BYOD – Four Steps to EnablingYour NetworkMichael Greco, Director , Security, APAC
MOBILE DEVICE USAGE IN ENTERPRISE                     Market Size - Smartphone                                            ...
TABLET ADOPTION       - MORE BUSINESS-READY DEVICES                                                                       ...
THE BYOD PHENOMENA CONTINUES TO EVOLVE                                                 Tuesday, January 3, 2012         Fo...
The BYOD balance    Private                                                           SecureDifferentiated                ...
BYOD Demands and Challenges   Any Device                Any Location                 Any ApplicationPersonal devices used ...
MOBILE SECURITY REQUIREMENTS:          ACCESS, DATA, APP and DEVICE PROTECTION•VPN                                        ...
EVOLVING AND EXPANDING BATTLEFRONTS              THE DECENTRALIZED NATURE OF ATTACKS     Inadequate         Diverse       ...
THE THREATS GROWTOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS9                              Copyright © 2011 J...
SO, WHAT ARE THE THREATS?          Malware – Viruses, Worms,          Trojans, Spyware          Direct Attack – Attacking ...
ADDRESSING BYOD DRIVERS     User Productivity                                          +                          Economic...
THE STEPS TO SECURE BYOD                Provide a safe, device-agnostic      1         connection everywhere              ...
ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE     Users can choose and change their mobile devices     Manage the ...
ADDRESSING PERSONAL MOBILE DEVICE USE                                               Protect personal mobile devices       ...
CONNECTSECURE MOBILE REMOTE ACCESS                                               SECURE DATA IN TRANSIT to                ...
PROTECTMOBILE DEVICE SECURITY                                                ANTI-MALWARE which scans all                 ...
MANAGEUSER, DEVICE AND APP MANAGEMENT                                                CONFIGURE AND PROVISION              ...
JUNOS PULSE: HIGH LEVEL OVERVIEW THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION     Anytime, Anywhere             ...
Upcoming SlideShare
Loading in...5
×

Byod four steps to enabling your network michael greco

526

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
526
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
16
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Byod four steps to enabling your network michael greco

