Listing Thumbnail

    Juniper Mist Access Assurance

     Info
    Deployed on AWS
    Juniper Mist Access Assurance is a microservices-based, cloud network access control (NAC) service that enables enterprises to easily enforce a zero-trust security model.

    Overview

    Access Assurance solves many complexity challenges associated with traditional NAC offerings, by removing on-premises server hardware, providing inherent service high-availability, resilience, as well as automatic at-run-time feature updates, security, and vulnerability fixes. Juniper Mist Access Assurance extends Juniper Mist IoT Assurance capabilities, which simplifies on-boarding for headless IoT and BYOD devices, Access Assurance extends support to onboard wired and wireless devices with 802.1X authentication or MAC Authentication Bypass (MAB) methods for non-802.1X devices.

    Access Assurance uses hundreds of different vectors to match the identity of the user and the device, such as X.509 certificate attributes, user group memberships, device compliance metrics, as well as location context. These vectors help determine identity-based network admission criteria, such as the network segment or a microsegment a device should connect to and the network policy that should be dynamically applied to a user.

    Highlights

    • The service delivers a suite of access control functionality with a flexible, yet simple authorization policy framework for onboarding guest, IoT, BYOD, and corporate devices.
    • Create and apply access policies that ensure only authorized devices and users are allowed network access.
    • The microservices architecture ties together high availability, redundancy, and autoscaling for optimal network access across wired, Wi-Fi, and wide area networks.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Juniper Mist Access Assurance

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    1 Year License
    Standard Access Assurance subscription for 1 active client for 1 year
    $500.00

    Vendor refund policy

    Juniper does not support refunds for SaaS contracts.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Juniper Networks Technical Assistance Center (JTAC) is your focal point of contact for post sales technical and network-related questions and issues on Juniper products 24x7x365.Please visit the below Juniper Knowledge Base article for steps to obtain support from Juniper Networks. Additional information may also be found in the JTAC User Guide. https://kb.juniper.net/KB31158  https://www.juniper.net/customers/support/ 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By Beyond Identity

    Accolades

     Info
    Top
    100
    In IT Business Management

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Cloud-Based Network Access Control
    Microservices-based, cloud-native NAC service that eliminates on-premises server hardware requirements and provides inherent service high-availability and resilience.
    Multi-Vector Identity Matching
    Uses hundreds of different vectors including X.509 certificate attributes, user group memberships, device compliance metrics, and location context to match user and device identity.
    Multi-Authentication Protocol Support
    Supports 802.1X authentication and MAC Authentication Bypass (MAB) methods for device onboarding across wired, wireless, and wide area networks.
    Dynamic Policy Application
    Determines identity-based network admission criteria and dynamically applies network policies to users and devices based on authorization rules.
    Automatic Security Updates
    Delivers automatic at-run-time feature updates, security patches, and vulnerability fixes without manual intervention.
    Zero Trust Architecture
    Cloud-native zero trust platform that applies zero trust principles to eliminate attack surface and prevent lateral movement across users, applications, and infrastructure.
    AI-Powered Threat Detection
    AI-powered cyberthreat and data loss prevention services that detect and prevent advanced threats, accidental exposure, theft, and ransomware attacks.
    Next-Generation Network Access
    Next-generation zero trust network access (ZTNA) platform enabling seamless and secure connectivity to private applications, services, and operational technology devices.
    Data Loss Prevention
    Data protection capabilities preventing data loss from users, SaaS applications, and public cloud infrastructure through comprehensive loss prevention policies.
    End-to-End Digital Experience Monitoring
    End-user perspective monitoring and visibility across device, ISP, cloud proxy, and application layers to optimize performance and identify application, network, and device issues.
    Phishing-Resistant Authentication
    Delivers phishing-resistant multi-factor authentication (MFA) as part of the security-first single sign-on (SSO) implementation.
    Device Verification and Compliance
    Validates user identity and device association against security policies, with visibility and control over both managed and unmanaged devices.
    Asymmetric Cryptography-Based Authentication
    Eliminates passwords by implementing an authentication platform based on asymmetric cryptography using x.509 certificates and TLS protocol standards without requiring manual certificate management.
    Continuous Risk-Based Access Control
    Enforces continuous, risk-based authentication to maintain trusted access throughout user sessions.
    Generative AI Fraud Protection
    Provides protections against generative AI-based fraud threats and modern attack vectors.

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.