Download - Junos Pulse Mobile Security Suite Launch
THE NEW NETWORK IS MOBILE
Follow @JuniperNetworks
Hashtag: #Junos
2
INTRODUCING
Lauren Flaherty
Chief Marketing Officer
4
THE NEW NETWORK IS MOBILE
Kevin Johnson
Chief Executive Officer
6
THE MOBILE INTERNET IS THE NEW INTERNET
Proliferation of Devices
Content ConsumptionConnected Socialization
*Source: Morgan Stanley, 2010
Number of smartphones sales to exceed PC sales in 2012*
7
THE IMPLICATIONS ARE SIGNIFICANT
8158
Access without permissionAccessing daily without permission
% %
Enterprise
Cloud services
Mobile deviceService provider
Mobile devices without permission are connecting to the network
40% use the same smartphone for both business and personal
Across a network that is no longer self-contained
For Enterprises Personal devices “sneaking” onto the network New threat vectors Strain on IT support
For Service Providers Multiple points of vulnerability Currently only fragmented security solutions CAPEX and OPEX impact
For Consumers Sensitive personal info exposed Theft/loss and malware threats Children need protection
Source: KRC Research and Juniper Mobile Threat Center
Source: KRC Research and Juniper Mobile Threat Center
8
AND AS AN INDIVIDUAL…
9
MALWARE HISTORY TELLS US TWO THINGS
1. Malware changes and gets more sophisticated
2. Waiting and reacting after-the-fact can be costly
2009
Mobile Malware
SMS Trojan – ‘09 Symbian,
July, ‘10 Android
1995
Macro Viruses
Concept ‘95Melissa ‘99
2001
Network Worm
Code Red ‘01Nimda ‘01
1981
Executable Boot Sector Infections
Elk Cloner (Apple II) ‘81
1986
Executable Boot Sector Infections
Brain Boot Sector (PC) ‘86
1988
Fred Cohen"On the Implications of
Computer Viruses and Methods of Defense"
Academic FoundationTheory of self-
reproducing automata,John von Neumann,
Institute for Advanced Study Site Y,Los Alamos
1966
1990
Anti-Virus Firms20+ anti-virus firms
‘88 ‘90
‘66 ‘81 ‘86 ‘95 ‘01 ‘09
10
IT IS TIME TO SET THE MOBILITY SECURITY AGENDA
1. Protection at all points – device, network, applications
2. Support across all mobile OS/devices
3. Extensible
4. User friendly
5. Easy to administer
5 principles for delivering mobile security:
11
With the EnterpriseWith Service Providers
JUNIPER STARTS WITH MOBILE SECURITY LEADERSHIP IN THE NETWORK
First to support smartphones with security
and access control
Juniper secures the majority of smartphone
traffic in the US
Covering 76% of all smartphones worldwide
24 of Fortune 25 using to enable employees and
protect the network
Mobile packet core
SRX SRX
VPN
SGSN GGSN Router
Corporate networks
Corporate OfficesSRX Data Centers
Branches
12
Comprehensive Scope
Ecosystem ExtensibilityPlatform Based, Cross OS
AND EXTENDS THAT LEADERSHIP USING THREE STRATEGIES
Simplify administration and use
1
On the Client
Innovation ecosystem
End-user device
In the Network
Software
System
Silicon
Build security in
2 3
Anticipate threat vectors
Device, Network, App and Data Mobile Device, Network Trafficand Data Center
13
THE NEW NETWORK IS MOBILE
New NetworkEcosystem InnovationNetwork Innovation
Reliable
Fast
Scalable
Simple
Secure
High Performance Networking
Profitable
Versatile
Dynamic
Open
Partner Solutions
$
New, better experiences
New flexibility & agility
New customer solutions
New revenue sources
Accelerated Innovation & Competition Drives…
14
Antivirus
Personal firewall
Anti-spam
Monitoring and control services
Remote backup and restore
Device locator
Secure corporate network access
Parental controls
Cross OS/Cross device
TODAY’S ANNOUNCEMENTS
Junos Pulse Mobile Security Suite, the mostcomprehensive security software for protecting all smartphones
1
Juniper Global Threat Center, around-the-clock, global monitoring of mobile security threats to consumers and enterprises
Securing enterprises and consumers, enabling end-point security directly and with our service provider partners
2
3
15
CUSTOMERS AND PARTNERS PARTICIPATING
David P Merrill
Strategist, IBM Chief Information Security Office
Marc J. Patterson
General Manager, Mobile Data Services
John Donovan
Chief Technology Officer
VIDEO – JOHN DONOVAN
INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE
Mark Bauhaus
Executive Vice President and General Manager
Service Layer Technology Business Group
18
?WHAT IS MISSING FROM MOBILE SECURITY?