  1. 1. BYOD – Four Steps to EnablingYour NetworkMichael Greco, Director , Security, APAC
  2. 2. MOBILE DEVICE USAGE IN ENTERPRISE Market Size - Smartphone IT Manager’s Top Initiatives 2011 2015 1 Control and Use of Mobile Devices Control and Use of Mobile Devices Total Market Size : 475M Total Market Size : 1B 2 Information Security Information Security B2B Market : 116M 333M 3 Data Retention Policies and Structure 18% 4 Remote Access Remote Access 11% 5 Staff and Management Training 13% 14% 6 Process Documentation and improvements 68% 76% 7 Saving and Making Money w/Technology 8 Technology Cost Controls 9 Budget Processes Consumer Smartphones used for business grow to 3X 2015 Individual-Biz Corporate-Biz CIO focus: Mobile mgmt / control and remote access& deployment of new 10 Project ManagementSource : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011 BYOD continues to be a driver Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  3. 3. TABLET ADOPTION - MORE BUSINESS-READY DEVICES CAGR CAGRTablets, by Region CAGR CAGR Tablets, by OS 10-12 12-15# of units (M); Units sold 10-12 12-15 # units (M), Units Sold 18 103 326 350 142% 47% 142% 47% 326 7% 8% 7 14% 4% 300 11% 99% 140% 52% 68 22% 250 36% 202% 72% 200 118 141% 48% 150 83% 103 67% 100 2 19 117% 29% 141% 43% 46% 36 133 50 18 0 3 46 0 8 6 2009 2012 2015 2010 2012 2015 LA EMEA Others Android APAC NA Microsoft iOS Tablet Market Grows to 4X by 2015 Apple iOS leads but Android challenges Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  4. 4. THE BYOD PHENOMENA CONTINUES TO EVOLVE Tuesday, January 3, 2012 For CIOs, Time To Deal With All Of Those Holiday Mobile Devices Trending Opportunity Trending Risk “At the end of 2011, almost half of “BYOD creates a whole new maze of mobile devices used in the workplace security risks that must be navigated. were employee owned, according to CIOs need to take a step back, assess IDC. These gadgets equal freedom for the specific security needs of their employees, which is why companies company’s confidential data, and then are increasingly embracing the BYOD, pick the right technology that enables or bring your own device, trend…” those controls...” CIOs need to embrace BYOD as the savings are too big to ignore. However, security risk continues to be a challenge.4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  5. 5. The BYOD balance Private SecureDifferentiated CompliantPersonalized Users Corporate Authorized“At the heart of most BYOD plans is the assumption that users are willing to give upsome level of control over their personal devices in exchange for access tocorporate resources, such as networking and email. The extent to which users andcompanies may agree on the compromise will vary.” – Gartner, Oct 2011
  6. 6. BYOD Demands and Challenges Any Device Any Location Any ApplicationPersonal devices used for Anytime, anywhere mobile Users download unknownwork remote access or un- / ill-secured appsWork devices used for Users with multiple devices Users access and storepersonal activities data from personal and business appsMultiple device types andservice providers
  7. 7. MOBILE SECURITY REQUIREMENTS: ACCESS, DATA, APP and DEVICE PROTECTION•VPN •AV / AS•Authentication • On-device Malware, •Backup, Wipe & • Enterprise Grade Data Virus,Spyware•NAC in Transit Security Scanning & Removal Restore • Strong User • Data Loss & Theft • Segmentation Authentication • Content • All Network, Apps & monitoring & Resource Access Control Network Data Device App •Device Configuration • Malicious Apps • App Profile & •Device Inventory • Unauthorized Apps Control• MDM •Posture Assessment • Corp Apps / Ent App • Application-• Host Check •Differentiated Store Access Data Control• Device Device+User Access • App Inventory •Targeted Threats • Restriction &Protection Management Enterprises and Service Providers need to address all four Enterprises of mobile device management and security compliance dimensions care most about data breach and security 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  8. 8. EVOLVING AND EXPANDING BATTLEFRONTS THE DECENTRALIZED NATURE OF ATTACKS Inadequate Diverse Device Increasing security on user and OS implementation mobile devices profiles proliferation points8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  9. 9. THE THREATS GROWTOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Source: Juniper Networks Mobile Threats Report 2011
  10. 10. SO, WHAT ARE THE THREATS? Malware – Viruses, Worms, Trojans, Spyware Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft – Accessing sensitive data Data Communication Interception – Sniffing data as it is transmitted and received Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.netPage 10 Copyright 2008 SMobile Systems
  11. 11. ADDRESSING BYOD DRIVERS User Productivity + Economics Mobile 1 Device Proliferation Network and 2 Application Access Consistent 3 Security Comprehensive 4 Management11 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net Networks, Inc. Juniper Networks, Inc. Confidential
  12. 12. THE STEPS TO SECURE BYOD Provide a safe, device-agnostic 1 connection everywhere Deliver secure, consistent 2 authentication, authorization and access Protect the user, their device and 3 data and your network, apps and data Simply manage the user, the device, 4 their apps and their access12 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  13. 13. ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE Users can choose and change their mobile devices Manage the connection, access and the device Enable user self-provisioning Security works the same on premises and off13 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  14. 14. ADDRESSING PERSONAL MOBILE DEVICE USE Protect personal mobile devices and apps, as well as corporate networks, resources and data Manage personal mobile devices, network / resource access, apps and users comprehensively CONNECTSMBs, Enterprises and Government Connect personal mobile devices to corporate networks, clouds, resources and data simply and securely 14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  15. 15. CONNECTSECURE MOBILE REMOTE ACCESS SECURE DATA IN TRANSIT to protect against hacks and data theft SUPPORT EXISTING AUTHENTICATION METHODS, including multi-factor authentication IDENTITY-ENABLED mobile, remote network and application access CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  16. 16. PROTECTMOBILE DEVICE SECURITY ANTI-MALWARE which scans all files and connections – even SD cards – with real-time updates LOSS AND THEFT PROTECTION, including locate and track, remote lock and wipe, alerts, and more ANTI-SPAM to block SMS and voice spam, with automatic denial options MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  17. 17. MANAGEUSER, DEVICE AND APP MANAGEMENT CONFIGURE AND PROVISION accounts, security policies, certificates… AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending apps COLLECT AND REPORT on device and compliance information, loaded apps and more REMOTELY MANAGE AND CONFIGURE lost/stolen devices – remote locate, track, lock, wipe…17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  18. 18. JUNOS PULSE: HIGH LEVEL OVERVIEW THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION Anytime, Anywhere Anytime, Anywhere Secure Access Threat Protection • Corporate / Cloud VPN • Mobile Loss and Theft • Authentication • Mobile Threat Prevention • Differentiated Access Connect Protect Manage Anytime, Anywhere Device and App Control • Device Management • App Management • Content monitoring18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×