2026 Best Software Awards are here!See the list
Juniper UAC

By Juniper Networks

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Juniper UAC and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Juniper UAC?

It's been two months since this profile received a new review
Leave a Review

Juniper UAC Reviews & Product Details

Product Avatar Image

Have you used Juniper UAC before?

Answer a few questions to help the Juniper UAC community

Juniper UAC Reviews (2)

Reviews

Juniper UAC Reviews (2)

4.5
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Pankaj M.
PM
Assistant Manager
Enterprise (> 1000 emp.)
"Simplifies and user-trusted network access control solution"
What do you like best about Juniper UAC?

It is highly effective with simplified operational console.

It is best among the network access control and security technologies rivalries. Review collected by and hosted on G2.com.

What do you dislike about Juniper UAC?

The cost of the product is somewhat high as comparable but it is justified when we talk about the features and properties. Review collected by and hosted on G2.com.

Hassan Amin M.
HM
TAC Engineer
Mid-Market (51-1000 emp.)
"It has been a great experience with this Juniper device"
What do you like best about Juniper UAC?

The device is simple, implementation in the network and making it up and running doesn't require a lot of expertise. The rules work superbly in principle and have Review collected by and hosted on G2.com.

What do you dislike about Juniper UAC?

The device are robust and reliable, working without fail which ensures production is not downthe system is simplistic in nature, with limited to no scope of going Review collected by and hosted on G2.com.

There are not enough reviews of Juniper UAC for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(231)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
2
NordLayer Logo
NordLayer
4.3
(127)
A stress-free way to secure your network.
3
Portnox Logo
Portnox
4.4
(108)
Portnox is a solution for on-premise network access control, visibility and enforcement in real-time on all devices.
4
Genea Security Logo
Genea Security
4.4
(94)
Genea Security's cloud-based access control system is designed for the convenience and security of both tenants and building management teams.
5
SecureW2 JoinNow Logo
SecureW2 JoinNow
4.7
(92)
The full JoinNow Suite contains everything you need to transition to secure passwordless authentication. It includes an intuitive managed PKI for certificate creation and management, as well as best-in-class certificate delivery solutions such as a dissolvable self-service configuration client for unmanaged devices and automatic enrollment gateways for managed devices. The platform also offers a Cloud RADIUS server, designed from the ground up for passwordless security and works seamlessly with Cloud Identity Providers.
6
Twingate Logo
Twingate
4.7
(75)
Twingate secures remote access to private apps, data and environments, allowing businesses to replace corporate VPNs with a more secure, usable, performant and modern zero trust-based solution.
7
Citrix Gateway Logo
Citrix Gateway
4.1
(73)
Citrix Gateway is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform.
8
Cisco Identity Services Engine (ISE) Logo
Cisco Identity Services Engine (ISE)
4.5
(50)
Cisco Identity Services Engine (ISE) is a comprehensive network access control (NAC) solution that serves as the cornerstone of a zero-trust security framework. It enables organizations to enforce security policies, manage endpoints, and ensure that only trusted users and devices can access network resources. By integrating intelligence from across the network stack, ISE provides real-time contextual information, allowing for precise control over who and what connects to the network. Key Features and Functionality: - Context-Aware Access Control: ISE gathers detailed information about users, devices, locations, and access methods to enforce policies that grant or restrict network access based on comprehensive contextual data. - Endpoint Compliance: The platform continuously assesses device posture to ensure compliance with security policies, preventing unpatched or non-compliant devices from posing risks to the network. - Automated Threat Containment: ISE can automatically identify and contain threats by leveraging network intelligence, effectively turning the network into a proactive defense mechanism. - Flexible Deployment Options: Supporting both on-premises and multi-cloud environments, ISE offers deployment flexibility to meet diverse organizational needs. - Integration with Security Ecosystem: ISE integrates seamlessly with other security solutions, enhancing overall security posture through coordinated policy enforcement and threat response. Primary Value and Problem Solved: Cisco ISE addresses the critical need for secure and efficient network access control in today's complex IT environments. By providing a centralized platform for policy enforcement and endpoint management, it reduces the risk of unauthorized access and potential security breaches. Organizations benefit from enhanced visibility into network activities, streamlined compliance with security policies, and the agility to adapt to evolving security threats. Ultimately, ISE empowers businesses to maintain a resilient security posture while supporting operational continuity and growth.
9
Google Cloud Identity-Aware Proxy Logo
Google Cloud Identity-Aware Proxy
4.4
(54)
Cloud Identity-Aware Proxy (Cloud IAP) controls access to user cloud applications running on Google Cloud Platform.
10
Aruba ClearPass Access Control and Policy Management Logo
Aruba ClearPass Access Control and Policy Management
4.3
(43)
Aruba ClearPass Policy Manager is a comprehensive network access control solution designed to provide secure, role- and device-based access for employees, contractors, and guests across multi-vendor wired, wireless, and VPN infrastructures. It features a context-based policy engine, supports RADIUS and TACACS+ protocols, and offers device profiling, posture assessment, onboarding, and guest access capabilities. ClearPass simplifies network security by enabling organizations to enforce consistent policies, ensuring that only authorized users and devices can access network resources. Key Features and Functionality: - Role-Based Access Control: Enforces network access policies based on user roles, device types, and ownership status, ensuring appropriate access levels. - Device Profiling and Posture Assessment: Identifies and assesses devices connecting to the network, verifying compliance with security policies before granting access. - Comprehensive Policy Management: Allows administrators to create and enforce detailed access rules based on user identity, device posture, location, and time, supporting dynamic VLAN assignment and real-time policy adjustments. - Multi-Vendor Integration: Supports industry-standard protocols like RADIUS, TACACS+, and 802.1X, enabling seamless integration with various network equipment from different vendors. - Guest and BYOD Management: Provides customizable guest access workflows, self-service device onboarding, and integration with mobile device management solutions for secure BYOD environments. - Third-Party Security Integration: Integrates with firewalls, SIEM systems, and other security solutions to automate threat detection and response workflows. Primary Value and Problem Solved: Aruba ClearPass Policy Manager addresses the challenge of securing diverse network environments by providing a unified platform for network access control. It enhances security by ensuring that only authorized users and compliant devices can access network resources, regardless of the infrastructure's complexity or the variety of devices connecting to it. By automating policy enforcement and integrating with existing security solutions, ClearPass reduces administrative overhead, streamlines onboarding processes, and ensures compliance with organizational security policies. This comprehensive approach to network access control helps organizations protect their networks from unauthorized access and security threats while maintaining a seamless user experience.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Juniper UAC