+ All Categories
Home > Business > Junos Pulse Mobile Security Suite Launch

Junos Pulse Mobile Security Suite Launch

Date post: 09-May-2015
Category:
Upload: juniper-networks
View: 3,219 times
Download: 0 times
Share this document with a friend
Description:
Presentation announcing Juniper's new Junose Pulse mobile security suite. Originally presented October 26, 2010.
47
THE NEW NETWORK IS MOBILE Follow @JuniperNetworks Hashtag: #Junos
Transcript
Page 1: Junos Pulse Mobile Security Suite Launch

THE NEW NETWORK IS MOBILE

Follow @JuniperNetworks

Hashtag: #Junos

Page 2: Junos Pulse Mobile Security Suite Launch

2

Page 3: Junos Pulse Mobile Security Suite Launch

INTRODUCING

Lauren Flaherty

Chief Marketing Officer

Page 4: Junos Pulse Mobile Security Suite Launch

4

Page 5: Junos Pulse Mobile Security Suite Launch

THE NEW NETWORK IS MOBILE

Kevin Johnson

Chief Executive Officer

Page 6: Junos Pulse Mobile Security Suite Launch

6

THE MOBILE INTERNET IS THE NEW INTERNET

Proliferation of Devices

Content ConsumptionConnected Socialization

*Source: Morgan Stanley, 2010

Number of smartphones sales to exceed PC sales in 2012*

Page 7: Junos Pulse Mobile Security Suite Launch

7

THE IMPLICATIONS ARE SIGNIFICANT

8158

Access without permissionAccessing daily without permission

% %

Enterprise

Cloud services

Mobile deviceService provider

Mobile devices without permission are connecting to the network

40% use the same smartphone for both business and personal

Across a network that is no longer self-contained

For Enterprises Personal devices “sneaking” onto the network New threat vectors Strain on IT support

For Service Providers Multiple points of vulnerability Currently only fragmented security solutions CAPEX and OPEX impact

For Consumers Sensitive personal info exposed Theft/loss and malware threats Children need protection

Source: KRC Research and Juniper Mobile Threat Center

Source: KRC Research and Juniper Mobile Threat Center

Page 8: Junos Pulse Mobile Security Suite Launch

8

AND AS AN INDIVIDUAL…

Page 9: Junos Pulse Mobile Security Suite Launch

9

MALWARE HISTORY TELLS US TWO THINGS

1. Malware changes and gets more sophisticated

2. Waiting and reacting after-the-fact can be costly

2009

Mobile Malware

SMS Trojan – ‘09 Symbian,

July, ‘10 Android

1995

Macro Viruses

Concept ‘95Melissa ‘99

2001

Network Worm

Code Red ‘01Nimda ‘01

1981

Executable Boot Sector Infections

Elk Cloner (Apple II) ‘81

1986

Executable Boot Sector Infections

Brain Boot Sector (PC) ‘86

1988

Fred Cohen"On the Implications of

Computer Viruses and Methods of Defense"

Academic FoundationTheory of self-

reproducing automata,John von Neumann,

Institute for Advanced Study Site Y,Los Alamos

1966

1990

Anti-Virus Firms20+ anti-virus firms

‘88 ‘90

‘66 ‘81 ‘86 ‘95 ‘01 ‘09

Page 10: Junos Pulse Mobile Security Suite Launch

10

IT IS TIME TO SET THE MOBILITY SECURITY AGENDA

1. Protection at all points – device, network, applications

2. Support across all mobile OS/devices

3. Extensible

4. User friendly

5. Easy to administer

5 principles for delivering mobile security:

Page 11: Junos Pulse Mobile Security Suite Launch

11

With the EnterpriseWith Service Providers

JUNIPER STARTS WITH MOBILE SECURITY LEADERSHIP IN THE NETWORK

First to support smartphones with security

and access control

Juniper secures the majority of smartphone

traffic in the US

Covering 76% of all smartphones worldwide

24 of Fortune 25 using to enable employees and

protect the network

Mobile packet core

SRX SRX

VPN

SGSN GGSN Router

Corporate networks

Corporate OfficesSRX Data Centers

Branches

Page 12: Junos Pulse Mobile Security Suite Launch

12

Comprehensive Scope

Ecosystem ExtensibilityPlatform Based, Cross OS

AND EXTENDS THAT LEADERSHIP USING THREE STRATEGIES

Simplify administration and use

1

On the Client

Innovation ecosystem

End-user device

In the Network

Software

System

Silicon

Build security in

2 3

Anticipate threat vectors

Device, Network, App and Data Mobile Device, Network Trafficand Data Center

Page 13: Junos Pulse Mobile Security Suite Launch

13

THE NEW NETWORK IS MOBILE

New NetworkEcosystem InnovationNetwork Innovation

Reliable

Fast

Scalable

Simple

Secure

High Performance Networking

Profitable

Versatile

Dynamic

Open

Partner Solutions

$

New, better experiences

New flexibility & agility

New customer solutions

New revenue sources

Accelerated Innovation & Competition Drives…

Page 14: Junos Pulse Mobile Security Suite Launch

14

Antivirus

Personal firewall

Anti-spam

Monitoring and control services

Remote backup and restore

Device locator

Secure corporate network access

Parental controls

Cross OS/Cross device

TODAY’S ANNOUNCEMENTS

Junos Pulse Mobile Security Suite, the mostcomprehensive security software for protecting all smartphones

1

Juniper Global Threat Center, around-the-clock, global monitoring of mobile security threats to consumers and enterprises

Securing enterprises and consumers, enabling end-point security directly and with our service provider partners

2

3

Page 15: Junos Pulse Mobile Security Suite Launch

15

CUSTOMERS AND PARTNERS PARTICIPATING

David P Merrill

Strategist, IBM Chief Information Security Office

Marc J. Patterson

General Manager, Mobile Data Services

John Donovan

Chief Technology Officer

Page 16: Junos Pulse Mobile Security Suite Launch

VIDEO – JOHN DONOVAN

Page 17: Junos Pulse Mobile Security Suite Launch

INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE

Mark Bauhaus

Executive Vice President and General Manager

Service Layer Technology Business Group

Page 18: Junos Pulse Mobile Security Suite Launch

18

?WHAT IS MISSING FROM MOBILE SECURITY?

Page 19: Junos Pulse Mobile Security Suite Launch

19

THIS IMPACTS ALL CUSTOMERS

For Enterprises For Service Providers For Consumer

31%Compromised security in 20091

86%Security high or critical priority1

25%Not corporate-standard or managed smartphones1

40%Use same smartphone for business and personal2

2 MillionStolen smartphone in the US4

80%Store personal information(24% store banking info) 4

24%Teens admit to sending inappropriate content 4

32%Online teens contacted by strangers4

1/3Of world’s workforce by 20131

1BillionMobile workers in 20101

2xIncrease in users requiring data access by 20133

0Capability to solve the problem today2

Source:1 Forester Research2 Juniper Networks3 IDC4 Credant Technologies

Page 20: Junos Pulse Mobile Security Suite Launch

20

INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE

Anti-spam

Personal Firewall

Antivirus

Loss/Theft Protection

Device MonitoringAnd Control

Page 21: Junos Pulse Mobile Security Suite Launch

21

For The Enterprise

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Wipe data and access rights from lost and stolen devices remotely

Combine security and access in a single client

Enforce policies across all devices attached to the network

Reduce IT overhead by better managing complexity

Page 22: Junos Pulse Mobile Security Suite Launch

22

For Service Providers

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Monetize innovative smartphone security services

Scale across all customers with a single solution

Offer both managed and self-managed solutions

Tailor offering through bundled services

Page 23: Junos Pulse Mobile Security Suite Launch

23

For Consumers

DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS

Defend kids from cyber bullying and online predators

Backup and Restore devices remotely

Find and Wipe content and contacts on demand

Protect from viruses, malware and spam

Page 25: Junos Pulse Mobile Security Suite Launch

25

NEW THREATS ARE A 24/7 SECURITY PROBLEM

Announcing - The Juniper Global Threat Center

The first and only threat and research center focused exclusively on mobility

Monitors and responds to threats and vulnerabilities

Produces on-going research

PhysicalCompromise

DirectAttack

Malware Exploitation &Misconduct

DataInterception

Page 26: Junos Pulse Mobile Security Suite Launch

26

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE

Sources: KRC Research and Juniper Mobile Threat Center

40%use their smartphone for both personal and business

52%of respondents with children rank parental controls extremely or very important.

72%share or access sensitive info such as banking, credit card, social security, medical records

81%access their employer’s network without permission –

58% do it everyday

50%+are very concerned about loss, theft and identity theft resulting from their mobile usage

1 in 5 Teens admit to sending inappropriate pictures of themselves from mobile devices

Page 27: Junos Pulse Mobile Security Suite Launch

27

Delivering Unique Value In The MarketplaceJuniper Mobile Security Solutions

JUNIPER RAISES THE STANDARD FOR MOBILE SECURITY WITH THE NEW NETWORK

First to provide security and remote access at the device, system provider and application level

Broadest support for all major mobile operating systems and platforms

World’s leading and most trusted security and access solution

Only single solution for both security and access across mobile and non-mobile devices

Secure at the device

Secure across the service provider

Secure in the enterprise

Page 28: Junos Pulse Mobile Security Suite Launch

28

WHAT CUSTOMERS SHOULD DO NEXT

http://juniper.net/

Page 29: Junos Pulse Mobile Security Suite Launch

INTRODUCING

David MerrillStrategist, Chief Information Security Office

IBM

Page 30: Junos Pulse Mobile Security Suite Launch

© 2010 IBM Corporation30

Our journey

The second mobile computing revolution

Page 31: Junos Pulse Mobile Security Suite Launch

© 2010 IBM Corporation

Is your data any less valuable because

it’s on a smartphone?

It’s all about the data …

Page 32: Junos Pulse Mobile Security Suite Launch

© 2010 IBM Corporation

Smartphone malware …

... is not an urban legend.

Page 33: Junos Pulse Mobile Security Suite Launch

© 2010 IBM Corporation

Thank you

Page 34: Junos Pulse Mobile Security Suite Launch

© 2010 IBM Corporation

Page 35: Junos Pulse Mobile Security Suite Launch

INTRODUCING

Sanjay Beri

Vice President and General Manager

Access & Acceleration Business Unit

Page 36: Junos Pulse Mobile Security Suite Launch

VIDEO – 3 SECURITY SCENARIOS

Page 37: Junos Pulse Mobile Security Suite Launch

37

Page 38: Junos Pulse Mobile Security Suite Launch

VIDEO – DEMO 1

Page 39: Junos Pulse Mobile Security Suite Launch

39

Page 40: Junos Pulse Mobile Security Suite Launch

VIDEO – DEMO 2

Page 41: Junos Pulse Mobile Security Suite Launch

41

Page 42: Junos Pulse Mobile Security Suite Launch

VIDEO – DEMO 3

Page 43: Junos Pulse Mobile Security Suite Launch

43

Page 44: Junos Pulse Mobile Security Suite Launch

INTRODUCING

Marc J. PattersonGeneral Manager, Mobile Data Services

BT Global Services

Page 45: Junos Pulse Mobile Security Suite Launch

45 Copyright © 2010 Juniper Networks, Inc. www.juniper.net

BT: Securing the Prosumer

BT has supported enabled smartphones since 2007• Provide secure end-user experience – for free

End-users are consumerizing the enterprise• Common focus across BT consumer and enterprise Mobility Services

Market opportunity

Why Juniper?• Cross-platform support• Ease of deployment• Technology performance• Relationship

• Consumer: BT Total Broadband Anywhere

• Enterprise: BT MobileXpress™

Page 46: Junos Pulse Mobile Security Suite Launch

46

Page 47: Junos Pulse Mobile Security Suite Launch

Recommended