Unified Access Control (UAC) is a standards-based, scalable solution for adaptive access control that reduces threat exposure and mitigates risks. It protects your network, guarding mission-critical applications and sensitive data, and providing comprehensive control, visibility, and monitoring.
This approach to adaptive access control reduces the cost and complexity of delivering and deploying granular network access control from the branch to the corporate data center. It also addresses pain points like insider threats, guest user access, outsourcing and off-shoring, and regulatory compliance.
UAC is composed of:
* The IC Series Unified Access Control Appliances, hardened, centralized policy management servers
* The UAC Agent, a dynamically downloaded agent that collects user credentials and assesses device security state (UAC also offers an agent-less mode for use when software downloads are not practical, such as with guest users.)
* UAC enforcement points, such as any vendor-agnostic 802.1X-enabled wireless access point or switch (including Juniper Networks EX Series Ethernet Switches) and any Juniper Networks firewall platform (including the SSG Series and ISG Series with IDP platforms).
UAC can be enabled at Layer 2 using 802.1X, at Layer 3 using the overlay deployment, or both for granular access control.