SlideShare a Scribd company logo
BYOD – Four Steps to Enabling
Your Network
Michael Greco, Director , Security, APAC
MOBILE DEVICE USAGE IN ENTERPRISE

                     Market Size - Smartphone                                                                               IT Manager’s Top Initiatives

             2011                                                  2015                                         1         Control and Use of Mobile Devices
                                                                                                                          Control
                                                                                                                                  and Use of Mobile Devices

  Total Market Size : 475M                                      Total Market Size : 1B
                                                                                                                2          Information Security
                                                                                                                          Information Security
  B2B Market : 116M                                                      333M
                                                                                                                3         Data Retention Policies and Structure


                                                                                  18%                           4         Remote Access
                                                                                                                          Remote Access
                     11%                                                                                        5         Staff and Management Training

                             13%                                                           14%                  6         Process Documentation and improvements
                                                               68%

             76%                                                                                                7         Saving and Making Money w/Technology

                                                                                                                8         Technology Cost Controls

                                                                                                                9         Budget Processes
        Consumer                  Smartphones used for business grow to 3X 2015
                                  Individual-Biz Corporate-Biz

                                  CIO focus: Mobile mgmt / control and remote access& deployment of new
                                                                    10   Project Management
Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011
                                  BYOD continues to be a driver                                              Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011



         2                                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
TABLET ADOPTION
       - MORE BUSINESS-READY DEVICES
                                                                                                                                          CAGR CAGR
Tablets, by Region                                          CAGR CAGR
                                                                                                        Tablets, by OS                    10-12 12-15
# of units (M); Units sold                                  10-12 12-15                                 # units (M), Units Sold
                                                                                                              18      103       326
               350                                          142% 47%                                                                      142% 47%
                                                   326                                                                   7%       8%
                                                    7                                                        14%         4%
               300                                                                                                               11%           99%
                                                            140% 52%
                                                    68
                                                                                                                         22%
               250
                                                                                                                                 36%      202% 72%
               200
                                                   118      141% 48%

               150                                                                                           83%
                                       103                                                                               67%
               100                       2
                                      19                                                                                                  117% 29%
                                                            141% 43%                                                             46%
                                       36          133
                 50
                        18
                     0 3               46
                   0   8 6
                                                                                                            2009         2012    2015
                         2010         2012        2015
                                      LA              EMEA                                                     Others           Android
                                      APAC            NA                                                       Microsoft        iOS


                           Tablet Market Grows to 4X by 2015
                           Apple iOS leads but Android challenges
  Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update




   3                                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE BYOD PHENOMENA CONTINUES TO EVOLVE



                                                 Tuesday, January 3, 2012


         For CIOs, Time To Deal With All Of Those Holiday
                         Mobile Devices
           Trending Opportunity                                                        Trending Risk
        “At the end of 2011, almost half of    “BYOD creates a whole new maze of
       mobile devices used in the workplace    security risks that must be navigated.
       were employee owned, according to      CIOs need to take a step back, assess
      IDC. These gadgets equal freedom for       the specific security needs of their
       employees, which is why companies       company’s confidential data, and then
      are increasingly embracing the BYOD,     pick the right technology that enables
        or bring your own device, trend…”                  those controls...”
           CIOs need to embrace BYOD as the savings are too big to
           ignore. However, security risk continues to be a challenge.
4                          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
The BYOD balance



    Private                                                           Secure
Differentiated                                                      Compliant
Personalized     Users                            Corporate         Authorized




“At the heart of most BYOD plans is the assumption that users are willing to give up
some level of control over their personal devices in exchange for access to
corporate resources, such as networking and email. The extent to which users and
companies may agree on the compromise will vary.” – Gartner, Oct 2011
BYOD Demands and Challenges

