SlideShare a Scribd company logo
1 of 8
Download to read offline
WHITE PAPER
Copyright © 2011, Juniper Networks, Inc.
SECURING TODAY’S
MOBILE WORKFORCE
Connect, Secure, and Manage Mobile Devices and
Users with Junos Pulse and the Junos Pulse Mobile
Security Suite
2 Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - Securing Today’s Mobile Workforce
Table of Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Junos Pulse Mobile Security Suite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Mobile Device Security on a Broad Range of Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Develop Flexible Mobility Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Support the Latest Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Loss and Theft Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Mobile Device Management (MDM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Granular Access Control with Juniper’s SSL VPN Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Enforce Strong Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Zero-Touch Provisioning of Mobile Access for New Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Copyright © 2011, Juniper Networks, Inc. 3
WHITE PAPER - Securing Today’s Mobile Workforce
Executive Summary
Enterprises today are challenged with deploying mobile security and granular access control on a growing number of diverse
mobile platforms, including Apple iOS, Google Android, Nokia Symbian, Microsoft Windows Mobile, and BlackBerry. With
increasing choices of smartphones, tablets, and other types of mobile devices, employees often bring their personal devices
into the enterprise and use them to access corporate resources. This has started the trend of “Bring Your Own Device” to
work (or “BYOD”), encouraging employees to use their own personal mobile devices to access the enterprise network and
resources. But, BYOD brings with it issues such as mobile and network security, and it further burdens IT staff with the
increasing “consumerization of IT.” Also, when personal mobile devices used at work are lost or stolen, enterprises risk losing
sensitive corporate data such as e-mail, sensitive documents, or even valuable intellectual property (IP).
Juniper Networks®
Junos®
Pulse creates a comprehensive solution that secures enterprise mobility. The Junos Pulse
solution consists of mobile device security and mobile device management (MDM) provided through Juniper Networks
Junos Pulse Mobile Security Suite. This is combined with secure mobile access control, which is delivered through Juniper’s
market-leading SSL VPN products. With this solution, enterprises can rise above the challenges of a heterogeneous mobile
environment, as well as secure mobile devices from malicious attacks and theft. The richness of mobile security features
in this solution, combined with a tight enforcement of access control policies as defined on the Juniper Networks MAG
Series Junos Pulse Gateways running the Junos Pulse Secure Access Service, constitutes a compelling mobility solution for
enterprises worldwide.
Overview
Many enterprises today struggle with the challenges involved in enabling secure, remote network and application access
for mobile device users, while conforming to corporate security policies.
This paper describes how Junos Pulse and the Junos Pulse Mobile Security Suite alleviate today’s enterprise mobility
challenges. With the Juniper Networks Junos Pulse client application that is available from leading application stores,
Juniper’s award-winning SSL VPN products, and a web-based management console, the Junos Pulse Mobile Security
Suite enables enterprises to deploy security, device management, and remote access for mobile devices at scale.
Introduction
Users are beginning to use their own personal mobile devices—smartphones, tablets, and the like—to access corporate data
and applications. These mobile devices are less cumbersome to carry than notebook computers or netbooks, and they have
the features and applications needed to deliver corporate data to the user. The concept of corporate issued mobile devices
is beginning to fade away, replaced by the trend of BYOD. But enabling corporate access on personal mobile devices requires
enterprises to enforce similar corporate policies, including authentication methods, data protection, access and security
settings, device management, and endpoint assessment as are already in place for their corporate managed Windows, Mac
OS X, and Linux based systems.
Along with the enhanced portability of mobile devices also comes the risk of increased loss and theft of these devices.
Enterprises risk loss of valuable, sensitive corporate data when a mobile device is lost or stolen. Users also risk loss of
their personal data on lost or stolen mobile devices, since some applications are designed to store passwords, credit card
information, bank account information, and other personal data, as well as store passwords for accessing personal apps
such as social networking apps as well as business apps.
Finally, mobile devices run a variety of operating systems designed specifically for their smaller form factor. Most of
the mobile platforms are open for third-party application development, and they support thriving application stores or
marketplaces for these independently developed mobile apps. Unfortunately, this also presents a huge opportunity for
hackers to build malicious applications for unsuspecting users to download. The number of threats such as viruses, trojans,
and malware reported on mobile devices is increasing rapidly.
4 Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - Securing Today’s Mobile Workforce
The proliferation of mobile devices presents several challenges to an enterprise:
• Adapting mobility policies to align with the current trend of employees using personal mobile devices for corporate use
• Delivering secure, remote access for mobile devices, while enforcing granular access control
• Securing corporate and personal data, and mobile devices from malware, viruses, and malicious applications
• Mitigating the risk of loss, theft, or exploitation of corporate and personal data residing on mobile devices
• Providing all of the above for an ever increasing range of mobile devices and platforms, including Apple iOS, Google
Android, BlackBerry, Microsoft Windows Mobile, and Nokia Symbian based devices
Junos Pulse Mobile Security Suite
Junos Pulse Mobile Security Suite is a comprehensive solution that enables enterprises to
secure and manage mobile devices at scale. It protects mobile devices against malware,
viruses, trojans, spyware, and other threats and malicious attacks on all of today’s
leading mobile platforms and operating systems. The Mobile Security Suite also includes
mobile device management and configuration features that mitigate the risk of losing
corporate as well as personal data on lost or stolen devices; provide device configuration
for accounts, policies, and application restrictions; provision certificates; query for, collect,
and leverage device information, compliance data, and GPS position; assess application
asset management and inventory; and provide device management configuration.
The Junos Pulse Mobile Security Suite is enforced on mobile devices through the Junos
Pulse client, which is available for the following mobile platforms in their respective
application stores1
:
• Apple iOS 4.X or later
• Google Android 2.X and 3.0 (Honeycomb)
• Nokia Symbian2
S60 5th Edition and Symbian ^3
• Windows Mobile 6.0, 6.1, and 6.5
• BlackBerry 4.2 or later
Mobile users can download the Junos Pulse client by browsing in the “business” category
of their mobile application store or marketplace.
For the administrator to configure and manage mobile security policies, the Mobile Security Suite also includes the Junos
Pulse Mobile Security Gateway management console. The Mobile Security Gateway is available as a hosted Software-as-a-
Service (SaaS) web-based console, simplifying deployment within an enterprise, without the need to set up and maintain an
onsite server. The Mobile Security Gateway keeps all of the Junos Pulse Mobile Security Suite-enabled devices automatically
updated with the latest emerging threat definitions, and also provides detailed reports on virus infections, updates, and the
latest threats detected on mobile devices accessing the enterprise network.
Mobile Device Security on a Broad Range of Platforms
The Junos Pulse Mobile Security Suite protects mobile devices from a broad range of threats that include malware, viruses,
trojans, and worms. It protects a mobile device from viruses and other malicious content that may get downloaded to the
device via Short Message Service (SMS), Multimedia Messaging Service (MMS), e-mail, or other sources. It also protects the
enterprise and the user from data loss or unauthorized access on lost or stolen devices. One of the strengths of the solution is
the breadth of security features supported across most leading mobile platforms available today.
1
The Junos Pulse for Windows Mobile client may be downloaded from http://www.juniper.net/support/products/pulse/mobile/#sw.
2
Junos Pulse for Nokia Symbian will be available in Q4 2011
Copyright © 2011, Juniper Networks, Inc. 5
WHITE PAPER - Securing Today’s Mobile Workforce
Develop Flexible Mobility Policies
Enterprises can leverage the Mobile Security Suite to adapt to the current trend of employees and other authorized individuals
using their personal mobile devices to access the corporate network. They can meet this challenge by not only enabling
secure, granular access to corporate resources, but also by securing the user’s mobile device from threats. This allows for a
flexible mobility policy, enabling more employee choice while at the same time not compromising corporate security policies.
The solution also enables enterprises to support a heterogeneous mobile environment spanning multiple mobile platforms,
differing greatly from most current mobile security deployments which only support one or two mobile platforms.
Support the Latest Mobile Devices
The Junos Pulse Mobile Security Suite enables enterprises to support new devices and mobile operating systems as soon as
they hit the market. The solution supports a broad range of operating system platforms, including Apple iOS, Google Android,
Nokia Symbian, Microsoft Windows Mobile, and RIM BlackBerry. These leading mobile operating systems are powering a
large majority of all smartphones, tablets, and other mobile devices available worldwide. Enterprises can remain assured that
by deploying the Junos Pulse Mobile Security Suite, they will be able to support new mobile devices available in the market
that run any of the supported mobile platforms.
When employees replace their personal mobile devices with new devices, the administrator can simply de-provision the older
device from the network and provision security on the newer device. The older device will then no longer be able to access
the corporate network via VPN. From an enterprise perspective, this also enables a flexible model of provisioning access to
new mobile devices and de-provisioning lost or stolen devices.
The Junos Pulse Mobile Security Suite antimalware service updates its virus signatures in real time over the air (OTA). The
virus signatures are updated by the Juniper Networks Global Threat Center, by our mobile malware research and analysis
team. These signatures are downloaded dynamically to every mobile device running the Junos Pulse Mobile Security Suite,
without intervention from either the user or the enterprise. This enables a low cost, real-time enforcement model for security
policies on all supported devices.
Loss and Theft Protection
Enterprises can use the Junos Pulse Mobile Security Suite to retrieve lost devices by either remotely locating them via GPS, or
by remotely setting off alarms on them. If the device has indeed been stolen, an administrator can remotely lock the device,
or even remotely wipe the device’s contents through the Junos Pulse Mobile Security Gateway management console
Enterprises and users can also remotely back up the content of users’ mobile devices and restore the backed up data to a
new device when the user or enterprise replaces the lost or stolen device, regardless whether the replaced device is the same
make of smartphone or tablet, or if it uses the same mobile operating system as the lost or stolen device. The loss prevention
and control features of Mobile Security Suite are easily administered via the web-based Junos Pulse Mobile Security Gateway
management console. This gives administrators the ability and control to proactively protect the enterprise and user from
losing valuable data.
Mobile Device Management (MDM)
Junos Pulse Mobile Security Suite supports MDM capabilities for most major mobile operating system platforms, enabling
enterprises to set and enforce granular security and management policies on company owned and operated devices, as well
as personal mobile devices used to access the enterprise network and its resources.
By supporting MDM capabilities on Apple iOS3
, which is the mobile operating system platform for Apple iPhones, iPads, and
iPod touch devices, Junos Pulse Mobile Security Suite is easing the burden on enterprise IT staff when it comes to the growing
“consumerization of IT.” By empowering an administrator to enable or disable certain features, to allow or disallow specific
applications, and to remotely enforce security policies on a user’s personal device when it is being used within the enterprise
or to access the enterprise network and its applications and data, Junos Pulse Mobile Security Suite helps to ensure the
enterprise’s security for and from personal mobile devices and unapproved mobile apps and functions. The ability to define
and enforce security policies and application restrictions protects the user, the device, the enterprise, personal and enterprise
data, and intellectual property from exploit, harm, or misuse.
3
Apple iOS MDM functionality in Junos Pulse Mobile Security Suite is available only to enterprises that have applied to and are members of the Apple iOS Enterprise
Developer Program. For further information on, and to sign up for the iOS Enterprise Developer Program, please go to http://developer.apple.com/programs/ios/enterprise/.
6 Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - Securing Today’s Mobile Workforce
Mobile Security Suite can also query a smartphone or tablet for specific device and compliance information, as well as
enabling an inventory of apps loaded on the mobile device and the GPS location of the Apple iOS device. By capturing the
device’s GPS location, an enterprise or employee can locate and track an employee’s lost or stolen mobile device—regardless
if it is BYOD or corporate issued. The device may also be remotely locked and wiped of data, particularly effective if the
mobile device has been stolen for nefarious purposes.
For Google Android-based mobile devices, with the appropriate permissions and access rights, the Mobile Security Suite
can allow enterprises to automatically remove apps with no user interaction or user notification of the app’s removal. Also,
Junos Pulse will automatically remove identified malware on an Android mobile device, again without user intervention or
knowledge, and only with the proper permissions and rights. If an application is automatically removed from an employee’s
Android device, the application’s removal will be noted for an administrator on the Junos Pulse Mobile Security Gateway
management console. The MDM capabilities for Android-based devices in the Mobile Security Suite are available with
Android-based mobile devices from various manufacturers. Please refer to the Junos Pulse supported platforms document
for further details on supported Android devices
Finally, the Junos Pulse Mobile Security Suite delivers and supports several additional MDM capabilities on Google Android,
Microsoft Windows Mobile, and Nokia Symbian based mobile devices. These include mobile device remote locate and track
leveraging the mobile device’s GPS functionality, remote device lock and wipe, SIM change notification, and other security
measures related to SIM change or removal.
Granular Access Control with Juniper’s SSL VPN Products
The Junos Pulse Mobile Security Suite provides a tight integration with Junos Pulse, Juniper Networks SA Series SSL VPN
Appliances, and the MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service. The security features
enabled on the Junos Pulse clients can serve as an endpoint security (or Host Checker) policy on the Juniper SSL VPN
platform. An administrator can configure Juniper SSL VPN platforms to allow remote VPN access from only those mobile
devices on which the Junos Pulse Mobile Security Suite has been activated and registered. This complements the Host
Checker policies already available on the SA Series for Microsoft Windows and Apple Mac OS X platforms, as well as the
MAG Series for Microsoft Windows. The Junos Pulse client on the mobile device is a single integrated client that can provide
both secure, mobile remote VPN access through the SA Series appliance or MAG Series gateway, as well as mobile security
from viruses, malware, and other threats through the Junos Pulse Mobile Security Suite integrated with the Host Checker
capabilities, which are included with both the SA Series appliances and MAG Series gateways.
Enforce Strong Authentication
The Junos Pulse client supports strong methods of authenticating to the Juniper SSL VPN platform, including certificate-
based, password-based, and multifactor authentication. Administrators can enforce the same level of authentication and
access control for mobile devices and operating systems as from Microsoft Windows or Apple Mac OS-based systems,
delivering seamless, cross-platform authentication for all users, regardless of their device.
Zero-Touch Provisioning of Mobile Access for New Users
Junos Pulse provides a simple deployment mechanism for enforcing role-based granular access control to corporate
networks and applications. It is especially cost-effective when provisioning access for new employees and authorized users.
New employees or authorized users need only to be instructed to download Junos Pulse from the respective application store
accessible from their mobile devices and to be provided with a license code to activate Mobile Security Suite features on their
devices. Once a user does this, the policies on the SA Series appliance or MAG Series gateway will provision the appropriate
set of network and application access rights, depending on the roles and groups to which that user belongs.
With Junos Pulse, mobile users can become more productive from their smartphones, tablets, and other mobile devices:
• Users can access not just corporate e-mail, but also web-based applications on the corporate intranet or in the corporate
cloud. They can also access applications such as SAP or Oracle using client applications available in the respective mobile
operating platform application store.
• IT departments, meanwhile, can remain assured that managed or unmanaged, personal or corporate issued mobile
devices, as well as corporate data and applications, are protected anywhere, anytime through the Junos Pulse Mobile
Security Suite.
Copyright © 2011, Juniper Networks, Inc. 7
WHITE PAPER - Securing Today’s Mobile Workforce
This is a unique model of provisioning access control and security for mobile devices, with seamless integration with existing
VPN infrastructure. Enterprises can now establish and enforce corporate mobility policies, combining VPN access control
with mobile security.
Junos Pulse, in conjunction with a Juniper SSL VPN platform, enables granular access control for mobile devices to the
enterprise network and applications via the following methods:
• Full network access, such as access to client/server and other enterprise network- or cloud-based applications, with a
similar user experience to accessing them from notebooks, netbooks, or desktop computers
• E-mail and calendaring via ActiveSync to Microsoft Exchange servers
• Web browser-based access
Users can be dynamically provisioned with access to the corporate network and applications by one or more of the above
remote access methods following policies configured on the appropriate and applicable Juniper SSL VPN platform.
Conclusion
Junos Pulse is a comprehensive secure mobility solution—including mobile security, MDM, and secure mobile remote
access—that protects mobile devices from a wide range of threats such as viruses, malware, trojans, and worms. It provides
enterprises with the security tools they need to manage a nonhomogenous mobile environment, and it mitigates the risks
of losing sensitive, critical corporate and personal data on lost or stolen mobile devices. These tools include the ability to
remotely locate, track, wipe, and lock an employee’s mobile device, as well as the ability to set and manage device passcodes
and set off remote alarms on a lost or stolen device. The deployment of the Junos Pulse Mobile Security Suite as a hosted
SaaS option provides the flexibility enterprises need to centrally manage all mobile security policies for their networks. The
Mobile Security Suite – and its Junos Pulse Mobile Security Gateway – as a hosted SaaS environment allows enterprises
to quickly deploy and secure their network from insecure or ill-secured mobile devices, as well as expedite mitigation when
exposed to infection and exploit.
Enterprises can also cut their overall security expenses—specifically mobile security expenses—since a SaaS solution does
not require as many resources to maintain and support today’s vast array of mobile devices needing secure access to the
corporate network environment. Enterprises can enable increases to the number of secured mobile devices and users simply
and quickly, while allowing the enterprise to add new mobile security features or to take advantage of new security features
and capabilities remotely over the air.
Finally, the option to seamlessly integrate the Junos Pulse Mobile Security Suite, including Junos Pulse, with the industry-
leading Juniper Networks SSL VPN products—SA Series SSL VPN Appliances or MAG Series Junos Pulse Gateways running
Junos Pulse Secure Access Service—provides an enterprise the required endpoint security and access features to effectively
enforce corporate compliance policies. This enables enterprises to remain consistent with endpoint security and access
policies that may already be in place for Microsoft Windows, Apple Mac OS and other computing platforms, thereby
alleviating user confusion and potentially costly support bottlenecks.
To purchase Juniper Networks solutions, please contact your Juniper networks representative at 1-866-298-6428 or
authorized reseller, or visit Juniper Networks at www.juniper.net.
8 Copyright © 2011, Juniper Networks, Inc.
WHITE PAPER - Securing Today’s Mobile Workforce
2000363-004-EN Sept 2011
Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,
NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered marks, or registered service marks are the property of
their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
EMEA Headquarters
Juniper Networks Ireland
Airside Business Park
Swords, County Dublin, Ireland
Phone: 35.31.8903.600
EMEA Sales: 00800.4586.4737
Fax: 35.31.8903.601
APAC Headquarters
Juniper Networks (Hong Kong)
26/F, Cityplaza One
1111 King’s Road
Taikoo Shing, Hong Kong
Phone: 852.2332.3636
Fax: 852.2574.7803
Corporate and Sales Headquarters
Juniper Networks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089 USA
Phone: 888.JUNIPER (888.586.4737)
or 408.745.2000
Fax: 408.745.2100
www.juniper.net
Printed on recycled paper
To purchase Juniper Networks solutions,
please contact your Juniper Networks
representative at 1-866-298-6428 or
authorized reseller.
About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers,
Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The
company serves customers and partners worldwide. Additional information can be found at www.juniper.net.

More Related Content

Similar to Securing todays mobile_workforce-white_paper

White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...EMC
 
Using Windows Azure Mobile Services to Cloud-Enable
Using Windows Azure Mobile Services to Cloud-EnableUsing Windows Azure Mobile Services to Cloud-Enable
Using Windows Azure Mobile Services to Cloud-EnableJose Vergara Veas
 
Uwams cloud enable-windows_store_apps_java_script
Uwams cloud enable-windows_store_apps_java_scriptUwams cloud enable-windows_store_apps_java_script
Uwams cloud enable-windows_store_apps_java_scriptSteve Xu
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview GuideDavid J Rosenthal
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksJustin Cletus
 
ZTE Axon 7 Manual/User Guide
ZTE Axon 7 Manual/User GuideZTE Axon 7 Manual/User Guide
ZTE Axon 7 Manual/User Guidemanualsheet
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudJohn Atchison
 
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?Craig Newell
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityEnclaveSecurity
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesSymantec
 
Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Eswar Publications
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwCarolineFlamand
 

Similar to Securing todays mobile_workforce-white_paper (20)

White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Sandy DiFranco Portfolio
Sandy DiFranco PortfolioSandy DiFranco Portfolio
Sandy DiFranco Portfolio
 
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
Goode Intelligence: Next-Generation Authentication for the Mobile-Ready Enter...
 
Using Windows Azure Mobile Services to Cloud-Enable
Using Windows Azure Mobile Services to Cloud-EnableUsing Windows Azure Mobile Services to Cloud-Enable
Using Windows Azure Mobile Services to Cloud-Enable
 
Uwams cloud enable-windows_store_apps_java_script
Uwams cloud enable-windows_store_apps_java_scriptUwams cloud enable-windows_store_apps_java_script
Uwams cloud enable-windows_store_apps_java_script
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
 
Mobile device management key components
Mobile device management key componentsMobile device management key components
Mobile device management key components
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Job help
Job helpJob help
Job help
 
Alternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networksAlternatives for-securing-virtual-networks
Alternatives for-securing-virtual-networks
 
ZTE Axon 7 Manual/User Guide
ZTE Axon 7 Manual/User GuideZTE Axon 7 Manual/User Guide
ZTE Axon 7 Manual/User Guide
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloudIntegrated-Security-Solution-for-the-virtual-data-center-and-cloud
Integrated-Security-Solution-for-the-virtual-data-center-and-cloud
 
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
VMworld 2012 - EUC 1823: What Makes a Mobile Workspace Better?
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Practical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device securityPractical steps for assessing tablet & mobile device security
Practical steps for assessing tablet & mobile device security
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...Review of Considerations for Mobile Device based Secure Access to Financial S...
Review of Considerations for Mobile Device based Secure Access to Financial S...
 
Mobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lwMobile exalead-whitepaper-a4-8-lw
Mobile exalead-whitepaper-a4-8-lw
 

More from Catherine Pham

Employee Benefits PowerPoint Infographic Templates.pptx
Employee Benefits PowerPoint Infographic Templates.pptxEmployee Benefits PowerPoint Infographic Templates.pptx
Employee Benefits PowerPoint Infographic Templates.pptxCatherine Pham
 
Top 5 Marketing Automation Software that Save You More Time
Top 5 Marketing Automation Software that Save You More TimeTop 5 Marketing Automation Software that Save You More Time
Top 5 Marketing Automation Software that Save You More TimeCatherine Pham
 
How to know if your infographics suck
How to know if your infographics suckHow to know if your infographics suck
How to know if your infographics suckCatherine Pham
 
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...Catherine Pham
 
5 Ways Infographics Can Strengthen Your Sales Funnel
5 Ways Infographics Can Strengthen Your Sales Funnel 5 Ways Infographics Can Strengthen Your Sales Funnel
5 Ways Infographics Can Strengthen Your Sales Funnel Catherine Pham
 
Top 7 Online Tools to Create Visual Content that Engages
Top 7 Online Tools to Create Visual Content that EngagesTop 7 Online Tools to Create Visual Content that Engages
Top 7 Online Tools to Create Visual Content that EngagesCatherine Pham
 
Top 28 Social Media Tools to Make Your Job Easier
Top 28 Social Media Tools to Make Your Job EasierTop 28 Social Media Tools to Make Your Job Easier
Top 28 Social Media Tools to Make Your Job EasierCatherine Pham
 
Top 10 Free Online Tools to Create Your Infographics
Top 10 Free Online Tools to Create Your InfographicsTop 10 Free Online Tools to Create Your Infographics
Top 10 Free Online Tools to Create Your InfographicsCatherine Pham
 
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionTop 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionCatherine Pham
 
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionTop 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionCatherine Pham
 
How to create visual marketing success with infographics
How to create visual marketing success with infographicsHow to create visual marketing success with infographics
How to create visual marketing success with infographicsCatherine Pham
 
18 ideas for visual content on social media
18 ideas for visual content on social media18 ideas for visual content on social media
18 ideas for visual content on social mediaCatherine Pham
 
10 Successful Visual Content Marketing Stories
10 Successful Visual Content Marketing Stories10 Successful Visual Content Marketing Stories
10 Successful Visual Content Marketing StoriesCatherine Pham
 
Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Catherine Pham
 
Top 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingTop 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingCatherine Pham
 
Top 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingTop 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingCatherine Pham
 
Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Catherine Pham
 
How to create infographics in one hour or less
How to create infographics in one hour or lessHow to create infographics in one hour or less
How to create infographics in one hour or lessCatherine Pham
 
Infographics for Marketing & Communication [White Paper]
Infographics for Marketing & Communication [White Paper]Infographics for Marketing & Communication [White Paper]
Infographics for Marketing & Communication [White Paper]Catherine Pham
 
White paper creation mistakes
White paper creation mistakesWhite paper creation mistakes
White paper creation mistakesCatherine Pham
 

More from Catherine Pham (20)

Employee Benefits PowerPoint Infographic Templates.pptx
Employee Benefits PowerPoint Infographic Templates.pptxEmployee Benefits PowerPoint Infographic Templates.pptx
Employee Benefits PowerPoint Infographic Templates.pptx
 
Top 5 Marketing Automation Software that Save You More Time
Top 5 Marketing Automation Software that Save You More TimeTop 5 Marketing Automation Software that Save You More Time
Top 5 Marketing Automation Software that Save You More Time
 
How to know if your infographics suck
How to know if your infographics suckHow to know if your infographics suck
How to know if your infographics suck
 
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...
Top 9 Editorial Calendar Tools to Effectively Manage Your Content Marketing P...
 
5 Ways Infographics Can Strengthen Your Sales Funnel
5 Ways Infographics Can Strengthen Your Sales Funnel 5 Ways Infographics Can Strengthen Your Sales Funnel
5 Ways Infographics Can Strengthen Your Sales Funnel
 
Top 7 Online Tools to Create Visual Content that Engages
Top 7 Online Tools to Create Visual Content that EngagesTop 7 Online Tools to Create Visual Content that Engages
Top 7 Online Tools to Create Visual Content that Engages
 
Top 28 Social Media Tools to Make Your Job Easier
Top 28 Social Media Tools to Make Your Job EasierTop 28 Social Media Tools to Make Your Job Easier
Top 28 Social Media Tools to Make Your Job Easier
 
Top 10 Free Online Tools to Create Your Infographics
Top 10 Free Online Tools to Create Your InfographicsTop 10 Free Online Tools to Create Your Infographics
Top 10 Free Online Tools to Create Your Infographics
 
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionTop 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
 
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and ConversionTop 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
Top 15 Content Marketing Tactics to Boost Your Website Traffic and Conversion
 
How to create visual marketing success with infographics
How to create visual marketing success with infographicsHow to create visual marketing success with infographics
How to create visual marketing success with infographics
 
18 ideas for visual content on social media
18 ideas for visual content on social media18 ideas for visual content on social media
18 ideas for visual content on social media
 
10 Successful Visual Content Marketing Stories
10 Successful Visual Content Marketing Stories10 Successful Visual Content Marketing Stories
10 Successful Visual Content Marketing Stories
 
Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013
 
Top 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingTop 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content Marketing
 
Top 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content MarketingTop 30 Must Read Blogs about Content Marketing
Top 30 Must Read Blogs about Content Marketing
 
Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013Top 10 Global Social Media Trends Q4 2013
Top 10 Global Social Media Trends Q4 2013
 
How to create infographics in one hour or less
How to create infographics in one hour or lessHow to create infographics in one hour or less
How to create infographics in one hour or less
 
Infographics for Marketing & Communication [White Paper]
Infographics for Marketing & Communication [White Paper]Infographics for Marketing & Communication [White Paper]
Infographics for Marketing & Communication [White Paper]
 
White paper creation mistakes
White paper creation mistakesWhite paper creation mistakes
White paper creation mistakes
 

Recently uploaded

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Recently uploaded (20)

Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

Securing todays mobile_workforce-white_paper

  • 1. WHITE PAPER Copyright © 2011, Juniper Networks, Inc. SECURING TODAY’S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite
  • 2. 2 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Securing Today’s Mobile Workforce Table of Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Junos Pulse Mobile Security Suite. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Mobile Device Security on a Broad Range of Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Develop Flexible Mobility Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Support the Latest Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Loss and Theft Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Mobile Device Management (MDM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Granular Access Control with Juniper’s SSL VPN Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Enforce Strong Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Zero-Touch Provisioning of Mobile Access for New Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
  • 3. Copyright © 2011, Juniper Networks, Inc. 3 WHITE PAPER - Securing Today’s Mobile Workforce Executive Summary Enterprises today are challenged with deploying mobile security and granular access control on a growing number of diverse mobile platforms, including Apple iOS, Google Android, Nokia Symbian, Microsoft Windows Mobile, and BlackBerry. With increasing choices of smartphones, tablets, and other types of mobile devices, employees often bring their personal devices into the enterprise and use them to access corporate resources. This has started the trend of “Bring Your Own Device” to work (or “BYOD”), encouraging employees to use their own personal mobile devices to access the enterprise network and resources. But, BYOD brings with it issues such as mobile and network security, and it further burdens IT staff with the increasing “consumerization of IT.” Also, when personal mobile devices used at work are lost or stolen, enterprises risk losing sensitive corporate data such as e-mail, sensitive documents, or even valuable intellectual property (IP). Juniper Networks® Junos® Pulse creates a comprehensive solution that secures enterprise mobility. The Junos Pulse solution consists of mobile device security and mobile device management (MDM) provided through Juniper Networks Junos Pulse Mobile Security Suite. This is combined with secure mobile access control, which is delivered through Juniper’s market-leading SSL VPN products. With this solution, enterprises can rise above the challenges of a heterogeneous mobile environment, as well as secure mobile devices from malicious attacks and theft. The richness of mobile security features in this solution, combined with a tight enforcement of access control policies as defined on the Juniper Networks MAG Series Junos Pulse Gateways running the Junos Pulse Secure Access Service, constitutes a compelling mobility solution for enterprises worldwide. Overview Many enterprises today struggle with the challenges involved in enabling secure, remote network and application access for mobile device users, while conforming to corporate security policies. This paper describes how Junos Pulse and the Junos Pulse Mobile Security Suite alleviate today’s enterprise mobility challenges. With the Juniper Networks Junos Pulse client application that is available from leading application stores, Juniper’s award-winning SSL VPN products, and a web-based management console, the Junos Pulse Mobile Security Suite enables enterprises to deploy security, device management, and remote access for mobile devices at scale. Introduction Users are beginning to use their own personal mobile devices—smartphones, tablets, and the like—to access corporate data and applications. These mobile devices are less cumbersome to carry than notebook computers or netbooks, and they have the features and applications needed to deliver corporate data to the user. The concept of corporate issued mobile devices is beginning to fade away, replaced by the trend of BYOD. But enabling corporate access on personal mobile devices requires enterprises to enforce similar corporate policies, including authentication methods, data protection, access and security settings, device management, and endpoint assessment as are already in place for their corporate managed Windows, Mac OS X, and Linux based systems. Along with the enhanced portability of mobile devices also comes the risk of increased loss and theft of these devices. Enterprises risk loss of valuable, sensitive corporate data when a mobile device is lost or stolen. Users also risk loss of their personal data on lost or stolen mobile devices, since some applications are designed to store passwords, credit card information, bank account information, and other personal data, as well as store passwords for accessing personal apps such as social networking apps as well as business apps. Finally, mobile devices run a variety of operating systems designed specifically for their smaller form factor. Most of the mobile platforms are open for third-party application development, and they support thriving application stores or marketplaces for these independently developed mobile apps. Unfortunately, this also presents a huge opportunity for hackers to build malicious applications for unsuspecting users to download. The number of threats such as viruses, trojans, and malware reported on mobile devices is increasing rapidly.
  • 4. 4 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Securing Today’s Mobile Workforce The proliferation of mobile devices presents several challenges to an enterprise: • Adapting mobility policies to align with the current trend of employees using personal mobile devices for corporate use • Delivering secure, remote access for mobile devices, while enforcing granular access control • Securing corporate and personal data, and mobile devices from malware, viruses, and malicious applications • Mitigating the risk of loss, theft, or exploitation of corporate and personal data residing on mobile devices • Providing all of the above for an ever increasing range of mobile devices and platforms, including Apple iOS, Google Android, BlackBerry, Microsoft Windows Mobile, and Nokia Symbian based devices Junos Pulse Mobile Security Suite Junos Pulse Mobile Security Suite is a comprehensive solution that enables enterprises to secure and manage mobile devices at scale. It protects mobile devices against malware, viruses, trojans, spyware, and other threats and malicious attacks on all of today’s leading mobile platforms and operating systems. The Mobile Security Suite also includes mobile device management and configuration features that mitigate the risk of losing corporate as well as personal data on lost or stolen devices; provide device configuration for accounts, policies, and application restrictions; provision certificates; query for, collect, and leverage device information, compliance data, and GPS position; assess application asset management and inventory; and provide device management configuration. The Junos Pulse Mobile Security Suite is enforced on mobile devices through the Junos Pulse client, which is available for the following mobile platforms in their respective application stores1 : • Apple iOS 4.X or later • Google Android 2.X and 3.0 (Honeycomb) • Nokia Symbian2 S60 5th Edition and Symbian ^3 • Windows Mobile 6.0, 6.1, and 6.5 • BlackBerry 4.2 or later Mobile users can download the Junos Pulse client by browsing in the “business” category of their mobile application store or marketplace. For the administrator to configure and manage mobile security policies, the Mobile Security Suite also includes the Junos Pulse Mobile Security Gateway management console. The Mobile Security Gateway is available as a hosted Software-as-a- Service (SaaS) web-based console, simplifying deployment within an enterprise, without the need to set up and maintain an onsite server. The Mobile Security Gateway keeps all of the Junos Pulse Mobile Security Suite-enabled devices automatically updated with the latest emerging threat definitions, and also provides detailed reports on virus infections, updates, and the latest threats detected on mobile devices accessing the enterprise network. Mobile Device Security on a Broad Range of Platforms The Junos Pulse Mobile Security Suite protects mobile devices from a broad range of threats that include malware, viruses, trojans, and worms. It protects a mobile device from viruses and other malicious content that may get downloaded to the device via Short Message Service (SMS), Multimedia Messaging Service (MMS), e-mail, or other sources. It also protects the enterprise and the user from data loss or unauthorized access on lost or stolen devices. One of the strengths of the solution is the breadth of security features supported across most leading mobile platforms available today. 1 The Junos Pulse for Windows Mobile client may be downloaded from http://www.juniper.net/support/products/pulse/mobile/#sw. 2 Junos Pulse for Nokia Symbian will be available in Q4 2011
  • 5. Copyright © 2011, Juniper Networks, Inc. 5 WHITE PAPER - Securing Today’s Mobile Workforce Develop Flexible Mobility Policies Enterprises can leverage the Mobile Security Suite to adapt to the current trend of employees and other authorized individuals using their personal mobile devices to access the corporate network. They can meet this challenge by not only enabling secure, granular access to corporate resources, but also by securing the user’s mobile device from threats. This allows for a flexible mobility policy, enabling more employee choice while at the same time not compromising corporate security policies. The solution also enables enterprises to support a heterogeneous mobile environment spanning multiple mobile platforms, differing greatly from most current mobile security deployments which only support one or two mobile platforms. Support the Latest Mobile Devices The Junos Pulse Mobile Security Suite enables enterprises to support new devices and mobile operating systems as soon as they hit the market. The solution supports a broad range of operating system platforms, including Apple iOS, Google Android, Nokia Symbian, Microsoft Windows Mobile, and RIM BlackBerry. These leading mobile operating systems are powering a large majority of all smartphones, tablets, and other mobile devices available worldwide. Enterprises can remain assured that by deploying the Junos Pulse Mobile Security Suite, they will be able to support new mobile devices available in the market that run any of the supported mobile platforms. When employees replace their personal mobile devices with new devices, the administrator can simply de-provision the older device from the network and provision security on the newer device. The older device will then no longer be able to access the corporate network via VPN. From an enterprise perspective, this also enables a flexible model of provisioning access to new mobile devices and de-provisioning lost or stolen devices. The Junos Pulse Mobile Security Suite antimalware service updates its virus signatures in real time over the air (OTA). The virus signatures are updated by the Juniper Networks Global Threat Center, by our mobile malware research and analysis team. These signatures are downloaded dynamically to every mobile device running the Junos Pulse Mobile Security Suite, without intervention from either the user or the enterprise. This enables a low cost, real-time enforcement model for security policies on all supported devices. Loss and Theft Protection Enterprises can use the Junos Pulse Mobile Security Suite to retrieve lost devices by either remotely locating them via GPS, or by remotely setting off alarms on them. If the device has indeed been stolen, an administrator can remotely lock the device, or even remotely wipe the device’s contents through the Junos Pulse Mobile Security Gateway management console Enterprises and users can also remotely back up the content of users’ mobile devices and restore the backed up data to a new device when the user or enterprise replaces the lost or stolen device, regardless whether the replaced device is the same make of smartphone or tablet, or if it uses the same mobile operating system as the lost or stolen device. The loss prevention and control features of Mobile Security Suite are easily administered via the web-based Junos Pulse Mobile Security Gateway management console. This gives administrators the ability and control to proactively protect the enterprise and user from losing valuable data. Mobile Device Management (MDM) Junos Pulse Mobile Security Suite supports MDM capabilities for most major mobile operating system platforms, enabling enterprises to set and enforce granular security and management policies on company owned and operated devices, as well as personal mobile devices used to access the enterprise network and its resources. By supporting MDM capabilities on Apple iOS3 , which is the mobile operating system platform for Apple iPhones, iPads, and iPod touch devices, Junos Pulse Mobile Security Suite is easing the burden on enterprise IT staff when it comes to the growing “consumerization of IT.” By empowering an administrator to enable or disable certain features, to allow or disallow specific applications, and to remotely enforce security policies on a user’s personal device when it is being used within the enterprise or to access the enterprise network and its applications and data, Junos Pulse Mobile Security Suite helps to ensure the enterprise’s security for and from personal mobile devices and unapproved mobile apps and functions. The ability to define and enforce security policies and application restrictions protects the user, the device, the enterprise, personal and enterprise data, and intellectual property from exploit, harm, or misuse. 3 Apple iOS MDM functionality in Junos Pulse Mobile Security Suite is available only to enterprises that have applied to and are members of the Apple iOS Enterprise Developer Program. For further information on, and to sign up for the iOS Enterprise Developer Program, please go to http://developer.apple.com/programs/ios/enterprise/.
  • 6. 6 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Securing Today’s Mobile Workforce Mobile Security Suite can also query a smartphone or tablet for specific device and compliance information, as well as enabling an inventory of apps loaded on the mobile device and the GPS location of the Apple iOS device. By capturing the device’s GPS location, an enterprise or employee can locate and track an employee’s lost or stolen mobile device—regardless if it is BYOD or corporate issued. The device may also be remotely locked and wiped of data, particularly effective if the mobile device has been stolen for nefarious purposes. For Google Android-based mobile devices, with the appropriate permissions and access rights, the Mobile Security Suite can allow enterprises to automatically remove apps with no user interaction or user notification of the app’s removal. Also, Junos Pulse will automatically remove identified malware on an Android mobile device, again without user intervention or knowledge, and only with the proper permissions and rights. If an application is automatically removed from an employee’s Android device, the application’s removal will be noted for an administrator on the Junos Pulse Mobile Security Gateway management console. The MDM capabilities for Android-based devices in the Mobile Security Suite are available with Android-based mobile devices from various manufacturers. Please refer to the Junos Pulse supported platforms document for further details on supported Android devices Finally, the Junos Pulse Mobile Security Suite delivers and supports several additional MDM capabilities on Google Android, Microsoft Windows Mobile, and Nokia Symbian based mobile devices. These include mobile device remote locate and track leveraging the mobile device’s GPS functionality, remote device lock and wipe, SIM change notification, and other security measures related to SIM change or removal. Granular Access Control with Juniper’s SSL VPN Products The Junos Pulse Mobile Security Suite provides a tight integration with Junos Pulse, Juniper Networks SA Series SSL VPN Appliances, and the MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service. The security features enabled on the Junos Pulse clients can serve as an endpoint security (or Host Checker) policy on the Juniper SSL VPN platform. An administrator can configure Juniper SSL VPN platforms to allow remote VPN access from only those mobile devices on which the Junos Pulse Mobile Security Suite has been activated and registered. This complements the Host Checker policies already available on the SA Series for Microsoft Windows and Apple Mac OS X platforms, as well as the MAG Series for Microsoft Windows. The Junos Pulse client on the mobile device is a single integrated client that can provide both secure, mobile remote VPN access through the SA Series appliance or MAG Series gateway, as well as mobile security from viruses, malware, and other threats through the Junos Pulse Mobile Security Suite integrated with the Host Checker capabilities, which are included with both the SA Series appliances and MAG Series gateways. Enforce Strong Authentication The Junos Pulse client supports strong methods of authenticating to the Juniper SSL VPN platform, including certificate- based, password-based, and multifactor authentication. Administrators can enforce the same level of authentication and access control for mobile devices and operating systems as from Microsoft Windows or Apple Mac OS-based systems, delivering seamless, cross-platform authentication for all users, regardless of their device. Zero-Touch Provisioning of Mobile Access for New Users Junos Pulse provides a simple deployment mechanism for enforcing role-based granular access control to corporate networks and applications. It is especially cost-effective when provisioning access for new employees and authorized users. New employees or authorized users need only to be instructed to download Junos Pulse from the respective application store accessible from their mobile devices and to be provided with a license code to activate Mobile Security Suite features on their devices. Once a user does this, the policies on the SA Series appliance or MAG Series gateway will provision the appropriate set of network and application access rights, depending on the roles and groups to which that user belongs. With Junos Pulse, mobile users can become more productive from their smartphones, tablets, and other mobile devices: • Users can access not just corporate e-mail, but also web-based applications on the corporate intranet or in the corporate cloud. They can also access applications such as SAP or Oracle using client applications available in the respective mobile operating platform application store. • IT departments, meanwhile, can remain assured that managed or unmanaged, personal or corporate issued mobile devices, as well as corporate data and applications, are protected anywhere, anytime through the Junos Pulse Mobile Security Suite.
  • 7. Copyright © 2011, Juniper Networks, Inc. 7 WHITE PAPER - Securing Today’s Mobile Workforce This is a unique model of provisioning access control and security for mobile devices, with seamless integration with existing VPN infrastructure. Enterprises can now establish and enforce corporate mobility policies, combining VPN access control with mobile security. Junos Pulse, in conjunction with a Juniper SSL VPN platform, enables granular access control for mobile devices to the enterprise network and applications via the following methods: • Full network access, such as access to client/server and other enterprise network- or cloud-based applications, with a similar user experience to accessing them from notebooks, netbooks, or desktop computers • E-mail and calendaring via ActiveSync to Microsoft Exchange servers • Web browser-based access Users can be dynamically provisioned with access to the corporate network and applications by one or more of the above remote access methods following policies configured on the appropriate and applicable Juniper SSL VPN platform. Conclusion Junos Pulse is a comprehensive secure mobility solution—including mobile security, MDM, and secure mobile remote access—that protects mobile devices from a wide range of threats such as viruses, malware, trojans, and worms. It provides enterprises with the security tools they need to manage a nonhomogenous mobile environment, and it mitigates the risks of losing sensitive, critical corporate and personal data on lost or stolen mobile devices. These tools include the ability to remotely locate, track, wipe, and lock an employee’s mobile device, as well as the ability to set and manage device passcodes and set off remote alarms on a lost or stolen device. The deployment of the Junos Pulse Mobile Security Suite as a hosted SaaS option provides the flexibility enterprises need to centrally manage all mobile security policies for their networks. The Mobile Security Suite – and its Junos Pulse Mobile Security Gateway – as a hosted SaaS environment allows enterprises to quickly deploy and secure their network from insecure or ill-secured mobile devices, as well as expedite mitigation when exposed to infection and exploit. Enterprises can also cut their overall security expenses—specifically mobile security expenses—since a SaaS solution does not require as many resources to maintain and support today’s vast array of mobile devices needing secure access to the corporate network environment. Enterprises can enable increases to the number of secured mobile devices and users simply and quickly, while allowing the enterprise to add new mobile security features or to take advantage of new security features and capabilities remotely over the air. Finally, the option to seamlessly integrate the Junos Pulse Mobile Security Suite, including Junos Pulse, with the industry- leading Juniper Networks SSL VPN products—SA Series SSL VPN Appliances or MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service—provides an enterprise the required endpoint security and access features to effectively enforce corporate compliance policies. This enables enterprises to remain consistent with endpoint security and access policies that may already be in place for Microsoft Windows, Apple Mac OS and other computing platforms, thereby alleviating user confusion and potentially costly support bottlenecks. To purchase Juniper Networks solutions, please contact your Juniper networks representative at 1-866-298-6428 or authorized reseller, or visit Juniper Networks at www.juniper.net.
  • 8. 8 Copyright © 2011, Juniper Networks, Inc. WHITE PAPER - Securing Today’s Mobile Workforce 2000363-004-EN Sept 2011 Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: 35.31.8903.600 EMEA Sales: 00800.4586.4737 Fax: 35.31.8903.601 APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King’s Road Taikoo Shing, Hong Kong Phone: 852.2332.3636 Fax: 852.2574.7803 Corporate and Sales Headquarters Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or 408.745.2000 Fax: 408.745.2100 www.juniper.net Printed on recycled paper To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller. About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net.