Mobile Network Security

765 views
692 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
765
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
54
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Mobile Network Security

  1. 1. JUNIPER SECURE MOBILE ACCESS<br />October 20, 2010<br />Amir Khan<br />
  2. 2. Agenda<br />1<br />WHAT IS SECURE MOBILE ACCESS<br />2<br />WHY IS SECURE MOBILE ACCESS<br /> IMPORTANT<br />WHAT IS JUNOS PULSE<br />3<br />SUMMARY<br />4<br />
  3. 3. Agenda<br />1<br />WHAT IS SECURE MOBILE ACCESS<br />2<br />WHY IS SECURE MOBILE ACCESS<br /> IMPORTANT<br />WHAT IS JUNOS PULSE<br />3<br />SUMMARY<br />4<br />
  4. 4. MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES…<br />
  5. 5. …Means a more mobile workforce!<br />Intranet®<br />Any Device<br />Any Location<br />Any Resource<br />
  6. 6. Secure, mobile ACCESS TO ENTERPRISE APPlicationS<br />Notebooks<br />Smartphones<br />Enterprise Apps<br />Email<br />ERP/CRM<br />Working<br />Intranet/Portals<br />Email, Calendar, Task Lists<br />Corporate Data<br />Oracle, Siebel<br />UnifiedCollaboration<br />VPNs for Peer to Peer and Collaborative messaging utilities<br />VPNs for digital voice or video conferencing applications (e.g. Skype)<br />Remote access to corporate intranet information and applications <br />VPNs for Real-time data from warehouse floor <br />VPNs for Instant access to financial information<br />Enforcement of Mobile Device Policies before allowing access<br />For the Road Warrior who needs mobile access to email, calendaring, and contacts<br />
  7. 7. Agenda<br />1<br />WHAT IS SECURE MOBILE ACCESS<br />2<br />WHY IS SECURE MOBILE ACCESS<br /> IMPORTANT<br />WHAT IS JUNOS PULSE<br />3<br />SUMMARY<br />4<br />
  8. 8. Mobility is exploding!<br />World's mobile worker population to surpass 1B peoplein 2010 and grow to > 1/3of world's workforce by 2013*<br />14%of information workers use smartphones in 2010 to access data; expected to reach 30% by 2013**<br />By 2012, smartphone penetration to roughly double globally (~9% to 20%)*<br />*Forrester Research; ** IDC<br />
  9. 9. Personal Devices vs. Corporate Devices<br />About 1/4 of employees use smartphones that are not “corporate-standard” or managed*<br />*Forrester Research<br />
  10. 10. Secure mobile remote access anytime, anywhere<br />HEADQUARTERS / CAMPUS<br />Remote LocationS<br />Remote Users / Telecommuters<br />Mobile Users<br />Branch OfficeS<br />
  11. 11. Challenges of a mobile workforce<br />Enable secure corporate access for smartphones<br />Enforce the same existing authentication methods and security settings for corporate managed systems<br />Deliver secure, remote access for mobile devices, while enforcing granular access control<br />Adapt mobility and security policies to allow for personal mobile devices <br />
  12. 12. Agenda<br />1<br />WHAT IS SECURE MOBILE ACCESS<br />2<br />WHY IS SECURE MOBILE ACCESS<br /> IMPORTANT<br />WHAT IS JUNOS PULSE<br />3<br />SUMMARY<br />4<br />
  13. 13. Junos Pulse<br />Based on Successful, Leading Technology<br />24 of Fortune 25 are using one core Junos Pulse service:<br />Juniper SA Series SSL VPN<br />Over 25M people use Juniper client software to securely access corporate data <br />Only Converged Solution<br />Support for many thousandsof users<br />Broadest Device Coverage<br />Covers majority of all desktop,<br />laptop, netbook, and smartphones <br />worldwide<br />Most Scalable<br />Only Standards-based Solution<br />Secure application access for <br />mobile and non-mobile devices<br />
  14. 14. JUNOS PULSE (FOR WINDOWS)<br />Dynamically provisioned client for: <br />Connectivity<br />Security<br />Acceleration<br />Support for notebooks, netbooks, and smartphones<br />Location aware and identity-enabled<br />Standards-based<br />Platform for select third party applications<br />Builds on Juniper’s market leading SA Series SSL VPN, UAC solution, and WXC Series technology!<br />
  15. 15. Junos Pulse SECURE MOBILE REMOTE ACCESS<br />Covers range of application access requirements<br />Web VPN<br />Secure Email and Calendaring<br />Full Layer 3 Tunnel<br />Unparalleled “Data in Transit” Security<br />Leverages SSL VPN<br />Multi-factor authentication<br />Granular auditing and logging<br />
  16. 16. Junos Pulse mobile clientsENABLING SECURE AND EASY CORPORATE ACCESS <br /><ul><li>Provisioned via respective Application Stores
  17. 17. Complete enterprise-user application portal
  18. 18. Dynamic, role-based application menu— tightly integrated with user identity and device type
  19. 19. Centralizes links to email, web applications/intranet, etc.
  20. 20. Designed for minimal user interaction
  21. 21. Autoboot upon device restart</li></li></ul><li>Smart Location Based VPN and LAN Access<br />For notebooks and netbooks:<br /><ul><li>Location Awareness – Seamless access as the user moves from remote access to LAN access
  22. 22. Pulse Client auto discovers High Speed/Low Latency connections
  23. 23. Seamless session migration – No need to re-authenticate</li></ul>SA Series<br />WXC Series<br />Remote LocationS<br />IC Series (UAC)<br />SRX Series<br />Branch OfficeS<br />Mobile Users<br />Remote Users / Telecommuters<br />
  24. 24. junos PulseMobile workforce security made simple<br />SA Series SSL VPN dynamically installs Junos Pulse. Pulse includes anti-spyware/anti-malware for Windows enabled endpoints and removes threat before access is granted<br />Imagine you have a remote doctor accessing medical records via SA Series SSL VPN using an infected endpoint<br />2<br />1<br />5<br />3<br />4<br />6<br />UAC<br />WXC Series<br />SA SSL VPN<br />LAN<br />VPN<br />INTERNET<br />SRX Series<br />REMOTE EMPLOYEE<br />DATA CENTER<br />STRM Series and Junos Space report that this doctor’s endpoint has been infected 5 times in two months, alerting IT<br />Junos Pulse also includes dynamic provisioning of application acceleration client (WXC Series) based on user’s role and encrypts traffic (Windows devices only)<br />User enjoys secure access with faster file transfer times<br />As user moves from remote location to LAN Junos Pulse provisions seamless connectivity with no additional sign-ons<br />
  25. 25. EngineeringServer<br />Finance Server<br />EngineeringServer<br />Finance Server<br />GLOBAL IDENTITY AWARE NETWORKING<br />Data Center Tokyo<br />Data Center NY<br />REMOTE<br />Corporate <br />Network<br />SRX<br />SRX<br />IF-MAP<br />IF-MAP<br />UAC<br />SSL VPN<br />UAC<br />SSL VPN<br />LAN<br />SSL VPN<br />Adam in Finance attempts to access the Engineering Servers in the NY data center from his wired desktop at HQ, but access is denied. Adam is only allowed access to the Finance Server based on his credentials and access policies. <br />Adam is now remote in Asia and attempts to access the Tokyo data center remotely from his mobile device. The same access policies applied to Adam when at HQ follow him anywhere and anytime he attempts network access.<br />User: Adam<br />Role: Finance<br />User: Adam<br />Role: Finance<br />Remote Site<br />Head Quarters<br />
  26. 26. Agenda<br />1<br />WHAT IS SECURE MOBILE ACCESS<br />2<br />WHY IS SECURE MOBILE ACCESS<br /> IMPORTANT<br />WHAT IS JUNOS PULSE<br />3<br />SUMMARY<br />4<br />
  27. 27. Secure, scalable Mobility<br />Comprehensive mobile, remote access<br />Enable secure, mobile remote access for mobile devices<br />Leverage existing authentication methods and security setting<br />Granular access controls<br />Adapt mobility and security policies<br /><ul><li>Scalable VPN infrastructure
  28. 28. Broad range of mobile platform support covering all leading mobile platforms</li></li></ul><li>
  29. 29. Junos Pulse As An integration Platform<br />Junos Pulse is also an integration platform for select third party applications and services <br />Applications<br /><ul><li> SSL VPN
  30. 30. NAC
  31. 31. Application Acceleration
  32. 32. EES
  33. 33. and more</li></ul>A<br />PP<br />1<br />A<br />PP<br />2<br />A<br />PP<br />3<br />A<br />PP<br />4<br />A<br />PP<br />1<br />A<br />PP<br />2<br />A<br />PP<br />3<br />A<br />PP<br />4<br />Junos <br />Pulse <br />Applications<br />Junos Pulse Gateways<br />Junos Pulse Client<br />Junos Pulse<br />Platform<br />Base OS<br />NOTE: Applications different per OS<br />
  34. 34. JUNOS PULSE ARCHITECTURE<br />Junos Pulse Gateways<br />Junos Pulse Client <br />SA Series SSL VPN <br />(also available as <br /> virtual appliance)<br />Junos Pulse Client<br />IC Series UAC<br />Applications(of any type)<br />Juniper Extensive “Clientless”/ Browser Support <br />WXC Series<br />Application Acceleration<br />
  35. 35. JUNIPER AND JUNOS PULSE LEADING THE WAY<br /><ul><li>Over 25M people use Juniper client software to securely access corporate data
  36. 36. Industry’s1st standards-based, dynamically provisioned multi-service client enabling connectivity, security and acceleration
  37. 37. Addresses 76%of all smartphones in use world-wide
  38. 38. Only Converged Multi-Application Access Solution for Mobile and Non-Mobile devices
  39. 39. Industry’s most scalable SSL VPN mobile solution – supports many thousands of concurrent users</li>

×