View
4
Download
0
Category
Preview:
Citation preview
DEFENDING THE MOBILE WORKFORCEKarim Toubba-Vice President Product Marketing and Strategy-Security Business Unit
2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
THE MOBILE INTERNET IS THE NEW INTERNET
Proliferation of Devices
Content ConsumptionConnected Socialization
Number of smartphones sales to
exceed PC sales in 2012*
*Source: Morgan Stanley, 2010
3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
MALWARE HISTORY TELLS US TWO THINGS
1. Malware changes and gets more sophisticated
2. Waiting and reacting after-the-fact can be costly
2009
Mobile Malware
SMS Trojan – „09
Symbian,
July, „10 Android
1995
Macro Viruses
Concept „95
Melissa „99
2001
Network Worm
Code Red „01
Nimda „01
1981
Executable Boot
Sector Infections
Elk Cloner
(Apple II) „81
1986
Executable Boot
Sector Infections
Brain Boot Sector
(PC) „86
1988
Fred Cohen"On the implications of
Computer Viruses and Methods
of Defense"
Academic
Foundation
Theory of self-
reproducing automata
John von Neumann,
Institute for Advanced
Study Site Y
Los Alamos
1966
1990
Anti-Virus Firms20 + anti-virus firms
‘88 ‘90
‘66 ‘81 ‘86 ‘95 ‘01 ‘09
4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
WHAT IS MISSING FROM MOBILE SECURITY?
5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE
Sources: KRC Research and Juniper Mobile Threat Center
40%use their smartphone
for both personal
and business
72%share or access sensitive
info such as banking, credit
card, social security,
medical records
80%access their employer‟s
network without permission –
59% do it everyday
50%+are very concerned about
loss, theft and identity
theft resulting from their
mobile usage
6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Notebook
Netbook
Smartphone
Tablet
HQ
Local Office
Global High-Performance Network
Secure Mobile Devices Secure Connectivity Secure Apps
DEFEND YOUR MOBILE LIFE
7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Wipe data and access rights from
lost and stolen devices remotely
Combine security and access in a
single client
Enforce policies across all devices
attached to the network
Reduce IT overhead by better
managing complexity
SECURING MOBILE DEVICES: KEY ENTERPRISE REQUIREMENTS
8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
SECURING MOBILE DEVICES KEY ELEMENTS
Antivirus
Real-time protection
Auto updates
Scan all files
All connections
Personal
Firewall
Inbound & outbound filtering
Alerts & logging
Customizable
Anti SpamBlock SMS and voice spam
Blacklist filtering
Disable alerts options
Automatic denial options
Loss & Theft
Protection
Remote lock & wipe
Backup and restore
GPS locate
SIM change notification
Device
ControlApp inventory and control
Content monitoring
Se
cu
re A
cce
ss
9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
SECURING MOBILE DEVICESLOCAL VS. CLOUD
Antivirus
Personal
Firewall
Anti Spam
Loss & Theft
Protection
Device
Control
Se
cu
re A
cce
ss
On Site
or
On Device
On Device
On Device
10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
REQUIREMENT: BROAD MOBILE PLATFORM SUPPORT
SECURING MOBILE DEVICES (CONT.)
11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
SECURE CONNECTIVITY
Providing anyone a secure experience from any device from any location to any resource
12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
SECURE CONNECTIVITY (CONT.)
Why haven‟t businesses supported all devices?
Lack of encryption
No multifactor authentication
Inconsistent security policies
Wide range of backend
applications
Personal
SmartphonesIssued
Smartphones
# o
f D
evic
es
13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Unmanaged
Devices
Diverse
Users/Locations/Networks
Critical
Resources
Intranet
Finance
Case
Tracking
How do you ensure ONLYthe right users are accessing resources?
SECURE APPLICATIONS
14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
WHAT DOES THE FUTURE HOLD?
Smart devices will
become the target of
choice for attacks
Attack vectors will
continue to evolve
within smart devices
Personal information
will be used for more
“front-door attacks,”
15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
THANK YOU
Recommended