DEFENDING THE MOBILE WORKFORCE - Aventri

Post on 10-Apr-2022

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

DEFENDING THE MOBILE WORKFORCEKarim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

THE MOBILE INTERNET IS THE NEW INTERNET

Proliferation of Devices

Content ConsumptionConnected Socialization

Number of smartphones sales to

exceed PC sales in 2012*

*Source: Morgan Stanley, 2010

3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

MALWARE HISTORY TELLS US TWO THINGS

1. Malware changes and gets more sophisticated

2. Waiting and reacting after-the-fact can be costly

2009

Mobile Malware

SMS Trojan – „09

Symbian,

July, „10 Android

1995

Macro Viruses

Concept „95

Melissa „99

2001

Network Worm

Code Red „01

Nimda „01

1981

Executable Boot

Sector Infections

Elk Cloner

(Apple II) „81

1986

Executable Boot

Sector Infections

Brain Boot Sector

(PC) „86

1988

Fred Cohen"On the implications of

Computer Viruses and Methods

of Defense"

Academic

Foundation

Theory of self-

reproducing automata

John von Neumann,

Institute for Advanced

Study Site Y

Los Alamos

1966

1990

Anti-Virus Firms20 + anti-virus firms

‘88 ‘90

‘66 ‘81 ‘86 ‘95 ‘01 ‘09

4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

WHAT IS MISSING FROM MOBILE SECURITY?

5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE

Sources: KRC Research and Juniper Mobile Threat Center

40%use their smartphone

for both personal

and business

72%share or access sensitive

info such as banking, credit

card, social security,

medical records

80%access their employer‟s

network without permission –

59% do it everyday

50%+are very concerned about

loss, theft and identity

theft resulting from their

mobile usage

6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Notebook

Netbook

Smartphone

Tablet

HQ

Local Office

Global High-Performance Network

Secure Mobile Devices Secure Connectivity Secure Apps

DEFEND YOUR MOBILE LIFE

7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Wipe data and access rights from

lost and stolen devices remotely

Combine security and access in a

single client

Enforce policies across all devices

attached to the network

Reduce IT overhead by better

managing complexity

SECURING MOBILE DEVICES: KEY ENTERPRISE REQUIREMENTS

8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICES KEY ELEMENTS

Antivirus

Real-time protection

Auto updates

Scan all files

All connections

Personal

Firewall

Inbound & outbound filtering

Alerts & logging

Customizable

Anti SpamBlock SMS and voice spam

Blacklist filtering

Disable alerts options

Automatic denial options

Loss & Theft

Protection

Remote lock & wipe

Backup and restore

GPS locate

SIM change notification

Device

ControlApp inventory and control

Content monitoring

Se

cu

re A

cce

ss

9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICESLOCAL VS. CLOUD

Antivirus

Personal

Firewall

Anti Spam

Loss & Theft

Protection

Device

Control

Se

cu

re A

cce

ss

On Site

or

On Device

On Device

On Device

10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

REQUIREMENT: BROAD MOBILE PLATFORM SUPPORT

SECURING MOBILE DEVICES (CONT.)

11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURE CONNECTIVITY

Providing anyone a secure experience from any device from any location to any resource

12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURE CONNECTIVITY (CONT.)

Why haven‟t businesses supported all devices?

Lack of encryption

No multifactor authentication

Inconsistent security policies

Wide range of backend

applications

Personal

SmartphonesIssued

Smartphones

# o

f D

evic

es

13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Unmanaged

Devices

Diverse

Users/Locations/Networks

Critical

Resources

Intranet

Finance

Case

Tracking

How do you ensure ONLYthe right users are accessing resources?

SECURE APPLICATIONS

14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

WHAT DOES THE FUTURE HOLD?

Smart devices will

become the target of

choice for attacks

Attack vectors will

continue to evolve

within smart devices

Personal information

will be used for more

“front-door attacks,”

15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

THANK YOU

top related