   Any Device                Any Location                 Any Application




Personal devices used for   Anytime, anywhere mobile      Users download unknown
work                        remote access                 or un- / ill-secured apps
Work devices used for       Users with multiple devices   Users access and store
personal activities                                       data from personal and
                                                          business apps
Multiple device types and
service providers
MOBILE SECURITY REQUIREMENTS:
          ACCESS, DATA, APP and DEVICE PROTECTION
•VPN                                                                                                                            •AV / AS
•Authentication                                                                                         • On-device Malware,    •Backup, Wipe &
                  • Enterprise Grade Data                                                                Virus,Spyware
•NAC               in Transit Security                                                                   Scanning & Removal
                                                                                                                                Restore
                  • Strong User                                                                         • Data Loss & Theft     • Segmentation
                   Authentication                                                                                               • Content
                  • All Network, Apps &                                                                                         monitoring &
                   Resource Access
                                                                                                                                Control
                                                Network                                 Data




                                                  Device                                 App
                  •Device Configuration                                                                 • Malicious Apps        • App Profile &
                  •Device Inventory                                                                     • Unauthorized Apps     Control
• MDM             •Posture Assessment                                                                   • Corp Apps / Ent App   • Application-
• Host Check      •Differentiated                                                                         Store Access          Data Control
• Device           Device+User Access                                                                   • App Inventory
                  •Targeted Threats                                                                     • Restriction &
Protection                                                                                                Management
                Enterprises and Service Providers need to address all four
               Enterprises of mobile device management and security compliance
                dimensions care most about data breach and security
      7                                     Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
EVOLVING AND EXPANDING BATTLEFRONTS

              THE DECENTRALIZED NATURE OF ATTACKS




     Inadequate         Diverse                                   Device           Increasing
     security on         user                                     and OS         implementation
    mobile devices      profiles                                proliferation         points




8                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE THREATS GROW
TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS




9                              Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

    Source: Juniper Networks Mobile Threats Report 2011
SO, WHAT ARE THE THREATS?

          Malware – Viruses, Worms,
          Trojans, Spyware


          Direct Attack – Attacking device interfaces,
          Network DoS, Malicious SMS


          Loss and Theft – Accessing
          sensitive data


          Data Communication Interception –
          Sniffing data as it is transmitted and received

          Exploitation and Misconduct –
          Online predators, pornography, inappropriate
          communications, data leakage


   10                             Copyright © 2011 Juniper Networks, Inc.   www.juniper.net


Page 10                                            Copyright 2008 SMobile Systems
ADDRESSING BYOD DRIVERS

     User Productivity                                          +                          Economics

                                                               Mobile
                                             1                 Device
                                                             Proliferation

                                                             Network and
                                             2               Application
                                                               Access

                                                               Consistent
                                             3                  Security


                                                          Comprehensive
                                             4             Management



11     Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net
                                Networks, Inc.   Juniper Networks, Inc. Confidential
THE STEPS TO SECURE BYOD

                Provide a safe, device-agnostic
      1         connection everywhere

                Deliver secure, consistent
      2         authentication, authorization and
                access
                Protect the user, their device and
      3         data and your network, apps and
                data

                Simply manage the user, the device,
      4         their apps and their access

12     Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
                                Networks, Inc.   Juniper Networks,      www.juniper.net
ENSURING SECURE PERSONAL MOBILE DEVICE
 ACCESS AND USE
     Users can choose and change their mobile devices
     Manage the connection, access and the device
     Enable user self-provisioning
     Security works the same
     on premises and off




13           Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
                                      Networks, Inc.   Juniper Networks,      www.juniper.net
ADDRESSING PERSONAL MOBILE DEVICE USE
                                               Protect personal mobile devices
                                               and apps, as well as corporate
                                               networks, resources and data


                                                                                    Manage personal
                                                                                    mobile devices,
                                                                                    network / resource
                                                                                    access, apps and
                                                                                    users
                                                                                    comprehensively
                                            CONNECT
SMBs, Enterprises and
    Government
                                        Connect personal mobile
                                        devices to corporate
                                        networks, clouds, resources
                                        and data simply and securely
  14                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
CONNECT
SECURE MOBILE REMOTE ACCESS


                                               SECURE DATA IN TRANSIT to
                                               protect against hacks and data
                                               theft

                                               SUPPORT EXISTING
                                               AUTHENTICATION METHODS,
                                               including multi-factor authentication

                                               IDENTITY-ENABLED mobile,
                                               remote network and application
                                               access

                                               CONSISTENT ACCESS
                                               CONTROL POLICIES across all
                                               devices accessing the network

15          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
PROTECT
MOBILE DEVICE SECURITY


                                                ANTI-MALWARE which scans all
                                                files and connections – even SD
                                                cards – with real-time updates

                                                LOSS AND THEFT PROTECTION,
                                                including locate and track, remote
                                                lock and wipe, alerts, and more

                                                ANTI-SPAM to block SMS and
                                                voice spam, with automatic denial
                                                options
                                                MOBILE ENDPOINT FIREWALL
                                                that’s customizable with inbound
                                                and outbound filters

16           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MANAGE
USER, DEVICE AND APP MANAGEMENT


                                                CONFIGURE AND PROVISION
                                                accounts, security policies,
                                                certificates…

                                                AUTOMATICALLY RESTRICT OR
                                                REMOVE unapproved or offending
                                                apps

                                                COLLECT AND REPORT on
                                                device and compliance information,
                                                loaded apps and more

                                                REMOTELY MANAGE AND
                                                CONFIGURE lost/stolen devices –
                                                remote locate, track, lock, wipe…

17           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
JUNOS PULSE: HIGH LEVEL OVERVIEW
 THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION

     Anytime, Anywhere                                                                                Anytime, Anywhere
       Secure Access                                                                                   Threat Protection
     • Corporate / Cloud VPN                                                                         • Mobile Loss and Theft
     • Authentication                                                                                • Mobile Threat Prevention
     • Differentiated Access




                               Connect                                          Protect




                                                       Manage

                                                                                             Anytime, Anywhere
                                                                                           Device and App Control
                                                                                            • Device Management
                                                                                            • App Management
                                                                                            • Content monitoring
18                             Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

More Related Content

PDF
Telecommunication @ Strategic Intelligence Studies
PPTX
Mobility is more than BYOD
PPTX
Udi and juniper networks BYOD
PDF
2011 TWNIC SP IPv6 Transition
PPT
INTERNET PROTOCOL VERSION 6
PDF
UK enterprises' 2012 IT investment priorities
PPTX
Business Insider, Social Commerce Summit, Fiona Swerdlow
PDF
Final 10 17-12 nyexpo using tech to grow
Telecommunication @ Strategic Intelligence Studies
Mobility is more than BYOD
Udi and juniper networks BYOD
2011 TWNIC SP IPv6 Transition
INTERNET PROTOCOL VERSION 6
UK enterprises' 2012 IT investment priorities
Business Insider, Social Commerce Summit, Fiona Swerdlow
Final 10 17-12 nyexpo using tech to grow

Similar to Byod four steps to enabling your network michael greco (20)

PDF
Tarik Fawzi, AEneas #Maduk
PPTX
IDC e o SCM para 2009
PPTX
Marketing Analytics Effectiveness
 
PDF
Be like the internet
PPTX
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
PDF
SAP TOP TEN ENTERPRISE MOBILITY 2013
PDF
Lehman Brothers Retail Seminar
PDF
Survey Results: The consumerization of it from the end user’s perspective
PDF
Apple brazil app proliferation 9.4
PPTX
Webinar on Mobility in Healthcare
PDF
iStrategy 2012, Melbourne: Customer relevance - the next frontier for competi...
PDF
"Connected home" - aplikacja dla domu i biznesu
PDF
Becoming iConic-Applying Apple's Principles Dallas Diggs at The Connective Hub
PDF
The rules of mobile advertising
PDF
The History of App Store
PPTX
GartnerBI SP Session: Harnessing Mobile Intelligence by Steve Reynolds
PDF
Digital marketing in Belgium 2012: infographic
PPTX
SIM Partners - Mobile Marketing Capabilities
PPT
What's Your Business Grade?
Tarik Fawzi, AEneas #Maduk
IDC e o SCM para 2009
Marketing Analytics Effectiveness
 
Be like the internet
NWEN and Founder Institute Ideation Bootcamp - Week 1 - Big Idea, Markets and...
SAP TOP TEN ENTERPRISE MOBILITY 2013
Lehman Brothers Retail Seminar
Survey Results: The consumerization of it from the end user’s perspective
Apple brazil app proliferation 9.4
Webinar on Mobility in Healthcare
iStrategy 2012, Melbourne: Customer relevance - the next frontier for competi...
"Connected home" - aplikacja dla domu i biznesu
Becoming iConic-Applying Apple's Principles Dallas Diggs at The Connective Hub
The rules of mobile advertising
The History of App Store
GartnerBI SP Session: Harnessing Mobile Intelligence by Steve Reynolds
Digital marketing in Belgium 2012: infographic
SIM Partners - Mobile Marketing Capabilities
What's Your Business Grade?
Ad

More from K Singh (8)

PDF
9767410 - Index
PDF
Ten Commandments of BYOD
PDF
Securing mobile devices_in_the_business_environment
PDF
Gapps connector guide_for _bes
PPT
Exchange active sync for developers
PPTX
Exchange Active Sync Troubleshooting
PDF
Exchange 2010 e_book
PPT
Database mirroring setup
9767410 - Index
Ten Commandments of BYOD
Securing mobile devices_in_the_business_environment
Gapps connector guide_for _bes
Exchange active sync for developers
Exchange Active Sync Troubleshooting
Exchange 2010 e_book
Database mirroring setup
Ad

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Teaching material agriculture food technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Review of recent advances in non-invasive hemoglobin estimation
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Reach Out and Touch Someone: Haptics and Empathic Computing
Chapter 3 Spatial Domain Image Processing.pdf

