DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Similar documents
JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

Securing Today s Mobile Workforce

Junos Pulse for Google Android

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Kaspersky Mobile Security 9. Reviewer s Guide

Course Outline (version 2)

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

For Businesses with more than 25 seats.

Junos Pulse Mobile Security Dashboard

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

ESET Secure Business. Simple and Straightforward

How To Remove Personal Antivirus Security Pro Virus Manually

Get BitDefender Client Security 2 Years 30 PCs software suite ]

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

EMERGING THREATS & STRATEGIES FOR DEFENSE. Paul Fletcher Cyber Security

CHALLENGES. Debbie Montano Chief Architect, Gov t, Education & Medical

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Changing face of endpoint security

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Information Security BYOD Procedure

Junos Pulse Mobile Security Dashboard

Kaspersky Small Office Security 5. Product presentation

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Mobile Devices prioritize User Experience

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Exclusive Selling Mobility with Security

ECDL / ICDL IT Security. Syllabus Version 2.0

CompTIA A+ Certification ( ) Study Guide Table of Contents

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

EM L01 Introduction to Mobile

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

for businesses with more than 25 seats

Mobile Security using IBM Endpoint Manager Mobile Device Management

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Office 365 Integration Guide Software Version 6.7

SECURE USE OF IT Syllabus Version 2.0

Mobile Security / Mobile Payments

Top Ten IT Security Risks CHRISTOPHER S. ELLINGWOOD SENIOR MANAGER, IT ASSURANCE SERVICES

Extending Enterprise Applications to Mobile - Key Considerations. Zensar Technologies Sep 2011

Bring Your Own Device

Securing the SMB Cloud Generation

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Data Protection in Practice

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms

Quick Heal Mobile Device Management. Available on

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

for businesses with more than 25 seats

Personal Cybersecurity

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Seqrite Endpoint Security

Enterprise Security Solutions by Quick Heal. Seqrite.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Comodo Mobile Security for Android Software Version 2.5

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

How To Remove Personal Antivirus Security Pro Virus Windows 8

Mobile software security Building trust in mobile apps


Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

IAM Security & Privacy Policies Scott Bradner

Mobile Security for Android devices

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

ConnectWise Automate. What is ConnectWise Automate?

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

BYOD: BRING YOUR OWN DEVICE.

<Criminal Justice Agency Name> Personally Owned Device Policy. Allowed Personally Owned Device Policy

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Future-ready security for small and mid-size enterprises

Kaspersky Open Space Security

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

10 Quick Tips to Mobile Security

Defend what you create. Why Dr.Web

How To Remove Personal Antivirus Security Pro Virus

Securing Multiple Mobile Platforms


Securing Enterprise or User Brought mobile devices


SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

24/7 Instant Technical Support Designed for Non-Geeks

Mobility, Security Concerns, and Avoidance

Make security part of your client systems refresh

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

10 Hidden IT Risks That Might Threaten Your Business

Transcription:

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

THE MOBILE INTERNET IS THE NEW INTERNET Proliferation of Devices Number of smartphones sales to exceed PC sales in 2012* Connected Socialization Content Consumption 2 Copyright 2011 Juniper Networks, Inc. www.juniper.net *Source: Morgan Stanley, 2010

MALWARE HISTORY TELLS US TWO THINGS 1. Malware changes and gets more sophisticated 1966 1981 1986 1995 2001 2009 Academic Foundation Theory of selfreproducing automata John von Neumann, Institute for Advanced Study Site Y Los Alamos Executable Boot Sector Infections Elk Cloner (Apple II) 81 Executable Boot Sector Infections Brain Boot Sector (PC) 86 Macro Viruses Concept 95 Melissa 99 Network Worm Code Red 01 Nimda 01 Mobile Malware SMS Trojan 09 Symbian, July, 10 Android 66 81 86 95 01 09 88 90 Fred Cohen "On the implications of Computer Viruses and Methods of Defense" 1988 Anti-Virus Firms 20 + anti-virus firms 1990 2. Waiting and reacting after-the-fact can be costly 3 Copyright 2011 Juniper Networks, Inc. www.juniper.net

WHAT IS MISSING FROM MOBILE SECURITY? 4 Copyright 2011 Juniper Networks, Inc. www.juniper.net

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% use their smartphone for both personal and business 72% share or access sensitive info such as banking, credit card, social security, medical records 80% access their employer s network without permission 59% do it everyday 50%+ are very concerned about loss, theft and identity theft resulting from their mobile usage 5 Copyright 2011 Juniper Networks, Inc. www.juniper.net Sources: KRC Research and Juniper Mobile Threat Center

DEFEND YOUR MOBILE LIFE Secure Mobile Devices Secure Connectivity Secure Apps Global High-Performance Network Notebook Netbook Smartphone HQ Tablet Local Office 6 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICES: KEY ENTERPRISE REQUIREMENTS Wipe data and access rights from lost and stolen devices remotely Combine security and access in a single client Enforce policies across all devices attached to the network Reduce IT overhead by better managing complexity 7 Copyright 2011 Juniper Networks, Inc. www.juniper.net

Secure Access SECURING MOBILE DEVICES KEY ELEMENTS Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Anti Spam Block SMS and voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock & wipe Backup and restore GPS locate SIM change notification Device Control App inventory and control Content monitoring 8 Copyright 2011 Juniper Networks, Inc. www.juniper.net

Secure Access SECURING MOBILE DEVICES LOCAL VS. CLOUD Antivirus On Device Personal Firewall On Device Anti Spam On Device On Site Loss & Theft Protection or Device Control 9 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICES (CONT.) REQUIREMENT: BROAD MOBILE PLATFORM SUPPORT 10 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE CONNECTIVITY Providing anyone a secure experience from any device from any location to any resource 11 Copyright 2011 Juniper Networks, Inc. www.juniper.net

# of Devices SECURE CONNECTIVITY (CONT.) Why haven t businesses supported all devices? Lack of encryption No multifactor authentication Inconsistent security policies Wide range of backend applications Personal Smartphones Issued Smartphones 12 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE APPLICATIONS Intranet Finance Case Tracking Unmanaged Devices Diverse Users/Locations/Networks Critical Resources How do you ensure ONLY the right users are accessing resources? 13 Copyright 2011 Juniper Networks, Inc. www.juniper.net

WHAT DOES THE FUTURE HOLD? Smart devices will become the target of choice for attacks Attack vectors will continue to evolve within smart devices Personal information will be used for more front-door attacks, 14 Copyright 2011 Juniper Networks, Inc. www.juniper.net

THANK YOU 15 Copyright 2011 Juniper Networks, Inc. www.juniper.net