Security Now
Security is top-of-mind everywhere, especially right here where Juniper experts share their thoughts on the latest security breakthroughs and product advancements
Showing results for 
Search instead for 
Do you mean 

Best Practises in Authentication with Junos Pulse and SSL VPN

by ‎04-25-2013 04:01 AM - edited ‎04-29-2013 08:01 AM

hostchecker.jpgDespite the growth in “Bring your own device” (BYOD) strategies, traditional mobile clients running “full-fat” operating systems are likely to be around for the foreseeable future. Realistically, BYOD cannot completely replace or supplant traditional laptops as there are still plenty of legacy business applications requiring a screen larger than 4 inches, a full sized keyboard and a mouse. 



Juniper Networks MAG Series appliances provide a suite of enterprise remote access services in a consolidated, secure and scalable platform.  For many the use case for remote access has moved from laptops to App driven access from Smart devices. Beyond connectivity for the traditional Road Warrior/Fat client; there are plenty of use-cases for SSL VPNs.  In its purest form, a SSL VPN uses the encryption features built into the web browser to secure communication between the remote clients and back-end resources. Authentication is performed over the encrypted SSL connection and the user is then authorised to access specific resources in line with the corporate security policy.


About Security Now

Discussing a wide range of topics impacting enterprises and
data center security.

Subscribe RSS Icon

Our Bloggers

Kevin Walker
Vice President
Security CTSO, Engineering

Profile | Subscribe

Ritesh Agrawal
Software Engineering

Profile | Subscribe

Scott Emo
Product Marketing

Profile | Subscribe

Bill Shelton
Director Field Sales

Profile | Subscribe

Juniper Networks Technical Books