Upload
k-singh
View
478
Download
0
Embed Size (px)
DESCRIPTION
Citation preview
BYOD – Four Steps to Enabling
Your Network
Michael Greco, Director , Security, APAC
1 Control and Use of Mobile Devices
2 Information Security
3 Data Retention Policies and Structure
4 Remote Access
Control and Use of Mobile Devices
Information Security
IT Manager’s Top Initiatives
20152011
Market Size - Smartphone
Total Market Size : 475M Total Market Size : 1B
18%
B2B Market : 116M 333M
Remote Access
MOBILE DEVICE USAGE IN ENTERPRISE
2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
5 Staff and Management Training
6 Process Documentation and improvements
7 Saving and Making Money w/Technology
8 Technology Cost Controls
9 Budget Processes
10 Project Management & deployment of new
Corporate-BizIndividual-BizConsumer
Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011
14%
68%
11%
13%
76%
Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011
�Smartphones used for business grow to 3X 2015�CIO focus: Mobile mgmt / control and remote access
�BYOD continues to be a driver
83%
14%
22%
36%
7% 8%
11%
103
4%
18 326
118
68
150
200
250
300
350326
7
TABLET ADOPTION- MORE BUSINESS-READY DEVICES
Tablets, by OS# units (M), Units Sold
Tablets, by Region# of units (M); Units sold
CAGR
10-12
CAGR
12-15
141% 48%
140% 52%
142% 47%
CAGR
10-12
CAGR
12-15
202% 72%
99%
142% 47%
3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
83%
67%
46%
20122009 2015
36
00
50
100
150
2015
133
2012
103
46
192
2010
18
8 63
NA
EMEA
APAC
LA
iOS
Android
Microsoft
Others
141% 43%
Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update
117% 29%
�Tablet Market Grows to 4X by 2015
�Apple iOS leads but Android challenges
For CIOs, Time To Deal With All Of Those Holiday
Mobile Devices
Trending Opportunity Trending Risk
Tuesday, January 3, 2012
THE BYOD PHENOMENA CONTINUES TO EVOLVE
4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
“At the end of 2011, almost half of mobile devices used in the workplace were employee owned, according to IDC. These gadgets equal freedom for employees, which is why companies are increasingly embracing the BYOD, or bring your own device, trend…”
Trending Opportunity Trending Risk
“BYOD creates a whole new maze of
security risks that must be navigated.
CIOs need to take a step back, assess
the specific security needs of their
company’s confidential data, and then
pick the right technology that enables
those controls...”CIOs need to embrace BYOD as the savings are too big to
ignore. However, security risk continues to be a challenge.
The BYOD balance
Private Secure
Users Corporate
Private
Differentiated
Personalized
Secure
Compliant
Authorized
“At the heart of most BYOD plans is the assumption that users are willing to give up
some level of control over their personal devices in exchange for access to
corporate resources, such as networking and email. The extent to which users and
companies may agree on the compromise will vary.” – Gartner, Oct 2011
BYOD Demands and Challenges
AnyAny DeviceDevice AnyAny LocationLocation AnyAny ApplicationApplication
�Personal devices used for
work
�Work devices used for
personal activities
�Multiple device types and
service providers
�Anytime, anywhere mobile
remote access
�Users with multiple devices
�Users download unknown
or un- / ill-secured apps
�Users access and store
data from personal and
business apps
MOBILE SECURITY REQUIREMENTS:ACCESS, DATA, APP and DEVICE PROTECTION
• On-device Malware, Virus,SpywareScanning & Removal
• Data Loss & Theft
• Enterprise Grade Data in Transit Security
• Strong User Authentication
• All Network, Apps &Resource Access
Network Network DataData
•VPN•Authentication•NAC
•AV / AS•Backup, Wipe & Restore• Segmentation• Content monitoring & Control
7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
• Malicious Apps
• Unauthorized Apps• Corp Apps / Ent App
Store Access
• App Inventory• Restriction &
Management
• Device Configuration
• Device Inventory• Posture Assessment
• Differentiated Device+User Access
•Targeted Threats
AppAppDeviceDevice
Enterprises care most about data breach and security compliance
• App Profile & Control• Application-Data Control
• MDM• Host Check• Device Protection
Enterprises and Service Providers need to address all four
dimensions of mobile device management and security
EVOLVING AND EXPANDING BATTLEFRONTS
THE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKSTHE DECENTRALIZED NATURE OF ATTACKS
8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Inadequate Inadequate
security on security on
mobile devicesmobile devices
Diverse Diverse
user user
profilesprofiles
Device Device
and OS and OS
proliferationproliferation
Increasing Increasing
implementation implementation
pointspoints
THE THREATS GROW
TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS
9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Source: Juniper Networks Mobile Threats Report 2011
SO, WHAT ARE THE THREATS?
Malware – Viruses, Worms, Trojans, Spyware
Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS
Loss and Theft –
10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Copyright 2008 SMobile SystemsPage 10
Loss and Theft – Accessing sensitive data
Data Communication Interception –Sniffing data as it is transmitted and received
Exploitation and Misconduct –Online predators, pornography, inappropriate communications, data leakage
ADDRESSING BYOD DRIVERS
User Productivity Economics+
11Mobile Device
Proliferation
22Network and Application
11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Juniper Confidential
22 Application Access
33 Consistent Security
44 ComprehensiveManagement
THE STEPS TO SECURE BYOD
Deliver secure, consistent authentication, authorization and access
Deliver secure, consistent authentication, authorization and access
22
Provide a safe, device-agnostic connection everywhereProvide a safe, device-agnostic connection everywhere11
12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
accessaccess
Protect the user, their device and data and your network, apps and data
Protect the user, their device and data and your network, apps and data
Simply manage the user, the device, their apps and their accessSimply manage the user, the device, their apps and their access
33
44
ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE
� Users can choose and change their mobile devices
� Manage the connection, access and the device
� Enable user self-provisioning
� Security works the sameon premises and off
13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
ADDRESSING PERSONAL MOBILE DEVICE USE
Manage personal
mobile devices, network / resource access, apps and users
Protect personal mobile devices
and apps, as well as corporate networks, resources and data
14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
CONNECT
Connect personal mobile
devices to corporate networks, clouds, resources and data simply and securely
users comprehensively
SMBs, Enterprises and Government
CONNECTSECURE MOBILE REMOTE ACCESS
SECURE DATA IN TRANSIT toprotect against hacks and data
theft
SUPPORT EXISTING AUTHENTICATION METHODS,
15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
AUTHENTICATION METHODS,
including multi-factor authentication
IDENTITY-ENABLED mobile,
remote network and application
access
CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network
PROTECTMOBILE DEVICE SECURITY
ANTI-MALWARE which scans all files and connections – even SD
cards – with real-time updates
LOSS AND THEFT PROTECTION, including locate and track, remote
16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
including locate and track, remote
lock and wipe, alerts, and more
ANTI-SPAM to block SMS and
voice spam, with automatic denial
options
MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters
MANAGEUSER, DEVICE AND APP MANAGEMENT
CONFIGURE AND PROVISION accounts, security policies,
certificates…
AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending
17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
REMOVE unapproved or offending
apps
COLLECT AND REPORT on
device and compliance information,
loaded apps and more
REMOTELY MANAGE AND CONFIGURE lost/stolen devices –remote locate, track, lock, wipe…
JUNOS PULSE: HIGH LEVEL OVERVIEWTHE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION
Anytime, Anywhere Secure Access
• Corporate / Cloud VPN• Authentication
• Differentiated Access
Anytime, AnywhereThreat Protection
• Mobile Loss and Theft• Mobile Threat Prevention
ProtectConnect
18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Anytime, Anywhere Device and App Control
• Device Management • App Management• Content monitoring
Manage