Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011
|
|
- Diane Gaines
- 8 years ago
- Views:
Transcription
1 Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011
2 Legal Statement This product roadmap sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted on this roadmap. 2 Copyright 2011 Juniper Networks, Inc.
3 IBM & Juniper 3 Copyright 2011 Juniper Networks, Inc.
4 JUNOS PULSE Unified Client für Desktops, Laptops, Smartphones und Tablets für den sicheren Zugriff auf das Firmennetzwerk 4 Copyright 2011 Juniper Networks, Inc.
5 AGENDA Junos Pulse Strategie Junos Pulse Junos Pulse Mobile Security Suite 5 Copyright 2011 Juniper Networks, Inc.
6 JUNOS PULSE STRATEGIE 6 Copyright 2011 Juniper Networks, Inc.
7
8 CLEAR MISSION AND FOCUSED STRATEGY CONNECT EVERYTHING; EMPOWER EVERYONE SILICON SYSTEMS SOFTWARE THROUGH HIGH-PERFORMANCE NETWORKING AND INDUSTRY INNOVATION 8 Copyright 2011 Juniper Networks, Inc.
9 OS AND APPLICATIONS: MOVING UP THE VALUE STACK User Application Layer STANDARDS INTERFACES (TCG, IEEE) CONNECTIVITY SECURITY FUTURE SERVICES Partner opportunity for network end-point innovation Network Application Layer PLATFORM AND UI SDK PLATFORM Developer opportunity for cross-device innovation DEVICE API Network Layer DEVICE API CONTROL PLANE DATA PLANE SDK SERVICES PLANE Developer opportunity for on-device innovation 9 Copyright 2011 Juniper Networks, Inc.
10 MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES 10 Copyright 2011 Juniper Networks, Inc.
11 UNIFIED NETWORK CLIENT ON THE DEVICE 11 Copyright 2011 Juniper Networks, Inc.
12 MOBILITY WITH JUNOS PULSE Finance Server SRX Engineering Server Corporate Network Finance Server SRX Engineering Server LAN UAC IF-MAP SSL Data Center NY UAC IF-MAP Data Center Tokyo SSL SSL VPN User: Adam Role: Finance User: Adam Role: Finance Head Quarters Remote Site 12 Copyright 2011 Juniper Networks, Inc.
13 JUNOS PULSE PLATFORM: Unified Client + Unified Gateway Junos Pulse Clients Junos Pulse Gateways Junos Pulse Client MAG2600 Junos Pulse Gateway MAG4600 Junos Pulse Gateway Junos Pulse Client MAG6610 Junos Pulse Gateway 13 Copyright 2011 Juniper Networks, Inc. MAG6611 Junos Pulse Gateway
14 JUNOS PULSE AS AN INTEGRATION PLATFORM - Junos Pulse is also an integration platform for select 3 rd party applications and services - Delivers additional revenue stream for service providers Junos Pulse Applications A P P 1 A P P 2 A P P 3 A P P 4 Applications SSL VPN NAC Application Acceleration EES JP MSS and more A P P 1 A P P 2 A P P 3 A P P 4 Junos Pulse Platform Junos Pulse Client Junos Pulse Gateways Base OS NOTE: Applications different per OS 14 Copyright 2011 Juniper Networks, Inc.
15 JUNOS PULSE 15 Copyright 2011 Juniper Networks, Inc.
16 JUNOS PULSE DESKTOP SOLUTION Dynamic, standards-based, anytime/anywhere unified network client Easy-to-use, intuitive and simple user experience Delivers anytime/anywhere access and acceleration automatically, without end user intervention Identity-enabled Standards-based and future-proofs network investments Integration platform for select 3rd party applications E.g: ipass Dynamically provisioned software client for: Remote access Enterprise LAN access control Application acceleration Single client that enables SSL VPN, NAC (UAC) and Application Acceleration services 16 Copyright 2011 Juniper Networks, Inc.
17 JUNOS PULSE APPLICATION ACCELERATION Provides "Fast" with access Increases productivity for key enterprise functions such as file sharing, , document sharing, application access etc Automatically discovers and connects with Junos Pulse Gateway (or WXC) to accelerate traffic without end user interaction Easily integrates into SSL VPN deployments through provisioning from the Junos Pulse Secure Access (SA) service. 17 Copyright 2011 Juniper Networks, Inc.
18 JUNOS PULSE: Dynamic Unified Network Client Remote Access LAN Access Control Application Acceleration Dynamic IPsec VPN MAG Series MAG Series MAG Series Branch SRX Series 18 Copyright 2011 Juniper Networks, Inc.
19 JUNOS PULSE PLATFORM: Unified Client + Unified Gateway Junos Pulse Clients Junos Pulse Gateways MAG2600 Junos Pulse Gateway Junos Pulse Client MAG4610 Junos Pulse Gateway MAG4611 Junos Pulse Gateway Sep 2011 MAG6610 Junos Pulse Gateway MAG-SM160, MAG-SM360, MAG-SM161, MAG-SM361 Sep Copyright 2011 Juniper Networks, Inc. MAG6611 Junos Pulse Gateway MAG-SM160, MAG-SM360, MAG-SM161, MAG-SM361 Sep 2011
20 USE CASE LOCATION AWARENESS AND SESSION MIGRATION Location-, identityaware acceleration Location-aware remote access Corporate Office User data session migration Home Remote Office Firewall SA Series AAA Location-aware local access, session data seamlessly coordinated Apps EX Series WXC Series IC Series / UAC Partner Retail Firewall Data Center Finance Server Database Server 20 Copyright 2011 Juniper Networks, Inc. Apps Server Data Server
21 JUNOS PULSE 2.0 USE CASES High Level WX Junos Pulse Use Cases Small Branch Offices Mobile and Telecommuter employees Partner and Contractor personnel Branch SRX Series 21 Copyright 2011 Juniper Networks, Inc.
22 JUNOS PULSE MOBILE SECURITY SUITE 22 Copyright 2011 Juniper Networks, Inc.
23 SMARTPHONES & TABLET PCS Exponential Growth increasing challenges for the IT BYOD Consumerization 23 Copyright 2011 Juniper Networks, Inc.
24 Notes from the Consultant's Jungle Top CIO Trends for 2011 January 9th, Mobile applications and media tablets. Tablet PC s and touch screens aren t new, but as Apple has leveraged the iphone ecosystem, and the ipad is as common as pocketbooks, the game has changed considerably. Items of note: Access to enterprise applications on the tablet will be commonly expected by users. Developing mobile applications is complicated by the diversity of platforms available. Context aware computing can connect to customers better Marketing will drive a lot of projects to utilize tablets, but these devices can also be used for inspections, surveys, image capture, documentation and training. 24 Copyright 2011 Juniper Networks, Inc.
25 NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% use their smartphone for both personal and business 72% share or access sensitive info such as banking, credit card, social security, medical records 80% access their employer s network without permission 59% do it everyday 50%+ are very concerned about loss, theft and identity theft resulting from their mobile usage Sources: KRC Research and Juniper Mobile Threat Center 25 Copyright 2011 Juniper Networks, Inc.
26 SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Enabling secure connectivity Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 26 Copyright 2011 Juniper Networks, Inc.
27 SECURE ACCESS FROM MOBILE DEVICES Junos Pulse for mobile devices enables smartphone and mobile device access to , Web, and corporate applications Applications Web Apps Corporate Apps More Applications on More Devices Over Time 27 Copyright 2011 Juniper Networks, Inc.
28 JUNOS PULSE: FULL SSL VPN ACCESS FROM MOBILE PHONES 28 Copyright 2011 Juniper Networks, Inc.
29 LAYER 3 VPN ON ANDROID Lack of remote VPN support on native Android Juniper-designed workaround with individual Android vendors Juniper-designed plugin software shared with each device vendor Junos Pulse 2.1 will detect plugin and enable full Layer 3 VPN on supported devices Strategic partnerships with device vendors to include plugin in their Android distributions Vendors on right-hand side are partnership candidates 29 Copyright 2011 Juniper Networks, Inc.
30 SECURE MOBILITY JUNOS PULSE FOR SECURE ACCESS Junos Pulse Clients Junos Pulse Gateways Secure Connectivity Junos Pulse Client 30 Copyright 2011 Juniper Networks, Inc.
31 MOBILE DEVICE ACCESS iphone ipad SA6500 AAA Corporate Intranet Virtual SSL VPN Infrastructure Firewall Internet Router Applications Server Server Improved Ease of Use, Higher Productivity Access from any mobile device ActiveSync facilitates secure access to Exchange Enforce mobile device integrity and security 31 Copyright 2011 Juniper Networks, Inc.
