SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Downloaden Sie, um offline zu lesen
BYOD – Four Steps to Enabling
Your Network
Michael Greco, Director , Security, APAC
MOBILE DEVICE USAGE IN ENTERPRISE

                     Market Size - Smartphone                                                                               IT Manager’s Top Initiatives

             2011                                                  2015                                         1         Control and Use of Mobile Devices
                                                                                                                          Control
                                                                                                                                  and Use of Mobile Devices

  Total Market Size : 475M                                      Total Market Size : 1B
                                                                                                                2          Information Security
                                                                                                                          Information Security
  B2B Market : 116M                                                      333M
                                                                                                                3         Data Retention Policies and Structure


                                                                                  18%                           4         Remote Access
                                                                                                                          Remote Access
                     11%                                                                                        5         Staff and Management Training

                             13%                                                           14%                  6         Process Documentation and improvements
                                                               68%

             76%                                                                                                7         Saving and Making Money w/Technology

                                                                                                                8         Technology Cost Controls

                                                                                                                9         Budget Processes
        Consumer                  Smartphones used for business grow to 3X 2015
                                  Individual-Biz Corporate-Biz

                                  CIO focus: Mobile mgmt / control and remote access& deployment of new
                                                                    10   Project Management
Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011
                                  BYOD continues to be a driver                                              Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011



         2                                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
TABLET ADOPTION
       - MORE BUSINESS-READY DEVICES
                                                                                                                                          CAGR CAGR
Tablets, by Region                                          CAGR CAGR
                                                                                                        Tablets, by OS                    10-12 12-15
# of units (M); Units sold                                  10-12 12-15                                 # units (M), Units Sold
                                                                                                              18      103       326
               350                                          142% 47%                                                                      142% 47%
                                                   326                                                                   7%       8%
                                                    7                                                        14%         4%
               300                                                                                                               11%           99%
                                                            140% 52%
                                                    68
                                                                                                                         22%
               250
                                                                                                                                 36%      202% 72%
               200
                                                   118      141% 48%

               150                                                                                           83%
                                       103                                                                               67%
               100                       2
                                      19                                                                                                  117% 29%
                                                            141% 43%                                                             46%
                                       36          133
                 50
                        18
                     0 3               46
                   0   8 6
                                                                                                            2009         2012    2015
                         2010         2012        2015
                                      LA              EMEA                                                     Others           Android
                                      APAC            NA                                                       Microsoft        iOS


                           Tablet Market Grows to 4X by 2015
                           Apple iOS leads but Android challenges
  Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update




   3                                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE BYOD PHENOMENA CONTINUES TO EVOLVE



                                                 Tuesday, January 3, 2012


         For CIOs, Time To Deal With All Of Those Holiday
                         Mobile Devices
           Trending Opportunity                                                        Trending Risk
        “At the end of 2011, almost half of    “BYOD creates a whole new maze of
       mobile devices used in the workplace    security risks that must be navigated.
       were employee owned, according to      CIOs need to take a step back, assess
      IDC. These gadgets equal freedom for       the specific security needs of their
       employees, which is why companies       company’s confidential data, and then
      are increasingly embracing the BYOD,     pick the right technology that enables
        or bring your own device, trend…”                  those controls...”
           CIOs need to embrace BYOD as the savings are too big to
           ignore. However, security risk continues to be a challenge.
4                          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
The BYOD balance



    Private                                                           Secure
Differentiated                                                      Compliant
Personalized     Users                            Corporate         Authorized




“At the heart of most BYOD plans is the assumption that users are willing to give up
some level of control over their personal devices in exchange for access to
corporate resources, such as networking and email. The extent to which users and
companies may agree on the compromise will vary.” – Gartner, Oct 2011
BYOD Demands and Challenges

   Any Device                Any Location                 Any Application




Personal devices used for   Anytime, anywhere mobile      Users download unknown
work                        remote access                 or un- / ill-secured apps
Work devices used for       Users with multiple devices   Users access and store
personal activities                                       data from personal and
                                                          business apps
Multiple device types and
service providers
MOBILE SECURITY REQUIREMENTS:
          ACCESS, DATA, APP and DEVICE PROTECTION
•VPN                                                                                                                            •AV / AS
•Authentication                                                                                         • On-device Malware,    •Backup, Wipe &
                  • Enterprise Grade Data                                                                Virus,Spyware
•NAC               in Transit Security                                                                   Scanning & Removal
                                                                                                                                Restore
                  • Strong User                                                                         • Data Loss & Theft     • Segmentation
                   Authentication                                                                                               • Content
                  • All Network, Apps &                                                                                         monitoring &
                   Resource Access
                                                                                                                                Control
                                                Network                                 Data




