Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
|
|
|
- Alban Bradley
- 10 years ago
- Views:
Transcription
1 White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1
2 Table of Contents Executive Summary...3 Introduction...3 Junos Pulse Mobile Security Suite... 4 Mobile Device Security on a Broad Range of Platforms... 4 Develop Flexible Mobility Policies... 4 Support the Latest Mobile Devices... 4 Loss and Theft Protection... 5 Mobile Device Management (MDM)... 5 Granular Access Control with Juniper s SSL VPN Products... 6 Enforce Strong Authentication... 6 Zero-Touch Provisioning of Mobile Access for New Users... 6 Conclusion...7 About Juniper Networks Copyright 2012, Juniper Networks, Inc.
3 Executive Summary Enterprises today are challenged with deploying mobile security and granular access control on a growing number of diverse mobile Overview platforms, including Apple ios, Google Android, Nokia Symbian, Many enterprises today struggle with the Microsoft Windows Mobile, and RIM BlackBerry. With increasing challenges involved in enabling secure, choices of smartphones, tablets, and other types of mobile devices, employees often bring their personal devices into the remote network and application access enterprise and use them to access corporate resources. This has for mobile device users, while conforming started the trend of Bring Your Own Device to work (or BYOD ), to corporate security policies. encouraging employees to use their own personal mobile devices This paper describes how Junos Pulse to access the enterprise network and resources. But, BYOD carries and the Junos Pulse Mobile Security with it issues such as mobile and network security, and it further burdens IT staff with the increasing consumerization of IT. Also, Suite alleviate today s enterprise when personal mobile devices used at work are lost or stolen, mobility challenges. With a client enterprises risk losing sensitive corporate data such as s, app downloadable from leading critical documents, or even valuable intellectual property (IP). mobile operating system application Juniper Networks Junos Pulse creates a comprehensive solution stores, Juniper s award-winning SSL that securely connects, protects and manages enterprise mobility. VPN products, and a web-based The Junos Pulse solution consists of mobile device security and management console, Junos Pulse and management provided through Juniper Networks Junos Pulse Mobile Security Suite. This is combined with secure mobile access the Junos Pulse Mobile Security Suite control, which is delivered through Juniper s market-leading SSL enable enterprises to deploy security, VPN products. With this solution, enterprises can rise above the device management, and remote access challenges of a heterogeneous mobile environment, as well as for mobile devices at scale. secure mobile devices from malicious attacks and theft. The richness of mobile security features in this solution, combined with a tight enforcement of access control policies as defined on the Juniper Networks MAG Series Junos Pulse Gateways running the Junos Pulse Secure Access Service, constitutes a compelling mobility solution for enterprises worldwide. Introduction Users are beginning to use their own personal mobile devices smartphones, tablets, and the like to access corporate data and applications. These mobile devices are less cumbersome to carry than laptop computers, and they have the features and applications needed to deliver vital corporate data to mobile or remote users. The concept of corporate issued mobile devices is fading fast, replaced by the trend of BYOD. But enabling corporate access on personal mobile devices requires enterprises to enforce similar corporate policies, including authentication methods, data protection, access and security settings, device management, and endpoint assessment, as are already in place for their corporate managed Windows, Mac OS, and Linux based systems. Along with the enhanced portability of mobile devices comes the risk of increased loss and theft of these devices. Enterprises risk loss of valuable, sensitive corporate data when a mobile device is lost or stolen. Users also risk loss of their personal data on lost or stolen mobile devices, since some applications are designed to store passwords, credit card numbers, bank account information, and other personal data, as well as store passwords for accessing personal apps such as social networking apps and business apps. Finally, mobile devices run a variety of operating systems designed specifically for their smaller form factor. Most of the mobile platforms are open for third-party application development, and they support thriving application stores or marketplaces for these independently developed mobile apps. Unfortunately, this also presents a huge opportunity for hackers to build malicious applications for unsuspecting users to download. The number of threats such as viruses, trojans, and malware reported on mobile devices is increasing rapidly. The proliferation of mobile devices presents several challenges to an enterprise: Adapting mobility policies to align with the current trend of employees using personal mobile devices for corporate use Delivering secure, remote access for mobile devices, while enforcing granular access controls Securing corporate and personal data, and mobile devices from malware, viruses, and malicious applications Mitigating the risk of loss, theft, or exploitation of corporate and personal data residing on mobile devices Providing all of the above for an ever increasing range of mobile devices and platforms Copyright 2012, Juniper Networks, Inc. 3
4 Junos Pulse Mobile Security Suite Junos Pulse Mobile Security Suite is a comprehensive solution that enables enterprises to secure and manage mobile devices at scale. It protects mobile devices against malware, viruses, trojans, spyware, and other threats and malicious attacks on all of today s leading mobile platforms and operating systems. The Junos Pulse Mobile Security Suite also includes mobile device management and configuration features that mitigate the risk of losing corporate as well as personal data on lost or stolen devices; provides device configuration for accounts, policies, and application restrictions; provisions certificates; queries for, collects, and leverages device information, compliance data, and GPS position; assesses application asset management and inventory; and provides device management configuration. The Junos Pulse Mobile Security Suite is enabled on mobile devices through Junos Pulse, which is available for the following mobile platforms in their respective application stores 1 : Apple ios 4.X or later Google Android 2.X, 3.0 (Honeycomb), and 4.0 (Ice Cream Sandwich) Nokia Symbian S60 5th Edition and Symbian ^3 Windows Mobile 6.0, 6.1, and 6.5 BlackBerry 4.2 or later Mobile users can download the Junos Pulse client by browsing in the business category of their mobile application store or marketplace. For an administrator to configure and manage mobile security policies, the Junos Pulse Mobile Security Suite also includes the Junos Pulse Mobile Security Gateway management console. The Pulse Mobile Security Gateway is available as a hosted Software-as-a-Service (SaaS) web-based console, simplifying deployment within an enterprise, without the need to set up and maintain an onsite server. The Junos Pulse Mobile Security Gateway keeps all of the Junos Pulse Mobile Security Suite-enabled devices automatically updated with the latest emerging threat definitions, and also provides detailed reports on virus infections, updates, and the latest threats detected on mobile devices accessing the enterprise network. Mobile Device Security on a Broad Range of Platforms The Junos Pulse Mobile Security Suite protects mobile devices from a broad range of threats that include malware, viruses, trojans, and worms. It protects a mobile device from viruses and other malicious content that may get downloaded to the device via Short Message Service (SMS), Multimedia Messaging Service (MMS), , or other sources. It also protects the enterprise and user from data loss or unauthorized access on lost or stolen devices. One of the strengths of the Pulse Mobile Security Suite is the breadth of security features supported across most leading mobile platforms available today. Develop Flexible Mobility Policies Enterprises can leverage the Junos Pulse Mobile Security Suite to adapt to the current trend of employees and other authorized individuals using their personal mobile devices to access the corporate network. They can meet this challenge by not only enabling secure, granular access to corporate resources, but also by securing the user s mobile device from threats. This allows for a flexible mobility policy, enabling more employee choice while at the same time not compromising corporate security policies. The solution also enables enterprises to support a heterogeneous mobile environment spanning multiple mobile platforms. Support the Latest Mobile Devices The Junos Pulse Mobile Security Suite enables enterprises to support new devices and mobile operating systems as soon as they hit the market. The solution supports a broad range of operating system platforms, including Apple ios, Google Android, Nokia Symbian, Microsoft Windows Mobile, and RIM BlackBerry. These leading mobile operating systems are powering a large majority of smartphones, tablets, and other mobile devices available worldwide. Enterprises can remain assured that by deploying the Junos Pulse Mobile Security Suite, they will be able to support new mobile devices available in the market that run any of the supported mobile platforms. 1 The Junos Pulse for Windows Mobile client may be downloaded from 4 Copyright 2012, Juniper Networks, Inc.
5 When employees replace their personal mobile devices with new devices, the administrator can simply de-provision the older device from the network and provision security on the newer device. The older device will then no longer be able to access the corporate network via VPN. From an enterprise perspective, this also enables a flexible model of provisioning access to new mobile devices and de-provisioning lost or stolen devices. The Junos Pulse Mobile Security Suite antimalware service updates its virus signatures in real time over the air (OTA). The virus signatures are updated by the Juniper Networks Mobile Threat Center, Juniper s mobile malware research and analysis team. These signatures are downloaded dynamically to every mobile device running the Junos Pulse Mobile Security Suite without requiring intervention by either the user or the enterprise. This enables a low cost, real-time enforcement model for security policies on all supported devices. Loss and Theft Protection Enterprises can use the Junos Pulse Mobile Security Suite to retrieve lost or stolen devices by either remotely locating them via the device s GPS, or by remotely setting off alarms on them. If the device has indeed been stolen, an administrator can remotely lock the device, or even remotely wipe the device s contents through the Junos Pulse Mobile Security Gateway management console Enterprises and users can also remotely back up the content of mobile devices and restore the backed up data to a new device when the user or enterprise replaces the lost or stolen device, regardless whether the replaced device is the same make of smartphone or tablet, or if it uses the same mobile operating system as the lost or stolen device. The loss prevention and control features of Junos Pulse Mobile Security Suite are easily administered via the webbased Junos Pulse Mobile Security Gateway management console. This gives administrators the ability and control to proactively protect the enterprise and user from losing valuable data. Mobile Device Management (MDM) Junos Pulse Mobile Security Suite supports MDM capabilities for most major mobile operating system platforms, enabling enterprises to set and enforce granular security and management policies on company owned and operated devices, as well as personal mobile devices used to access the enterprise network and its resources. By supporting MDM capabilities on Apple ios, which is the mobile operating system platform for Apple iphones, ipads, and ipod touch devices, Junos Pulse Mobile Security Suite is easing the burden on enterprise IT staff when it comes to the growing consumerization of IT. By empowering an administrator to enable or disable certain features, to allow or disallow specific applications, and to remotely enforce security policies on a user s personal device when it is being used within the enterprise or to access the enterprise network and its applications and data, Junos Pulse Mobile Security Suite helps to ensure the enterprise s security for and from personal mobile devices and unapproved mobile apps and functions. The ability to define and enforce security policies and application restrictions protects the user, the device, the enterprise, personal and enterprise data, and intellectual property from exploit, harm, or misuse. Junos Pulse Mobile Security Suite can also query an iphone or IPad for specific device and compliance information, as well as enabling an inventory of apps loaded on the device. It can also capture the GPS location of an Apple ios or Google Android device. By capturing the device s GPS location, an enterprise or employee can locate and track an employee s lost or stolen mobile device regardless if it is a personal or corporate issued device. The device may also be remotely locked and wiped of data, particularly effective if the mobile device has been stolen for nefarious purposes. Junos Pulse Mobile Security Suite also delivers secure device management capabilities for Google Android devices. Enterprises and service providers may set and enforce stringent passcode policies on personal or corporate-issued Android smartphones and tablets, protecting the sensitive data on the devices, as well as the corporate networks and clouds the devices are used to access. Junos Pulse Mobile Security Suite ensures that data stored and at rest on Android devices regardless if the data is personal or business-related - is encrypted and therefore, protected. For specific Google Android-based mobile devices, with the appropriate permissions and access rights, the Junos Pulse Mobile Security Suite can allow enterprises to automatically remove apps with no user interaction or user notification of the app s removal. Also, Junos Pulse Mobile Security Suite will automatically remove identified malware on specific manufacturers Android mobile devices, again without user intervention or knowledge, and only with the proper permissions and rights. If an application is automatically removed from an employee s Android device, the application s removal will be noted for an administrator on the Junos Pulse Mobile Security Gateway management console. Also, Android devices from specific vendors are able to enforce encryption on data stored on their device s Secure Digital (SD) cards, in addition to data stored on the device. The MDM capabilities for Android-based devices in the Junos Pulse Mobile Security Suite are available with Android-based mobile devices from various manufacturers. Please refer to the Junos Pulse supported platforms document for further details on supported Android devices 2. Finally, the Junos Pulse Mobile Security Suite delivers and supports several additional MDM capabilities on Google Android, Microsoft Windows Mobile, and Nokia Symbian based mobile devices. These include mobile device remote locate and track leveraging the mobile device s GPS functionality, remote device lock and wipe, SIM change notification, and other security measures related to SIM change or removal. 2 For a list of supported devices, please refer to the Junos Pulse Supported Platforms document at Copyright 2012, Juniper Networks, Inc. 5
6 Granular Access Control with Juniper s SSL VPN Products The Junos Pulse Mobile Security Suite provides a tight integration with Junos Pulse and the MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service, or the SA Series SSL VPN Virtual Appliances (or legacy SA Series SSL VPN Appliances). Junos Pulse is a single, integrated client that enables secure, mobile remote VPN access through the MAG Series gateways running Junos Pulse Secure Access Service or SA Series appliances or virtual appliances, and mobile device security from viruses, malware, and other threats, and device management and loss and theft protections through the Junos Pulse Mobile Security Suite. Full Layer 3 VPN access is available via Juniper s SSL VPN solutions for Apple ios devices, devices running Google Android 4.0, and select devices running earlier versions of Android. Full L3 VPN access via Juniper s SSL VPN platform also enables Apple ios and select Google Android mobile devices to leverage an existing authenticated VPN session to enjoy transparent login into SAML-protected cloud- and web-based applications. It also enables ios device users to dynamically join online meetings via Juniper Networks Junos Pulse Collaboration, which is integrated within the MAG Series gateways running Junos Pulse Secure Access Service or SA Series virtual appliances (or legacy SA Series appliances), enabling mobile users to view shared media and actively chat with other meeting attendees. Juniper s SSL VPN platforms also enable enterprises to define security and access policies which allow, restrict,or prohibit remote network access from any ios and compatible Android mobile devices that are not compliant with centrally-defined enterprise corporate network security and access policies. For instance, enterprises can define a policy with Juniper s SSL VPN platform which limits remote network access to only mobile devices running specific versions of ios or Android. Enterprises can also define an access policy preventing remote network access from jailbroken ios devices or rooted Android devices, since jail-broken or rooted devices can pose significant security threats. An administrator can also configure the Juniper SSL VPN platforms to allow mobile, remote VPN access to network and private or public clouds from only mobile devices on which the Junos Pulse Mobile Security Suite has been activated and registered. These capabilities extend the endpoint integrity checks already offered on Juniper s SSL VPN platforms for Windows and Mac OS platforms, to ios and Android platforms which are now used widely in corporate environments. Enforce Strong Authentication Junos Pulse supports strong methods of authenticating to the Juniper SSL VPN platform, including certificate-based, password-based, and multifactor authentication. Administrators can enforce the same level of authentication and access control for mobile devices and operating systems as they do for Microsoft Windows or Apple Mac OS-based systems, delivering seamless, cross-platform authentication for all users, regardless of their device. Zero-Touch Provisioning of Mobile Access for New Users Junos Pulse provides a simple deployment mechanism for enforcing role-based granular access control to corporate networks and applications. It is especially cost-effective when provisioning access for new employees and authorized users. New employees or authorized users need only to be instructed to download Junos Pulse from the respective, authorized application store accessible from their mobile devices, and be provided with a license code to activate Junos Pulse Mobile Security Suite features on their devices. From Junos Pulse, the appropriate policies on the MAG Series gateways running Junos Pulse Secure Access Service, or SA Series appliances or virtual appliances will provision the appropriate set of network and application access rights for the user and their device, depending on the roles and groups to which that user belongs and the assessment of their device against the enterprise s pre-defined network security and access policies. With Junos Pulse, mobile users can become more productive from their smartphones, tablets, and other mobile devices: Users can access not just corporate , but also web-based applications on the corporate intranet or in the public or corporate cloud. They can also access applications such as SAP or Oracle using client applications available in the respective mobile operating platform application store. IT departments, meanwhile, can remain assured that managed or unmanaged, personal or corporate issued mobile devices, as well as corporate data and applications, are protected anywhere, anytime through the Junos Pulse Mobile Security Suite. This is a unique model of provisioning access control and security for mobile devices, with seamless integration with existing VPN infrastructure. Enterprises can now establish and enforce corporate mobility policies, combining secure VPN access control and data in-transit protection with mobile security. Junos Pulse, in conjunction with a Juniper SSL VPN platform, enables granular access control for mobile devices to the enterprise network and applications via the following methods: Full network access, such as access to client/server and other enterprise network- or cloud-based applications, with a similar user experience to accessing them from laptop or remote desktop PCs, for Apple ios devices, select Google Android devices, and devices running Android Copyright 2012, Juniper Networks, Inc.
7 and calendaring via ActiveSync to Microsoft Exchange servers Web browser-based access Users can be dynamically provisioned with access to the corporate network and applications by one or more of the above remote access methods following policies configured on the appropriate and applicable Juniper SSL VPN platform. Conclusion Junos Pulse is a comprehensive solution which secures mobility including secure mobile remote access, mobile device security and management, and application controls protecting enterprises, their networks, clouds and data from unauthenticated, unauthorized, and insecure access, and mobile devices and the apps they access, and the data stored on-device from a wide range of threats such as viruses, malware, trojans, and worms. It provides enterprises with the security tools they need to manage a nonhomogenous mobile environment, and mitigates the risks of losing sensitive, critical corporate and personal data on lost or stolen mobile devices. These tools include the ability to remotely locate, track, wipe, and lock an employee s or other authorized user s mobile device, as well as the ability to set and manage robust device passcodes (for Apple ios and Google Android devices), ensure stored data-at-rest is secure and set off remote alarms on a lost or stolen device. The deployment of the Junos Pulse Mobile Security Suite as a hosted SaaS offering provides the flexibility enterprises need to centrally manage all mobile security policies for their networks. The Junos Pulse Mobile Security Suite and its Junos Pulse Mobile Security Gateway as a hosted SaaS environment allows enterprises to quickly deploy and secure their network from insecure or ill-secured mobile devices, as well as expedite mitigation when exposed to infection and exploit. Enterprises can also cut their overall security expenses specifically mobile security expenses since a SaaS solution does not require as many resources to deploy and maintain, and can support today s vast array of mobile devices needing secure access to the corporate network environment. Enterprises can enable increases to the number of secured mobile devices and users simply and quickly, while allowing the enterprise to quickly add new mobile security features and capabilities remotely over the air. Finally, the option to seamlessly integrate the Junos Pulse Mobile Security Suite, including Junos Pulse, with the industry-leading Juniper Networks SSL VPN products Including the MAG Series Junos Pulse Gateways running Junos Pulse Secure Access Service, or SA Series SSL VPN Virtual Appliances (or legacy SA Series SSL VPN Appliances) provides an enterprise the required mobile endpoint assessment, and security and access features to effectively enforce corporate compliance policies. This enables enterprises to remain consistent with endpoint security and access policies that may already be in place for Microsoft Windows, Apple Mac OS and other computing platforms, thereby alleviating user confusion and potentially costly support bottlenecks. Junos Pulse and the Junos Pulse Mobile Security Suite securely connect, protect and manage today s enterprise mobility. To purchase Juniper Networks solutions, please contact your Juniper networks representative at or authorized reseller, or visit Juniper Networks at About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: EMEA Sales: Fax: To purchase Juniper Networks solutions, please contact your Juniper Networks representative at or authorized reseller. Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Aug 2012 Printed on recycled paper Copyright 2012, Juniper Networks, Inc. 7
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility
White Paper Transitioning Enterprise Customers to the Cloud with Junos Pulse Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with
SA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
Key Capabilities for Safeguarding Mobile Devices and Corporate Assets
WHITE PAPER Mobile Device Security Emerging Threats, Essential Strategies Key Capabilities for Safeguarding Mobile Devices and Corporate Assets Copyright 2011, Juniper Networks, Inc. 1 Table of Contents
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
Reasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation
White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Juniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
IBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.
BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next CONTENTS 1. OPEN ALL HOURS...2 Page 2. MOBILE DEVICE MANAGEMENT
TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE
White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and
Athena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011
Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document
Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper
Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Mobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments
Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments Efficiently and Cost- Effectively Managing Mobility Risks in the Age of IT Consumerization Table of Contents EXECUTIVE
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
Juniper Networks Solution Portfolio for Public Sector Network Security
Solution Brochure Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance STRM NS-Security
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2
Deployment Guide Sept-2014 rev. a Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2 Table of Contents 1 Introduction... 2 1.1 Array Networks AG Series Secure Access
JUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
Five Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
Product Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Managing and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
Configuring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.
White Paper Five Best Practices to Protect Your Virtual Environment Realizing the Benefits of Virtualization Without Sacrificing Security Copyright 2012, Juniper Networks, Inc. 1 Table of Contents Executive
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Securing the mobile enterprise with IBM Security solutions
Securing the mobile enterprise with IBM Security solutions Gain visibility and control with proven security for mobile initiatives in the enterprise Highlights Address the full spectrum of mobile risks
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Mobile Device Management Glossary. www.maas360.com
Mobile Device Management Glossary www.maas360.com Copyright 2014 Fiberlink Communications Corporation. All rights reserved. This document contains proprietary and confidential information of Fiberlink,
WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
The Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Enabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
The Maximum Security Marriage:
The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management The bring your own device (BYOD) trend in the workplace is at an all-time high, and according
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
IT Resource Management & Mobile Data Protection vs. User Empowerment
Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity
6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment
6 Steps to Migrate from BlackBerry to a Secure, Multi-OS Environment 6 Steps to a Successful Migration Determine whether a cutover or a gradual migration makes more sense. Integrate BES into AirWatch for
M a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
Secure iphone Access to Corporate Web Applications
F5 Technical Brief Secure iphone Access to Corporate Web Applications The way corporations operate around mobile devices is currently shifting employees are starting to use their own devices for business
Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS
ENTERPRISE MOBILITY USE CASES AND SOLUTIONS ENTERPRISE MOBILITY USE CASES AND SOLUTIONS Mobility is no longer a trend it s how business gets done. With employees using multiple mobile devices and the availability
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Architecture and Key Components
DATASHEET Junos Pulse Secure Access Service Product Overview Employees are more mobile than ever before, and they carry multiple company issued and personal computing devices. They want fast, easy yet
JUNIPER NETWORKS WIRELESS LAN SOLUTION
SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview
Symantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
NETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