32 SECURE MOBILITY GARTNER MAGIC QUADRANT FOR SSL VPN 2010 Magic Quadrant Key Takeaways: 2008 Gartner Magic Quadrant for SSL VPN Juniper has maintained the product vision, execution and overall momentum so effectively that it has held a Magic Quadrant leadership position continuously entrenched in the Fortune 500 with a track record for large deployments. Juniper is the No. 1 competitive threat cited by peer vendors Junos Pulse is expected to pose a strong competitive advantage for Juniper SSL VPN sales. 32 Copyright 2011 Juniper Networks, Inc.
33 SECURE MOBILITY FUNDAMENTAL CHANGE IN MOBILE SECURITY Smartphones ARE computers Threat vectors are at the device, application and network level Threat landscape has evolved from SMS-based attacks Junos Pulse Mobile Security Suite 33 Copyright 2011 Juniper Networks, Inc.
34 MOBILE DEVICE LOSS AND THEFT A survey of consumer users found that one out of every three users lost their mobile device 1 Approximately 2 million smartphones were stolen in the U.S. in Over 56,000 mobile devices were left in the back seats of the city of London taxi cabs during 6 month period between 2008 and 2009 Over the 2010 holidays, in the U.K. alone, a total of 5,100 smartphones and 3,844 notebook computers were lost at 15 different airports 3 In Paris, 75% of 991 violent crimes that took place in October 2010 happened because of mobile phone theft 4 34 Copyright 2011 Juniper Networks, Inc. 1 Information obtained from Junos Pulse Mobile Security Suite internal transaction logs; 2 Forrester Research; 3 Credant Technologies; 4 The Sydney Morning Herald, 12/10/10
35 SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Securing handsets against new vulnerabilities Protecting company data User & location based security Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 35 Copyright 2011 Juniper Networks, Inc.
36 SECURE MOBILITY JUNOS PULSE FOR Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 36 Copyright 2011 Juniper Networks, Inc.
37 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Junos Pulse Clients Junos Pulse Gateways Junos Pulse Client Junos Pulse Mobile Security Gateway Mobile Security Hosted (SaaS) Deployment 37 Copyright 2011 Juniper Networks, Inc.
38 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Oct July 2011 Q Oct Q Copyright 2011 Juniper Networks, Inc.
39 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE iphone, ipod Touch, ipad (Q3 2011) Features MDM Phase I: ios enrollment, provisioning (via APNS) ios Lock, Wipe, Locate ios OS and App inventory Remote policy configuration VPN, Exchange, Passcode policies, , etc. App and Usage restrictions (camera) ipad/tablet user interface VPN access enforcement 39 Copyright 2011 Juniper Networks, Inc.
40 SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Secure Access Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 40 Copyright 2011 Juniper Networks, Inc.
41 SECURE MOBILITY JUNOS PULSE Junos Pulse Clients Junos Pulse Gateways Secure Connectivity Junos Pulse Client Junos Pulse Mobile Security Gateway Mobile Security Hosted (SaaS) Deployment 41 Copyright 2011 Juniper Networks, Inc.
42 IBM - ENTERPRISE CASE STUDY Extending Corporate Access IBM The modern workforce is increasingly mobile, with many jobs performed in the field, far from standard workplace tools, such as desk-bound computers and wired networks. Key Market Decision Factors Key Product Decision Factors Extending Corporate Services Proliferation of Smartphone Usage Increased Security Threats Adherence to Internal Security Policies Cross Platform Support Solution Manageability Ease of Deployment Technology Performance Vendor Expertise 42 Copyright 2011 Juniper Networks, Inc.
43 Uwe Nelkel Business Development Manager Junos Pulse Phone: +49 (0) Mobile:
SECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationSHA-256 IAB Q&A. February 2011
SHA-256 IAB Q&A February 2011 ANALYST PRAISE & RECOGNITION 2008 Gartner Magic Quadrant for SSL VPN 2010 Magic Quadrant Key Takeaways: Juniper has maintained the product vision, execution and overall momentum
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationJunos Pulse: Securing Today s Mobile Life
Junos Pulse: Securing Today s Mobile Life An Integrated Approach to Mobile Security, Device and Application Management, and Secure Network Access Today s Mobile Life - Overview Today, our world is digital,
More informationMOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationThanks for joining We ll start at 10am
Thanks for joining We ll start at 10am Mobile Device Management Learn the basics to build your MDM Strategy Mobile Device Management Learn the basics to build your MDM Strategy Poll Question #1 3 of 39
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationSecurity. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.
Mobile Device Security FOR by Rich Campagna, Subbu Iyer, and Ashwin Krishnan Foreword by Mark Bauhaus Executive Vice President, Device and Network Systems Business Group, Juniper Networks WILEY John Wiley
More informationBuilding Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh
Building Apps for iphone and ipad Presented by Ryan Hope, Sumeet Singh 1 Let s continue the conversation! @MaaS360 [Share comments, continue Q&A, suggest future topics] #MaaS360Webinar Click the link in
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationOrchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
More informationPeople-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh
People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform
More informationMaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationEmbracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
More informationKaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
More informationIntroducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com
Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS! Guyton Thorne! Sr. Manager System Engineering! guyton.thorne@kaspersky.com 1 Business drivers and their impact on IT AGILITY! Move fast, be nimble
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationSymantec Mobile Security
Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationMobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
More informationSecure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationSymantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationJonas Vercruysse Technical Pre-sales February 2013. Endpoint Management. 2013 IBM Corporation
Jonas Vercruysse Technical Pre-sales February 2013 Endpoint Management 2013 IBM Corporation Agenda 2 Intro IBM Endpoint Manager overview Key value adds Functionalities Use cases Wrap-up Agenda 3 Intro
More informationMcAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync
McAfee Enterprise Mobility Management Versus Microsoft Secure, easy, and scalable mobile device management Table of Contents What Can Do? 3 The smartphone revolution is sweeping the enterprise 3 Can enterprises
More informationTotal Enterprise Mobility
Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationSANS Mobility/BYOD Security Survey
Sponsored by Bradford Networks, MobileIron, and HP Enterprise Security Products SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey
More information6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
More informationMobile Device Management and Security Glossary
Mobile Device Management and Security Glossary February, 2011 MOBILE OS ActiveSync Exchange ActiveSync (EAS) is a Microsoft technology that allows mobile users to access their Microsoft Exchange mailboxes
More informationMobility Challenges & Trends The Financial Services Point Of View
Mobility Challenges & Trends The Financial Services Point Of View Nikos Theodosiou Cloud Computing Solutions Presales/Marketing Engineer The New World Agenda The Mobile World The Challenges The Solutions
More informationEnterprise Mobility as a Service
Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...
More informationPOLICY SECURE FOR UNIFIED ACCESS CONTROL
White Paper POLICY SECURE FOR UNIFIED ACCESS CONTROL Enabling Identity, Role, and Device-Based Access Control in a Simply Connected Network Copyright 2014, Pulse Secure LLC 1 Table of Contents Executive
More informationTop 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
More informationManaging and Securing the Mobile Device Invasion. 2012 IBM Corporation
Managing and Securing the Mobile Device Invasion 2012 IBM Corporation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM
More informationGenerating leads with Meraki's Systems Manager. Partner Training"
Generating leads with Meraki's Systems Manager Partner Training Agenda Systems Manager overview Starting the conversation & uncovering opportunities Sales tools and collateral Systems Manager solution
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationSECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE
SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE Michael CLICK TO Albek EDIT MASTER - SecureDevice SUBTITLE STYLE 2011 Driven by changing trends and increasing globalization, the needs of
More informationMobile Security BYOD and Consumer Apps
Mobile Security BYOD and Consumer Apps Adam Shnider, Managing Director, Coalfire October 16, 2012 Agenda I. The Mobile World - Trends I. Mobile devices - threats and risks I. BYOD Security Top Five I.
More informationBen Hall Technical Pre-Sales Manager
Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality
More informationMobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software
Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationIBM MobileFirst Protect: Secure & Manage your mobile enterprise
IBM MobileFirst Protect: Secure & Manage your mobile enterprise SolutionsConnect Vietnam March 2015 Stephen Downie Growth Markets, Unified Endpoint Management 1 Digital and mobile technologies are making
More informationIBM United States Software Announcement 215-078, dated February 3, 2015
IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,
More informationMOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
More informationBuilding an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise
Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise Jan Wiewiora White Paper Introduction Users are increasingly relying on smartphones and tablets for work. Recent
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationM a as3 6 0 fo r M o bile D evice s
by Fiberlink Services > Overview MaaS360 helps IT administrators provision, manage, and secure today s expanding suite of mobile devices, including ios and Android devices. The New Challenges of Mobile
More informationEnabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD
Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD FORTINET Enabling Secure BYOD PAGE 2 Executive Summary Bring Your Own Device (BYOD) is another battle in the war between security
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
More informationEOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
More information"Secure insight, anytime, anywhere."
"Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others
More informationBring Your Own Device:
Bring Your Own Device: Finding the perfect balance between Security, Performance, Flexibility & Manageability SECURELINK WHITEPAPER 2012 By Frank Staut Management summary This white paper discusses some
More informationHow To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
More information10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)
10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM) CONTENT INTRODUCTION 2 SCOPE OF BEST PRACTICES 2 1. HAVE A POLICY THAT IS REALISTIC 3 2. TAKE STOCK USING A MULTIPLATFORM REPORTING AND INVENTORY TOOL...3
More informationData Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense
Data Security on the Move Mark Bloemsma, Sr. Sales Engineer Websense Consumerization of IT Fast & disruptive Enables business Increases productivity It s Mine! THE MOBILE ENTERPRISE. TYPES OF DEVICES METHODS
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSay Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices
Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices Introduction Bring Your Own Device (BYOD) and consumerization of IT are all phrases that serve to encompass
More informationEmbracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
More information5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet
5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet Sr. Sales Engineer 1 What we ll talk about What is BYOD? Mobile Revolution, the Post PC era? BYOD: What to consider 1. Users 2. Devices
More informationSecure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
More informationMeraki: Introduction to Cloud Networking
Meraki: Introduction to Cloud Networking April 30, 2014 Sharif Kotb Meraki Business Manager KSA, UAE, Turkey, & Qatar Agenda About Cisco s Cloud Managed Networking Cloud Architecture Solution Overview
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More information{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
More informationPrivate Geräte im Unternehmen - ein großes Potential mit Risiken
Insight-eSeminar zum Thema BYOD, 2012-09-20 Bernhard Kammerstetter Client Technical Professional für IEM in ALPS (CH, FL und AT) Email: Bernhard_Kammerstetter@at.ibm.com Telefon: +43 1 21145 3392 Private
More informationProviding a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationCyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
More informationBYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited alenlo@n2nsecurity.com
More informationJunos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
More informationMDM and beyond: Rethinking mobile security in a BYOD world
MDM and beyond: Rethinking mobile security in a BYOD world 2013 Citrix and TechTarget Table of Contents Summary.... 3 Introduction... 3 Current business challenges with BYOD... 4 Securing mobile devices
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationBring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
More informationMobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationEasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
More informationBENEFITS OF MOBILE DEVICE MANAGEMENT
BENEFITS OF MOBILE DEVICE MANAGEMENT White Paper 2013 SUMMARY OVERVIEW This white paper outlines the benefits of Mobile Device Management in different use cases. SyncShield is a Mobile Device Management
More informationTuesday, June 5, 12. Mobile Device Usage
Mobile Device Usage Remeber This? The original, live presentation included the embedded video below: http://www.youtube.com/watch?v=bo-nft2mohi A Changing Industry Proliferation of Smart Phones and Tablets.
More informationSANS Mobility/BYOD Security Survey
Sponsored by MobileIron SANS Mobility/BYOD Security Survey March 2012 A SANS Whitepaper Written by: Kevin Johnson Advisor: Barbara L. Filkins Survey Participants Page 3 Policies and BYOD Page 4 What Devices
More informationSecuring mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationSAMSUNG ENTERPRISE MOBILITY SOLUTIONS. Horizontal Solutions Portfolio
SAMSUNG ENTERPRISE MOBILITY SOLUTIONS Horizontal s Portfolio TABLE OF CONTENTS MOBILE SECURITY Samsung ODE Sybase Afaria Cisco AnyConnect (VPN) F5 Networks BIG-IP Edge Gateway (VPN) Juniper Networks Junos
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationThe User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
More informationJunos Pulse: A Day in the Life of the Mobile Worker
Junos Pulse: A Day in the Life of the Mobile Worker Junos Pulse and the MAG Series Enable Fast, Secure Network, Cloud, and Application Access 1 Table of Contents Executive Summary... 3 Introduction Creating
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationBEYOND LIMITATIONS CONNECTING POSSIBILITIES
BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More information