byod four steps to enabling your network michael greco

18
BYOD –Four Steps to Enabling Your Network Michael Greco, Director , Security, APAC

Upload: k-singh

Post on 23-Jan-2015

478 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Byod four steps to enabling your network michael greco

BYOD – Four Steps to Enabling

Your Network

Michael Greco, Director , Security, APAC

Page 2: Byod four steps to enabling your network michael greco

1 Control and Use of Mobile Devices

2 Information Security

3 Data Retention Policies and Structure

4 Remote Access

Control and Use of Mobile Devices

Information Security

IT Manager’s Top Initiatives

20152011

Market Size - Smartphone

Total Market Size : 475M Total Market Size : 1B

18%

B2B Market : 116M 333M

Remote Access

MOBILE DEVICE USAGE IN ENTERPRISE

2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

5 Staff and Management Training

6 Process Documentation and improvements

7 Saving and Making Money w/Technology

8 Technology Cost Controls

9 Budget Processes

10 Project Management & deployment of new

Corporate-BizIndividual-BizConsumer

Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011

14%

68%

11%

13%

76%

Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011

�Smartphones used for business grow to 3X 2015�CIO focus: Mobile mgmt / control and remote access

�BYOD continues to be a driver

Page 3: Byod four steps to enabling your network michael greco

83%

14%

22%

36%

7% 8%

11%

103

4%

18 326

118

68

150

200

250

300

350326

7

TABLET ADOPTION- MORE BUSINESS-READY DEVICES

Tablets, by OS# units (M), Units Sold

Tablets, by Region# of units (M); Units sold

CAGR

10-12

CAGR

12-15

141% 48%

140% 52%

142% 47%

CAGR

10-12

CAGR

12-15

202% 72%

99%

142% 47%

3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

83%

67%

46%

20122009 2015

36

00

50

100

150

2015

133

2012

103

46

192

2010

18

8 63

NA

EMEA

APAC

LA

iOS

Android

Microsoft

Others

141% 43%

Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update

117% 29%

�Tablet Market Grows to 4X by 2015

�Apple iOS leads but Android challenges

Page 4: Byod four steps to enabling your network michael greco

For CIOs, Time To Deal With All Of Those Holiday

Mobile Devices

Trending Opportunity Trending Risk

Tuesday, January 3, 2012

THE BYOD PHENOMENA CONTINUES TO EVOLVE

4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

“At the end of 2011, almost half of mobile devices used in the workplace were employee owned, according to IDC. These gadgets equal freedom for employees, which is why companies are increasingly embracing the BYOD, or bring your own device, trend…”

Trending Opportunity Trending Risk

“BYOD creates a whole new maze of

security risks that must be navigated.

CIOs need to take a step back, assess

the specific security needs of their

company’s confidential data, and then

pick the right technology that enables

those controls...”CIOs need to embrace BYOD as the savings are too big to

ignore. However, security risk continues to be a challenge.

Page 5: Byod four steps to enabling your network michael greco

The BYOD balance

Private Secure

Users Corporate

Private

Differentiated

Personalized

Secure

Compliant

Authorized

“At the heart of most BYOD plans is the assumption that users are willing to give up

