News

Microsoft Forges Security Alliance With Juniper Networks

Microsoft, Juniper work to integrate Network Access Protection and Unified Access Control

Many public buildings these days have concrete poles or other large barriers on the outside, and metal detectors inside. The idea, of course, is to keep outsiders from bringing anything dangerous inside. The same principal applies to computer security as well, and a hot trend in the security industry these days is technology to keep dangerous computers from corrupting an internal network.

The Microsoft version of this technology is called Network Access Protection, or NAP. Microsoft announced at the Interop Las Vegas conference this week that it is expanding the scope of NAP to work with Juniper Network's version, known as Unified Access Control (UAC).

Sunnyvale, CA-based Juniper makes several hardware appliances for UAC, for use in medium-size business and enterprises. Microsoft's interoperability with Juniper means, among other things, that businesses with Juniper equipment don't have to throw it out to use Microsoft NAP on the network as well.

"Interoperability of NAC infrastructures enables customers to quickly and effectively adapt to changing business and network environments, especially now that companies will be able to leverage Windows Vista and Windows XP as their NAP or UAC clients," Bob Muglia, senior vice president of the Server and Tools Business at Microsoft, said in a press release. "Customers can feel confident in the investments they make today in NAP, Windows and the Juniper Networks UAC solution."

As part of the announcement, Microsoft also stated that it contributed NAP’s primary Statement of Health (SOH) client-server protocol to the Trusted Computing Group’s (TCG) Trusted Network Connect (TNC) open specifications for network access control. The main benefit is that NAP clients, servers and other infrastructure will work with any other systems that use the TNC protocol. That includes Windows XP and Windows Vista, which have NAP clients built in.

The SOH is a determination of the compliance of a computer with a given network's security protocols. For example, a computer attempting to join a network using NAP would need to demonstrate, say, that it is up to date with its virus scans and signatures. If it failed, it would be denied access to the network. Juniper's appliances use the TNC protocol.

Interoperability, in this case, is not synonymous with open source. The TCG is a somewhat controversial organization, having been founded by, among others, Microsoft, Intel, IBM, HP and others to implement trusted computing standards. Much of the free software community is critical of the TCG, claiming that it locks customers into proprietary standards, rather than open standards. Richard Stallman, a free software evangelist, has called Trusted Computing "Treacherous Computing."

About the Author

Keith Ward is the editor in chief of Virtualization & Cloud Review. Follow him on Twitter @VirtReviewKeith.

Featured

  • Image of a futuristic maze

    The 2024 Microsoft Product Roadmap

    Everything Microsoft partners and IT pros need to know about major Microsoft product milestones this year.

  • SharePoint Embedded Becomes Generally Available

    After a six-month preview, SharePoint Embedded, an API-based version of SharePoint that developers and ISVs can use to embed Microsoft 365 capabilities into their apps, is now generally available.

  • Copilot in Microsoft 365 Getting Agents, Extensions and Team (Not Teams) Support

    Microsoft is adding more functionality to its Copilot AI assistant aimed at improving business collaboration, processes and workflows for Microsoft 365 users.

  • Microsoft Giving Startups Templates To Build AI Apps

    A new perk for businesses enrolled in the Microsoft for Startups Founders Hub program aims to fast-track their ability to build AI-powered applications.