Byod four steps to enabling your network michael greco

  • 1. BYOD – Four Steps to Enabling Your Network Michael Greco, Director , Security, APAC
  • 2. MOBILE DEVICE USAGE IN ENTERPRISE Market Size - Smartphone IT Manager’s Top Initiatives 2011 2015 1 Control and Use of Mobile Devices Control and Use of Mobile Devices Total Market Size : 475M Total Market Size : 1B 2 Information Security Information Security B2B Market : 116M 333M 3 Data Retention Policies and Structure 18% 4 Remote Access Remote Access 11% 5 Staff and Management Training 13% 14% 6 Process Documentation and improvements 68% 76% 7 Saving and Making Money w/Technology 8 Technology Cost Controls 9 Budget Processes Consumer Smartphones used for business grow to 3X 2015 Individual-Biz Corporate-Biz CIO focus: Mobile mgmt / control and remote access& deployment of new 10 Project Management Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011 BYOD continues to be a driver Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. TABLET ADOPTION - MORE BUSINESS-READY DEVICES CAGR CAGR Tablets, by Region CAGR CAGR Tablets, by OS 10-12 12-15 # of units (M); Units sold 10-12 12-15 # units (M), Units Sold 18 103 326 350 142% 47% 142% 47% 326 7% 8% 7 14% 4% 300 11% 99% 140% 52% 68 22% 250 36% 202% 72% 200 118 141% 48% 150 83% 103 67% 100 2 19 117% 29% 141% 43% 46% 36 133 50 18 0 3 46 0 8 6 2009 2012 2015 2010 2012 2015 LA EMEA Others Android APAC NA Microsoft iOS Tablet Market Grows to 4X by 2015 Apple iOS leads but Android challenges Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. THE BYOD PHENOMENA CONTINUES TO EVOLVE Tuesday, January 3, 2012 For CIOs, Time To Deal With All Of Those Holiday Mobile Devices Trending Opportunity Trending Risk “At the end of 2011, almost half of “BYOD creates a whole new maze of mobile devices used in the workplace security risks that must be navigated. were employee owned, according to CIOs need to take a step back, assess IDC. These gadgets equal freedom for the specific security needs of their employees, which is why companies company’s confidential data, and then are increasingly embracing the BYOD, pick the right technology that enables or bring your own device, trend…” those controls...” CIOs need to embrace BYOD as the savings are too big to ignore. However, security risk continues to be a challenge. 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. The BYOD balance Private Secure Differentiated Compliant Personalized Users Corporate Authorized “At the heart of most BYOD plans is the assumption that users are willing to give up some level of control over their personal devices in exchange for access to corporate resources, such as networking and email. The extent to which users and companies may agree on the compromise will vary.” – Gartner, Oct 2011
  • 6. BYOD Demands and Challenges Any Device Any Location Any Application Personal devices used for Anytime, anywhere mobile Users download unknown work remote access or un- / ill-secured apps Work devices used for Users with multiple devices Users access and store personal activities data from personal and business apps Multiple device types and service providers
  • 7. MOBILE SECURITY REQUIREMENTS: ACCESS, DATA, APP and DEVICE PROTECTION •VPN •AV / AS •Authentication • On-device Malware, •Backup, Wipe & • Enterprise Grade Data Virus,Spyware •NAC in Transit Security Scanning & Removal Restore • Strong User • Data Loss & Theft • Segmentation Authentication • Content • All Network, Apps & monitoring & Resource Access Control Network Data Device App •Device Configuration • Malicious Apps • App Profile & •Device Inventory • Unauthorized Apps Control • MDM •Posture Assessment • Corp Apps / Ent App • Application- • Host Check •Differentiated Store Access Data Control • Device Device+User Access • App Inventory •Targeted Threats • Restriction & Protection Management Enterprises and Service Providers need to address all four Enterprises of mobile device management and security compliance dimensions care most about data breach and security 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. EVOLVING AND EXPANDING BATTLEFRONTS THE DECENTRALIZED NATURE OF ATTACKS Inadequate Diverse Device Increasing security on user and OS implementation mobile devices profiles proliferation points 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. THE THREATS GROW TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS 9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Source: Juniper Networks Mobile Threats Report 2011
  • 10. SO, WHAT ARE THE THREATS? Malware – Viruses, Worms, Trojans, Spyware Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft – Accessing sensitive data Data Communication Interception – Sniffing data as it is transmitted and received Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Page 10 Copyright 2008 SMobile Systems
  • 11. ADDRESSING BYOD DRIVERS User Productivity + Economics Mobile 1 Device Proliferation Network and 2 Application Access Consistent 3 Security Comprehensive 4 Management 11 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net Networks, Inc. Juniper Networks, Inc. Confidential
  • 12. THE STEPS TO SECURE BYOD Provide a safe, device-agnostic 1 connection everywhere Deliver secure, consistent 2 authentication, authorization and access Protect the user, their device and 3 data and your network, apps and data Simply manage the user, the device, 4 their apps and their access 12 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  • 13. ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE Users can choose and change their mobile devices Manage the connection, access and the device Enable user self-provisioning Security works the same on premises and off 13 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  • 14. ADDRESSING PERSONAL MOBILE DEVICE USE Protect personal mobile devices and apps, as well as corporate networks, resources and data Manage personal mobile devices, network / resource access, apps and users comprehensively CONNECT SMBs, Enterprises and Government Connect personal mobile devices to corporate networks, clouds, resources and data simply and securely 14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 15. CONNECT SECURE MOBILE REMOTE ACCESS SECURE DATA IN TRANSIT to protect against hacks and data theft SUPPORT EXISTING AUTHENTICATION METHODS, including multi-factor authentication IDENTITY-ENABLED mobile, remote network and application access CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network 15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 16. PROTECT MOBILE DEVICE SECURITY ANTI-MALWARE which scans all files and connections – even SD cards – with real-time updates LOSS AND THEFT PROTECTION, including locate and track, remote lock and wipe, alerts, and more ANTI-SPAM to block SMS and voice spam, with automatic denial options MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters 16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 17. MANAGE USER, DEVICE AND APP MANAGEMENT CONFIGURE AND PROVISION accounts, security policies, certificates… AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending apps COLLECT AND REPORT on device and compliance information, loaded apps and more REMOTELY MANAGE AND CONFIGURE lost/stolen devices – remote locate, track, lock, wipe… 17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 18. JUNOS PULSE: HIGH LEVEL OVERVIEW THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION Anytime, Anywhere Anytime, Anywhere Secure Access Threat Protection • Corporate / Cloud VPN • Mobile Loss and Theft • Authentication • Mobile Threat Prevention • Differentiated Access Connect Protect Manage Anytime, Anywhere Device and App Control • Device Management • App Management • Content monitoring 18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net