Junos Pulse: Securing Today s Mobile Life

Similar documents
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

SECURING TODAY S MOBILE WORKFORCE

PULSE SECURE FOR GOOGLE ANDROID

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

SA Series SSL VPN Virtual Appliances

Systems Manager Cloud Based Mobile Device Management

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Feature List for Kaspersky Security for Mobile

Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility

The ForeScout Difference

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Systems Manager Cloud-Based Enterprise Mobility Management

Securing mobile devices in the business environment

Mobile Device Management and Security Glossary

Symantec Mobile Security

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

Ensuring the security of your mobile business intelligence

ForeScout MDM Enterprise

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

JUNOS PULSE APPCONNECT

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

BEST PRACTICE GUIDE MOBILE DEVICE MANAGEMENT AND MOBILE SECURITY.

Chris Boykin VP of Professional Services

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Secure Your Mobile Workplace

Symantec Mobile Management 7.2

PRODUCT CATEGORY BROCHURE

Cisco Mobile Collaboration Management Service

ios Enterprise Deployment Overview

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Bring Your Own Device:

Symantec Mobile Management for Configuration Manager 7.2

Windows Phone 8.1 Mobile Device Management Overview

McAfee Enterprise Mobility Management

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

IBM Endpoint Manager for Mobile Devices

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

Junos Space for Android: Manage Your Network on the Go

Kaspersky Security for Mobile

BYOD: End-to-End Security

Guideline on Safe BYOD Management

An Overview of Samsung KNOX Active Directory and Group Policy Features

Mobile First Government

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Symantec Mobile Management 7.1

How To Manage A Mobile Device Management (Mdm) Solution

Endpoint Protection Small Business Edition 2013?

BYOD: BRING YOUR OWN DEVICE.

Thanks for joining We ll start at 10am

Securing the mobile enterprise with IBM Security solutions

Enterprise Mobility as a Service

Mobile Device Management for CFAES

FileCloud Security FAQ

Symantec Mobile Management Suite

Junos Pulse: A Day in the Life of the Mobile Worker

Symantec Mobile Management 7.1

Deploying iphone and ipad Mobile Device Management

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Junos Pulse for Google Android

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Symantec Mobile Management 7.2

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

IBM United States Software Announcement , dated February 3, 2015

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Mobile device and application management. Speaker Name Date

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

What We Do: Simplify Enterprise Mobility

IMPLEMENTATION GUIDE

Mobile Device Management Glossary.

How To Protect Your Mobile Devices From Security Threats

When enterprise mobility strategies are discussed, security is usually one of the first topics

Juniper Solutions for Turnkey, Managed Cloud Services

Ensuring the security of your mobile business intelligence

EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Endpoint protection for physical and virtual desktops

Key Capabilities for Safeguarding Mobile Devices and Corporate Assets

Reasons to Choose the Juniper ON Enterprise Network

Good for Enterprise Good Dynamics

White Paper. Five Steps to Firewall Planning and Design

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

A Bring-Your-Own-Device (BYOD) Solution Brief

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Secure iphone Access to Corporate Web Applications

Securing Corporate on Personal Mobile Devices

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

INFORMATION PROTECTED

CHOOSING AN MDM PLATFORM

The Global Attacker Security Intelligence Service Explained

Endpoint Security More secure. Less complex. Less costs... More control.

Cloud Backup and Recovery for Endpoint Devices

Choosing an MDM Platform

Transcription:

Junos Pulse: Securing Today s Mobile Life An Integrated Approach to Mobile Security, Device and Application Management, and Secure Network Access

Today s Mobile Life - Overview Today, our world is digital, mobile, and converging. In the year 2000, there were 284 million Internet connections. Today, there are over 2 billion. In the year 2000, the number of mobile devices worldwide was around 700 million. Today, it s over 4 billion. We ve moved from chat rooms to video conferences, from dial-up connections to broadband wireless connections and more. Just think: It took the radio 38 years to reach 50 million listeners. Television reached 50 million viewers in 13 years. The Internet took only four years. The Apple ipod reached 50 million users in just three years. And, it took social networking site Facebook only nine months to reach 50 million users! In today s mobile and connected culture, there are more users who are doing more things all while they are mobile. The network, particularly the mobile network, has become an integral part of our dayto-day life. Trends and Challenges While today s mobile, connected life clearly has its benefits, it also has its challenges and pitfalls. Business and government must support users who are full- or part-time telecommuters, remote workers, and mobile workers across an increasingly global and mobile work environment. Enabling fast, secure network access for these users is vital to productivity. Many of these same users demand that their personal smartphones, tablets, and other personal mobile devices be allowed access to the corporate network. And, many companies are now allowing these personal mobile devices access to their network, public and private clouds, sensitive data, and resources as part of Bring Your Own Device (BYOD) initiatives. In many cases, users who are not receiving sanctioned enterprise network access are sneaking their personal mobile devices onto the corporate network anyway. The exploding number, resilience, and virulence of mobile malware threats, security exploits, and attacks are only adding to the problems facing those enterprises that are embracing BYOD or having mobile users go rogue by accessing the enterprise network on their own with their unmanaged, unapproved personal devices. Mobile threats, exploits, and attacks are growing at a magnitude even larger and faster than what was previously experienced with desktop and laptop PCs. Combine these factors together, and your IT department is often overwhelmed and overmatched. The fact is, consumers you, me, and everyone else who is a part of today s mobile, connected world use mobile devices for just about everything. Mobile devices span the scope from laptops, to tablet devices, to smartphones. Even the smallest formfactor intelligent mobile devices are just little computers in the palms of our hands. As such, we have and will continue to store sensitive, private data such as bank account information, credit card numbers, social security and other identification numbers, personal photos and text messages, even medical data on these devices. This makes smartphones, tablets, and other mobile devices a gold mine for identity thieves and hackers. It also makes mobile devices dangerous if lost. Imagine your vital financial, personal, or business data even pictures of your children falling into the wrong hands. Juniper Networks Junos Pulse Juniper Networks Junos Pulse addresses these mobility challenges by: Delivering connectivity, security, and management for mobile devices at scale Allowing enterprises to secure network access and personal or corporate-issued mobile devices for employees and other users Enabling service providers to deliver secure access, mobile security, and device management as managed services for their enterprise and consumer customers Junos Pulse delivers secure, mobile remote network access, reinforced by strong mobile security against malware, viruses, loss or theft, and other exploits, as well as robust mobile device and application management. Junos Pulse provides enterprises, service providers, and users with a complete, end-to-end solution to secure mobility. Secure Access and Connectivity Enterprises and service providers alike are challenged to deliver secure, mobile remote network access while limiting resource access based on user authentication, authorization, and identity. Junos Pulse, through Junos Pulse Secure Access Service, in conjunction with the Juniper Networks MAG Series Junos Pulse Gateways or as a virtual appliance, leverages Juniper s industry-leading SSL VPN technology to deliver simple, secure, authenticated access to corporate networks and resources for mobile users from any supported personal or corporateissued smartphone, tablet, or other mobile device. Junos Pulse 2

is a simple, integrated mobile user interface for Junos Pulse Secure Access Service on MAG Series gateways or as a virtual appliance protecting enterprises, their networks and clouds, and their sensitive applications and data by securely enabling granular, role-based mobile remote network and application access over a broad range of mobile operating platforms and mobile devices. Junos Pulse and Junos Pulse Secure Access Service on MAG Series gateways or as a virtual appliance deliver a broad range of purpose-driven remote network and application access methods, including complete Layer 3 VPN access, secure e-mail and calendaring via secure ActiveSync proxy, as well as browserbased application access. Junos Pulse provides mobile remote users and their transmitted information with unparalleled data in transit security. Junos Pulse enforces a simple, consistent level of authentication and access control to smartphones, tablets, and mobile devices, as well as laptops and remote desktop PCs. Enterprises can grant complete or limited network and cloud access, or deny access based on centrally defined corporate security and access policies. A host check performed on a user s device whether it s a remote desktop PC, laptop, smartphone, or tablet, managed or unmanaged, personal or corporate issued can determine whether or not the device is compliant with enterprise security and access policies. Endpoint computing devices running Microsoft Windows, Apple Mac OS, and Linux may be checked prior to and during a network access session to verify if the device security posture meets enterprise security and access policies. These device security policies can check for installed and running endpoint security applications such as antivirus, personal firewall, antimalware, antispam, as well as custom-built device checks for specialized customer requirements. Mobile endpoint devices running Apple ios and Google Android can be checked prior to and during a network access session to restrict access based on mobile operating system version, whether the device has been jailbroken or rooted, and whether or not the Junos Pulse Mobile Security Suite has been installed and is operational on the device. Junos Pulse also supports multifactor authentication, including the use of soft and hard tokens. Junos Pulse provides full Layer 3 VPN access for all Apple ios devices including Apple iphones and ipads, any mobile device that runs Google Android 4.0 (Ice Cream Sandwich) or 4.1 (Jelly Bean), and select devices running earlier versions of Android from various mobile device manufacturers. Please refer to the Junos Pulse supported platforms document 1 for further details on supported Android devices. Also, in conjunction with the Junos Pulse Secure Access Service running on MAG Series gateways or as a virtual appliance, Junos Pulse enables authenticated, authorized users and their compliant mobile and remote devices seamless, transparent, single sign-on (SSO) to cloud- and webbased applications, leveraging their authenticated SSL VPN session. And, Junos Pulse provides detailed audit logs, perfect for use in regulatory compliance audits. Finally, for Apple ios mobile devices connecting remotely from an IPv4 network, the capabilities supported in Junos Pulse and the Junos Pulse Secure Access Service limited split tunneling, proxy support, and route policies (except for controlling IPv6 routing policies) are also supported for an ios-based mobile device connecting to a MAG Series gateway or virtual appliance from an IPv6 remote network. Session roaming from an IPv4 remote network to an IPv6 remote network, and from an IPv6 remote network to an IPv4 remote network, is also supported by Junos Pulse on Apple ios mobile endpoints. Comprehensive Mobile Device and Application Security and Management As users continue to demand mobile remote access to corporate networks and applications from their personal smartphones, tablets, and similar mobile devices, enterprises and service providers many of whom already deliver managed access services to their small and medium sized businesses (SMBs) and enterprise clients face a complex security problem: A personal mobile device left unprotected or unchecked can lead to the loss, theft, and compromise of valuable, confidential data, corporate or personal. Junos Pulse and the Junos Pulse Mobile Security Suite deliver a comprehensive mobile security, management, and control solution that connects, protects, and manages smartphones, tablets, and other mobile devices. