SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Better BYOD: Your Pad or Mine?

SESSION ID: SP01-T07

Tamir Hardof
Sr. Director Security Product Marketing
Security Business Unit – Juniper Networks
Your Pad or Mine?
Your Pad?

My Pad?

Work Place?

#RSAC
Market Situation

90%

81%

OF COMPANIES WILL
ALLOW USE OF
BYOD BY 2014

OF EMPLOYEES USE
PERSONAL MOBILE
DEVICES FOR WORK

66%

OF COMPANIES HAVE
NO BYOD POLICY

71%

OF ATTACKS
TARGETED USER
MOBILE DEVICES

BYOD and mobility aren’t anomalies.
They are the norm.

#RSAC
Business View:

Connect seamlessly

Collaborate anywhere

Mobile flexibility

Stay Connected

Secure and Simple Enablement
#RSAC
IT BYOD View
Enable work anytime and
anywhere on any device
Segregate personal and
corporate

Enable simple and secure
experience

Balance productivity with security.

#RSAC
Solving the Problem?
Essential Elements to enterprise-class BYOD

UNIFIED ACCESS
CONTROLS

SECURE REMOTE
ACCESS SSL VPN

MOBILE DEVICE
MANAGEMENT

EMPLOYEE AND
GUEST ACCESS

DEVICE AND/OR
APPLICATION TO
ENTERPRISE

TABLETS
PHONES
AND PCs

In the office from anywhere….

#RSAC
Multi-Vendor Challenge
Silos of multi-vendor functionality and management
SECURE
REMOTE ACCESS
SSL VPN

NETWORK
POLICY
CONTROLS

MOBILE DEVICE
MANAGEMENT

UNIFIED ACCESS
CONTROLS

SECURE REMOTE
ACCESS SSL/VPN

MOBILE DEVICE
MANAGEMENT

EMPLOYEE AND
GUEST ACCESS

DEVICE AND/OR
APPLICATION TO
ENTERPRISE

Tablets
Phones
AND PCs

Reality: Complex experiences for
IT and end users

#RSAC
Case Study:
Multi-national
Enterprise
Multinational Enterprise

Case
Study

9600+ employees

123 offices, 47 countries
10000+ mobile devices
10000+ PCs/Laptops
#RSAC
Critical BYOD Operational Requirements

Case
Study

Consolidated policy management
Secure remote connectivity

Context sensitive “Mobile Aware” policies
Near-transparent deployment for end-users

#RSAC
Case
Study

Chosen Solution
Access Control
Junos Pulse Policy Secure

Remote Access
Junos Pulse Connect Secure

MDM
AirWatch

#RSAC
Better BYOD Architecture and Data Flow

Access Control and
Secure Access - Guest

Case
Study

Device
Management

Access Control and
Secure Access –
Public Network

Attribute Sharing

Juniper
(SSL VPN / NAC)

Secure Corporate Network
Single-Pane Policy Management/Reporting

#RSAC
Case
Study

Simple User Experience

Single Client for all platforms

No Touch Deployment
Leverages any available
connectivity
Session continuity
#RSAC
Accessing Secure Network Example – One Time

Case
Study

Welcome to Juniper.
You have secure network access.

Near-transparent secure access

#RSAC
Case
Study

Behind the Scenes

Transparent and Secure Network Access from Anywhere
BARCELONA, SPAIN

SUNNYVALE, CA

Finance
Server

NAC Gateway

Engineering
Server

SSL VPN

CORPORATE
NETWORK

Finance
Server

NAC Gateway

Engineering
Server

SSL VPN
REMOTE
SSL VPN

LAN

User: Adam
Role: Finance

HEADQUARTERS

User: Adam
Role: Finance

REMOTE SITE

#RSAC
Consolidated IT Experience

Case
Study

Single Policy
User Centric
Management
(drill down to device)

Consolidated
Management
and Reporting

#RSAC
Trend: Application Centric Connectivity/Policy
Application Containers

App

App

Application Wrappers

App

Native OS Facilities

App

App

App

App
App

App

App

App

#RSAC

Per-App VPN – The Future of Secure Access
Your Pad? Or Mine? It Won’t Matter
Any device

Anywhere

Private and Secure

#RSAC
Come see a demo
Booth #3105

Thank you!

Weitere ähnliche Inhalte

Andere mochten auch

Network Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud ServicesNetwork Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud ServicesJuniper Networks
 
Mass Customization: The Role of SDN and NFV in a 4G Network
Mass Customization: The Role of SDN and NFV in a 4G NetworkMass Customization: The Role of SDN and NFV in a 4G Network
Mass Customization: The Role of SDN and NFV in a 4G NetworkJuniper Networks
 
From Inspiration to World Domination
From Inspiration to World DominationFrom Inspiration to World Domination
From Inspiration to World DominationJuniper Networks
 
State of the Virtualized Data Center
State of the Virtualized Data CenterState of the Virtualized Data Center
State of the Virtualized Data CenterJuniper Networks
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
How to Build Your Own Nationwide 4G Network (for Dummies)
How to Build Your Own Nationwide 4G Network (for Dummies)How to Build Your Own Nationwide 4G Network (for Dummies)
How to Build Your Own Nationwide 4G Network (for Dummies)Kegan Gan
 

Andere mochten auch (9)

IBM and Juniper Cloud Day
IBM and Juniper Cloud DayIBM and Juniper Cloud Day
IBM and Juniper Cloud Day
 
Network Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud ServicesNetwork Innovation: Key to Operators' Cloud Services
Network Innovation: Key to Operators' Cloud Services
 
Mass Customization: The Role of SDN and NFV in a 4G Network
Mass Customization: The Role of SDN and NFV in a 4G NetworkMass Customization: The Role of SDN and NFV in a 4G Network
Mass Customization: The Role of SDN and NFV in a 4G Network
 
From Inspiration to World Domination
From Inspiration to World DominationFrom Inspiration to World Domination
From Inspiration to World Domination
 
State of the Virtualized Data Center
State of the Virtualized Data CenterState of the Virtualized Data Center
State of the Virtualized Data Center
 
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
How to Build Your Own Nationwide 4G Network (for Dummies)
How to Build Your Own Nationwide 4G Network (for Dummies)How to Build Your Own Nationwide 4G Network (for Dummies)
How to Build Your Own Nationwide 4G Network (for Dummies)
 
3G & 4G Network
3G & 4G Network3G & 4G Network
3G & 4G Network
 

Ähnlich wie Better BYOD: Your Pad or Mine?

Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!CA Technologies
 
Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxssuserba2d14
 
F secure presentation
F secure presentationF secure presentation
F secure presentationkwader Saudi
 
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerDaccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerIndiaMART InterMESH Limited
 
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune IndiaMART InterMESH Limited
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7Networks
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windowsF-Secure Corporation
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...Jürgen Ambrosi
 
Client Presentation Linkedin Neat Solutions Limited
Client Presentation  Linkedin   Neat Solutions LimitedClient Presentation  Linkedin   Neat Solutions Limited
Client Presentation Linkedin Neat Solutions LimitedChurchillN
 
Appknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox
 
Llevando la autenticación de sus clientes a un siguiente nivel
Llevando la autenticación de sus clientes a un siguiente nivelLlevando la autenticación de sus clientes a un siguiente nivel
Llevando la autenticación de sus clientes a un siguiente nivelCristian Garcia G.
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Aggregage
 
Netxactics Enterprise Portfolio
Netxactics Enterprise PortfolioNetxactics Enterprise Portfolio
Netxactics Enterprise PortfolioMichee Ngonga
 
Marco Zanella - Webinar CDO Community
Marco Zanella - Webinar CDO Community Marco Zanella - Webinar CDO Community
Marco Zanella - Webinar CDO Community Livia Francesca Caruso
 

Ähnlich wie Better BYOD: Your Pad or Mine? (20)

Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!Security in the App Economy: How to Ride the Wave Without Wiping Out!
Security in the App Economy: How to Ride the Wave Without Wiping Out!
 
Sholove cyren web security presentation2
Sholove cyren web security presentation2Sholove cyren web security presentation2
Sholove cyren web security presentation2
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerDaccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
 
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
 
i7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprisesi7 pregerine7 - Agentless byod security for Enterprises
i7 pregerine7 - Agentless byod security for Enterprises
 
Best business protection for windows
Best business protection for windowsBest business protection for windows
Best business protection for windows
 
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
2° Sessione - Workspace ONE la soluzione semplice e sicura per il lavoro nell...
 
Client Presentation Linkedin Neat Solutions Limited
Client Presentation  Linkedin   Neat Solutions LimitedClient Presentation  Linkedin   Neat Solutions Limited
Client Presentation Linkedin Neat Solutions Limited
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Appknox Enterprise Offerings
Appknox Enterprise OfferingsAppknox Enterprise Offerings
Appknox Enterprise Offerings
 
Llevando la autenticación de sus clientes a un siguiente nivel
Llevando la autenticación de sus clientes a un siguiente nivelLlevando la autenticación de sus clientes a un siguiente nivel
Llevando la autenticación de sus clientes a un siguiente nivel
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.Shift Left Security: Development Does Not Want to Own It.
Shift Left Security: Development Does Not Want to Own It.
 
Netxactics Enterprise Portfolio
Netxactics Enterprise PortfolioNetxactics Enterprise Portfolio
Netxactics Enterprise Portfolio
 
Endeavour Africa Company Profile
Endeavour Africa Company ProfileEndeavour Africa Company Profile
Endeavour Africa Company Profile
 
Minder Product Demo
Minder Product DemoMinder Product Demo
Minder Product Demo
 
Marco Zanella - Webinar CDO Community
Marco Zanella - Webinar CDO Community Marco Zanella - Webinar CDO Community
Marco Zanella - Webinar CDO Community
 

Mehr von Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

Mehr von Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Kürzlich hochgeladen

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Kürzlich hochgeladen (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Better BYOD: Your Pad or Mine?

  • 1. Better BYOD: Your Pad or Mine? SESSION ID: SP01-T07 Tamir Hardof Sr. Director Security Product Marketing Security Business Unit – Juniper Networks
  • 2. Your Pad or Mine? Your Pad? My Pad? Work Place? #RSAC
  • 3. Market Situation 90% 81% OF COMPANIES WILL ALLOW USE OF BYOD BY 2014 OF EMPLOYEES USE PERSONAL MOBILE DEVICES FOR WORK 66% OF COMPANIES HAVE NO BYOD POLICY 71% OF ATTACKS TARGETED USER MOBILE DEVICES BYOD and mobility aren’t anomalies. They are the norm. #RSAC
  • 4. Business View: Connect seamlessly Collaborate anywhere Mobile flexibility Stay Connected Secure and Simple Enablement #RSAC
  • 5. IT BYOD View Enable work anytime and anywhere on any device Segregate personal and corporate Enable simple and secure experience Balance productivity with security. #RSAC
  • 6. Solving the Problem? Essential Elements to enterprise-class BYOD UNIFIED ACCESS CONTROLS SECURE REMOTE ACCESS SSL VPN MOBILE DEVICE MANAGEMENT EMPLOYEE AND GUEST ACCESS DEVICE AND/OR APPLICATION TO ENTERPRISE TABLETS PHONES AND PCs In the office from anywhere…. #RSAC
  • 7. Multi-Vendor Challenge Silos of multi-vendor functionality and management SECURE REMOTE ACCESS SSL VPN NETWORK POLICY CONTROLS MOBILE DEVICE MANAGEMENT UNIFIED ACCESS CONTROLS SECURE REMOTE ACCESS SSL/VPN MOBILE DEVICE MANAGEMENT EMPLOYEE AND GUEST ACCESS DEVICE AND/OR APPLICATION TO ENTERPRISE Tablets Phones AND PCs Reality: Complex experiences for IT and end users #RSAC
  • 9. Multinational Enterprise Case Study 9600+ employees 123 offices, 47 countries 10000+ mobile devices 10000+ PCs/Laptops #RSAC
  • 10. Critical BYOD Operational Requirements Case Study Consolidated policy management Secure remote connectivity Context sensitive “Mobile Aware” policies Near-transparent deployment for end-users #RSAC
  • 11. Case Study Chosen Solution Access Control Junos Pulse Policy Secure Remote Access Junos Pulse Connect Secure MDM AirWatch #RSAC
  • 12. Better BYOD Architecture and Data Flow Access Control and Secure Access - Guest Case Study Device Management Access Control and Secure Access – Public Network Attribute Sharing Juniper (SSL VPN / NAC) Secure Corporate Network Single-Pane Policy Management/Reporting #RSAC
  • 13. Case Study Simple User Experience Single Client for all platforms No Touch Deployment Leverages any available connectivity Session continuity #RSAC
  • 14. Accessing Secure Network Example – One Time Case Study Welcome to Juniper. You have secure network access. Near-transparent secure access #RSAC
  • 15. Case Study Behind the Scenes Transparent and Secure Network Access from Anywhere BARCELONA, SPAIN SUNNYVALE, CA Finance Server NAC Gateway Engineering Server SSL VPN CORPORATE NETWORK Finance Server NAC Gateway Engineering Server SSL VPN REMOTE SSL VPN LAN User: Adam Role: Finance HEADQUARTERS User: Adam Role: Finance REMOTE SITE #RSAC
  • 16. Consolidated IT Experience Case Study Single Policy User Centric Management (drill down to device) Consolidated Management and Reporting #RSAC
  • 17. Trend: Application Centric Connectivity/Policy Application Containers App App Application Wrappers App Native OS Facilities App App App App App App App App #RSAC Per-App VPN – The Future of Secure Access
  • 18. Your Pad? Or Mine? It Won’t Matter Any device Anywhere Private and Secure #RSAC
  • 19. Come see a demo Booth #3105 Thank you!