Weitere ähnliche Inhalte Ähnlich wie Byod four steps to enabling your network michael greco Ähnlich wie Byod four steps to enabling your network michael greco (20) Kürzlich hochgeladen (20) Byod four steps to enabling your network michael greco1. BYOD – Four Steps to Enabling
Your Network
Michael Greco, Director , Security, APAC
2. MOBILE DEVICE USAGE IN ENTERPRISE
Market Size - Smartphone IT Manager’s Top Initiatives
2011 2015 1 Control and Use of Mobile Devices
Control
and Use of Mobile Devices
Total Market Size : 475M Total Market Size : 1B
2 Information Security
Information Security
B2B Market : 116M 333M
3 Data Retention Policies and Structure
18% 4 Remote Access
Remote Access
11% 5 Staff and Management Training
13% 14% 6 Process Documentation and improvements
68%
76% 7 Saving and Making Money w/Technology
8 Technology Cost Controls
9 Budget Processes
Consumer Smartphones used for business grow to 3X 2015
Individual-Biz Corporate-Biz
CIO focus: Mobile mgmt / control and remote access& deployment of new
10 Project Management
Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011
BYOD continues to be a driver Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011
2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
3. TABLET ADOPTION
- MORE BUSINESS-READY DEVICES
CAGR CAGR
Tablets, by Region CAGR CAGR
Tablets, by OS 10-12 12-15
# of units (M); Units sold 10-12 12-15 # units (M), Units Sold
18 103 326
350 142% 47% 142% 47%
326 7% 8%
7 14% 4%
300 11% 99%
140% 52%
68
22%
250
36% 202% 72%
200
118 141% 48%
150 83%
103 67%
100 2
19 117% 29%
141% 43% 46%
36 133
50
18
0 3 46
0 8 6
2009 2012 2015
2010 2012 2015
LA EMEA Others Android
APAC NA Microsoft iOS
Tablet Market Grows to 4X by 2015
Apple iOS leads but Android challenges
Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update
3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
4. THE BYOD PHENOMENA CONTINUES TO EVOLVE
Tuesday, January 3, 2012
For CIOs, Time To Deal With All Of Those Holiday
Mobile Devices
Trending Opportunity Trending Risk
“At the end of 2011, almost half of “BYOD creates a whole new maze of
mobile devices used in the workplace security risks that must be navigated.
were employee owned, according to CIOs need to take a step back, assess
IDC. These gadgets equal freedom for the specific security needs of their
employees, which is why companies company’s confidential data, and then
are increasingly embracing the BYOD, pick the right technology that enables
or bring your own device, trend…” those controls...”
CIOs need to embrace BYOD as the savings are too big to
ignore. However, security risk continues to be a challenge.
4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
5. The BYOD balance
Private Secure
Differentiated Compliant
Personalized Users Corporate Authorized
“At the heart of most BYOD plans is the assumption that users are willing to give up
some level of control over their personal devices in exchange for access to
corporate resources, such as networking and email. The extent to which users and
companies may agree on the compromise will vary.” – Gartner, Oct 2011
6. BYOD Demands and Challenges
Any Device Any Location Any Application
Personal devices used for Anytime, anywhere mobile Users download unknown
work remote access or un- / ill-secured apps
Work devices used for Users with multiple devices Users access and store
personal activities data from personal and
business apps
Multiple device types and
service providers
7. MOBILE SECURITY REQUIREMENTS:
ACCESS, DATA, APP and DEVICE PROTECTION
•VPN •AV / AS
•Authentication • On-device Malware, •Backup, Wipe &
• Enterprise Grade Data Virus,Spyware
•NAC in Transit Security Scanning & Removal
Restore
• Strong User • Data Loss & Theft • Segmentation
Authentication • Content
• All Network, Apps & monitoring &
Resource Access
Control
Network Data
Device App
•Device Configuration • Malicious Apps • App Profile &
•Device Inventory • Unauthorized Apps Control
• MDM •Posture Assessment • Corp Apps / Ent App • Application-
• Host Check •Differentiated Store Access Data Control
• Device Device+User Access • App Inventory
•Targeted Threats • Restriction &
Protection Management
Enterprises and Service Providers need to address all four
Enterprises of mobile device management and security compliance
dimensions care most about data breach and security
7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
8. EVOLVING AND EXPANDING BATTLEFRONTS
THE DECENTRALIZED NATURE OF ATTACKS
Inadequate Diverse Device Increasing
security on user and OS implementation
mobile devices profiles proliferation points
8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
9. THE THREATS GROW
TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS
9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Source: Juniper Networks Mobile Threats Report 2011
10. SO, WHAT ARE THE THREATS?
Malware – Viruses, Worms,
Trojans, Spyware
Direct Attack – Attacking device interfaces,
Network DoS, Malicious SMS
Loss and Theft – Accessing
sensitive data
Data Communication Interception –
Sniffing data as it is transmitted and received
Exploitation and Misconduct –
Online predators, pornography, inappropriate
communications, data leakage
10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
Page 10 Copyright 2008 SMobile Systems
11. ADDRESSING BYOD DRIVERS
User Productivity + Economics
Mobile
1 Device
Proliferation
Network and
2 Application
Access
Consistent
3 Security
Comprehensive
4 Management
11 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net
Networks, Inc. Juniper Networks, Inc. Confidential
12. THE STEPS TO SECURE BYOD
Provide a safe, device-agnostic
1 connection everywhere
Deliver secure, consistent
2 authentication, authorization and
access
Protect the user, their device and
3 data and your network, apps and
data
Simply manage the user, the device,
4 their apps and their access
12 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
Networks, Inc. Juniper Networks, www.juniper.net
13. ENSURING SECURE PERSONAL MOBILE DEVICE
ACCESS AND USE
Users can choose and change their mobile devices
Manage the connection, access and the device
Enable user self-provisioning
Security works the same
on premises and off
13 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
Networks, Inc. Juniper Networks, www.juniper.net
14. ADDRESSING PERSONAL MOBILE DEVICE USE
Protect personal mobile devices
and apps, as well as corporate
networks, resources and data
Manage personal
mobile devices,
network / resource
access, apps and
users
comprehensively
CONNECT
SMBs, Enterprises and
Government
Connect personal mobile
devices to corporate
networks, clouds, resources
and data simply and securely
14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
15. CONNECT
SECURE MOBILE REMOTE ACCESS
SECURE DATA IN TRANSIT to
protect against hacks and data
theft
SUPPORT EXISTING
AUTHENTICATION METHODS,
including multi-factor authentication
IDENTITY-ENABLED mobile,
remote network and application
access
CONSISTENT ACCESS
CONTROL POLICIES across all
devices accessing the network
15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
16. PROTECT
MOBILE DEVICE SECURITY
ANTI-MALWARE which scans all
files and connections – even SD
cards – with real-time updates
LOSS AND THEFT PROTECTION,
including locate and track, remote
lock and wipe, alerts, and more
ANTI-SPAM to block SMS and
voice spam, with automatic denial
options
MOBILE ENDPOINT FIREWALL
that’s customizable with inbound
and outbound filters
16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
17. MANAGE
USER, DEVICE AND APP MANAGEMENT
CONFIGURE AND PROVISION
accounts, security policies,
certificates…
AUTOMATICALLY RESTRICT OR
REMOVE unapproved or offending
apps
COLLECT AND REPORT on
device and compliance information,
loaded apps and more
REMOTELY MANAGE AND
CONFIGURE lost/stolen devices –
remote locate, track, lock, wipe…
17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
18. JUNOS PULSE: HIGH LEVEL OVERVIEW
THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION
Anytime, Anywhere Anytime, Anywhere
Secure Access Threat Protection
• Corporate / Cloud VPN • Mobile Loss and Theft
• Authentication • Mobile Threat Prevention
• Differentiated Access
Connect Protect
Manage
Anytime, Anywhere
Device and App Control
• Device Management
• App Management
• Content monitoring
18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net