JUNIPER NETWORKS CONFIDENTIAL JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY Sales Presentation – Enterprise Edition

Embed Size (px)

Citation preview

  • Slide 1

JUNIPER NETWORKS CONFIDENTIAL JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY Sales Presentation Enterprise Edition Slide 2 2 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 1 MOBILE SECURITY TRENDS AND CHALLENGES 2 JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE 3 4 SUMMARY COMPETITIVE POSITION Slide 3 3 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 1 MOBILE SECURITY TRENDS AND OPPORTUNITY Slide 4 4 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAY'S MOBILE, ALWAYS ON/ALWAYS CONNECTED LIFE Proliferation of Devices Content Consumption Connected Socialization *Source: Morgan Stanley, 2010 Number of smartphones sales to exceed PC sales in 2012* Slide 5 5 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAYS MOBILE WORKFORCE NEEDS/DEMANDS ANY Device ANY Location ANY Application Slide 6 6 Copyright 2010 Juniper Networks, Inc. www.juniper.net TODAYS MOBILE WORKFORCE CHALLENGES Multiple types of devices and service providers Multiple device owners Personal devices used for work BYOD; Work devices used for personal activities Personal devices used for work BYOD; Work devices used for personal activities Users download ill-secured apps and store data on unsecured/ill-secured devices Users demand to use devices to fullest potential Slide 7 7 Copyright 2010 Juniper Networks, Inc. www.juniper.net THE NEW SECURITY LANDSCAPE AttackerThreatsTarget.gov/.com.me/.you Attackers are using new indirect techniques to bypass perimeter security Attackers gain control of user devices Once inside, they go after sensitive data and intellectual property Data Center Assets Malware Slide 8 8 Copyright 2010 Juniper Networks, Inc. www.juniper.net THE GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SECURE Slide 9 9 Copyright 2010 Juniper Networks, Inc. www.juniper.net Copyright 2008 SMobile Systems Page 9 Mobile Security Threat Environment MOBILE SECURITY THREAT LANDSCAPE Malware Viruses, Worms, Trojans, Spyware Malware Viruses, Worms, Trojans, Spyware Loss and Theft Loss or inappropriate access of sensitive data Loss and Theft Loss or inappropriate access of sensitive data Data Communication Interception Sniffing data as it is transmitted and received Data Communication Interception Sniffing data as it is transmitted and received Exploitation and Misconduct Online predators, pornography, inappropriate communications, data leakage Exploitation and Misconduct Online predators, pornography, inappropriate communications, data leakage Direct Attack Attacking device interfaces, Network DoS, Malicious SMS Direct Attack Attacking device interfaces, Network DoS, Malicious SMS Slide 10 10 Copyright 2010 Juniper Networks, Inc. www.juniper.net MOBILE SECURITY ENTERPRISE VALUE PROPOSITION AND PRODUCT STRATEGY Enables increased productivity Allows for heterogeneous mobile environment Facilitates compliance with internal and external regulations Protects enterprise network and data Slide 11 11 Copyright 2010 Juniper Networks, Inc. www.juniper.net THREE PILLARS OF SECURING MOBILITY MOBILE DEVICE MANAGEMENT AND CONTROL SECURE CONNECTIVITY MOBILE DEVICE SECURITY Slide 12 12 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 2 JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE Slide 13 13 Copyright 2010 Juniper Networks, Inc. www.juniper.net DESIGNED TO PROVIDE: Secure Mobile Office (enterprise, prosumer) AND Secure Mobile Experience (enterprise, prosumer, consumer): Granular, role-based, secure VPN for mobile devices Comprehensive security from malware, viruses, spam, loss and theft Robust mobile device management, configuration and control Apple iOS (iPhone and iPad) Google AndroidWindows MobileNokia SymbianBlackBerry JUNIPER NETWORKS SECURING MOBILITY Broad, comprehensive mobile platform support Slide 14 14 Copyright 2010 Juniper Networks, Inc. www.juniper.net Protect Connect Manage JUNOS PULSE: COMPREHENSIVE SOLUTION FOR SECURING MOBILITY Anytime, Anywhere Device and App Management Device Management Application Management Content Monitoring Anytime, Anywhere Secure Access Corporate Networks Cloud/Service Provider Anytime, Anywhere Threat Protection Mobile Loss and Theft Mobile Threat Prevention Slide 15 15 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE ENABLING SIMPLE, SECURE CONNECTIVITY Complete enterprise- user application portal Dynamic, role-based application menu tightly integrated with user identity and device type Centralizes links to email, web applications/intranet, etc. Provisioned via respective Application Stores Designed for minimal user interaction Autoboot upon device restart Slide 16 16 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE SECURING CONNECTIVITY Covers the range of application access requirements Full Layer 3 Tunnel Secure Email (secure ActiveSync proxy) Web VPN (browser-based applications) Unparalleled Data in Transit security Leverages SSL VPN Multi-factor authentication Granular auditing and logging Slide 17 17 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE MOBILE SECURITY SUITE AND THE ENTERPRISE Junos Pulse Mobile Security Suite Protects corporate data with centralized control Addresses the consumerization of IT challenges and BYOD Saves cost by supporting existing smartphones, tablets and mobile devices Slide 18 18 Copyright 2010 Juniper Networks, Inc. www.juniper.net Full Layer 3 Tunnel Secure Email (ActiveSync proxy) Web VPN (browser-based apps) JUNIPER NETWORKS JUNOS PULSE CONNECT. PROTECT. CONTROL. Secure Remote Access (MAG Series Junos Pulse Gateway ) Slide 19 19 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE MOBILE SECURITY SUITE WHATS NEW IN VERSION 3.0 Mobile device configuration and management capabilities for Apple iOS devices* Manage and secure Apple iPhones, iPads and iPod touch devices connecting to a network Enforce and set passcode policies Provision and remove Microsoft Exchange profiles Provision VPN and Wi-Fi settings Perform remote locate and track and remote lock and wipe of a lost or stolen mobile device Inventory and restrict applications Layer 3 SSL VPN integration, automatic application revocation and removal for specific Google Android devices** Samsung mobile devices running Android 2.3.4+, among others * Due to Apple licensing restrictions, Junos Pulse Mobile Security Suite MDM functionality for Apple iOS devices requires membership in the Apple iOS Enterprise Developer Program (http://developer.apple.com/programs/ios/enterprise/)http://developer.apple.com/programs/ios/enterprise/ ** Please refer to the posted supported platforms document for supported Android devices Slide 20 20 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE MOBILE SECURITY SERVICES *Available from www.juniper.net/support/products/pulse/mobile/#swwww.juniper.net/support/products/pulse/mobile/#sw **Junos Pulse for Nokia Symbian available in 1H 2012 Slide 21 21 Copyright 2010 Juniper Networks, Inc. www.juniper.net BENEFITS SECURING MOBILITY FOR ALL ENTERPRISE MOBILE DEVICE USERS Secures personal mobile devices, addressing "Bring Your Own Device" (BYOD) Eases mobile device management (MDM) burden Extends security policies to all mobile devices on a network Enables data to be wiped and device locked if lost or stolen Slide 22 22 Copyright 2010 Juniper Networks, Inc. www.juniper.net PROTECTING TODAYS MOBILE, GLOBAL LIFE For Service Providers Protect your network Monetize mobile services Differentiate your offering Scale with a single solution For The Enterprise Secure access with SSL VPN Enforce IT policies Protect against malware Reduce IT overhead Prevent data/device loss For Consumers Defend kids against cyber misuse and abuse Protect against malware Wipe content and contacts if device lost or stolen Wipe content and contacts if device lost or stolen Delivers secure connectivity, mobile device security and device management Slide 23 23 Copyright 2010 Juniper Networks, Inc. www.juniper.net Junos Pulse SSL VPN Junos Pulse JUNOS PULSE AND JUNOS PULSE MOBILE SECURITY SUITE ARCHITECTURE Corporate Applications (of any type) Hardware or Virtual Appliance Deployment Secure, Hosted Deployment (SaaS) Datacenter Secure Connectivity Mobile Device Security and Management Junos Pulse Mobile Security Suite Junos Pulse Mobile Security Gateway Slide 24 24 Copyright 2010 Juniper Networks, Inc. www.juniper.net Centralized Administration Configure, Control and Report on all security activities and policies