defending the mobile workforce - aventri

16
DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Upload: others

Post on 10-Apr-2022

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DEFENDING THE MOBILE WORKFORCE - Aventri

DEFENDING THE MOBILE WORKFORCEKarim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Page 2: DEFENDING THE MOBILE WORKFORCE - Aventri

2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

THE MOBILE INTERNET IS THE NEW INTERNET

Proliferation of Devices

Content ConsumptionConnected Socialization

Number of smartphones sales to

exceed PC sales in 2012*

*Source: Morgan Stanley, 2010

Page 3: DEFENDING THE MOBILE WORKFORCE - Aventri

3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

MALWARE HISTORY TELLS US TWO THINGS

1. Malware changes and gets more sophisticated

2. Waiting and reacting after-the-fact can be costly

2009

Mobile Malware

SMS Trojan – „09

Symbian,

July, „10 Android

1995

Macro Viruses

Concept „95

Melissa „99

2001

Network Worm

Code Red „01

Nimda „01

1981

Executable Boot

Sector Infections

Elk Cloner

(Apple II) „81

1986

Executable Boot

Sector Infections

Brain Boot Sector

(PC) „86

1988

Fred Cohen"On the implications of

Computer Viruses and Methods

of Defense"

Academic

Foundation

Theory of self-

reproducing automata

John von Neumann,

Institute for Advanced

Study Site Y

Los Alamos

1966

1990

Anti-Virus Firms20 + anti-virus firms

‘88 ‘90

‘66 ‘81 ‘86 ‘95 ‘01 ‘09

Page 4: DEFENDING THE MOBILE WORKFORCE - Aventri

4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

WHAT IS MISSING FROM MOBILE SECURITY?

Page 5: DEFENDING THE MOBILE WORKFORCE - Aventri

5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE

Sources: KRC Research and Juniper Mobile Threat Center

40%use their smartphone

for both personal

and business

72%share or access sensitive

info such as banking, credit

card, social security,

medical records

80%access their employer‟s

network without permission –

59% do it everyday

50%+are very concerned about

loss, theft and identity

theft resulting from their

mobile usage

Page 6: DEFENDING THE MOBILE WORKFORCE - Aventri

6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Notebook

Netbook

Smartphone

Tablet

HQ

Local Office

Global High-Performance Network

Secure Mobile Devices Secure Connectivity Secure Apps

DEFEND YOUR MOBILE LIFE

Page 7: DEFENDING THE MOBILE WORKFORCE - Aventri

7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Wipe data and access rights from

lost and stolen devices remotely

Combine security and access in a

single client

Enforce policies across all devices

attached to the network

Reduce IT overhead by better

managing complexity

SECURING MOBILE DEVICES: KEY ENTERPRISE REQUIREMENTS

Page 8: DEFENDING THE MOBILE WORKFORCE - Aventri

8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICES KEY ELEMENTS

Antivirus

Real-time protection

Auto updates

Scan all files

All connections

Personal

Firewall

Inbound & outbound filtering

Alerts & logging

Customizable

Anti SpamBlock SMS and voice spam

Blacklist filtering

Disable alerts options

Automatic denial options

Loss & Theft

Protection

Remote lock & wipe

Backup and restore

GPS locate

SIM change notification

Device

ControlApp inventory and control

Content monitoring

Se

cu

re A

cce

ss

Page 9: DEFENDING THE MOBILE WORKFORCE - Aventri

9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURING MOBILE DEVICESLOCAL VS. CLOUD

Antivirus

Personal

Firewall

Anti Spam

Loss & Theft

Protection

Device

Control

Se

cu

re A

cce

ss

On Site

or

On Device

On Device

On Device

Page 10: DEFENDING THE MOBILE WORKFORCE - Aventri

10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

REQUIREMENT: BROAD MOBILE PLATFORM SUPPORT

SECURING MOBILE DEVICES (CONT.)

Page 11: DEFENDING THE MOBILE WORKFORCE - Aventri

11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURE CONNECTIVITY

Providing anyone a secure experience from any device from any location to any resource

Page 12: DEFENDING THE MOBILE WORKFORCE - Aventri

12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

SECURE CONNECTIVITY (CONT.)

Why haven‟t businesses supported all devices?

Lack of encryption

No multifactor authentication

Inconsistent security policies

Wide range of backend

applications

Personal

SmartphonesIssued

Smartphones

# o

f D

evic

es

Page 13: DEFENDING THE MOBILE WORKFORCE - Aventri

13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Unmanaged

Devices

Diverse

Users/Locations/Networks

Critical

Resources

Intranet

Finance

Case

Tracking

How do you ensure ONLYthe right users are accessing resources?

SECURE APPLICATIONS

Page 14: DEFENDING THE MOBILE WORKFORCE - Aventri

14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

WHAT DOES THE FUTURE HOLD?

Smart devices will

become the target of

choice for attacks

Attack vectors will

continue to evolve

within smart devices

Personal information

will be used for more

“front-door attacks,”

Page 15: DEFENDING THE MOBILE WORKFORCE - Aventri

15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

THANK YOU

Page 16: DEFENDING THE MOBILE WORKFORCE - Aventri