19
THIS IMPACTS ALL CUSTOMERS
For Enterprises For Service Providers For Consumer
31%Compromised security in 20091
86%Security high or critical priority1
25%Not corporate-standard or managed smartphones1
40%Use same smartphone for business and personal2
2 MillionStolen smartphone in the US4
80%Store personal information(24% store banking info) 4
24%Teens admit to sending inappropriate content 4
32%Online teens contacted by strangers4
1/3Of world’s workforce by 20131
1BillionMobile workers in 20101
2xIncrease in users requiring data access by 20133
0Capability to solve the problem today2
Source:1 Forester Research2 Juniper Networks3 IDC4 Credant Technologies
20
INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE
Anti-spam
Personal Firewall
Antivirus
Loss/Theft Protection
Device MonitoringAnd Control
21
For The Enterprise
DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS
Wipe data and access rights from lost and stolen devices remotely
Combine security and access in a single client
Enforce policies across all devices attached to the network
Reduce IT overhead by better managing complexity
22
For Service Providers
DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS
Monetize innovative smartphone security services
Scale across all customers with a single solution
Offer both managed and self-managed solutions
Tailor offering through bundled services
23
For Consumers
DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS
Defend kids from cyber bullying and online predators
Backup and Restore devices remotely
Find and Wipe content and contacts on demand
Protect from viruses, malware and spam
24
ACROSS A BROAD, COMPREHENSIVE MOBILE PLATFORM SUPPORT
Available
Now
Available
H1 2011
In any unit quantity and subscription lengths between 1 and 3 years
25
NEW THREATS ARE A 24/7 SECURITY PROBLEM
Announcing - The Juniper Global Threat Center
The first and only threat and research center focused exclusively on mobility
Monitors and responds to threats and vulnerabilities
Produces on-going research
PhysicalCompromise
DirectAttack
Malware Exploitation &Misconduct
DataInterception
26
NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE
Sources: KRC Research and Juniper Mobile Threat Center
40%use their smartphone for both personal and business
52%of respondents with children rank parental controls extremely or very important.
72%share or access sensitive info such as banking, credit card, social security, medical records
81%access their employer’s network without permission –
58% do it everyday
50%+are very concerned about loss, theft and identity theft resulting from their mobile usage
1 in 5 Teens admit to sending inappropriate pictures of themselves from mobile devices
27
Delivering Unique Value In The MarketplaceJuniper Mobile Security Solutions
JUNIPER RAISES THE STANDARD FOR MOBILE SECURITY WITH THE NEW NETWORK
First to provide security and remote access at the device, system provider and application level
Broadest support for all major mobile operating systems and platforms
World’s leading and most trusted security and access solution
Only single solution for both security and access across mobile and non-mobile devices
Secure at the device
Secure across the service provider
Secure in the enterprise
28
WHAT CUSTOMERS SHOULD DO NEXT
http://juniper.net/
INTRODUCING
David MerrillStrategist, Chief Information Security Office
IBM
© 2010 IBM Corporation30
Our journey
The second mobile computing revolution
© 2010 IBM Corporation
Is your data any less valuable because
it’s on a smartphone?
It’s all about the data …
© 2010 IBM Corporation
Smartphone malware …
... is not an urban legend.
© 2010 IBM Corporation
Thank you
© 2010 IBM Corporation
INTRODUCING
Sanjay Beri
Vice President and General Manager
Access & Acceleration Business Unit
VIDEO – 3 SECURITY SCENARIOS
37
VIDEO – DEMO 1
39
VIDEO – DEMO 2
41
VIDEO – DEMO 3
43
INTRODUCING
Marc J. PattersonGeneral Manager, Mobile Data Services
BT Global Services
45 Copyright © 2010 Juniper Networks, Inc. www.juniper.net
BT: Securing the Prosumer
BT has supported enabled smartphones since 2007• Provide secure end-user experience – for free
End-users are consumerizing the enterprise• Common focus across BT consumer and enterprise Mobility Services
Market opportunity
Why Juniper?• Cross-platform support• Ease of deployment• Technology performance• Relationship
• Consumer: BT Total Broadband Anywhere
• Enterprise: BT MobileXpress™
46