Slava Dementyev, Director, Product Management, Juniper Networks

Juniper Access Assurance (NAC) - Client Onboarding, Always-On Posture, Built-in Profiling

Summits AI & ML

Juniper Access Assurance (NAC) - Client Onboarding, Always-On Posture, Built-In Profiling

Access assurance and NAC enhance client onboarding for unmanaged clients to enterprise networks. Marvis client personas focus on an onboarding tool that provisions end user devices with certificates and profiles, ensuring network visibility. Customizable onboarding portals with SSO integration improve user authentication. The end user experience includes mobile and desktop onboarding, app installation, and SSO login. New BYOD support and cloud PKI for managed devices integrate with existing MDM solutions.

Presented by Slava Dementyev, Director, Product Management. Recorded live at Mobility Field Day 13 in Santa Clara, CA on May 7, 2025. 

Show more

You’ll learn

  • How Mist access assurance enhances client onboarding for unmanaged clients to enterprise networks

  • How new BYOD support and cloud PKI for managed devices integrate with existing MDM solutions

Who is this for?

Network Professionals Security Professionals Business Leaders

Host

Slava Dementyev
Director, Product Management, Juniper Networks

Transcript

0:00 hi everyone my name is Slava and we will not talk about wireless we will talk about access assurance or cloud knack So

0:07 uh as we are expanding our footprint and we're you know we're growing

0:13 exponentially we're growing dramatically we are adding more and more functionalities that would cover uh some

0:20 of the use cases that come from from our customers And today we will talk about three things And the first thing we will

0:27 talk about is client on boarding This is something we've actually announced on

0:32 the previous uh MFD last year And I just wanted to go deeper into it as

0:39 we closing on this and as we are releasing the functionality So client on

0:46 boarding for us is really about how do you uh move a client that's that's unmanaged

0:53 to an enterprise network on WPA3 or WPA2 enterprise How do you push a search how

0:59 do you install a Wi-Fi profile or wire profile easily and seamlessly as possible now before we go into you know

1:07 a demo and a and a deep discussion you know you've heard the Marvis client

1:13 mentioned couple of times today and you will hear about it more and more I wanted to kind of uh give a brief

1:19 overview of different Marvis client personas right so this is where uh one

1:25 of the persona that we will cover right now is the knock on boarding tool So

1:30 Marbus client could just have different faces One of one of its faces is actually the onboarding one where it

1:36 will provision the end user device with a certificate with a Wi-Fi wire profile connected to the network and then

1:44 optionally on top of that you can then enable to send telemetry So you can actually get client level visibility of

1:51 the network streaming to the MIS cloud and then providing the admin of the MS

1:57 dashboard of you know uh deeper visibility into how the client sees the network and then you know the other

2:03 other use cases we've seen in uh in warehouses specifically is the loc

2:08 locationing aspect that's that's enabled on the Marvis client just to to track the uh uh the handheld scanners uh in

2:16 those areas Right now we are focusing on the Knack on boarding and we will actually start with the demo and the

2:24 demo we will start by looking at the uh at the admin side of things So we will

2:31 uh look at how an admin would actually you know start uh and create the

2:36 onboarding process for the end users and many of you are familiar with our PSK

2:42 portal concept where you know an end user say a student can come

2:48 to the portal authenticate through the SSO grab their personal appreciate key

2:53 connect their devices so that that process existed for for a long time now we are expanding that concept cept into

3:01 a knack on boarding portal where the similar workflow will work for and then

3:06 for an end user then do the SSO login and then uh they'll be able to provision their device with a you know with a

3:13 certificate and Wi-Fi wire profile Now we'll look at the portal config here So

3:19 first we'll create a portal portal has all the customization options that allow

3:25 you to kind of get your own branding colors and backgrounds The most

3:30 important thing is that portal will be attached to your single sign on using SL any uh identity provider that you work

3:38 with whether it's entra ID octa or you know Google or literally anything in the

3:43 world we will work with this once the SSO process is complete the important

3:48 part is the onboarding parameters and this is where you define if a user goes

3:55 through this portal and they're successfully authenticated and authorized what do we do with the on

4:02 boarding process how do we treat them so a you're going to specify which SSID they will eventually

4:08 connect to So that can be a portal for your say editor users on in a higher red

4:14 or that could be a portal for you know a personal employee network in an

4:20 enterprise You you can then say do you want to also enable wired connection

4:27 with one X and certificate authentication do you want to send Marvis telemetry back to the MSC cloud

4:32 so this way you can actually get that client level visibility So that's the optional part that you can uh enable as

4:39 part of that on boarding process plus you know few few other things where you could actually say for how long the

4:46 certificate will issue will be valid for the end user including roles etc So now

4:53 uh this is the admin side right So what's happening on the end user side uh is me go to the next slide on the on the

5:02 end user side So first we're going to look at the mobile device This is Android but you know it the process is

5:08 similar for uh for iOS as well What I did here was I just encoded the knack

5:15 portal URL as a QR code So you know you could just scan it with a camera It will

5:21 then redirect you to the onboarding portal That onboarding portal will actually redirect you to your SSO

5:28 provider In this case this is enter ID Again can be anything else You log in If

5:33 you have MFA MFA will be completed at this step Once you've logged in you will

5:39 be redirected back to our on boarding portal It will say "Oh hey you're running Android If you don't have an app

5:45 go click here and install." If you do click on the link and let me Okay click on the link

5:53 The app will pop up It will ask you to install the network profile Wait wait wait It will give you one more prompt

6:00 You'll hit save At this point you're connected You're good to go Now um

6:06 what's important here is uh this part right where based on your SSO login we

6:12 will grab your identity we will uh issue a certificate for that uh end user

6:18 device using the identity from the SSL right so we can embed all of that information in theert and then the

6:25 client will go through our general you know access assurance authentication process you can set up your policies

6:31 look at you know extra checks like group memberships things like that but this is the end user uh facing on boarding

6:40 process okay that's mobile device Now the next part is what's going

6:48 to happen on on a on a desktop whether it's you know Windows or or Mac OS Again

6:53 very similar We will uh look at the uh SSO login first Once you've logged in it

7:01 will detect that you're running uh Windows It will ask you to open the app

7:06 if you already have it It will then go through the enrollment process And as you can see in the bottom right corner

7:13 of the screen the client is already trying to authenticate to that uh to that network as it's installing the

7:20 Wi-Fi profile and it's now on on that destin uh destination SSID at this point

7:27 Right so that on boarding process is you know you know very uh very simple for

7:33 for the end user to follow And let me actually stop the video plane Okay And

7:39 uh whether you're on a mobile device whether you're on a desktop that's your typical BYOD flow And the primary use

7:46 case obviously for that is higher red as students bring in all sorts of things and you want them to be on ed you want

7:54 them to be you know enabled for for WPA3 etc etc Yeah just curious are you seeing

8:00 uptick in 2FA requirements uh for the onboarding process

8:06 So the onboarding process is something you will complete uh probably once uh

8:12 again let's talk about let's say higher ed you'll probably do it once a year or once a semester depending on you know

8:18 the policy requirements of the of the university or some some customers would actually say hey issue certificate for 5

8:25 years I don't care I'm going to check if the if the user is valid the MFA is there uh usually enabled by default

8:33 because all the IDPS today enforce you to have MFA enabled when you're going

8:38 through this kind of you know web type of authentication process but once you've done that on

8:44 boarding the way you connect to to the network is you're presenting your right

8:49 so that's completely transparent to the end user that Wi-Fi profile gets embedded in your machine you have aert

8:56 that identifies you and then the knack will actually check you know are you still active user which groups you

9:03 belong to which level of access you want to etc etc All right

9:10 Okay Now this is the BYOD portion right

9:16 so what we are uh releasing and by the way this is going to be available this summer early this summer right so what

9:23 we are releasing is uh BYOD portion That's what uh what we've looked at

9:28 right now We will support Windows Mac Android iOS at the start and Marvis

9:34 client will be the vehicle that would actually configure the end device and you know push the search push the Wi-Fi

9:40 profile etc Now with that we are also releasing full-blown cloud PI or

9:47 certificate infrastructure delivered as part of the M dashboard What this means is it's not just about BYU You can also

9:55 use it for your managed devices via our existing MDM integrations that uh that

10:02 we currently have So that means that if you have your uh your managed endpoints

10:08 via in tune via CH again this is what we what we'll do at the start you can

10:14 actually use our cloud PKI to let your clients uh get their their certificates

10:21 from our PI while MDM is still managing the client right so there is no need to install the MX client app the MDM will

10:28 do the work for you and we'll just use our uh PI endpoints to do that sava

10:33 Yep I have I have a question If you're running a Marvis client on one of those oss can that Marvis client also

10:42 be a Marvis mini agent uh so we we've started talking about the

10:51 the persona of the Marvis client that sends telemetry That's what that's an option that you will have uh when you

10:59 will you will be able to send telemetry from that Marvis client installed on the

11:04 device saying basically you know which APs are you hearing in the environment when you're roaming why do you why do

11:11 you actually make the decisions etc etc so you will get that uh level of uh

11:17 information optionally uh once once we get to to minis then you know Marvis

11:23 client is yet another uh yet another presence point for us So

11:30 yes Okay All

11:36 right Any any questions on on the PKI or

11:41 on boarding okay Very good

11:46 So again as I said this is available this summer We're getting you know

11:53 really close to to to get this released Very excited about it There are you know

11:58 lots of companies out there that are actually they don't have the PI or they

12:03 don't want to keep managing the onrem PPI anymore So we want to provide a you

12:08 know a simple and seamless solution to them Now item number two I want to talk

12:14 about is oh it's a fancy name of saying this It's an always on posture or continuous authorization if you will Uh

12:22 we've been doing uh integrations with various MDM providers since since the

12:28 start So we we do integrations within tune J VMware workspace one si etc etc

12:37 Now the way these integrations have done or have actually allowed us to do

12:44 posture assessment right so you're getting the endpoint health or compliance status from that MDM and you

12:51 use that compliance status in your policy So you say if in tune tells us that the device is compliant you know go

12:57 and have unrestricted access If you're not compliant go go into quarantine and

13:03 have some some more restrictions The challenge with the with most of these is

13:09 uh MDMs are not you know very frequent at actually checking with the client

13:14 themselves right So they may check with the client every couple of hours and within these couple of hours anything

13:21 and everything may happen So uh in addition to what we do today with MDMs

13:26 we're actually doing uh you know working on uh integration with EDR platforms

13:32 that are you know that have agents on on your devices and their only purpose is

13:39 actually to determine if you know if if your device is infected if it has malware if

13:45 it has some uncompliant things installed on it But what they provide to us is

13:51 really the real timeness of data So this is the first time when we uh you know add

13:57 the uh an option to do to ingest data into uh into our access assurance live

14:04 from these providers Right so it's it's not like we have to wait for something to happen or call periodically or wait

14:10 for the authentication to repeat Anytime the client is for example detected with

14:16 a malware there is a notification sent to us from one of these uh EDR providers

14:23 we will start with crowd strike and sentinel one so they will send us live notification we will be able to

14:31 immediately change the policy on the client right so that's that's why we call it like an always on posture

14:38 enforcement let's look at the demo so what we'll look at is it's a you know

14:44 simple scenario We will first look at the just the additional we will we're just

14:51 looking at Sentinel one as an example here So we have Sentinel one account linked in our dashboard So again it's a

14:59 onetime process where you link your M dashboard with your uh EDR provider to

15:06 provide an URL and and an API token Easy as that The second uh second point is

15:14 you need to create a a list of policies So again here we're just creating three simple policies We are looking at

15:20 infected clients that need to drop into quarantine dan get quarantine roller policy Healthy clients will get full

15:27 access into employee network and get employee role and unknown maybe they

15:32 don't have an agent We will still put them on a quarantine network Now we'll

15:38 look at one client example So we'll pull some knack live data coming from one

15:46 client that's that's connected and I'll show you like what is the you know what is the problem we're trying to solve here So uh look at the initial

15:53 connection of that client So at 236 here you see the there was an event that's

15:59 saying this client was allowed to connect to the network at 236 right it

16:04 went through all of these authorization processes So it did the ETLS authentication We then did a look up uh

16:13 in Sentinel one It was actually deemed healthy at that point right client was okay So we let them in and the client

16:21 got full full access no restrictions Now let's look at what happened to this

16:29 client just a couple of seconds later

16:35 will move to a Sentinel one dashboard or the video

16:40 will move to Sentinel one dashboard but it didn't So now what we see is actually

16:45 we've detected the malware uh for this client 10 seconds later after it joined

16:52 the network Right so in the normal world you would have waited for another couple

16:57 of hours before you would put them into quarantine But in this case Sentinel one

17:02 says "Oh actually I'm going to send a notification web hook back to back to Knack and this will trigger an action on

17:10 our site." Right so we're sending the uh the web hook and

17:18 then once we move back to uh the M dashboard what you'll see is actually

17:23 there is a dynamic update event saying "Hey now this client is infected Now rerun the policy." So it will actually

17:30 do the uh change of authorization whether it's a wireless or wired client doesn't really matter It will always

17:37 bounce the connection rerun the policy and at that point uh with the new status

17:42 it will give the more restricted access to to the client Now the beauty of this

17:50 is you don't really have to do match in order to to configure this right So you

17:55 just link your ADR provider into the M dashboard create some policies Now boom

18:01 you have your uh posture assessment happening in real time So that's the uh

18:06 the the beauty of it I'm going to pause and see your question Can you define

18:12 what can you be specific about what triggers that because I know like some EDR

18:17 uh solutions will will trigger alerts and like a posture state change when it's just you know encryption has been

18:24 temporarily disabled because an application is loading or something is running Can you can you be prescriptive

18:29 with that great So you you can be so again depending on the EDR provider they all have their own metrics so to speak

18:36 So in case of Sentinel one it's the client is either infected or it's not infected And the infect the infected

18:43 status is defined on Sentinel one All these policies are happening there right so you're defining what what it means to

18:49 be infected We're just getting the status yes or no we say uh you know with with

18:55 some others so take crowd strike they would actually give you the risk factor they will give you like low medium high

19:00 etc So you will be able to specify in your access insurance policies like okay

19:05 if it's a low risk we yeah maybe let it stay connected with less restrictions if it's high risk drop it in some dead VLAN

19:13 uh I'm going to deal with this later but the the compliance logic happens in the

19:18 source of truth which for the client which is your EDR really the knack is

19:24 only getting that uh information back from from the EDR saying this client is infected let us also isolate that uh

19:31 that device on the network side Okay Can I have one more follow-up question with that um because so many of the EDR

19:38 vendors have their own like auto quarantine at the software level where they can do things on the interface or they can modify the the firewall What

19:44 was the gap that you saw where we needed to be doing this back on the network again uh so uh again it's uh if if you

19:53 look at uh at the existing edrs and most of the time they they have a very like

19:59 yes or no uh kind of uh kind of triggers So uh you either block all access on the

20:06 on the agent itself or you allow everything and then uh you start enforcing some restrictions but there is

20:13 no granularity in terms of uh in terms of what policy you can assign in this scenarios in in many scenario in many

20:20 EDRs that that we've seen Uh now what you really want is to actually move that

20:28 client and uh isolate it from the rest of the uh let's say unrestricted network

20:34 at so to you so you can actually prohibit the east west traffic right so if you move into quarantine and only

20:40 allow outbound connection to the internet then your your east west is uh is safe in that in that scenario does

20:47 that make sense okay So uh Sentinel one

20:52 again crowd strike as well Let's talk about the third

20:58 thing Third item of the day is profiling or fingerprinting depending on how you

21:04 want to to name it So and for the most part really we've

21:10 we've been very successful doing all all of our wireless profiling by leveraging

21:16 the you know multi multip solution where you know your key is really the identity for the IoT and then you assign a policy

21:24 based on which keys the client is using But the challenge was always so and this is this was coming from customers saying

21:31 hey uh I have a bunch of wired devices that are that are IoT obviously you know

21:37 don't even dream about doing that 1x on them so you're only left with map so what else do you do so this is really an

21:44 attempt for us to simplify the on boarding of the IoT devices you know mainly this will be a

21:52 wired use case but you can always extend this to wireless as well So what you

21:57 will see now is uh you will see a new capability of uh doing profiling as part

22:06 of your uh access control policy So in your O policy rules you will be able to

22:12 match on device type or device family So it's a an AP and IoT device gaming

22:17 console blah blah blah or device manufacturer or OS or model want to be that ground I

22:26 hope you don't so and then you can mix and match all these four four buckets as

22:32 much as you want So in this scenario we will look at just five policies just to

22:39 you know do some basic uh basic segmentation So we have our cameras we have our IP phones we have our printers

22:46 So we we are matching on the device type which is say a camera and maybe we only

22:52 want to drop our access cameras to specific and again the policy config is

23:00 super super simple Everything is available again in one place But what's important is the onboarding flow So when

23:07 it comes to profiling um when it comes to profiling a knack especially on the wire side the challenge is okay so how

23:14 do how do I profile the device before it's on the network you know I I need I

23:19 need that device to send something some traffic so I can look at it and and tell you what it is so what we are doing is

23:27 really creating that last policy rule here that says okay if you don't match any of the policy rules right you will

23:35 drop into that catch control uh uh policy at the bottom We will move you to

23:40 some staging network or any network with very restrictive

23:46 access fairly dead end if you want as long as the device can send some some packets out Once the device is dropped

23:53 into that staging network we'll do the fingerprinting in a cloud We'll then uh

23:59 once we determine what the device is we'll bounce the port we'll reapply the policy and then move that client to the

24:06 correct correct van So we'll look at the example of one access camera that I had

24:11 in that policy before and we'll look at the flow So initially when the client

24:16 connects you'll see that you know at that point client is or not the client

24:22 switches the map and the only thing we see is really the MAC address of the client and that doesn't give us much

24:28 except the macro UI now So you could see OS is empty uh

24:36 model device type uh everything is unknown at that point Now you'll see

24:41 that there is a fingerprint change uh event that actually you know there is a

24:46 there's a microser in the cloud that actually looks at the at the packets that are sent uh by the client and

24:53 they're streamed to the to the cloud Once we know what that device is in this case it's a it's a camera there's a

25:00 model of it It assigns a family to that device We will then issue a COA or in

25:07 this case since it's a wired device we are always doing a port bounce to make sure the client gets the uh the AP from

25:15 from the new VLAN and at that point we are matching the new authentication policy rule which is you know designed

25:22 for our cameras So that process is fully automated Again the the beauty of this

25:28 is you don't really need to configure anything else in in on the switch side

25:35 or anywhere else The only thing you need to do is to configure the policy All the COA per bounce thing is all automated

25:42 and done by us right so something that you'd probably spend um quite a bit of

25:48 time with uh other N products that's simplified and uh uh now uh now

25:56 it will be available in in access assurance In fact it is now in early access I forgot to say now now we'll

26:06 talk about and please interrupt if there are questions in between but I will talk about some

26:14 specifics on

26:20 actually this light is not turning now it does okay so some specifics right uh

26:26 on how we are doing and what we are doing behind the scenes so as I said

26:31 this is a fingerprinting or profiling service that runs in our cloud It uh

26:37 gets data from multiple sources So it gets network side metadata that comes

26:43 from our switches APs or you know even third party devices that are using using our knack It gets data from his client

26:50 if it's installed on the device or any third parties that we integrate directly So all these MDM MDM EDR integrations

26:59 I've spoken about we actually get fingerprinting info about the endpoints as well So all of that gets sent to the

27:06 fingerprinting service kind of uh does does its magic It has has its own logic

27:12 on how to paradise certain information over other It produces the final fingerprint that

27:18 it actually sends down to our knot all the policy can actually be applied

27:25 and you know the proper segmentation will be done Now what it also does is it

27:31 continuously reevaluates the fingerprint right So some of the things that uh that that

27:38 you see in in some products is you know the fingerprint is only detected once and then it stays forever So we are

27:45 actually revaluating it based on the data that that keeps uh coming to that

27:51 profiling service And here what you see is it's completely passive right now

27:57 There is no requirement to put any span for any tap source sensors or probes or anything like that We get the

28:03 information from from the network in line Right So that's the that's the

28:10 important important point Hey Sava Yep So if it's passive is that just is that

28:16 assuming it missed infrastructure whether switches or AP well uh not only

28:22 so today uh so for third party uh we also we also get information uh in in

28:30 radius accounting So like there's device sensors in pretty much every uh you know

28:35 every solution out there So they would send send you the metadata that uh that we need and we can parse that as well

28:40 But I assume it's going to be more accurate if it's your infrastructure and you've got the full data flow It it will be Yeah So and again this is what we

28:48 release right now with the passive info collection Uh I'm sure you know next

28:54 year on MFB you will see this slide change a little bit

29:01 Oh yeah Quick question Um can you put any sort of custom fingerprints

29:07 in so if you've got an unusual device that you know how to identify it can you

29:13 how can I tell myths this is what this sensor looks like or something like that

29:19 right So right now uh right now uh you cannot feed the fingerprint back to us

29:27 but what what you can do and again be before this profile I should have mentioned uh the way we've been uh doing

29:35 and many customers integrate with our knack end points through uh through API

29:42 interface So you know if a customer has CMDB with all the data and they know what their devices are and where they

29:49 are and what they are they can actually push this data to to us through API and

29:54 you know we have very very very large customers doing that at at at high scale I mean

30:01 like millions of endpoints Now with the profiling this is an automated way for

30:06 us to actually do this for you If you want to tag something specifically you

30:13 have an unusual device uh you can actually create an endpoint like there's

30:18 a knack end points page where you can tag the client with with certain certain

30:23 labels So you can say this is you know a camera in building one floor 2 XYZ

30:28 something like that use these labels in the policies So that's something you can do today We are looking at uh providing

30:36 like a feedback loop for the customer to actually say this profile that you've

30:41 done automatically I want this improved because this and that but we're not there right now Okay Are you seeing an

30:49 uptick in uh profiling you know say headless IoT devices sensors

30:57 um what kind of a momentum are you seeing there so the primary as I said in the

31:02 beginning right the primary use case is really wired IoT So like take enterprise

31:08 all sorts of things like starting from IP phones and printers to uh all sort of

31:14 OT sensors or controllers etc etc So these need need to be profiled and they

31:21 need to be dropped into a particular a particular segment on the wireless side

31:26 again because uh prior to that we've been doing the multi type of IoT

31:33 deployment where you know a PSK is actually uh used by certain device type

31:38 So you say you know this is a PSK for my hback this is a PSK for for my cameras and at that point this is very

31:45 deterministic It's kind of implicit trust So I'm again seeing more profiling

31:51 on the wire side versus wireless but you know it doesn't mean that you can't combine the two

31:57 Okay this lava I have a question Um I'm just trying to think about this from a

32:04 higher ed point of view because there's a lot of BYOD devices uh I could potentially see uh a ton of policies uh

32:12 being created and and tying back to that Marvis client that gets installed How uh

32:19 one of the questions that was brought online from Anders was edgerome So how are you

32:28 integrating and and making that more mainstream with Edome SSIDs like can we

32:35 push that certificate through the Marvis client is that just a Marvis so so so

32:41 let me rewind to the beginning So if you look at this right

32:47 so the Marvis client is what actually allows you to onboard your uh your

32:54 devices to your own So think of a student coming into the to campus They're there for the first time All

33:00 they do is they they log into the portal with your you know university credentials right it will let them

33:10 uh provision their device by just downloading the Marvis client app and it will what what it is doing here at this

33:17 step it's actually provisioning a certificate for that user and it's provisioning the Wi-Fi profile Right

33:23 Okay Now the certificate that you provision here it it has the user identity So you can actually create a

33:29 policy uh in access issue and say oh hey uh this is this is this user is part of

33:35 the student group I'm going to drop it in the student view So your policies will be very very simple your policies

33:42 will say oh if it's a student go here if you're staff go there if you're some somebody special you know do something

33:48 else but the Marvis client will allow your students to on board This is the

33:55 BYD portion The PPI solution that I've shown on the on the next slide for for

34:01 the MDM integrations This will help you for your managed devices like if if you

34:06 have any like sometimes the devices are managed in higher ed and in this

34:12 scenario you can actually differentiate between the two by just looking at the certificate and how the certificate

34:17 looks So we we provide that capability and granularity today which actually you

34:22 know our higher ed customers are using that extensively today So so when you say certificate you're talking about a

34:28 missed certificate Yeah It's a misued certificate but that is issued to your

34:34 uh end user device Okay The the left of this is is misissued

34:41 Correct It is misu Yeah The left side is the

34:47 left side and the right side is as well It's misued It's the cloud PI that we host right that's that cloud PI will be

34:55 your PI for your organization right it's not shared with anybody else but it's

35:00 going to be issuing certificates for everything on the left hand side If you're using the apptoone board and if

35:07 you have MDM integration done then uh it will be issuing certificates for your

35:13 MDM manage clients So the difference is for MDM clients you don't need to install a Mars client app because the

35:20 MDM is actually the facilitator The MDM will put the profile and put the cloud

35:26 PPI and the miss cloud PKI will find that okay so it's designed to replace intoune's cloud PKI Yes Oh but it would

35:33 only apply to the ones that you onboarded through that portal through the MIS infrastructure etc etc Correct

35:39 Okay Slava maybe just interrupt just I think the point is so today uh you know

35:45 for you know to support certificates within access we're using you know third party CA you know bring your own CIA

35:51 right what we're saying is with the miscloud PK PKI we can we can operate in

