JUNIPER NETWORKS CONFIDENTIAL JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY Sales Presentation – Enterprise Edition

  • View
    217

  • Download
    2

Embed Size (px)

Text of JUNIPER NETWORKS CONFIDENTIAL JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY Sales Presentation –...

  • Slide 1

JUNIPER NETWORKS CONFIDENTIAL JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY Sales Presentation Enterprise Edition Slide 2 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 1 MOBILE SECURITY TRENDS AND CHALLENGES 2 JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE 3 4 SUMMARY COMPETITIVE POSITION Slide 3 3 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 1 MOBILE SECURITY TRENDS AND OPPORTUNITY Slide 4 4 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAY'S MOBILE, ALWAYS ON/ALWAYS CONNECTED LIFE Proliferation of Devices Content Consumption Connected Socialization *Source: Morgan Stanley, 2010 Number of smartphones sales to exceed PC sales in 2012* Slide 5 5 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAYS MOBILE WORKFORCE NEEDS/DEMANDS ANY Device ANY Location ANY Application Slide 6 6 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAYS MOBILE WORKFORCE CHALLENGES Multiple types of devices and service providers Multiple device owners Personal devices used for work BYOD; Work devices used for personal activities Personal devices used for work BYOD; Work devices used for personal activities Users download ill-secured apps and store data on unsecured/ill-secured devices Users demand to use devices to fullest potential Slide 7 7 Copyright 2010 Juniper Networks, Inc. www.juniper.net THE NEW SECURITY LANDSCAPE AttackerThreatsTarget.gov/.com.me/.you Attackers are using new indirect techniques to bypass perimeter security Attackers gain control of user devices Once inside, they go after sensitive data and intellectual property Data Center Assets Malware Slide 8 8 Copyright 2010 Juniper Networks, Inc. www.juniper.net THE GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SECURE Slide 9 9 Copyright 2010 Juniper Networks, Inc. www.juniper.net Copyright 2008 SMobile Systems Page 9 Mobile Security Threat Environment MOBILE SECURITY THREAT LANDSCAPE Malware Viruses, Worms, Trojans, Spyware Malware Viruses, Worms, Trojans, Spyware Loss and Theft Loss or inappropriate access of sensitive data Loss and Theft Loss or inappropriate access of sensitive data Data Communication Interception Sniffing data as it is transmitted and received Data Communication Interception Sniffing data as it is transmitted and received Exploitation and Misconduct Online predators, pornography, inappropriate communications, data leakage Exploitation and Misconduct Online predators, pornography, inappropriate communications, data leakage Direct Attack Attacking device interfaces, Network DoS, Malicious SMS Direct Attack Attacking device interfaces, Network DoS, Malicious SMS Slide 10 10 Copyright 2010 Juniper Networks, Inc. www.juniper.net MOBILE SECURITY ENTERPRISE VALUE PROPOSITION AND PRODUCT STRATEGY Enables increased productivity Allows for heterogeneous mobile environment Facilitates compliance with internal and external regulations Protects enterprise network and data Slide 11 11 Copyright 2010 Juniper Networks, Inc. www.juniper.net THREE PILLARS OF SECURING MOBILITY MOBILE DEVICE MANAGEMENT AND CONTROL SECURE CONNECTIVITY MOBILE DEVICE SECURITY Slide 12 12 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 2 JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE Slide 13 13 Copyright 2010 Juniper Networks, Inc. www.juniper.net DESIGNED TO PROVIDE: Secure Mobile Office (enterprise, prosumer) AND Secure Mobile Experience (enterprise, prosumer, consumer): Granular, role-based, secure VPN for mobile devices Comprehensive security from malware, viruses, spam, loss and theft Robust mobile device management, configuration and control Apple iOS (iPhone and iPad) Google AndroidWindows MobileNokia SymbianBlackBerry JUNIPER NETWORKS SECURING MOBILITY Broad, comprehensive mobile platform support Slide 14 14 Copyright 2010 Juniper Networks, Inc. www.juniper.net Protect Connect Manage JUNOS PULSE: COMPREHENSIVE SOLUTION FOR SECURING MOBILITY Anytime, Anywhere Device and App Management Device Management Application Management Content Monitoring Anytime, Anywhere Secure Access Corporate Networks Cloud/Service Provider Anytime, Anywhere Threat Protection Mobile Loss and Theft Mobile Threat Prevention Slide 15 15 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE ENABLING SIMPLE, SECURE CONNECTIVITY Complete enterprise- user application portal Dynamic, role-based application menu tightly integrated with user identity and device type Centralizes links to email, web applications/intranet, etc. Provisioned via respective Application Stores Designed for minimal user interaction Autoboot upon device restart Slide 16 16 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE SECURING CONNECTIVITY Covers the range of application access requirements Full Layer 3 Tunnel