some level of control over their personal devices in exchange for access to

corporate resources, such as networking and email. The extent to which users and

companies may agree on the compromise will vary.” – Gartner, Oct 2011

Page 6: Byod four steps to enabling your network michael greco

BYOD Demands and Challenges

AnyAny DeviceDevice AnyAny LocationLocation AnyAny ApplicationApplication

�Personal devices used for

work

�Work devices used for

personal activities

�Multiple device types and

service providers

�Anytime, anywhere mobile

remote access

�Users with multiple devices

�Users download unknown

or un- / ill-secured apps

�Users access and store

data from personal and

business apps

Page 7: Byod four steps to enabling your network michael greco

MOBILE SECURITY REQUIREMENTS:ACCESS, DATA, APP and DEVICE PROTECTION

• On-device Malware, Virus,SpywareScanning & Removal

• Data Loss & Theft

• Enterprise Grade Data in Transit Security

• Strong User Authentication

• All Network, Apps &Resource Access

Network Network DataData

•VPN•Authentication•NAC

•AV / AS•Backup, Wipe & Restore• Segmentation• Content monitoring & Control

7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

• Malicious Apps

• Unauthorized Apps• Corp Apps / Ent App

Store Access

• App Inventory• Restriction &

Management

• Device Configuration

• Device Inventory• Posture Assessment

• Differentiated Device+User Access

•Targeted Threats

AppAppDeviceDevice

Enterprises care most about data breach and security compliance

• App Profile & Control• Application-Data Control

• MDM• Host Check• Device Protection

Enterprises and Service Providers need to address all four

dimensions of mobile device management and security

Page 8: Byod four steps to enabling your network michael greco

EVOLVING AND EXPANDING BATTLEFRONTS

THE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKS

8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Inadequate Inadequate

security on security on

mobile devicesmobile devices

Diverse Diverse

user user

profilesprofiles

Device Device

and OS and OS

proliferationproliferation

Increasing Increasing

implementation implementation

pointspoints

Page 9: Byod four steps to enabling your network michael greco

THE THREATS GROW

TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS

9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Source: Juniper Networks Mobile Threats Report 2011

Page 10: Byod four steps to enabling your network michael greco

SO, WHAT ARE THE THREATS?

Malware – Viruses, Worms, Trojans, Spyware

Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS

Loss and Theft –

10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Copyright 2008 SMobile SystemsPage 10

Loss and Theft – Accessing sensitive data

Data Communication Interception –Sniffing data as it is transmitted and received

Exploitation and Misconduct –Online predators, pornography, inappropriate communications, data leakage

Page 11: Byod four steps to enabling your network michael greco

ADDRESSING BYOD DRIVERS

User Productivity Economics+

11Mobile Device

Proliferation

22Network and Application

11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Juniper Confidential

22 Application Access

33 Consistent Security

44 ComprehensiveManagement

Page 12: Byod four steps to enabling your network michael greco

THE STEPS TO SECURE BYOD

Deliver secure, consistent authentication, authorization and access

Deliver secure, consistent authentication, authorization and access

22

Provide a safe, device-agnostic connection everywhereProvide a safe, device-agnostic connection everywhere11

12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

accessaccess

Protect the user, their device and data and your network, apps and data

Protect the user, their device and data and your network, apps and data

Simply manage the user, the device, their apps and their accessSimply manage the user, the device, their apps and their access

33

44

Page 13: Byod four steps to enabling your network michael greco

ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE

� Users can choose and change their mobile devices

� Manage the connection, access and the device

� Enable user self-provisioning

� Security works the sameon premises and off

13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Page 14: Byod four steps to enabling your network michael greco

ADDRESSING PERSONAL MOBILE DEVICE USE

Manage personal

mobile devices, network / resource access, apps and users

Protect personal mobile devices

and apps, as well as corporate networks, resources and data

14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

CONNECT

Connect personal mobile

devices to corporate networks, clouds, resources and data simply and securely

users comprehensively

SMBs, Enterprises and Government

Page 15: Byod four steps to enabling your network michael greco

CONNECTSECURE MOBILE REMOTE ACCESS

SECURE DATA IN TRANSIT toprotect against hacks and data

theft

SUPPORT EXISTING AUTHENTICATION METHODS,

15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

AUTHENTICATION METHODS,

including multi-factor authentication

IDENTITY-ENABLED mobile,

remote network and application

access

CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network

Page 16: Byod four steps to enabling your network michael greco

PROTECTMOBILE DEVICE SECURITY

ANTI-MALWARE which scans all files and connections – even SD

cards – with real-time updates

LOSS AND THEFT PROTECTION, including locate and track, remote

16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

including locate and track, remote

lock and wipe, alerts, and more

ANTI-SPAM to block SMS and

voice spam, with automatic denial

options

MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters

Page 17: Byod four steps to enabling your network michael greco

MANAGEUSER, DEVICE AND APP MANAGEMENT

CONFIGURE AND PROVISION accounts, security policies,

certificates…

AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending

17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

REMOVE unapproved or offending

apps

COLLECT AND REPORT on

device and compliance information,

loaded apps and more

REMOTELY MANAGE AND CONFIGURE lost/stolen devices –remote locate, track, lock, wipe…

Page 18: Byod four steps to enabling your network michael greco

JUNOS PULSE: HIGH LEVEL OVERVIEWTHE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION

Anytime, Anywhere Secure Access

• Corporate / Cloud VPN• Authentication

• Differentiated Access

Anytime, AnywhereThreat Protection

• Mobile Loss and Theft• Mobile Threat Prevention

ProtectConnect

18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Anytime, Anywhere Device and App Control

• Device Management • App Management• Content monitoring

Manage