from a single interface JUNOS PULSE MOBILE SECURITY SUITE MANAGEMENT Detailed Reporting Real-time reporting provides usable data to determine the current security state of mobile devices Detailed Reporting Real-time reporting provides usable data to determine the current security state of mobile devices Easy Deployment Securely hosted by Juniper for quick seamless deployment Management Easily implement endpoint firewall rules, set frequency of AV updates and scans, and issue commands to update or locate a device Management Easily implement endpoint firewall rules, set frequency of AV updates and scans, and issue commands to update or locate a device Slide 25 25 Copyright 2010 Juniper Networks, Inc. www.juniper.net Deployment Size: 100,000 devices globally Juniper was selected after a rigorous technical bake-off, against IBMs incumbent desktop security providers: McAfee, Symantec, and Trend Micro Extending Corporate Access Key Market Decision Factors Extending Corporate Services Proliferation of Smartphone Usage Increased Security Threats Adherence to Internal Security Policies Key Product Decision Factors Cross Platform Support Solution Manageability Ease of Deployment Technology Performance Vendor Expertise IBM ENTERPRISE CASE STUDY Slide 26 26 Copyright 2010 Juniper Networks, Inc. www.juniper.net Page 26 Exploit Research and Development Complete threat analysis against all exploit vectors Continual assessment of new mobile devices and platforms Knowledge-share with worldwide device exploit network Malware Operation Center Actively monitor Junos Pulse customer malware alerts, reports and trends Monitor and scan publicly submitted malware samples Scan partner feeds for discovered/recent viruses, spyware, etc. Continually monitors underground and public malware bulletin boards, websites, newsgroups, etc. JUNIPER NETWORKS GLOBAL THREAT CENTER Marine Computer Emergency Response Center Leadership Numerous Phd.s, published authors CISSPs, CEHs, CHFIs and CWNAs Team members in Ohio, California, Florida, Massachusetts, England, Sweden, India, Japan Worldwide 24/7 Team of Leading Security Experts Slide 27 27 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 3 COMPETITIVE POSITION Slide 28 28 Copyright 2010 Juniper Networks, Inc. www.juniper.net KEY CUSTOMER CONSIDERATIONS How and when will you support smartphones/tablets on your secure intranet/networks? Will you support personal mobile devices? Which mobile device or mobile OS is/will be dominant in your environment and why? Would you prefer to implement a mobile security solution internally, or a cloud-based mobile security from a service provider? Are you considering monitoring non-issued smart devices for compliance reasons? Slide 29 29 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNOS PULSE COMPETITIVE POSITIONING The only company able to deliver secure, mobile, remote SSL VPN access to enterprise networks based on application need Based on Junipers industry- and market-leading SSL VPN products A single client for securing mobile connectivity and delivering mobile security (Junos Pulse) Support for all major mobile operating systems and devices Purpose-built, heuristics-based antivirus/anti-malware for mobile devices Focused on mobile security while addressing/delivering core MDM capabilities (remote lock, wipe, etc.) Doesnt force replacement of, but instead leverages and augments and secures existing mobile services and processes, as well as authentication means Slide 30 30 Copyright 2010 Juniper Networks, Inc. www.juniper.net MOBILE SECURITY MANAGEMENT VS. MOBILE DEVICE MANAGEMENT Multiple types of mobile software combine to deliver a complete MDM solution May include telecom expense management, software distribution, policy management, inventory management and service management There may be some overlap between mobile security and MDM, but they are inherently different Mobile security may be defined as anti-malware and related capabilities which protect a mobile device such as a smartphone, tablet, and so on from malware, exploit, hack, and threat BOTH mobile security management (MSM) AND MDM are necessary! One protects the device and enterprise from infection and exploit, the other ensures policies and enforcement Slide 31 31 Copyright 2010 Juniper Networks, Inc. www.juniper.net Parental Controls App Control/Removal Security Event Reporting Device Registration Reporting API for OSS Integration Cloudbased Offering SSL VPN for Mobile Devices Antivirus Firewall Anti-spam Lock/Wipe, Backup/Restore Advanced MDM GPS Locate/Track Good SymantecMcAfee * Junos Pulse F-Secure Mobile Iron JUNOS PULSE MOBILE SECURITY SUITE COMPETITIVE FEATURE COMPARISON * For Apple iOS and select Android devices Slide 32 32 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNIPER NETWORKS MOBILE SECURITY STRATEGY Device Threat Security Secure Connectivity Device Management App and Content Control Mobile Device Security Network Infrastructure Next Generation Platform Mobile Infrastructure Service Consolidation and Scale Performance Drivers Scale Throughput and Sessions Signaling and Control Plane Security Secure Mobile Infrastructure Virtual Security Data Center Fabric Integration Scale Identity Data Center Security Application AppSecure Strategy User Mapping to Application Mobile App Control Application Security Slide 33 33 Copyright 2010 Juniper Networks, Inc. www.juniper.net AGENDA 4 SUMMARY Slide 34 34 Copyright 2010 Juniper Networks, Inc. www.juniper.net SECURE, SCALABLE MOBILITY Mobile threats are pervasive and escalating Un-/ill-secure personal mobile devices access networks and resources BYOD Consumerization of IT places heavy burden on mobile device security/ management Junipers Junos Pulse solution delivers Secure Mobility and Peace of Mind CONNECT. Secure Connectivity PROTECT. Mobile Threat Prevention and Protection MANAGE. Mobile Device Configuration and Management Slide 35 Slide 36 36 Copyright 2010 Juniper Networks, Inc. www.juniper.net ADDITIONAL SLIDES Slide 37 37 Copyright 2010 Juniper Networks, Inc. www.juniper.net Region200920102011201220132014 CAGR (09-14) North America 3.03.64.76.69.212.833.7% Western Europe 4.16.88.110.614.820.738.5% Eastern Europe 0.30.40.50.81.21.842.5% Asia- Pacific 4.56.28.712.217.124.040.0% Latin America 0.1 0.2 0.339.8% Middle East & Africa 0.1 0.2 0.30.430.6% SMARTPHONE SECURITY SUBSCRIBERS FORECAST Smartphone Security Subscribers by Region, World Market, Forecast: 2009 to 2014 Source: ABI Research Slide 38 38 Copyright 2010 Juniper Networks, Inc. www.juniper.net SMARTPHONE SECURITY REVENUE FORECAST Segment200920102011201220132014 CAGR (09-14) Smartphone Security Services (Enterprise) 4415657209071,1291,38225.7% Smartphone Security Services (Carriers) 2944637201,1081,6932,56754.3% Client Application Software 8611114518122628227.0% Smartphone Security Revenue, World Market, Forecast: 2009 to 2014 ($ Millions) Source: ABI Research Slide 39 39 Copyright 2010 Juniper Networks, Inc. www.juniper.net MDM Vendors Legacy PC Security Vendors Service Provider Value Device Management Anti-Theft, Monitor and Control AV, FW, Anti-Spam Management Console COMPLETE SECURITY ECOSYSTEM MOBILE SECURITY PRODUCT STRATEGIES Slide 40 40 Copyright 2010 Juniper Networks, Inc. www.juniper.net JUNIPER NETWORKS PROFESSIONAL SERVICES SERVICE PROVIDER COMMON TASKS OSS/BSS Integration Integration with current systems using Junos Pulse APIs (i.e., ordering, provisioning, registration and billing) Implementation Architecting and designing on-premise installations of Junos Pulse Mobile Security Suite management Installing Junos Pulse Mobile Security Suite management console on-premise Includes future Virtual Machine support and custom solutions Localization Modification of the client and server interfaces to support currently unsupported languages and themes Slide 41 41 Copyright 2010 Juniper Networks, Inc. www.juniper.net Key Market Decision Factors 5 Million Existing Broadband Customers AV and FW Embedded on Every Device Cost Included in Data Plan No Charge to End User Market Differentiation Key Product Results 2% Real Malware Reduction 10% Effective Malware Reduction Ease of Deployment Low CAPEX Pay as You Grow BT Total Broadband Anywhere BT Total Broadband Anywhere bundles home broadband service with latest smart phones, such as the award winning HTC Hero. These handsets give consumers email and high-speed internet access on the move. They will work anywhere on the Vodafone wireless network and also connect to Wi-Fi hotspots for even faster speeds. BT CONSUMER CASE STUDY Slide 42