The Juniper Networks Secure Access 2000 (SA 2000) SSL VPN enables small- to medium-sized companies to deploy cost-effective remote and extranet access, as well as intranet security. Users can access the corporate network and applications from any standard Web browser. The SA 2000 uses SSL, the security protocol found in all standard Web browsers, as a secure access transport mechanism. The use of SSL eliminates the need for client-software deployment, changes to internal servers, and costly ongoing maintenance. Juniper's Secure Access appliances also offer sophisticated partner/customer extranet features that enable controlled access to differentiated users and groups, with no infrastructure changes, no DMZ deployments, and no software agents. This functionality also allows companies to secure access to the corporate intranet, so that administrators can restrict access to different employee, contractor, or visitor populations, based on the resources that they need.
The SA 2000 comes with the streamlined feature set that an enterprise would need to deploy secure remote access, as well as a basic customer/partner extranet or secure intranet. The Advanced license enables additional sophisticated features that meet the needs of more complex deployments with diverse audiences and use cases, as well as Juniper's Central Manager.
Features:
-End-to-end layered security.
--Endpoint client, device, data and server security controls
--Juniper Networks Endpoint Defense Initiative, for best-in-class endpoint security
---Identity-driven secure access specified by user group or role, as well as by network, device, and session attributes
-Lower total cost of ownership.
--No client-software deployments or changes to servers, and virtually no ongoing maintenance
--Secure remote access, intranets, and extranets from one platform
--Secure extranet access with no DMZ build-out, server hardening, resource duplication, or incremental deployments to add applications or users
-Streamlined manageability.
--Central management option for unified administration
--Self-service features for users, for lower help desk support costs
--Fine-grained auditing and logging
--Three different secure access methods, to let administrators provision by purpose
--Role-based delegation of administrative tasks
-High availability.
--Cluster pair deployment option, for high availability across the LAN and the WAN