Your SlideShare is downloading. ×
Byod four steps to enabling your network michael greco
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Byod four steps to enabling your network michael greco


Published on

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. BYOD – Four Steps to EnablingYour NetworkMichael Greco, Director , Security, APAC
  • 2. MOBILE DEVICE USAGE IN ENTERPRISE Market Size - Smartphone IT Manager’s Top Initiatives 2011 2015 1 Control and Use of Mobile Devices Control and Use of Mobile Devices Total Market Size : 475M Total Market Size : 1B 2 Information Security Information Security B2B Market : 116M 333M 3 Data Retention Policies and Structure 18% 4 Remote Access Remote Access 11% 5 Staff and Management Training 13% 14% 6 Process Documentation and improvements 68% 76% 7 Saving and Making Money w/Technology 8 Technology Cost Controls 9 Budget Processes Consumer Smartphones used for business grow to 3X 2015 Individual-Biz Corporate-Biz CIO focus: Mobile mgmt / control and remote access& deployment of new 10 Project ManagementSource : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011 BYOD continues to be a driver Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011 2 Copyright © 2011 Juniper Networks, Inc.
  • 3. TABLET ADOPTION - MORE BUSINESS-READY DEVICES CAGR CAGRTablets, by Region CAGR CAGR Tablets, by OS 10-12 12-15# of units (M); Units sold 10-12 12-15 # units (M), Units Sold 18 103 326 350 142% 47% 142% 47% 326 7% 8% 7 14% 4% 300 11% 99% 140% 52% 68 22% 250 36% 202% 72% 200 118 141% 48% 150 83% 103 67% 100 2 19 117% 29% 141% 43% 46% 36 133 50 18 0 3 46 0 8 6 2009 2012 2015 2010 2012 2015 LA EMEA Others Android APAC NA Microsoft iOS Tablet Market Grows to 4X by 2015 Apple iOS leads but Android challenges Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update 3 Copyright © 2011 Juniper Networks, Inc.
  • 4. THE BYOD PHENOMENA CONTINUES TO EVOLVE Tuesday, January 3, 2012 For CIOs, Time To Deal With All Of Those Holiday Mobile Devices Trending Opportunity Trending Risk “At the end of 2011, almost half of “BYOD creates a whole new maze of mobile devices used in the workplace security risks that must be navigated. were employee owned, according to CIOs need to take a step back, assess IDC. These gadgets equal freedom for the specific security needs of their employees, which is why companies company’s confidential data, and then are increasingly embracing the BYOD, pick the right technology that enables or bring your own device, trend…” those controls...” CIOs need to embrace BYOD as the savings are too big to ignore. However, security risk continues to be a challenge.4 Copyright © 2011 Juniper Networks, Inc.
  • 5. The BYOD balance Private SecureDifferentiated CompliantPersonalized Users Corporate Authorized“At the heart of most BYOD plans is the assumption that users are willing to give upsome level of control over their personal devices in exchange for access tocorporate resources, such as networking and email. The extent to which users andcompanies may agree on the compromise will vary.” – Gartner, Oct 2011
  • 6. BYOD Demands and Challenges Any Device Any Location Any ApplicationPersonal devices used for Anytime, anywhere mobile Users download unknownwork remote access or un- / ill-secured appsWork devices used for Users with multiple devices Users access and storepersonal activities data from personal and business appsMultiple device types andservice providers
  • 7. MOBILE SECURITY REQUIREMENTS: ACCESS, DATA, APP and DEVICE PROTECTION•VPN •AV / AS•Authentication • On-device Malware, •Backup, Wipe & • Enterprise Grade Data Virus,Spyware•NAC in Transit Security Scanning & Removal Restore • Strong User • Data Loss & Theft • Segmentation Authentication • Content • All Network, Apps & monitoring & Resource Access Control Network Data Device App •Device Configuration • Malicious Apps • App Profile & •Device Inventory • Unauthorized Apps Control• MDM •Posture Assessment • Corp Apps / Ent App • Application-• Host Check •Differentiated Store Access Data Control• Device Device+User Access • App Inventory •Targeted Threats • Restriction &Protection Management Enterprises and Service Providers need to address all four Enterprises of mobile device management and security compliance dimensions care most about data breach and security 7 Copyright © 2011 Juniper Networks, Inc.