35:57 both a sort of a uh provision on devices using the Marvis client uh or you know

36:02 through a managed type of workflow using uh you know a scype integration Yeah I'm just trying to figure out where where it

36:09 would make sense from a managed device scenario to use this platform instead of

36:14 something that we already have Yep Right More in root CA or into Right Yeah it's

36:21 an option And there are still a lot of customers who don't have any today or

36:26 they're planning to migrate from you know the the legacy Windows Windows CS

36:32 services That's when this will be an option I have

36:40 Awesome Slava are you are you good we've I am good All right Uh actually actually

36:47 one last thing because we we've digressed and we've went back to

36:52 tomorrow's client So let me go back to

36:57 the profiling part because I was so one last thing before before we finish So

37:03 the reevaluation fingerprint where this comes handy is

37:09 actually it allows us to actually do max detection right So when we when we think

37:16 about the typical scenarios especially with auditing or say you know you you

37:22 had a printer connected or you had a a camera connected somebody comes in puts the MAC of that printer disconnects the

37:29 printer connects the you know Linux device and starts some sort of attack So what will what will happen here is our

37:37 fingerprint reevaluation will come in handy first because it's going to do the enforcement that will say "Oh hey yeah

37:43 you have the same Mac but you're you've been a printer or you've been a camera and now you're a Linux uh a Linux laptop

37:49 That's not good Let us court bounce We will rerun the policy You will probably end up in some staging or quarantine van

37:56 anyway." But that enforcement is immediate but what we will do is we will also generate a climaxing alert saying

38:04 "Hey this is happening You may want to look into this because the same Mac was seen as two completely different 38:09 devices. And we are being really careful here basically you know just any dramatic changes So obviously if you've"

38:15 changed from Windows 10 to 11 that's not a maxable thing but if you've changed from you know a printer to to a laptop

38:22 that's cause of concern Hey Slava on on that are you tagging that device then

38:28 with a hey this has been max spoofed so that it can just be blocked until

38:34 someone goes in and manually re-evaluates So potentially potentially an kind of auto auto action

38:42 for for Marvis where you would be able to say hey uh I want this to be automatically blocked until I until I

38:49 says otherwise Today it's reevaluating the policy and if you don't match the

38:54 previous condition you'll likely end up in the you know in the default dead end van

39:02 Awesome Uh thank thank you Slava So let me uh close out just to level set on on

39:08 Knack Um our history in our industry says Knack and happy customers don't

39:14 belong in the same sentence right you know that's been our history where this is this product in general the category

39:21 has been tainted with very heavy onrem systems Uh we have the happiest

39:26 customers in the world on Knack If you have if you if you don't believe that you have to try access assurance um uh

39:33 sort of proof in the pudding uh the largest customer we're deploying right now has 3 million endpoints deploying on

39:41 our cloud knack right we have actually uh uh deployed knack now uh these knack

39:46 pops for a cloud-driven knack system are d dep deployed around the world so if an

39:52 employee from a US-based company goes to India or or China wherever else they are

39:57 they're connecting to the closest Knack Pop All this kind of stuff completely cloudnative you know uh being able to

40:04 enable Knack to be easy and simple to be deployed Um we've achieved I I I'm

40:10 really proud of the work that has been done on this thing So if you're new to Juniper Mist and new to access assurance

40:15 you got to try this to believe this So uh Sam uh any sort of survivability features with Mist Edge doing caching

40:22 and things along those lines oh yes Yeah we didn't talk about that We should stop actually actually we did um last M&M we

40:29 showed that So uh we released site survivability uh late last year So the

40:36 way the way this is done is you have a local site edge that's under normal conditions does nothing but just caching

40:43 right So your clients are still authenticated through through the through the net cloud All the heavy

40:49 lifting is done in the cloud Mist that just learns the cache of all of the clients we have seen in that site for

40:55 the period that you specify So you know up to them So if we have seen that

41:00 client on that side in the last month and then you suddenly lose all of your internet connectivity So you cannot talk

41:07 to any of the knack pods APs and switches will automatically fail over to that local mist right and at that point

41:14 mist will start saying oh okay I know the last policy for that client I know that's the last policy for that client

41:19 So they will keep authenticating for as long as you want So this is designed to

41:25 survive even you know full power outages if you know the whole building goes down comes back and only you know only maj

41:33 are available Oh yes Okay

Show more