5. THE NEW NETWORK IS MOBILE
Kevin Johnson
Chief Executive Officer
6. THE MOBILE INTERNET IS THE NEW INTERNET
Number of smartphones sales to
Proliferation of Devices exceed PC sales in 2012*
Connected Socialization Content Consumption
*Source: Morgan Stanley, 2010
6
7. THE IMPLICATIONS ARE SIGNIFICANT
Mobile devices without permission
are connecting to the network For Enterprises
Personal devices “sneaking” onto the network
81% 58% New threat vectors
Access without permission
Strain on IT support
Accessing daily without permission
Source: KRC Research and Juniper Mobile Threat Center
40% use the same smartphone for
both business and personal For Service Providers
Multiple points of vulnerability
Currently only fragmented security solutions
CAPEX and OPEX impact
Source: KRC Research and Juniper Mobile Threat Center
Across a network that is no
longer self-contained
Enterprise
For Consumers
Sensitive personal info exposed
Service provider Mobile device Theft/loss and malware threats
Children need protection
Cloud services
7
9. MALWARE HISTORY TELLS US TWO THINGS
1. Malware changes and gets more sophisticated
1966 1981 1986 1995 2001 2009
Academic Executable Boot Executable Boot Macro Viruses Network Worm Mobile Malware
Foundation Sector Infections Sector Infections
Theory of self- Elk Cloner Brain Boot Sector Concept „95 Code Red „01 SMS Trojan – „09
reproducing automata, (Apple II) „81 (PC) „86 Melissa „99 Nimda „01 Symbian,
John von Neumann, July, „10 Android
Institute for Advanced
Study Site Y,
Los Alamos
‘66 ‘81 ‘86 ‘95 ‘01 ‘09
‘88 ‘90
Fred Cohen Anti-Virus Firms
"On the Implications of 20+ anti-virus firms
Computer Viruses and Methods
of Defense"
1988 1990
2. Waiting and reacting after-the-fact can be costly
9
10. IT IS TIME TO SET THE MOBILITY SECURITY AGENDA
5 principles for delivering mobile security:
1. Protection at all points – device, network, applications
2. Support across all mobile OS/devices
3. Extensible
4. User friendly
5. Easy to administer
10
11. JUNIPER STARTS WITH MOBILE SECURITY
LEADERSHIP IN THE NETWORK
With Service Providers With the Enterprise
Juniper secures the First to support
majority of smartphone smartphones with security
traffic in the US and access control
Mobile packet core Corporate networks
SGSN GGSN Router
Branches
VPN
SRX SRX SRX Corporate Offices Data Centers
24 of Fortune 25 using to
Covering 76% of all
enable employees and
smartphones worldwide
protect the network
11
12. AND EXTENDS THAT LEADERSHIP USING
THREE STRATEGIES
1 Comprehensive Scope
Simplify administration
Anticipate threat vectors Build security in
and use
Device, Network, App and Data Mobile Device, Network Traffic
and Data Center
2 Platform Based, Cross OS 3 Ecosystem Extensibility
In the Network On the Client
Software
System End-user device
Silicon Innovation ecosystem
12
13. THE NEW NETWORK IS MOBILE
Network Innovation Ecosystem Innovation New Network
High Performance Accelerated Innovation
Partner Solutions
Networking & Competition Drives…
Fast New, better experiences
Profitable
Secure
New flexibility & agility
Versatile
Scalable
Dynamic New customer solutions
Reliable
Simple Open $ New revenue sources
13
14. TODAY‟S ANNOUNCEMENTS
Junos Pulse Mobile Security Suite, the most
1 comprehensive security software for protecting
all smartphones
Antivirus Device locator
Personal firewall Secure corporate network access
Anti-spam Parental controls
Monitoring and control services Cross OS/Cross device
Remote backup and restore
Juniper Global Threat Center, around-the-clock, global monitoring
2 of mobile security threats to consumers and enterprises
Securing enterprises and consumers, enabling end-point
3 security directly and with our service provider partners
14
15. CUSTOMERS AND PARTNERS PARTICIPATING
David P Merrill
Strategist, IBM Chief Information Security Office
Marc J. Patterson
General Manager, Mobile Data Services
John Donovan
Chief Technology Officer
15
17. INTRODUCING THE
JUNOS PULSE
MOBILE SECURITY SUITE
Mark Bauhaus
Executive Vice President and General Manager
Service Layer Technology Business Group
19. THIS IMPACTS ALL CUSTOMERS
For Enterprises For Service Providers For Consumer
86% 1Billion 80%
Security high or Mobile workers in 20101 Store personal information
critical priority1 (24% store banking info) 4
31% 1/3 2 Million
Compromised security Of world‟s workforce Stolen smartphone
in 20091 by 20131 in the US4
25% 2x 24%
Not corporate-standard or Increase in users requiring Teens admit to sending
managed smartphones1 data access by 20133 inappropriate content 4
Source:
1 Forester Research
2 Juniper Networks
40% 0 32%
Use same smartphone for Capability to solve the Online teens contacted
3 IDC
4 Credant Technologies
business and personal2 problem today2 by strangers4
19
20. INTRODUCING THE
JUNOS PULSE MOBILE SECURITY SUITE
Antivirus
Personal Firewall
Device Monitoring
And Control
Anti-spam
Loss/Theft Protection
20
21. DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
For The Enterprise
Wipe data and access rights from
lost and stolen devices remotely
Combine security and access in a
single client
Enforce policies across all devices
attached to the network
Reduce IT overhead by better
managing complexity
21
22. DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
For Service Providers
Monetize innovative smartphone
security services
Scale across all customers with a
single solution
Offer both managed and self-
managed solutions
Tailor offering through bundled
services
22
23. DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
For Consumers
Protect from viruses, malware and
spam
Defend kids from cyber bullying
and online predators
Backup and Restore devices
remotely
Find and Wipe content and
contacts on demand
23
24. ACROSS A BROAD, COMPREHENSIVE
MOBILE PLATFORM SUPPORT
Available Available
Now H1 2011
In any unit quantity and subscription lengths between 1 and 3 years
24
25. NEW THREATS ARE A 24/7 SECURITY PROBLEM
Announcing -
The Juniper Global Threat Center
The first and only threat and research center
focused exclusively on mobility
Monitors and responds to threats and
vulnerabilities
Produces on-going research
Malware Direct Physical Data Exploitation &
Attack Compromise Interception Misconduct
25
26. NEW RESEARCH REVEALS A GAP BETWEEN
BEHAVIOR AND THE DESIRE TO BE SAFE
40% 52% 72%
use their smartphone of respondents with children share or access sensitive
for both personal rank parental controls info such as banking, credit
and business extremely or very important. card, social security,
medical records
81% 50%+ 1 in 5
access their employer‟s are very concerned about Teens admit to sending
network without permission – loss, theft and identity inappropriate pictures
58% do it everyday theft resulting from their of themselves from
mobile usage mobile devices
Sources: KRC Research and Juniper Mobile Threat Center
26
27. JUNIPER RAISES THE STANDARD FOR
MOBILE SECURITY WITH THE NEW NETWORK
Juniper Mobile Security Solutions Delivering Unique Value In The Marketplace
First to provide security and
remote access at the device, system
provider and application level
Broadest support for all major
mobile operating systems and
platforms
Secure at the device
Only single solution for both
security and access across mobile
Secure across
and non-mobile devices
the service provider
Secure in the enterprise World’s leading and most trusted
security and access solution
27
Loss theft protection (detail provided if you need notes)Remote Lock and/or Wipe GPS Locate/TrackDevice Backup/RestoreRemote Alarm/NotificationSIM Change Notification Device monitoring(detail provided if you need notes)Application inventory and removalMonitor SMS, MMS, email message contentView phone call log and address book/contactsView photos stored on device T: And this has implications for all types of customers…
For enterprise customersThey are worried about - 86% say it is a critical or high prioirityThey see it as an unsolved need – 31% say there security compromised one way or another last yearIt is not well controlled at the management level – 25% of connected devices don’t follow corporate standardsAnd a significant number of users compromise corporate data – 40% use the same smartphone for personal and business use[click to build]For service providers the problem is also significantThe number of mobile worker is staggering – over 1 billion worldwide in 2010It is also increasing significantly in numbers – as many as 1/3 of all workers will be mobile by 2013Resulting in a strain to their networks – as the number of people using their smartphones for data access doubles in the next several yearsWhat is most frustration for service providers is the have no readily available solution to help their customers with their security and access concerns[click to build]For consumersOver 2 million consumers say their smartphones stolen in just the USOf these, 80% had personal information stored on them and 24% had banking informationAt the same time, parents have concerns with their children’s use of phones, with 1 in 4 kids admitting to sextingAnd nearly a third being contacted by strangersT: Today we change this
I would like to the Junos Pulse Mobile Security SuiteThe suite offers a full range of security capabilities across five key areasAntivirusPersonal firewallAnti-spamLoss/theft protectionDevice monitoringAntivirus (detail provided if you need notes)Real-time protection updated automaticallyScans files received over all network connectionsOn-demand scans of all memory or full deviceAlerts on detectionPersonal Firewall (detail provided if you need notes)Inbound/Outbound Port+IP Filtering automaticallyFull control of alerts/loggingDefault (high/low) filtering options + customizableAntispam (detail provided if you need notes)Blacklist filtering – blocks voice and SMS spamMessage settingsDisable alerts for incoming messages (option)Automatic denial for unknown or unwanted callsLoss theft protection (detail provided if you need notes)Remote Lock and/or Wipe GPS Locate/TrackDevice Backup/RestoreRemote Alarm/NotificationSIM Change Notification Device monitoring (detail provided if you need notes)Application inventory and removalMonitor SMS, MMS, email message contentView phone call log and address book/contactsView photos stored on device T: This suite solves our customer’s problems like nothing else currently available in the market…
Announcing - The Juniper Global Threat Center The first and only threat and research center focused exclusively on mobilityMonitors and responds to threats and vulnerabilitiesProduces on-going researchIn five areasMalwareDirect AttackPhysical compromiseData communication interceptionExploitation & misconduct
40% use their smartphone for both personal and business72% share or access sensitive info such as banking, credit card, social security, medical records80% access their employer’s network without permission – 59% do it everyday52% of respondents with children rank parental controls extremely or very important.Over half are very concerned about loss, theft and identity theft resulting from their mobile usage1 in 5 teens admits to sending inappropriate pictures of themselves from mobile devices
Take the next stepsLearn about Juniper’s new offerings: Go to the websiteDeploy the suite at your enterprise or solution provider level: Rollout across your networkKeep up to date and monitor your current threat level: Keep aware through the Threat CenterT: Thank you, let me pass it on to Sanjay…