Junos Pulse Mobile Security Suite Launch

  • View
    3.221

  • Download
    0

  • Category

    Business

Preview:

DESCRIPTION

Presentation announcing Juniper's new Junose Pulse mobile security suite. Originally presented October 26, 2010.

Citation preview

THE NEW NETWORK IS MOBILE

Follow @JuniperNetworks

Hashtag: #Junos

2

INTRODUCING

Lauren Flaherty

Chief Marketing Officer

4

THE NEW NETWORK IS MOBILE

Kevin Johnson

Chief Executive Officer

6

THE MOBILE INTERNET IS THE NEW INTERNET

Proliferation of Devices

Content ConsumptionConnected Socialization

*Source: Morgan Stanley, 2010

Number of smartphones sales to exceed PC sales in 2012*

7

THE IMPLICATIONS ARE SIGNIFICANT

8158

Access without permissionAccessing daily without permission

% %

Enterprise

Cloud services

Mobile deviceService provider

Mobile devices without permission are connecting to the network

40% use the same smartphone for both business and personal

Across a network that is no longer self-contained

For Enterprises Personal devices “sneaking” onto the network New threat vectors Strain on IT support

For Service Providers Multiple points of vulnerability Currently only fragmented security solutions CAPEX and OPEX impact

For Consumers Sensitive personal info exposed Theft/loss and malware threats Children need protection

Source: KRC Research and Juniper Mobile Threat Center

Source: KRC Research and Juniper Mobile Threat Center

8

AND AS AN INDIVIDUAL…

9

MALWARE HISTORY TELLS US TWO THINGS

1. Malware changes and gets more sophisticated

2. Waiting and reacting after-the-fact can be costly

2009

Mobile Malware

SMS Trojan – ‘09 Symbian,

July, ‘10 Android

1995

Macro Viruses

Concept ‘95Melissa ‘99

2001

Network Worm

Code Red ‘01Nimda ‘01

1981

Executable Boot Sector Infections

Elk Cloner (Apple II) ‘81

1986

Executable Boot Sector Infections

Brain Boot Sector (PC) ‘86

1988

Fred Cohen"On the Implications of

Computer Viruses and Methods of Defense"

Academic FoundationTheory of self-

reproducing automata,John von Neumann,

Institute for Advanced Study Site Y,Los Alamos

1966

1990

Anti-Virus Firms20+ anti-virus firms

‘88 ‘90

‘66 ‘81 ‘86 ‘95 ‘01 ‘09

10

IT IS TIME TO SET THE MOBILITY SECURITY AGENDA

1. Protection at all points – device, network, applications

2. Support across all mobile OS/devices

3. Extensible

4. User friendly

5. Easy to administer

5 principles for delivering mobile security:

11

With the EnterpriseWith Service Providers

JUNIPER STARTS WITH MOBILE SECURITY LEADERSHIP IN THE NETWORK

First to support smartphones with security

and access control

Juniper secures the majority of smartphone

traffic in the US

Covering 76% of all smartphones worldwide

24 of Fortune 25 using to enable employees and

protect the network

Mobile packet core

SRX SRX

VPN

SGSN GGSN Router

Corporate networks

Corporate OfficesSRX Data Centers

Branches

12

Comprehensive Scope

Ecosystem ExtensibilityPlatform Based, Cross OS

AND EXTENDS THAT LEADERSHIP USING THREE STRATEGIES

Simplify administration and use

1

On the Client

Innovation ecosystem

End-user device

In the Network

Software

System

Silicon

Build security in

2 3

Anticipate threat vectors

Device, Network, App and Data Mobile Device, Network Trafficand Data Center

13

THE NEW NETWORK IS MOBILE

New NetworkEcosystem InnovationNetwork Innovation

Reliable

Fast

Scalable

Simple

Secure

High Performance Networking

Profitable

Versatile

Dynamic

Open

Partner Solutions

$

New, better experiences

New flexibility & agility

New customer solutions

New revenue sources

Accelerated Innovation & Competition Drives…

14

Antivirus

Personal firewall

Anti-spam

Monitoring and control services

Remote backup and restore

Device locator

Secure corporate network access

Parental controls

Cross OS/Cross device

TODAY’S ANNOUNCEMENTS

Junos Pulse Mobile Security Suite, the mostcomprehensive security software for protecting all smartphones

1

Juniper Global Threat Center, around-the-clock, global monitoring of mobile security threats to consumers and enterprises

Securing enterprises and consumers, enabling end-point security directly and with our service provider partners

2

3

15

CUSTOMERS AND PARTNERS PARTICIPATING

David P Merrill

Strategist, IBM Chief Information Security Office

Marc J. Patterson

General Manager, Mobile Data Services

John Donovan

Chief Technology Officer

VIDEO – JOHN DONOVAN

INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE

Mark Bauhaus

Executive Vice President and General Manager

Service Layer Technology Business Group

18

?WHAT IS MISSING FROM MOBILE SECURITY?

