Risk
7/17/2006
03:00 AM
Connect Directly
RSS
E-Mail
50%
50%

Juniper Enhances Security

Juniper Networks announced the new Odyssey Access Client 4.5 and Steel-Belted Radius 5.4 software solutions

SUNNYVALE, Calif. -- Juniper Networks, Inc. (Nasdaq: JNPR) today announced the new Odyssey(R) Access Client (OAC) 4.5 and Steel-Belted Radius(R) (SBR) 5.4 software solutions. The new OAC 4.5 and SBR 5.4 capabilities enable Juniper to continue providing its customers with secured and assured networking solutions based on open standards, which can increase usability while decreasing maintenance, support and deployment costs.

The newest OAC 802.1X client family augments OAC's already-robust network control, ease-of-use and security capabilities through new features, such as priority and preferred network connections, wireless suppression, prompt for user name, and additional EAP support. The latest revision to the SBR family of AAA/RADIUS servers advances its ease-of-administration and configuration, as well as supplements its superior authentication and administrative controls by adding new features, such as RADIUS clients via IP address range, greater administrator file permission control, improved logging, and enabling JavaScript within LDAP authentication.

'It's great to see these additions to Juniper's technology lineup, which address the needs of enterprises worldwide that rely on secure, high-performance wired or wireless networking,' said Zeus Kerravala, vice president at Yankee Group. 'With its comprehensive support of enterprise platforms, Odyssey Access Client continues to be the market-leading 802.1X supplicant built explicitly for enterprise use and deployment. The new version of Steel-Belted Radius extends its superior flexibility and dependability with time-saving tools and processes, as well as continued support for AAA functions and the latest standards.'

Juniper Networks Inc. (Nasdaq: JNPR)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1556
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php.

CVE-2014-2008
Published: 2014-09-12
SQL injection vulnerability in confirm.php in the mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to execute arbitrary SQL commands via the TID parameter.

CVE-2014-2009
Published: 2014-09-12
The mPAY24 payment module before 1.6 for PrestaShop allows remote attackers to obtain credentials, the installation path, and other sensitive information via a direct request to api/curllog.log.

CVE-2014-4735
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in MyWebSQL 3.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the table parameter to index.php.

CVE-2014-5259
Published: 2014-09-12
Cross-site scripting (XSS) vulnerability in cattranslate.php in the CatTranslate JQuery plugin in BlackCat CMS 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant