1 Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011
2 Legal Statement This product roadmap sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted on this roadmap. 2 Copyright 2011 Juniper Networks, Inc.
3 IBM & Juniper 3 Copyright 2011 Juniper Networks, Inc.
4 JUNOS PULSE Unified Client für Desktops, Laptops, Smartphones und Tablets für den sicheren Zugriff auf das Firmennetzwerk 4 Copyright 2011 Juniper Networks, Inc.
5 AGENDA Junos Pulse Strategie Junos Pulse Junos Pulse Mobile Security Suite 5 Copyright 2011 Juniper Networks, Inc.
6 JUNOS PULSE STRATEGIE 6 Copyright 2011 Juniper Networks, Inc.
8 CLEAR MISSION AND FOCUSED STRATEGY CONNECT EVERYTHING; EMPOWER EVERYONE SILICON SYSTEMS SOFTWARE THROUGH HIGH-PERFORMANCE NETWORKING AND INDUSTRY INNOVATION 8 Copyright 2011 Juniper Networks, Inc.
9 OS AND APPLICATIONS: MOVING UP THE VALUE STACK User Application Layer STANDARDS INTERFACES (TCG, IEEE) CONNECTIVITY SECURITY FUTURE SERVICES Partner opportunity for network end-point innovation Network Application Layer PLATFORM AND UI SDK PLATFORM Developer opportunity for cross-device innovation DEVICE API Network Layer DEVICE API CONTROL PLANE DATA PLANE SDK SERVICES PLANE Developer opportunity for on-device innovation 9 Copyright 2011 Juniper Networks, Inc.
10 MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES 10 Copyright 2011 Juniper Networks, Inc.
11 UNIFIED NETWORK CLIENT ON THE DEVICE 11 Copyright 2011 Juniper Networks, Inc.
12 MOBILITY WITH JUNOS PULSE Finance Server SRX Engineering Server Corporate Network Finance Server SRX Engineering Server LAN UAC IF-MAP SSL Data Center NY UAC IF-MAP Data Center Tokyo SSL SSL VPN User: Adam Role: Finance User: Adam Role: Finance Head Quarters Remote Site 12 Copyright 2011 Juniper Networks, Inc.
14 JUNOS PULSE AS AN INTEGRATION PLATFORM - Junos Pulse is also an integration platform for select 3 rd party applications and services - Delivers additional revenue stream for service providers Junos Pulse Applications A P P 1 A P P 2 A P P 3 A P P 4 Applications SSL VPN NAC Application Acceleration EES JP MSS and more A P P 1 A P P 2 A P P 3 A P P 4 Junos Pulse Platform Junos Pulse Client Junos Pulse Gateways Base OS NOTE: Applications different per OS 14 Copyright 2011 Juniper Networks, Inc.
15 JUNOS PULSE 15 Copyright 2011 Juniper Networks, Inc.
16 JUNOS PULSE DESKTOP SOLUTION Dynamic, standards-based, anytime/anywhere unified network client Easy-to-use, intuitive and simple user experience Delivers anytime/anywhere access and acceleration automatically, without end user intervention Identity-enabled Standards-based and future-proofs network investments Integration platform for select 3rd party applications E.g: ipass Dynamically provisioned software client for: Remote access Enterprise LAN access control Application acceleration Single client that enables SSL VPN, NAC (UAC) and Application Acceleration services 16 Copyright 2011 Juniper Networks, Inc.
17 JUNOS PULSE APPLICATION ACCELERATION Provides "Fast" with access Increases productivity for key enterprise functions such as file sharing, , document sharing, application access etc Automatically discovers and connects with Junos Pulse Gateway (or WXC) to accelerate traffic without end user interaction Easily integrates into SSL VPN deployments through provisioning from the Junos Pulse Secure Access (SA) service. 17 Copyright 2011 Juniper Networks, Inc.
18 JUNOS PULSE: Dynamic Unified Network Client Remote Access LAN Access Control Application Acceleration Dynamic IPsec VPN MAG Series MAG Series MAG Series Branch SRX Series 18 Copyright 2011 Juniper Networks, Inc.
20 USE CASE LOCATION AWARENESS AND SESSION MIGRATION Location-, identityaware acceleration Location-aware remote access Corporate Office User data session migration Home Remote Office Firewall SA Series AAA Location-aware local access, session data seamlessly coordinated Apps EX Series WXC Series IC Series / UAC Partner Retail Firewall Data Center Finance Server Database Server 20 Copyright 2011 Juniper Networks, Inc. Apps Server Data Server
21 JUNOS PULSE 2.0 USE CASES High Level WX Junos Pulse Use Cases Small Branch Offices Mobile and Telecommuter employees Partner and Contractor personnel Branch SRX Series 21 Copyright 2011 Juniper Networks, Inc.
22 JUNOS PULSE MOBILE SECURITY SUITE 22 Copyright 2011 Juniper Networks, Inc.
23 SMARTPHONES & TABLET PCS Exponential Growth increasing challenges for the IT BYOD Consumerization 23 Copyright 2011 Juniper Networks, Inc.
24 Notes from the Consultant's Jungle Top CIO Trends for 2011 January 9th, Mobile applications and media tablets. Tablet PC s and touch screens aren t new, but as Apple has leveraged the iphone ecosystem, and the ipad is as common as pocketbooks, the game has changed considerably. Items of note: Access to enterprise applications on the tablet will be commonly expected by users. Developing mobile applications is complicated by the diversity of platforms available. Context aware computing can connect to customers better Marketing will drive a lot of projects to utilize tablets, but these devices can also be used for inspections, surveys, image capture, documentation and training. 24 Copyright 2011 Juniper Networks, Inc.
25 NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% use their smartphone for both personal and business 72% share or access sensitive info such as banking, credit card, social security, medical records 80% access their employer s network without permission 59% do it everyday 50%+ are very concerned about loss, theft and identity theft resulting from their mobile usage Sources: KRC Research and Juniper Mobile Threat Center 25 Copyright 2011 Juniper Networks, Inc.
26 SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Enabling secure connectivity Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 26 Copyright 2011 Juniper Networks, Inc.
27 SECURE ACCESS FROM MOBILE DEVICES Junos Pulse for mobile devices enables smartphone and mobile device access to , Web, and corporate applications Applications Web Apps Corporate Apps More Applications on More Devices Over Time 27 Copyright 2011 Juniper Networks, Inc.
28 JUNOS PULSE: FULL SSL VPN ACCESS FROM MOBILE PHONES 28 Copyright 2011 Juniper Networks, Inc.
29 LAYER 3 VPN ON ANDROID Lack of remote VPN support on native Android Juniper-designed workaround with individual Android vendors Juniper-designed plugin software shared with each device vendor Junos Pulse 2.1 will detect plugin and enable full Layer 3 VPN on supported devices Strategic partnerships with device vendors to include plugin in their Android distributions Vendors on right-hand side are partnership candidates 29 Copyright 2011 Juniper Networks, Inc.
31 MOBILE DEVICE ACCESS iphone ipad SA6500 AAA Corporate Intranet Virtual SSL VPN Infrastructure Firewall Internet Router Applications Server Server Improved Ease of Use, Higher Productivity Access from any mobile device ActiveSync facilitates secure access to Exchange Enforce mobile device integrity and security 31 Copyright 2011 Juniper Networks, Inc.
32 SECURE MOBILITY GARTNER MAGIC QUADRANT FOR SSL VPN 2010 Magic Quadrant Key Takeaways: 2008 Gartner Magic Quadrant for SSL VPN Juniper has maintained the product vision, execution and overall momentum so effectively that it has held a Magic Quadrant leadership position continuously entrenched in the Fortune 500 with a track record for large deployments. Juniper is the No. 1 competitive threat cited by peer vendors Junos Pulse is expected to pose a strong competitive advantage for Juniper SSL VPN sales. 32 Copyright 2011 Juniper Networks, Inc.
33 SECURE MOBILITY FUNDAMENTAL CHANGE IN MOBILE SECURITY Smartphones ARE computers Threat vectors are at the device, application and network level Threat landscape has evolved from SMS-based attacks Junos Pulse Mobile Security Suite 33 Copyright 2011 Juniper Networks, Inc.
34 MOBILE DEVICE LOSS AND THEFT A survey of consumer users found that one out of every three users lost their mobile device 1 Approximately 2 million smartphones were stolen in the U.S. in Over 56,000 mobile devices were left in the back seats of the city of London taxi cabs during 6 month period between 2008 and 2009 Over the 2010 holidays, in the U.K. alone, a total of 5,100 smartphones and 3,844 notebook computers were lost at 15 different airports 3 In Paris, 75% of 991 violent crimes that took place in October 2010 happened because of mobile phone theft 4 34 Copyright 2011 Juniper Networks, Inc. 1 Information obtained from Junos Pulse Mobile Security Suite internal transaction logs; 2 Forrester Research; 3 Credant Technologies; 4 The Sydney Morning Herald, 12/10/10
35 SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Securing handsets against new vulnerabilities Protecting company data User & location based security Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 35 Copyright 2011 Juniper Networks, Inc.
36 SECURE MOBILITY JUNOS PULSE FOR Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 36 Copyright 2011 Juniper Networks, Inc.
37 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Junos Pulse Clients Junos Pulse Gateways Junos Pulse Client Junos Pulse Mobile Security Gateway Mobile Security Hosted (SaaS) Deployment 37 Copyright 2011 Juniper Networks, Inc.
38 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Oct July 2011 Q Oct Q Copyright 2011 Juniper Networks, Inc.
39 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE iphone, ipod Touch, ipad (Q3 2011) Features MDM Phase I: ios enrollment, provisioning (via APNS) ios Lock, Wipe, Locate ios OS and App inventory Remote policy configuration VPN, Exchange, Passcode policies, , etc. App and Usage restrictions (camera) ipad/tablet user interface VPN access enforcement 39 Copyright 2011 Juniper Networks, Inc.
40 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Secure Access Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 40 Copyright 2011 Juniper Networks, Inc.
42 IBM - ENTERPRISE CASE STUDY Extending Corporate Access IBM The modern workforce is increasingly mobile, with many jobs performed in the field, far from standard workplace tools, such as desk-bound computers and wired networks. Key Market Decision Factors Key Product Decision Factors Extending Corporate Services Proliferation of Smartphone Usage Increased Security Threats Adherence to Internal Security Policies Cross Platform Support Solution Manageability Ease of Deployment Technology Performance Vendor Expertise 42 Copyright 2011 Juniper Networks, Inc.
43 Uwe Nelkel Business Development Manager Junos Pulse Phone: +49 (0) Mobile:
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
Junos Pulse: Securing Today s Mobile Life An Integrated Approach to Mobile Security, Device and Application Management, and Secure Network Access Today s Mobile Life - Overview Today, our world is digital,
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski email@example.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
White Paper POLICY SECURE FOR UNIFIED ACCESS CONTROL Enabling Identity, Role, and Device-Based Access Control in a Simply Connected Network Copyright 2014, Pulse Secure LLC 1 Table of Contents Executive
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen firstname.lastname@example.org
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices