Logo
Sign in
Product Logo
Juniper Mist Access AssuranceJuniper Networks

Juniper Mist Access Assurance is a cloud-based service that provides secure network access control for wired and wireless networks. It enforces Zero Trust network access policies for various devices, including guest, IoT, BYOD, and corporate devices, based on user and device identities. The service utilizes a microservices-based authentication system to simplify IT operations and deliver comprehensive access controls within a flexible authorization policy framework.

Vendor

Vendor

Juniper Networks

Company Website

Company Website

Product details

Juniper Mist Access Assurance is a cloud-based service that provides secure network access control for wired and wireless networks. It enforces Zero Trust network access policies for various devices, including guest, IoT, BYOD, and corporate devices, based on user and device identities. The service utilizes a microservices-based authentication system to simplify IT operations and deliver comprehensive access controls within a flexible authorization policy framework.

Key Features

Client-first experience Provides a unified view of client connectivity and simplifies troubleshooting

  • Holistic view of client connectivity experience
  • Captures all client events for easy problem identification

Granular identity fingerprinting Utilizes various attributes for precise identity verification

  • Uses X.509 certificate attributes
  • Incorporates IdP information, group membership, and device compliance state

Zero-trust security policy enforcement Assigns roles and enforces network policies based on user and device identity

  • Segments users using VLAN or Group-Based Policy technology
  • Enforces specific network policies for each segment

Supported devices and connections

  • Corporate-owned devices (laptops, tablets, smartphones)
  • IoT and M2M devices
  • BYOD devices
  • Shadow IT devices
  • Guest devices

Authentication methods

  • 802.1X authentication
  • MAC Authentication Bypass (MAB) for non-802.1X devices

Benefits

Enhanced security Improves overall network security posture

  • Protects against unauthorized access
  • Guards against malware and other security threats

Simplified IT operations Streamlines network management and reduces complexity

  • Cloud-native platform eliminates infrastructure requirements
  • Automatic software updates without service interruptions

Improved visibility and control Provides comprehensive insights into network access and user experience

  • End-to-end visibility across the network stack
  • Unified IT management experience for wired and wireless LAN access