DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit
THE MOBILE INTERNET IS THE NEW INTERNET Proliferation of Devices Number of smartphones sales to exceed PC sales in 2012* Connected Socialization Content Consumption 2 Copyright 2011 Juniper Networks, Inc. www.juniper.net *Source: Morgan Stanley, 2010
MALWARE HISTORY TELLS US TWO THINGS 1. Malware changes and gets more sophisticated 1966 1981 1986 1995 2001 2009 Academic Foundation Theory of selfreproducing automata John von Neumann, Institute for Advanced Study Site Y Los Alamos Executable Boot Sector Infections Elk Cloner (Apple II) 81 Executable Boot Sector Infections Brain Boot Sector (PC) 86 Macro Viruses Concept 95 Melissa 99 Network Worm Code Red 01 Nimda 01 Mobile Malware SMS Trojan 09 Symbian, July, 10 Android 66 81 86 95 01 09 88 90 Fred Cohen "On the implications of Computer Viruses and Methods of Defense" 1988 Anti-Virus Firms 20 + anti-virus firms 1990 2. Waiting and reacting after-the-fact can be costly 3 Copyright 2011 Juniper Networks, Inc. www.juniper.net
WHAT IS MISSING FROM MOBILE SECURITY? 4 Copyright 2011 Juniper Networks, Inc. www.juniper.net
NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% use their smartphone for both personal and business 72% share or access sensitive info such as banking, credit card, social security, medical records 80% access their employer s network without permission 59% do it everyday 50%+ are very concerned about loss, theft and identity theft resulting from their mobile usage 5 Copyright 2011 Juniper Networks, Inc. www.juniper.net Sources: KRC Research and Juniper Mobile Threat Center
DEFEND YOUR MOBILE LIFE Secure Mobile Devices Secure Connectivity Secure Apps Global High-Performance Network Notebook Netbook Smartphone HQ Tablet Local Office 6 Copyright 2011 Juniper Networks, Inc. www.juniper.net
SECURING MOBILE DEVICES: KEY ENTERPRISE REQUIREMENTS Wipe data and access rights from lost and stolen devices remotely Combine security and access in a single client Enforce policies across all devices attached to the network Reduce IT overhead by better managing complexity 7 Copyright 2011 Juniper Networks, Inc. www.juniper.net
Secure Access SECURING MOBILE DEVICES KEY ELEMENTS Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Anti Spam Block SMS and voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock & wipe Backup and restore GPS locate SIM change notification Device Control App inventory and control Content monitoring 8 Copyright 2011 Juniper Networks, Inc. www.juniper.net
Secure Access SECURING MOBILE DEVICES LOCAL VS. CLOUD Antivirus On Device Personal Firewall On Device Anti Spam On Device On Site Loss & Theft Protection or Device Control 9 Copyright 2011 Juniper Networks, Inc. www.juniper.net
SECURING MOBILE DEVICES (CONT.) REQUIREMENT: BROAD MOBILE PLATFORM SUPPORT 10 Copyright 2011 Juniper Networks, Inc. www.juniper.net
SECURE CONNECTIVITY Providing anyone a secure experience from any device from any location to any resource 11 Copyright 2011 Juniper Networks, Inc. www.juniper.net
# of Devices SECURE CONNECTIVITY (CONT.) Why haven t businesses supported all devices? Lack of encryption No multifactor authentication Inconsistent security policies Wide range of backend applications Personal Smartphones Issued Smartphones 12 Copyright 2011 Juniper Networks, Inc. www.juniper.net
SECURE APPLICATIONS Intranet Finance Case Tracking Unmanaged Devices Diverse Users/Locations/Networks Critical Resources How do you ensure ONLY the right users are accessing resources? 13 Copyright 2011 Juniper Networks, Inc. www.juniper.net
WHAT DOES THE FUTURE HOLD? Smart devices will become the target of choice for attacks Attack vectors will continue to evolve within smart devices Personal information will be used for more front-door attacks, 14 Copyright 2011 Juniper Networks, Inc. www.juniper.net
THANK YOU 15 Copyright 2011 Juniper Networks, Inc. www.juniper.net