19

THIS IMPACTS ALL CUSTOMERS

For Enterprises For Service Providers For Consumer

31%Compromised security in 20091

86%Security high or critical priority1

25%Not corporate-standard or managed smartphones1

40%Use same smartphone for business and personal2

2 MillionStolen smartphone in the US4

80%Store personal information(24% store banking info) 4

24%Teens admit to sending inappropriate content 4

32%Online teens contacted by strangers4

1/3Of world’s workforce by 20131

1BillionMobile workers in 20101

2xIncrease in users requiring data access by 20133

0Capability to solve the problem today2

Source:1 Forester Research2 Juniper Networks3 IDC4 Credant Technologies

20

INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE

Anti-spam

Personal Firewall

Antivirus

Loss/Theft Protection

Device MonitoringAnd Control

21

For The Enterprise

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Wipe data and access rights from lost and stolen devices remotely

Combine security and access in a single client

Enforce policies across all devices attached to the network

Reduce IT overhead by better managing complexity

22

For Service Providers

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Monetize innovative smartphone security services

Scale across all customers with a single solution

Offer both managed and self-managed solutions

Tailor offering through bundled services

23

For Consumers

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Defend kids from cyber bullying and online predators

Backup and Restore devices remotely

Find and Wipe content and contacts on demand

Protect from viruses, malware and spam

25

NEW THREATS ARE A 24/7 SECURITY PROBLEM

Announcing - The Juniper Global Threat Center

The first and only threat and research center focused exclusively on mobility

Monitors and responds to threats and vulnerabilities

Produces on-going research

PhysicalCompromise

DirectAttack

Malware Exploitation &Misconduct

DataInterception

26

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE

Sources: KRC Research and Juniper Mobile Threat Center

40%use their smartphone for both personal and business

52%of respondents with children rank parental controls extremely or very important.

72%share or access sensitive info such as banking, credit card, social security, medical records

81%access their employer’s network without permission –

58% do it everyday

50%+are very concerned about loss, theft and identity theft resulting from their mobile usage

1 in 5 Teens admit to sending inappropriate pictures of themselves from mobile devices

27

Delivering Unique Value In The MarketplaceJuniper Mobile Security Solutions

JUNIPER RAISES THE STANDARD FOR MOBILE SECURITY WITH THE NEW NETWORK

First to provide security and remote access at the device, system provider and application level

Broadest support for all major mobile operating systems and platforms

World’s leading and most trusted security and access solution

Only single solution for both security and access across mobile and non-mobile devices

Secure at the device

Secure across the service provider

Secure in the enterprise

28

WHAT CUSTOMERS SHOULD DO NEXT

http://juniper.net/

INTRODUCING

David MerrillStrategist, Chief Information Security Office

IBM

© 2010 IBM Corporation30

Our journey

The second mobile computing revolution

© 2010 IBM Corporation

Is your data any less valuable because

it’s on a smartphone?

It’s all about the data …

© 2010 IBM Corporation

Smartphone malware …

... is not an urban legend.

© 2010 IBM Corporation

Thank you

© 2010 IBM Corporation

INTRODUCING

Sanjay Beri

Vice President and General Manager

Access & Acceleration Business Unit

VIDEO – 3 SECURITY SCENARIOS

37

VIDEO – DEMO 1

39

VIDEO – DEMO 2

41

VIDEO – DEMO 3

43

INTRODUCING

Marc J. PattersonGeneral Manager, Mobile Data Services

BT Global Services

45 Copyright © 2010 Juniper Networks, Inc. www.juniper.net

BT: Securing the Prosumer

BT has supported enabled smartphones since 2007• Provide secure end-user experience – for free

End-users are consumerizing the enterprise• Common focus across BT consumer and enterprise Mobility Services

Market opportunity

Why Juniper?• Cross-platform support• Ease of deployment• Technology performance• Relationship

• Consumer: BT Total Broadband Anywhere

• Enterprise: BT MobileXpress™

46

Recommended