• Like
Securing the Mobile Enterprise
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Securing the Mobile Enterprise

  • 757 views
Published

A new approach to mobile security means different things to different groups. This presentation provides of an overview of the key players and tactics for security. …

A new approach to mobile security means different things to different groups. This presentation provides of an overview of the key players and tactics for security.

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
757
On SlideShare
0
From Embeds
0
Number of Embeds
2

Actions

Shares
Downloads
21
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. SECURING THE MOBILE ENTERPRISE
  • 2. 2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE A new approach to mobile security means different things to different groups:  Employees want to connect to the network using multiple devices, based on their needs. This makes them more productive and happier.  IT faces a security challenge because meeting enterprise objectives requires looking at security on a per-person basis so that people’s security profile can follow them to different locations, devices and applications. These security profiles must be provided for each device used and may dictate what each user can or cannot do in an unobtrusive way.  Mobile device management requires security policies, software patches, updates, policy enforcement, remote wipe and lock capabilities and application blacklisting or whitelisting.
  • 3. 3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE Devising a security policy:  User groups covered by security policies include internal constituencies, visitors, customers, partners and contractors.  Security policies must include enforcement mechanisms to ensure that policies are carried out and agreements from BYOD users that state that:  Users will secure the device with a password.  Users will allow the company to wipe the email account and certain data if the device is compromised.  Companies need to determine which applications will or won’t be allowed, depending on the user group. For example, the marketing group may be allowed to use web apps like Facebook for work-related purposes only. Companies should also be able to prevent the use of mobile features or functions such as cameras in sensitive areas. All policies for mobile devices must sync with the company’s overall IT policy.
  • 4. 4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE Mobile-Ready Security Solution: Benefits Enabled Owner Approach Resolved? Can you create policies once, across wired, wireless and remote access networks? This should include device coverage for BYOD and IT-managed devices. Can you get a deep understanding of app behavior and traffic flows for protection from common evasion techniques and malware attacks? Will you get context-aware policies, tailored to security risk? Do you have a choice between client and clientless deployment? Does your solution allow enterprise access from outside the enterprise perimeter? Do users get a better user experience regardless of how they connect, wired or wirelessly? Are you offered connectivity for on- demand business applications, fewer devices, simplified management and more automation? Use the following checklist to consider a mobile security solution to meet your needs.
  • 5. 5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net Click to access the white paper and get the complete CIO Playbook: Building the Anytime, Anywhere Network at http://juni.pr/cioPBss. BUILDING THE ANYTIME, ANYWHERE NETWORK