                                                  Device                                 App
                  •Device Configuration                                                                 • Malicious Apps        • App Profile &
                  •Device Inventory                                                                     • Unauthorized Apps     Control
• MDM             •Posture Assessment                                                                   • Corp Apps / Ent App   • Application-
• Host Check      •Differentiated                                                                         Store Access          Data Control
• Device           Device+User Access                                                                   • App Inventory
                  •Targeted Threats                                                                     • Restriction &
Protection                                                                                                Management
                Enterprises and Service Providers need to address all four
               Enterprises of mobile device management and security compliance
                dimensions care most about data breach and security
      7                                     Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
EVOLVING AND EXPANDING BATTLEFRONTS

              THE DECENTRALIZED NATURE OF ATTACKS




     Inadequate         Diverse                                   Device           Increasing
     security on         user                                     and OS         implementation
    mobile devices      profiles                                proliferation         points




8                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
THE THREATS GROW
TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS




9                              Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

    Source: Juniper Networks Mobile Threats Report 2011
SO, WHAT ARE THE THREATS?

          Malware – Viruses, Worms,
          Trojans, Spyware


          Direct Attack – Attacking device interfaces,
          Network DoS, Malicious SMS


          Loss and Theft – Accessing
          sensitive data


          Data Communication Interception –
          Sniffing data as it is transmitted and received

          Exploitation and Misconduct –
          Online predators, pornography, inappropriate
          communications, data leakage


   10                             Copyright © 2011 Juniper Networks, Inc.   www.juniper.net


Page 10                                            Copyright 2008 SMobile Systems
ADDRESSING BYOD DRIVERS

     User Productivity                                          +                          Economics

                                                               Mobile
                                             1                 Device
                                                             Proliferation

                                                             Network and
                                             2               Application
                                                               Access

                                                               Consistent
                                             3                  Security


                                                          Comprehensive
                                             4             Management



11     Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net
                                Networks, Inc.   Juniper Networks, Inc. Confidential
THE STEPS TO SECURE BYOD

                Provide a safe, device-agnostic
      1         connection everywhere

                Deliver secure, consistent
      2         authentication, authorization and
                access
                Protect the user, their device and
      3         data and your network, apps and
                data

                Simply manage the user, the device,
      4         their apps and their access

12     Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
                                Networks, Inc.   Juniper Networks,      www.juniper.net
ENSURING SECURE PERSONAL MOBILE DEVICE
 ACCESS AND USE
     Users can choose and change their mobile devices
     Manage the connection, access and the device
     Enable user self-provisioning
     Security works the same
     on premises and off




13           Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc.
                                      Networks, Inc.   Juniper Networks,      www.juniper.net
ADDRESSING PERSONAL MOBILE DEVICE USE
                                               Protect personal mobile devices
                                               and apps, as well as corporate
                                               networks, resources and data


                                                                                    Manage personal
                                                                                    mobile devices,
                                                                                    network / resource
                                                                                    access, apps and
                                                                                    users
                                                                                    comprehensively
                                            CONNECT
SMBs, Enterprises and
    Government
                                        Connect personal mobile
                                        devices to corporate
                                        networks, clouds, resources
                                        and data simply and securely
  14                    Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
CONNECT
SECURE MOBILE REMOTE ACCESS


                                               SECURE DATA IN TRANSIT to
                                               protect against hacks and data
                                               theft

                                               SUPPORT EXISTING
                                               AUTHENTICATION METHODS,
                                               including multi-factor authentication

                                               IDENTITY-ENABLED mobile,
                                               remote network and application
                                               access

                                               CONSISTENT ACCESS
                                               CONTROL POLICIES across all
                                               devices accessing the network

15          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
PROTECT
MOBILE DEVICE SECURITY


                                                ANTI-MALWARE which scans all
                                                files and connections – even SD
                                                cards – with real-time updates

                                                LOSS AND THEFT PROTECTION,
                                                including locate and track, remote
                                                lock and wipe, alerts, and more

                                                ANTI-SPAM to block SMS and
                                                voice spam, with automatic denial
                                                options
                                                MOBILE ENDPOINT FIREWALL
                                                that’s customizable with inbound
                                                and outbound filters

16           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MANAGE
USER, DEVICE AND APP MANAGEMENT


                                                CONFIGURE AND PROVISION
                                                accounts, security policies,
                                                certificates…

                                                AUTOMATICALLY RESTRICT OR
                                                REMOVE unapproved or offending
                                                apps

                                                COLLECT AND REPORT on
                                                device and compliance information,
                                                loaded apps and more

                                                REMOTELY MANAGE AND
                                                CONFIGURE lost/stolen devices –
                                                remote locate, track, lock, wipe…

17           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
JUNOS PULSE: HIGH LEVEL OVERVIEW
 THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION

     Anytime, Anywhere                                                                                Anytime, Anywhere
       Secure Access                                                                                   Threat Protection
     • Corporate / Cloud VPN                                                                         • Mobile Loss and Theft
     • Authentication                                                                                • Mobile Threat Prevention
     • Differentiated Access




                               Connect                                          Protect




                                                       Manage

                                                                                             Anytime, Anywhere
                                                                                           Device and App Control
                                                                                            • Device Management
                                                                                            • App Management
                                                                                            • Content monitoring
18                             Copyright © 2011 Juniper Networks, Inc.   www.juniper.net

Weitere ähnliche Inhalte

Ähnlich wie Byod four steps to enabling your network michael greco

Symantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration SurveySymantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration SurveySymantec
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise MobilityCompTIA
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech WeekThe Judge Group
 
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...Emulex Corporation
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) wipjam
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Caroline Lewko
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxTyler Shields
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012nerb13
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITValencell, Inc.
 
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the BerriesBRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the BerriesTyler Shields
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesTyler Shields
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondCompTIA
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011Jude Umeh
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...cVidya Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecurityAirTight Networks
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprisePim Bilderbeek
 
SYMC_FAD_2008_Webcast_Final
SYMC_FAD_2008_Webcast_FinalSYMC_FAD_2008_Webcast_Final
SYMC_FAD_2008_Webcast_Finalfinance40
 

Ähnlich wie Byod four steps to enabling your network michael greco (20)

Symantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration SurveySymantec 2010 Windows 7 Migration Survey
Symantec 2010 Windows 7 Migration Survey
 
Trends in Enterprise Mobility
Trends in Enterprise MobilityTrends in Enterprise Mobility
Trends in Enterprise Mobility
 
BYOD Industry Trends and Best Practices - Philly Tech Week
BYOD Industry Trends and Best Practices  -  Philly Tech WeekBYOD Industry Trends and Best Practices  -  Philly Tech Week
BYOD Industry Trends and Best Practices - Philly Tech Week
 
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
How to Increase Performance and Virtualization Efficiency with Emulex 16Gb FC...
 
Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition) Mobile Developer 101 (mHealth 2012 Edition)
Mobile Developer 101 (mHealth 2012 Edition)
 
Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)Mobile Developer 101 (mHealth Edition)
Mobile Developer 101 (mHealth Edition)
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 
Source Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part DeuxSource Boston 2010 - The Monkey Steals the Berries Part Deux
Source Boston 2010 - The Monkey Steals the Berries Part Deux
 
Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012Sap Mobility Presentation 5 1 2012
Sap Mobility Presentation 5 1 2012
 
Top 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your ITTop 5 Ways the Cloud is Impacting Your IT
Top 5 Ways the Cloud is Impacting Your IT
 
BRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the BerriesBRUCon 2010 - The Monkey Steals the Berries
BRUCon 2010 - The Monkey Steals the Berries
 
Software Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the BerriesSoftware Developers Forum 2010 - The Monkey Steals the Berries
Software Developers Forum 2010 - The Monkey Steals the Berries
 
Mobility Trends in 2012 and Beyond
Mobility Trends in 2012 and BeyondMobility Trends in 2012 and Beyond
Mobility Trends in 2012 and Beyond
 
Innovating and enabling digital futures 12-07-2011
Innovating and enabling digital futures   12-07-2011Innovating and enabling digital futures   12-07-2011
Innovating and enabling digital futures 12-07-2011
 
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
TM Forum Fraud Management Group Activities - Presented at TM Forum's Manageme...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
Cloud Computing in the consumergoods industry
Cloud Computing in the consumergoods industryCloud Computing in the consumergoods industry
Cloud Computing in the consumergoods industry
 
Mobilising people and enterprise
Mobilising people and enterpriseMobilising people and enterprise
Mobilising people and enterprise
 
SYMC_FAD_2008_Webcast_Final
SYMC_FAD_2008_Webcast_FinalSYMC_FAD_2008_Webcast_Final
SYMC_FAD_2008_Webcast_Final
 
Economics behind IT
Economics behind ITEconomics behind IT
Economics behind IT
 

Mehr von K Singh

9767410 - Index
9767410 - Index9767410 - Index
9767410 - IndexK Singh
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Gapps connector guide_for _bes
Gapps connector guide_for _besGapps connector guide_for _bes
Gapps connector guide_for _besK Singh
 
Exchange active sync for developers
Exchange active sync for developersExchange active sync for developers
Exchange active sync for developersK Singh
 
Exchange Active Sync Troubleshooting
Exchange Active Sync TroubleshootingExchange Active Sync Troubleshooting
Exchange Active Sync TroubleshootingK Singh
 
Exchange 2010 e_book
Exchange 2010 e_bookExchange 2010 e_book
Exchange 2010 e_bookK Singh
 
Database mirroring setup
Database mirroring setupDatabase mirroring setup
Database mirroring setupK Singh
 

Mehr von K Singh (8)

9767410 - Index
9767410 - Index9767410 - Index
9767410 - Index
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Gapps connector guide_for _bes
Gapps connector guide_for _besGapps connector guide_for _bes
Gapps connector guide_for _bes
 
Exchange active sync for developers
Exchange active sync for developersExchange active sync for developers
Exchange active sync for developers
 
Exchange Active Sync Troubleshooting
Exchange Active Sync TroubleshootingExchange Active Sync Troubleshooting
Exchange Active Sync Troubleshooting
 
Exchange 2010 e_book
Exchange 2010 e_bookExchange 2010 e_book
Exchange 2010 e_book
 
Database mirroring setup
Database mirroring setupDatabase mirroring setup
Database mirroring setup
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Byod four steps to enabling your network michael greco

  • 1. BYOD – Four Steps to Enabling Your Network Michael Greco, Director , Security, APAC
  • 2. MOBILE DEVICE USAGE IN ENTERPRISE Market Size - Smartphone IT Manager’s Top Initiatives 2011 2015 1 Control and Use of Mobile Devices Control and Use of Mobile Devices Total Market Size : 475M Total Market Size : 1B 2 Information Security Information Security B2B Market : 116M 333M 3 Data Retention Policies and Structure 18% 4 Remote Access Remote Access 11% 5 Staff and Management Training 13% 14% 6 Process Documentation and improvements 68% 76% 7 Saving and Making Money w/Technology 8 Technology Cost Controls 9 Budget Processes Consumer Smartphones used for business grow to 3X 2015 Individual-Biz Corporate-Biz CIO focus: Mobile mgmt / control and remote access& deployment of new 10 Project Management Source : IDC Worldwide Business Use Smartphone 2010–2015 Forecast and Analysis, Oct 2011 BYOD continues to be a driver Source : AICPA’s 2011 Top Technology Initiatives Survey, Mar.2011 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. TABLET ADOPTION - MORE BUSINESS-READY DEVICES CAGR CAGR Tablets, by Region CAGR CAGR Tablets, by OS 10-12 12-15 # of units (M); Units sold 10-12 12-15 # units (M), Units Sold 18 103 326 350 142% 47% 142% 47% 326 7% 8% 7 14% 4% 300 11% 99% 140% 52% 68 22% 250 36% 202% 72% 200 118 141% 48% 150 83% 103 67% 100 2 19 117% 29% 141% 43% 46% 36 133 50 18 0 3 46 0 8 6 2009 2012 2015 2010 2012 2015 LA EMEA Others Android APAC NA Microsoft iOS Tablet Market Grows to 4X by 2015 Apple iOS leads but Android challenges Source: Gartner, Media Tablets by Operating System, Worldwide, 2008-2015, 3Q11 Update 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. THE BYOD PHENOMENA CONTINUES TO EVOLVE Tuesday, January 3, 2012 For CIOs, Time To Deal With All Of Those Holiday Mobile Devices Trending Opportunity Trending Risk “At the end of 2011, almost half of “BYOD creates a whole new maze of mobile devices used in the workplace security risks that must be navigated. were employee owned, according to CIOs need to take a step back, assess IDC. These gadgets equal freedom for the specific security needs of their employees, which is why companies company’s confidential data, and then are increasingly embracing the BYOD, pick the right technology that enables or bring your own device, trend…” those controls...” CIOs need to embrace BYOD as the savings are too big to ignore. However, security risk continues to be a challenge. 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. The BYOD balance Private Secure Differentiated Compliant Personalized Users Corporate Authorized “At the heart of most BYOD plans is the assumption that users are willing to give up some level of control over their personal devices in exchange for access to corporate resources, such as networking and email. The extent to which users and companies may agree on the compromise will vary.” – Gartner, Oct 2011
  • 6. BYOD Demands and Challenges Any Device Any Location Any Application Personal devices used for Anytime, anywhere mobile Users download unknown work remote access or un- / ill-secured apps Work devices used for Users with multiple devices Users access and store personal activities data from personal and business apps Multiple device types and service providers
  • 7. MOBILE SECURITY REQUIREMENTS: ACCESS, DATA, APP and DEVICE PROTECTION •VPN •AV / AS •Authentication • On-device Malware, •Backup, Wipe & • Enterprise Grade Data Virus,Spyware •NAC in Transit Security Scanning & Removal Restore • Strong User • Data Loss & Theft • Segmentation Authentication • Content • All Network, Apps & monitoring & Resource Access Control Network Data Device App •Device Configuration • Malicious Apps • App Profile & •Device Inventory • Unauthorized Apps Control • MDM •Posture Assessment • Corp Apps / Ent App • Application- • Host Check •Differentiated Store Access Data Control • Device Device+User Access • App Inventory •Targeted Threats • Restriction & Protection Management Enterprises and Service Providers need to address all four Enterprises of mobile device management and security compliance dimensions care most about data breach and security 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. EVOLVING AND EXPANDING BATTLEFRONTS THE DECENTRALIZED NATURE OF ATTACKS Inadequate Diverse Device Increasing security on user and OS implementation mobile devices profiles proliferation points 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. THE THREATS GROW TOTAL MOBILE MALWARE SAMPLES ACROSS ALL OPERATING SYSTEMS 9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Source: Juniper Networks Mobile Threats Report 2011
  • 10. SO, WHAT ARE THE THREATS? Malware – Viruses, Worms, Trojans, Spyware Direct Attack – Attacking device interfaces, Network DoS, Malicious SMS Loss and Theft – Accessing sensitive data Data Communication Interception – Sniffing data as it is transmitted and received Exploitation and Misconduct – Online predators, pornography, inappropriate communications, data leakage 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net Page 10 Copyright 2008 SMobile Systems
  • 11. ADDRESSING BYOD DRIVERS User Productivity + Economics Mobile 1 Device Proliferation Network and 2 Application Access Consistent 3 Security Comprehensive 4 Management 11 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Juniper www.juniper.net Networks, Inc. Juniper Networks, Inc. Confidential
  • 12. THE STEPS TO SECURE BYOD Provide a safe, device-agnostic 1 connection everywhere Deliver secure, consistent 2 authentication, authorization and access Protect the user, their device and 3 data and your network, apps and data Simply manage the user, the device, 4 their apps and their access 12 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  • 13. ENSURING SECURE PERSONAL MOBILE DEVICE ACCESS AND USE Users can choose and change their mobile devices Manage the connection, access and the device Enable user self-provisioning Security works the same on premises and off 13 Copyright © 2011 Juniper Copyright © 2011 www.juniper.net Inc. Networks, Inc. Juniper Networks, www.juniper.net
  • 14. ADDRESSING PERSONAL MOBILE DEVICE USE Protect personal mobile devices and apps, as well as corporate networks, resources and data Manage personal mobile devices, network / resource access, apps and users comprehensively CONNECT SMBs, Enterprises and Government Connect personal mobile devices to corporate networks, clouds, resources and data simply and securely 14 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 15. CONNECT SECURE MOBILE REMOTE ACCESS SECURE DATA IN TRANSIT to protect against hacks and data theft SUPPORT EXISTING AUTHENTICATION METHODS, including multi-factor authentication IDENTITY-ENABLED mobile, remote network and application access CONSISTENT ACCESS CONTROL POLICIES across all devices accessing the network 15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 16. PROTECT MOBILE DEVICE SECURITY ANTI-MALWARE which scans all files and connections – even SD cards – with real-time updates LOSS AND THEFT PROTECTION, including locate and track, remote lock and wipe, alerts, and more ANTI-SPAM to block SMS and voice spam, with automatic denial options MOBILE ENDPOINT FIREWALL that’s customizable with inbound and outbound filters 16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 17. MANAGE USER, DEVICE AND APP MANAGEMENT CONFIGURE AND PROVISION accounts, security policies, certificates… AUTOMATICALLY RESTRICT OR REMOVE unapproved or offending apps COLLECT AND REPORT on device and compliance information, loaded apps and more REMOTELY MANAGE AND CONFIGURE lost/stolen devices – remote locate, track, lock, wipe… 17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 18. JUNOS PULSE: HIGH LEVEL OVERVIEW THE MOST COMPREHENSIVE MOBILE DEVICE SECURITY SOLUTION Anytime, Anywhere Anytime, Anywhere Secure Access Threat Protection • Corporate / Cloud VPN • Mobile Loss and Theft • Authentication • Mobile Threat Prevention • Differentiated Access Connect Protect Manage Anytime, Anywhere Device and App Control • Device Management • App Management • Content monitoring 18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net