Juniper Networks Junos Pulse SSL VPN and UAC services include Host Checker, which performs assessment of endpoint devices that connect to Juniper Networks network security and access control gateways and appliances, including MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service/SSL VPN and Junos Pulse Access Control Service/UAC, to ensure the endpoints meet certain security policies and requirements. In order to meet the security and productivity needs of their organization, system administrators require solutions that enable security policies to be implemented based on the detection of security applications and their status, as well as fallback measures in the event of policy failure. However, for endpoints that fail these standard security checks, network administrators must balance the end users’ need for network access with the need to preserve the security of their network and resources. Because infected endpoints can unwittingly spread malware to other devices in the network, an important part of any system administrator’s network defense strategy is to ensure that all endpoints are healthy and protected before they are allowed access to the network.įor example, many system administrators check endpoints to ensure that an antivirus solution is installed and running, that real-time protection is enabled, and that the latest virus definitions are being used. System administrators are faced with the difficult task of securing their networks from outside and inside threats.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |