SlideShare a Scribd company logo
THE NEW NETWORK IS MOBILE



Follow @JuniperNetworks
Hashtag: #Junos
2
INTRODUCING
Lauren Flaherty
Chief Marketing Officer
4
THE NEW NETWORK IS MOBILE
Kevin Johnson
Chief Executive Officer
THE MOBILE INTERNET IS THE NEW INTERNET

                                                 Number of smartphones sales to
                      Proliferation of Devices   exceed PC sales in 2012*




               Connected Socialization           Content Consumption




    *Source: Morgan Stanley, 2010
6
THE IMPLICATIONS ARE SIGNIFICANT

    Mobile devices without permission
    are connecting to the network                            For Enterprises
                                                               Personal devices “sneaking” onto the network
                 81%                    58%                    New threat vectors
               Access without permission
                                                               Strain on IT support
               Accessing daily without permission

     Source: KRC Research and Juniper Mobile Threat Center


    40% use the same smartphone for
    both business and personal                               For Service Providers
                                                               Multiple points of vulnerability
                                                               Currently only fragmented security solutions
                                                               CAPEX and OPEX impact
     Source: KRC Research and Juniper Mobile Threat Center

    Across a network that is no
    longer self-contained
        Enterprise
                                                             For Consumers
                                                              Sensitive personal info exposed
                Service provider            Mobile device     Theft/loss and malware threats
                                                              Children need protection
        Cloud services




7
AND AS AN INDIVIDUAL…




8
MALWARE HISTORY TELLS US TWO THINGS

         1. Malware changes and gets more sophisticated

               1966                    1981                      1986                      1995                          2001                2009
          Academic              Executable Boot           Executable Boot            Macro Viruses                  Network Worm      Mobile Malware
         Foundation             Sector Infections         Sector Infections
           Theory of self-          Elk Cloner             Brain Boot Sector           Concept „95                   Code Red „01      SMS Trojan – „09
      reproducing automata,        (Apple II) „81               (PC) „86               Melissa „99                    Nimda „01            Symbian,
        John von Neumann,                                                                                                              July, „10 Android
       Institute for Advanced
            Study Site Y,
             Los Alamos


‘66                                                 ‘81                  ‘86                             ‘95                    ‘01                        ‘09




                                                                               ‘88   ‘90
                                                            Fred Cohen                     Anti-Virus Firms
                                                       "On the Implications of               20+ anti-virus firms
                                                    Computer Viruses and Methods
                                                            of Defense"


                                                                 1988                                1990

         2. Waiting and reacting after-the-fact can be costly

 9
IT IS TIME TO SET THE MOBILITY SECURITY AGENDA

     5 principles for delivering mobile security:

     1. Protection at all points – device, network, applications

     2. Support across all mobile OS/devices

     3. Extensible

     4. User friendly

     5. Easy to administer




10
JUNIPER STARTS WITH MOBILE SECURITY
LEADERSHIP IN THE NETWORK

              With Service Providers                   With the Enterprise

                    Juniper secures the                    First to support
                   majority of smartphone             smartphones with security
                      traffic in the US                 and access control



                   Mobile packet core                  Corporate networks
            SGSN          GGSN         Router

                                                                                 Branches
                                                VPN
                    SRX          SRX                   SRX   Corporate Offices   Data Centers




                                                      24 of Fortune 25 using to
                    Covering 76% of all
                                                       enable employees and
                   smartphones worldwide
                                                         protect the network



11
AND EXTENDS THAT LEADERSHIP USING
THREE STRATEGIES

     1             Comprehensive Scope

                                                                                         Simplify administration
          Anticipate threat vectors                        Build security in
                                                                                                and use




     Device, Network, App and Data               Mobile Device, Network Traffic
                                                       and Data Center



     2              Platform Based, Cross OS                                 3    Ecosystem Extensibility

     In the Network                   On the Client




         Software


         System                             End-user device


         Silicon                                      Innovation ecosystem




12
THE NEW NETWORK IS MOBILE

     Network Innovation   Ecosystem Innovation          New Network




      High Performance                               Accelerated Innovation
                             Partner Solutions
         Networking                                   & Competition Drives…

            Fast                                      New, better experiences
                                   Profitable
            Secure
                                                      New flexibility & agility
                                   Versatile
            Scalable
                                   Dynamic            New customer solutions
            Reliable

            Simple                  Open         $    New revenue sources



13
TODAY‟S ANNOUNCEMENTS

          Junos Pulse Mobile Security Suite, the most
     1    comprehensive security software for protecting
          all smartphones

      Antivirus                                  Device locator
      Personal firewall                          Secure corporate network access
      Anti-spam                                  Parental controls
      Monitoring and control services            Cross OS/Cross device
      Remote backup and restore


          Juniper Global Threat Center, around-the-clock, global monitoring
     2    of mobile security threats to consumers and enterprises



          Securing enterprises and consumers, enabling end-point
     3    security directly and with our service provider partners


14
CUSTOMERS AND PARTNERS PARTICIPATING


         David P Merrill
         Strategist, IBM Chief Information Security Office




         Marc J. Patterson
         General Manager, Mobile Data Services




         John Donovan
         Chief Technology Officer


15
VIDEO – JOHN DONOVAN
INTRODUCING THE
JUNOS PULSE
MOBILE SECURITY SUITE
Mark Bauhaus
Executive Vice President and General Manager
Service Layer Technology Business Group
WHAT IS MISSING FROM MOBILE SECURITY?




18
THIS IMPACTS ALL CUSTOMERS
                            For Enterprises          For Service Providers             For Consumer


                         86%                          1Billion                      80%
                         Security high or             Mobile workers in 20101       Store personal information
                         critical priority1                                         (24% store banking info) 4



                         31%                          1/3                           2 Million
                         Compromised security         Of world‟s workforce          Stolen smartphone
                         in 20091                     by 20131                      in the US4



                         25%                          2x                            24%
                         Not corporate-standard or    Increase in users requiring   Teens admit to sending
                         managed smartphones1         data access by 20133          inappropriate content 4



Source:
1 Forester Research
2 Juniper Networks
                         40%                          0                             32%
                         Use same smartphone for      Capability to solve the       Online teens contacted
3 IDC
4 Credant Technologies
                         business and personal2       problem today2                by strangers4


19
INTRODUCING THE
JUNOS PULSE MOBILE SECURITY SUITE


                   Antivirus



                                       Personal Firewall


                  Device Monitoring
                  And Control


                                           Anti-spam



                           Loss/Theft Protection



20
DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
                 For The Enterprise


                          Wipe data and access rights from
                          lost and stolen devices remotely


                          Combine security and access in a
                          single client


                          Enforce policies across all devices
                          attached to the network


                          Reduce IT overhead by better
                          managing complexity


21
DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
                 For Service Providers


                           Monetize innovative smartphone
                           security services


                           Scale across all customers with a
                           single solution


                           Offer both managed and self-
                           managed solutions


                           Tailor offering through bundled
                           services


22
DELIVER SECURITY TO ALL SMARTPHONE
MARKETS AND USERS
                  For Consumers


                        Protect from viruses, malware and
                        spam


                        Defend kids from cyber bullying
                        and online predators


                        Backup and Restore devices
                        remotely


                        Find and Wipe content and
                        contacts on demand


23
ACROSS A BROAD, COMPREHENSIVE
MOBILE PLATFORM SUPPORT




                       Available                         Available
                         Now                              H1 2011

In any unit quantity and subscription lengths between 1 and 3 years

24
NEW THREATS ARE A 24/7 SECURITY PROBLEM
Announcing -
The Juniper Global Threat Center
The first and only threat and research center
focused exclusively on mobility
 Monitors and responds to threats and
  vulnerabilities
 Produces on-going research

     Malware     Direct       Physical         Data       Exploitation &
                 Attack     Compromise     Interception    Misconduct




25
NEW RESEARCH REVEALS A GAP BETWEEN
BEHAVIOR AND THE DESIRE TO BE SAFE




     40%                                             52%                            72%
     use their smartphone                            of respondents with children   share or access sensitive
     for both personal                               rank parental controls         info such as banking, credit
     and business                                    extremely or very important.   card, social security,
                                                                                    medical records



     81%                                             50%+                           1 in 5
     access their employer‟s                         are very concerned about       Teens admit to sending
     network without permission –                    loss, theft and identity       inappropriate pictures
     58% do it everyday                              theft resulting from their     of themselves from
                                                     mobile usage                   mobile devices

Sources: KRC Research and Juniper Mobile Threat Center

26
JUNIPER RAISES THE STANDARD FOR
MOBILE SECURITY WITH THE NEW NETWORK
     Juniper Mobile Security Solutions   Delivering Unique Value In The Marketplace

                                              First to provide security and
                                              remote access at the device, system
                                              provider and application level


                                              Broadest support for all major
                                              mobile operating systems and
                                              platforms

            Secure at the device
                                              Only single solution for both
                                              security and access across mobile
            Secure across
                                              and non-mobile devices
            the service provider


            Secure in the enterprise          World’s leading and most trusted
                                              security and access solution


27
WHAT CUSTOMERS SHOULD DO NEXT




http://juniper.net/




28
INTRODUCING
David Merrill
Strategist, Chief Information Security Office
IBM
Our journey




     The second mobile computing revolution
30                                            © 2010 IBM Corporation
It’s all about the data …


 Is your data any less valuable because
          it’s on a smartphone?




                                   © 2010 IBM Corporation
Smartphone malware …

            ... is not an urban legend.




                                     © 2010 IBM Corporation
Thank you



            © 2010 IBM Corporation
© 2010 IBM Corporation
INTRODUCING
Sanjay Beri
Vice President and General Manager
Access & Acceleration Business Unit
VIDEO – 3 SECURITY SCENARIOS
37
VIDEO – DEMO 1
39
VIDEO – DEMO 2
41
VIDEO – DEMO 3
43
INTRODUCING
Marc J. Patterson
General Manager, Mobile Data Services
BT Global Services
BT: Securing the Prosumer
                       • Consumer: BT Total Broadband Anywhere
                       • Enterprise: BT MobileXpress™


     BT has supported enabled smartphones since 2007
     • Provide secure end-user experience – for free
     End-users are consumerizing the enterprise
     • Common focus across BT consumer and enterprise Mobility Services
     Market opportunity
     Why Juniper?
     •   Cross-platform support
     •   Ease of deployment
     •   Technology performance
     •   Relationship

45                        Copyright © 2010 Juniper Networks, Inc. www.juniper.net
46
Junos Pulse Mobile Security Suite Launch

More Related Content

Junos Pulse Mobile Security Suite Launch

  • 1. THE NEW NETWORK IS MOBILE Follow @JuniperNetworks Hashtag: #Junos
  • 2. 2
  • 4. 4
  • 5. THE NEW NETWORK IS MOBILE Kevin Johnson Chief Executive Officer
  • 6. THE MOBILE INTERNET IS THE NEW INTERNET Number of smartphones sales to Proliferation of Devices exceed PC sales in 2012* Connected Socialization Content Consumption *Source: Morgan Stanley, 2010 6
  • 7. THE IMPLICATIONS ARE SIGNIFICANT Mobile devices without permission are connecting to the network For Enterprises  Personal devices “sneaking” onto the network 81% 58%  New threat vectors Access without permission  Strain on IT support Accessing daily without permission Source: KRC Research and Juniper Mobile Threat Center 40% use the same smartphone for both business and personal For Service Providers  Multiple points of vulnerability  Currently only fragmented security solutions  CAPEX and OPEX impact Source: KRC Research and Juniper Mobile Threat Center Across a network that is no longer self-contained Enterprise For Consumers  Sensitive personal info exposed Service provider Mobile device  Theft/loss and malware threats  Children need protection Cloud services 7
  • 8. AND AS AN INDIVIDUAL… 8
  • 9. MALWARE HISTORY TELLS US TWO THINGS 1. Malware changes and gets more sophisticated 1966 1981 1986 1995 2001 2009 Academic Executable Boot Executable Boot Macro Viruses Network Worm Mobile Malware Foundation Sector Infections Sector Infections Theory of self- Elk Cloner Brain Boot Sector Concept „95 Code Red „01 SMS Trojan – „09 reproducing automata, (Apple II) „81 (PC) „86 Melissa „99 Nimda „01 Symbian, John von Neumann, July, „10 Android Institute for Advanced Study Site Y, Los Alamos ‘66 ‘81 ‘86 ‘95 ‘01 ‘09 ‘88 ‘90 Fred Cohen Anti-Virus Firms "On the Implications of 20+ anti-virus firms Computer Viruses and Methods of Defense" 1988 1990 2. Waiting and reacting after-the-fact can be costly 9
  • 10. IT IS TIME TO SET THE MOBILITY SECURITY AGENDA 5 principles for delivering mobile security: 1. Protection at all points – device, network, applications 2. Support across all mobile OS/devices 3. Extensible 4. User friendly 5. Easy to administer 10
  • 11. JUNIPER STARTS WITH MOBILE SECURITY LEADERSHIP IN THE NETWORK With Service Providers With the Enterprise Juniper secures the First to support majority of smartphone smartphones with security traffic in the US and access control Mobile packet core Corporate networks SGSN GGSN Router Branches VPN SRX SRX SRX Corporate Offices Data Centers 24 of Fortune 25 using to Covering 76% of all enable employees and smartphones worldwide protect the network 11
  • 12. AND EXTENDS THAT LEADERSHIP USING THREE STRATEGIES 1 Comprehensive Scope Simplify administration Anticipate threat vectors Build security in and use Device, Network, App and Data Mobile Device, Network Traffic and Data Center 2 Platform Based, Cross OS 3 Ecosystem Extensibility In the Network On the Client Software System End-user device Silicon Innovation ecosystem 12
  • 13. THE NEW NETWORK IS MOBILE Network Innovation Ecosystem Innovation New Network High Performance Accelerated Innovation Partner Solutions Networking & Competition Drives… Fast New, better experiences Profitable Secure New flexibility & agility Versatile Scalable Dynamic New customer solutions Reliable Simple Open $ New revenue sources 13
  • 14. TODAY‟S ANNOUNCEMENTS Junos Pulse Mobile Security Suite, the most 1 comprehensive security software for protecting all smartphones  Antivirus  Device locator  Personal firewall  Secure corporate network access  Anti-spam  Parental controls  Monitoring and control services  Cross OS/Cross device  Remote backup and restore Juniper Global Threat Center, around-the-clock, global monitoring 2 of mobile security threats to consumers and enterprises Securing enterprises and consumers, enabling end-point 3 security directly and with our service provider partners 14
  • 15. CUSTOMERS AND PARTNERS PARTICIPATING David P Merrill Strategist, IBM Chief Information Security Office Marc J. Patterson General Manager, Mobile Data Services John Donovan Chief Technology Officer 15
  • 16. VIDEO – JOHN DONOVAN
  • 17. INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE Mark Bauhaus Executive Vice President and General Manager Service Layer Technology Business Group
  • 18. WHAT IS MISSING FROM MOBILE SECURITY? 18
  • 19. THIS IMPACTS ALL CUSTOMERS For Enterprises For Service Providers For Consumer 86% 1Billion 80% Security high or Mobile workers in 20101 Store personal information critical priority1 (24% store banking info) 4 31% 1/3 2 Million Compromised security Of world‟s workforce Stolen smartphone in 20091 by 20131 in the US4 25% 2x 24% Not corporate-standard or Increase in users requiring Teens admit to sending managed smartphones1 data access by 20133 inappropriate content 4 Source: 1 Forester Research 2 Juniper Networks 40% 0 32% Use same smartphone for Capability to solve the Online teens contacted 3 IDC 4 Credant Technologies business and personal2 problem today2 by strangers4 19
  • 20. INTRODUCING THE JUNOS PULSE MOBILE SECURITY SUITE Antivirus Personal Firewall Device Monitoring And Control Anti-spam Loss/Theft Protection 20
  • 21. DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS For The Enterprise Wipe data and access rights from lost and stolen devices remotely Combine security and access in a single client Enforce policies across all devices attached to the network Reduce IT overhead by better managing complexity 21
  • 22. DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS For Service Providers Monetize innovative smartphone security services Scale across all customers with a single solution Offer both managed and self- managed solutions Tailor offering through bundled services 22
  • 23. DELIVER SECURITY TO ALL SMARTPHONE MARKETS AND USERS For Consumers Protect from viruses, malware and spam Defend kids from cyber bullying and online predators Backup and Restore devices remotely Find and Wipe content and contacts on demand 23
  • 24. ACROSS A BROAD, COMPREHENSIVE MOBILE PLATFORM SUPPORT Available Available Now H1 2011 In any unit quantity and subscription lengths between 1 and 3 years 24
  • 25. NEW THREATS ARE A 24/7 SECURITY PROBLEM Announcing - The Juniper Global Threat Center The first and only threat and research center focused exclusively on mobility  Monitors and responds to threats and vulnerabilities  Produces on-going research Malware Direct Physical Data Exploitation & Attack Compromise Interception Misconduct 25
  • 26. NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% 52% 72% use their smartphone of respondents with children share or access sensitive for both personal rank parental controls info such as banking, credit and business extremely or very important. card, social security, medical records 81% 50%+ 1 in 5 access their employer‟s are very concerned about Teens admit to sending network without permission – loss, theft and identity inappropriate pictures 58% do it everyday theft resulting from their of themselves from mobile usage mobile devices Sources: KRC Research and Juniper Mobile Threat Center 26
  • 27. JUNIPER RAISES THE STANDARD FOR MOBILE SECURITY WITH THE NEW NETWORK Juniper Mobile Security Solutions Delivering Unique Value In The Marketplace First to provide security and remote access at the device, system provider and application level Broadest support for all major mobile operating systems and platforms Secure at the device Only single solution for both security and access across mobile Secure across and non-mobile devices the service provider Secure in the enterprise World’s leading and most trusted security and access solution 27
  • 28. WHAT CUSTOMERS SHOULD DO NEXT http://juniper.net/ 28
  • 29. INTRODUCING David Merrill Strategist, Chief Information Security Office IBM
  • 30. Our journey The second mobile computing revolution 30 © 2010 IBM Corporation
  • 31. It’s all about the data … Is your data any less valuable because it’s on a smartphone? © 2010 IBM Corporation
  • 32. Smartphone malware … ... is not an urban legend. © 2010 IBM Corporation
  • 33. Thank you © 2010 IBM Corporation
  • 34. © 2010 IBM Corporation
  • 35. INTRODUCING Sanjay Beri Vice President and General Manager Access & Acceleration Business Unit
  • 36. VIDEO – 3 SECURITY SCENARIOS
  • 37. 37
  • 39. 39
  • 41. 41
  • 43. 43
  • 44. INTRODUCING Marc J. Patterson General Manager, Mobile Data Services BT Global Services
  • 45. BT: Securing the Prosumer • Consumer: BT Total Broadband Anywhere • Enterprise: BT MobileXpress™ BT has supported enabled smartphones since 2007 • Provide secure end-user experience – for free End-users are consumerizing the enterprise • Common focus across BT consumer and enterprise Mobility Services Market opportunity Why Juniper? • Cross-platform support • Ease of deployment • Technology performance • Relationship 45 Copyright © 2010 Juniper Networks, Inc. www.juniper.net
  • 46. 46

Editor's Notes

  1. Loss theft protection (detail provided if you need notes)Remote Lock and/or Wipe GPS Locate/TrackDevice Backup/RestoreRemote Alarm/NotificationSIM Change Notification Device monitoring(detail provided if you need notes)Application inventory and removalMonitor SMS, MMS, email message contentView phone call log and address book/contactsView photos stored on device T: And this has implications for all types of customers…
  2. For enterprise customersThey are worried about - 86% say it is a critical or high prioirityThey see it as an unsolved need – 31% say there security compromised one way or another last yearIt is not well controlled at the management level – 25% of connected devices don’t follow corporate standardsAnd a significant number of users compromise corporate data – 40% use the same smartphone for personal and business use[click to build]For service providers the problem is also significantThe number of mobile worker is staggering – over 1 billion worldwide in 2010It is also increasing significantly in numbers – as many as 1/3 of all workers will be mobile by 2013Resulting in a strain to their networks – as the number of people using their smartphones for data access doubles in the next several yearsWhat is most frustration for service providers is the have no readily available solution to help their customers with their security and access concerns[click to build]For consumersOver 2 million consumers say their smartphones stolen in just the USOf these, 80% had personal information stored on them and 24% had banking informationAt the same time, parents have concerns with their children’s use of phones, with 1 in 4 kids admitting to sextingAnd nearly a third being contacted by strangersT: Today we change this
  3. I would like to the Junos Pulse Mobile Security SuiteThe suite offers a full range of security capabilities across five key areasAntivirusPersonal firewallAnti-spamLoss/theft protectionDevice monitoringAntivirus (detail provided if you need notes)Real-time protection updated automaticallyScans files received over all network connectionsOn-demand scans of all memory or full deviceAlerts on detectionPersonal Firewall (detail provided if you need notes)Inbound/Outbound Port+IP Filtering automaticallyFull control of alerts/loggingDefault (high/low) filtering options + customizableAntispam (detail provided if you need notes)Blacklist filtering – blocks voice and SMS spamMessage settingsDisable alerts for incoming messages (option)Automatic denial for unknown or unwanted callsLoss theft protection (detail provided if you need notes)Remote Lock and/or Wipe GPS Locate/TrackDevice Backup/RestoreRemote Alarm/NotificationSIM Change Notification Device monitoring (detail provided if you need notes)Application inventory and removalMonitor SMS, MMS, email message contentView phone call log and address book/contactsView photos stored on device T: This suite solves our customer’s problems like nothing else currently available in the market…
  4. Announcing - The Juniper Global Threat Center The first and only threat and research center focused exclusively on mobilityMonitors and responds to threats and vulnerabilitiesProduces on-going researchIn five areasMalwareDirect AttackPhysical compromiseData communication interceptionExploitation & misconduct
  5. 40% use their smartphone for both personal and business72% share or access sensitive info such as banking, credit card, social security, medical records80% access their employer’s network without permission – 59% do it everyday52% of respondents with children rank parental controls extremely or very important.Over half are very concerned about loss, theft and identity theft resulting from their mobile usage1 in 5 teens admits to sending inappropriate pictures of themselves from mobile devices
  6. Take the next stepsLearn about Juniper’s new offerings: Go to the websiteDeploy the suite at your enterprise or solution provider level: Rollout across your networkKeep up to date and monitor your current threat level: Keep aware through the Threat CenterT: Thank you, let me pass it on to Sanjay…