. MAG SERIES SSL VPN % of Participants Who Experienced an Insider Incident 1. Employee Remote Access 2. Extranet Portals 3. Business Continuity 4. Mobile Device Access Employees with Corporate Laptops Employees with Home PCs Employees with Mobile Devices Applications Server Corporate Intranet Server MAG Partners Suppliers Customers Partners Employees Customers Increased Productivity  Anytime, anywhere access from any device  No endpoint software to install or manage  Easy access from common browsers Administrative Ease of Use  Easier management of authorized users  No client software enforced on users  Access from any Web-enabled device Continued Business Operations  High remote access demand during emergency  Simple scalability to increased demand  Sustain access for partners and customers iPhone Improved Ease of Use, Higher Productivity  Access from any mobile device  ActiveSync provides secure access to Exchange  Enforce mobile device integrity and security

23 Copyright © 2010 Juniper Networks, Inc. INTRODUCING MAG SERIES JUNOS PULSE GATEWAYS  3rd Party Applications/VM’s - future  Application Acceleration (WX) - future MAG6611 Junos Pulse Gateway  SSL VPN  NAC Next Generation Purpose-built Gateways Supporting Junos Pulse Gateway – Single Gateway! Single Client!  Single, designed gateway to run SSL VPN & NAC  Integrated with Junos Pulse client  4 models to meet needs of companies of all sizes  Smaller form factor  Lower power consumption  Common access licensing  Investment protection SSL VPN Module NAC Module

24 Copyright © 2010 Juniper Networks, Inc. UNIQUE MAG SERIES FEATURES FeatureDescription Single client, single gateway - One converged gateway for SSL VPN & NAC - Single client for SSL VPN & NAC (Junos Pulse) Personality switchingEasily change between SSL VPN & NAC personalities (e.g., SSL VPN today, NAC tomorrow) Modular designMix & match service modules in chassis models to meet changing enterprise access needs Scalable architectureMax. support of up to 40,000 SSL VPN users and up to 60,000 NAC users in highest model Common access licensesSame license can be used either for SSL VPN user sessions or NAC user sessions Long-term investmentFuture support for 3 rd party applications & application acceleration

25 Copyright © 2010 Juniper Networks, Inc. MAG SERIES MODELS  MAG6611—2U high chassis modular configuration supports up to four service modules  Optional management module.  Typical deployment up to 40,000 SSL VPN users or 60,000 NAC users  MAG6610—1U high chassis modular configuration supports up to two service modules  Optional management module.  Typical deployment up to 20,000 SSL VPN users or 30,000 NAC users  MAG4610—Single application engine, fixed HW config.  1U, ½-width (may be deployed side-by-side in 1U rack space).  Typical deployment up to 1000 SSL VPN users or 5000 NAC users  MAG2600—Single application engine, fixed HW config.  1U high, 30W power consumption.  Typical deployment up to 100 SSL VPN users or 200 guest access users

26 Copyright © 2010 Juniper Networks, Inc. MAG2600 JUNOS PULSE GATEWAY Ideal for small and medium enterprise customers Equivalent to SA700/SA2500 Small form factor design (1U high)  Rack mountable or can be placed on desk Fixed configuration  Can be used for SSL VPN OR enterprise guest access (EGA) capability  Supports up to 100 SSL VPN users or 200 guest access users SSL VPN mode includes SA 7.1 (or higher) software features Guest access mode includes all EGA features (must order EGA license - MAGX600-GUEST- ACCESS)

27 Copyright © 2010 Juniper Networks, Inc. MAG4610 JUNOS PULSE GATEWAY Ideal for medium to large sized enterprise customers Equivalent to SA4500 or IC4500 1U, ½-width (may be deployed side-by-side in 1U rack space) for two node cluster Fixed configuration  Can be used for SSL VPN OR NAC capability  Supports up to 1000 SSL VPN users or 5000 NAC users SSL VPN mode includes SA 7.1 (or higher) software features NAC mode includes UAC 4.1 (or higher) software features

28 Copyright © 2010 Juniper Networks, Inc. MAG6610 JUNOS PULSE GATEWAY Ideal for scalable large enterprise customers Equivalent to SA4500/SA6500 or IC4500/IC6500 1U high chassis modular configuration  Supports up to two service modules (MAG-SM160 or MAG-SM360) for SSL VPN AND/OR NAC capability  Can enable SSL VPN mode on one module & NAC mode on another module  Max. support of up to 20,000 SSL VPN or 30,000 NAC users  Optional management module available (MAG-CM060) SSL VPN mode includes SA 7.1 (or higher) software features NAC mode includes UAC 4.1 (or higher) software features Service Modules

29 Copyright © 2010 Juniper Networks, Inc. MAG6611 JUNOS PULSE GATEWAY Ideal for highest access needs of enterprises Equivalent to SA4500/SA6500 or IC4500/IC6500 2U high chassis modular configuration  Supports up to four service modules (MAG-SM160 or MAG-SM360) for SSL VPN AND/OR NAC capability  Can enable SSL VPN mode on one or more modules & NAC mode on one or more modules  Max. support of up to 40,000 SSL VPN or 60,000 NAC users  Optional management module available (MAG-CM060) Additional power supply available for redundancy SSL VPN mode includes SA 7.1 (or higher) software features NAC mode includes UAC 4.1 (or higher) software features Service Modules

30 Copyright © 2010 Juniper Networks, Inc. WXC SERIES APPLICATION ACCELERATION Enterprise IT NSM DATA CENTER Apps Data Finance Video STRM Series Unified Access Control SA Series SSL VPN IDP Series Firewall WXC Series Wide Area Network Application acceleration services in Junos Pulse are targeted to improve the performance of remote / mobile / home users accessing centrally hosted applications such as:  Access to Microsoft Office data held on Windows shared drives  Access to Web and Portal type applications  FTP data repository

31 Copyright © 2010 Juniper Networks, Inc. IC SERIES UNIFIED ACCESS CONTROL Mike Fratto | InformationWeek Analytics | 2008 NAC Survey 58% 57% 47% 44% 42% 30% Guests Employee, remote access Employee, Wireless LAN Contractors/ outsourced labor Unmanageable devices Employee, wired LAN LAN Threat by Users 2007 e-Crime Watch Survey % of Participants Who Experienced Insider Threats Ensures Secure Guest Access Addresses Regulatory Compliance Protects Against Insider Threats

32 Copyright © 2010 Juniper Networks, Inc. INDUSTRY LEADERSHIP AND RECOGNITION 2008 Gartner Magic Quadrant for SSL VPN Gartner SSL VPN Magic Quadrant Gartner NAC Magic Quadrant

33 Copyright © 2010 Juniper Networks, Inc. JUNIPER AND JUNOS PULSE LEADING THE WAY  Over 25M people use Juniper client software to securely access corporate data  Industry’s 1 st standards-based, dynamically provisioned multi-service client enabling connectivity, security and acceleration  Addresses 76% of all smartphones in use world-wide  Only Converged Multi-Application Access Solution for Mobile and Non- Mobile devices  Industry’s most scalable SSL VPN mobile solution – supports many thousands of concurrent users

iPAD Demo

ADDITIONAL SLIDES

37 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE REMOTE ACCESS FeaturesBenefits Layer 3 SSL VPN (Network Connect)Layer 3 VPN connectivity with granular access control SSL mode only (no ESP mode) Location Awareness Seamless roaming from remote access (to Juniper SA Series gateway) to local LAN access (via Juniper UAC) Pulse can be pre-configured by admins to automatically prompt end users for credentials to authenticate to the SA Series gateway when they are remote Endpoint security Full Host Checker capability to check endpoint integrity EES delivers on-the-fly malware protection, pre-connection scanning policies and real time protection, supported by both the SA Series SSL VPN and the UAC Split tunneling options Enabled or disable without route monitoring Key split tunneling options of Network Connect Enforces secure, granular access control Flexible launch options Standalone client Browser-based launch Users can easily launch Junos Pulse via the web from the SA Series SSL VPN landing page Remote users can simply launch Junos Pulse from their desktop Pre-configuration options Pre-configured installer to contain list of SA Series gateways Admin can pre-configure a Pulse deployment with a list of corporate SSLVPN gateways for end users to choose from Connectivity Options Max/Idle Session Timeouts Automatic Reconnect Logging Admins can set up flexible connectivity options for remote users

38 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE LAN ACCESS CONTROL FeaturesBenefits Location Awareness Simplified end user interface: automatically prompts user for credentials to the IC Series appliance Reduces support costs due to simplified user interface Session Migration Automatically migrates authenticated user sessions between SA Series and IC Series appliances Avoids end user from having to authenticate multiple times to different devices Pre-configuration options Administrative ease of configuring predefined SSID’s corresponding to corporate networks Simplified end user interface: avoids them to configure these SSID’s manually Wired/Wireless 802.1x support EAP-TTLS, EAP-JUAC Username-password, Cert- based auth Endpoint Security IPSec tunneling Good critical mass of features to facilitate IC Series/UAC customers to migrate from UAC Agent/OAC to Junos Pulse Broad Authentication support, Endpoint Security, Windows support and IPSec tunneling features enable majority of IC Series use cases

39 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE APPLICATION ACCELERATION FeaturesBenefits LZ compression LZ compression delivers first and repeated-pass optimization for ‘cold’ never seen data patterns. Delivering improvements to application and data access for remote and mobile users. TCP Acceleration WX Pulse provides for TCP layer optimization aiding in delivering application acceleration and mitigating network latency for remote and mobile users. CIFS Acceleration Protocol specific acceleration for CIFS transactions, in conjunction with CIFS Object store to provide significant performance improvements. Improved User Interface Easy to use and understand Interface (GUI). Pulse Auto-Installation Pulse can be automatically distributed to client endpoints without users intervention, installation and running of the client can be performed under the Juniper Installer Services (JIS) ensuring users do not require Admin access. Temporary Evaluation Licenses LMS can generate temporary license keys for WXC appliance without the need to load factory-defaults. WX Pulse Auto- Configuration sync Each time the WX Pulse client forms an adjacency with the head-end WXC Series appliance, any new or updated application definitions are automatically synchronized to ensure optimum application optimization is happening for the user. Head-End auto-discovery Auto-Discovery, Pulse will auto discover the head-end WXC Series appliance with our specific IP addressing via dynamic use of TCP Options field.

40 Copyright © 2010 Juniper Networks, Inc. JUNOS PULSE LICENSING Licensing model identical to current standalone clients  Concurrent user licensing enforced on SA Series, IC Series, SRX Series and WXC Series appliances  SA Series and IC Series admin UI can be configured to deploy either Junos Pulse or standalone clients