Secure Email (secure ActiveSync proxy) Web VPN (browser-based applications) Unparalleled Data in Transit security Leverages SSL VPN Multi-factor authentication Granular auditing and logging Slide 17 17 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE MOBILE SECURITY SUITE AND THE ENTERPRISE Junos Pulse Mobile Security Suite Protects corporate data with centralized control Addresses the consumerization of IT challenges and BYOD Saves cost by supporting existing smartphones, tablets and mobile devices Slide 18 18 Copyright 2010 Juniper Networks, Inc. www.juniper.net Full Layer 3 Tunnel Secure Email (ActiveSync proxy) Web VPN (browser-based apps) JUNIPER NETWORKS JUNOS PULSE CONNECT. PROTECT. CONTROL. Secure Remote Access (MAG Series Junos Pulse Gateway ) Slide 19 19 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE MOBILE SECURITY SUITE WHATS NEW IN VERSION 3.0 Mobile device configuration and management capabilities for Apple iOS devices* Manage and secure Apple iPhones, iPads and iPod touch devices connecting to a network Enforce and set passcode policies Provision and remove Microsoft Exchange profiles Provision VPN and Wi-Fi settings Perform remote locate and track and remote lock and wipe of a lost or stolen mobile device Inventory and restrict applications Layer 3 SSL VPN integration, automatic application revocation and removal for specific Google Android devices** Samsung mobile devices running Android 2.3.4+, among others * Due to Apple licensing restrictions, Junos Pulse Mobile Security Suite MDM functionality for Apple iOS devices requires membership in the Apple iOS Enterprise Developer Program (http://developer.apple.com/programs/ios/enterprise/)http://developer.apple.com/programs/ios/enterprise/ ** Please refer to the posted supported platforms document for supported Android devices Slide 20 20 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE MOBILE SECURITY SERVICES *Available from www.juniper.net/support/products/pulse/mobile/#swwww.juniper.net/support/products/pulse/mobile/#sw **Junos Pulse for Nokia Symbian available in 1H 2012 Slide 21 21 Copyright 2010 Juniper Networks, Inc. www.juniper.net BENEFITS SECURING MOBILITY FOR ALL ENTERPRISE MOBILE DEVICE USERS Secures personal mobile devices, addressing "Bring Your Own Device" (BYOD) Eases mobile device management (MDM) burden Extends security policies to all mobile devices on a network Enables data to be wiped and device locked if lost or stolen Slide 22 22 Copyright 2010 Juniper Networks, Inc. www.juniper.net PROTECTING TODAYS MOBILE, GLOBAL LIFE For Service Providers Protect your network Monetize mobile services Differentiate your offering Scale with a single solution For The Enterprise Secure access with SSL VPN Enforce IT policies Protect against malware Reduce IT overhead Prevent data/device loss For Consumers Defend kids against cyber misuse and abuse Protect against malware Wipe content and contacts if device lost or stolen Wipe content and contacts if device lost or stolen Delivers secure connectivity, mobile device security and device management Slide 23 23 Copyright 2010 Juniper Networks, Inc. www.juniper.net Junos Pulse SSL VPN Junos Pulse JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE ARCHITECTURE Corporate Applications (of any type) Hardware or Virtual Appliance Deployment Secure, Hosted Deployment (SaaS) Datacenter Secure Connectivity Mobile Device Security and Management Junos Pulse Mobile Security Suite Junos Pulse Mobile Security Gateway Slide 24 24 Copyright 2010 Juniper Networks, Inc. www.juniper.net Centralized Administration Configure, Control and Report on all security activities and policies from a single interface JUNOS PULSE MOBILE SECURITY SUITE MANAGEMENT Detailed Reporting Real-time reporting provides usable data to determine the current security state of mobile devices Detailed Reporting Real-time reporting provides usable data to determine the current security state of mobile devices Easy Deployment Securely hosted by Juniper for quick seamless deployment Management Easily implement endpoint firewall rules, set frequency of AV updates and scans, and issue commands to update or locate a device Management Easily implement endpoint firewall rules, set frequency of AV updates and scans, and issue commands to update or locate a device Slide 25 25 Copyright 2010 Juniper Networks, Inc. www.juniper.net Deployment Size: 100,000 devices globally Juniper was selected after a rigorous technical bake-off, against IBMs incumbent desktop security providers: McAfee, Symantec, and Trend Micro Extending Corporate Access Key Market Decision Factors Extending Corporate Services Proliferation of Smartphone Usage Increased Security Threats Adherence to Internal Security Policies Key Product Decision Factors Cross Platform Support Solution Manageability Ease of Deployment Technology Performance Vendor Expertise IBM ENTERPRISE CASE STUDY Slide 26 26 Copyright 2010 Juniper Networks, Inc. www.juniper.net Page 26 Exploit Research and Development Complete threat analysis ag