  • 8. EVOLVING AND EXPANDING BATTLEFRONTS THE DECENTRALIZED NATURE OF ATTACKS Inadequate Diverse Device Increasing security on user and OS implementation mobile devices profiles proliferation points8 Copyright © 2011 Juniper Networks, Inc.
  • 9. THE THREATS GROWTOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS9 Copyright © 2011 Juniper Networks, Inc. Source: Juniper Networks Mobile Threats Report 2011
  • 10. SO, WHAT ARE THE THREATS? Malware – Viruses, Worms, Trojans, Spyware Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft – Accessing sensitive data Data Communication Interception – Sniffing data as it is transmitted and received Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage 10 Copyright © 2011 Juniper Networks, Inc. 10 Copyright 2008 SMobile Systems
  • 11. ADDRESSING BYOD DRIVERS User Productivity + Economics Mobile 1 Device Proliferation Network and 2 Application Access Consistent 3 Security Comprehensive 4 Management11 Copyright © 2011 Juniper Copyright © 2011 Juniper Networks, Inc. Juniper Networks, Inc. Confidential
  • 12. THE STEPS TO SECURE BYOD Provide a safe, device-agnostic 1 connection everywhere Deliver secure, consistent 2 authentication, authorization and access Protect the user, their device and 3 data and your network, apps and data Simply manage the user, the device, 4 their apps and their access12 Copyright © 2011 Juniper Copyright © 2011 Inc. Networks, Inc. Juniper Networks,
  • 13. ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE Users can choose and change their mobile devices Manage the connection, access and the device Enable user self-provisioning Security works the same on premises and off13 Copyright © 2011 Juniper Copyright © 2011 Inc. Networks, Inc. Juniper Networks,
  • 14. ADDRESSING PERSONAL MOBILE DEVICE USE Protect personal mobile devices and apps, as well as corporate networks, resources and data Manage personal mobile devices, network / resource access, apps and users comprehensively CONNECTSMBs, Enterprises and Government Connect personal mobile devices to corporate networks, clouds, resources and data simply and securely 14 Copyright © 2011 Juniper Networks, Inc.
  • 15. CONNECTSECURE MOBILE REMOTE ACCESS SECURE DATA IN TRANSIT to protect against hacks and data theft SUPPORT EXISTING AUTHENTICATION METHODS, including multi-factor authentication IDENTITY-ENABLED mobile, remote network and application access CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network15 Copyright © 2011 Juniper Networks, Inc.
  • 16. PROTECTMOBILE DEVICE SECURITY ANTI-MALWARE which scans all files and connections – even SD cards – with real-time updates LOSS AND THEFT PROTECTION, including locate and track, remote lock and wipe, alerts, and more ANTI-SPAM to block SMS and voice spam, with automatic denial options MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters16 Copyright © 2011 Juniper Networks, Inc.
  • 17. MANAGEUSER, DEVICE AND APP MANAGEMENT CONFIGURE AND PROVISION accounts, security policies, certificates… AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending apps COLLECT AND REPORT on device and compliance information, loaded apps and more REMOTELY MANAGE AND CONFIGURE lost/stolen devices – remote locate, track, lock, wipe…17 Copyright © 2011 Juniper Networks, Inc.
  • 18. JUNOS PULSE: HIGH LEVEL OVERVIEW THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION Anytime, Anywhere Anytime, Anywhere Secure Access Threat Protection • Corporate / Cloud VPN • Mobile Loss and Theft • Authentication • Mobile Threat Prevention • Differentiated Access Connect Protect Manage Anytime, Anywhere Device and App Control • Device Management • App Management • Content monitoring18 Copyright © 2011 Juniper Networks, Inc.