
Juniper Mist Access Assurance is a cloud-based service that provides secure network access control for wired and wireless networks. It enforces Zero Trust network access policies for various devices, including guest, IoT, BYOD, and corporate devices, based on user and device identities. The service utilizes a microservices-based authentication system to simplify IT operations and deliver comprehensive access controls within a flexible authorization policy framework.
Vendor
Juniper Networks
Company Website
Juniper Mist Access Assurance is a cloud-based service that provides secure network access control for wired and wireless networks. It enforces Zero Trust network access policies for various devices, including guest, IoT, BYOD, and corporate devices, based on user and device identities. The service utilizes a microservices-based authentication system to simplify IT operations and deliver comprehensive access controls within a flexible authorization policy framework.
Key Features
Client-first experience Provides a unified view of client connectivity and simplifies troubleshooting
- Holistic view of client connectivity experience
- Captures all client events for easy problem identification
Granular identity fingerprinting Utilizes various attributes for precise identity verification
- Uses X.509 certificate attributes
- Incorporates IdP information, group membership, and device compliance state
Zero-trust security policy enforcement Assigns roles and enforces network policies based on user and device identity
- Segments users using VLAN or Group-Based Policy technology
- Enforces specific network policies for each segment
Supported devices and connections
- Corporate-owned devices (laptops, tablets, smartphones)
- IoT and M2M devices
- BYOD devices
- Shadow IT devices
- Guest devices
Authentication methods
- 802.1X authentication
- MAC Authentication Bypass (MAB) for non-802.1X devices
Benefits
Enhanced security Improves overall network security posture
- Protects against unauthorized access
- Guards against malware and other security threats
Simplified IT operations Streamlines network management and reduces complexity
- Cloud-native platform eliminates infrastructure requirements
- Automatic software updates without service interruptions
Improved visibility and control Provides comprehensive insights into network access and user experience
- End-to-end visibility across the network stack
- Unified IT management experience for wired and wireless LAN access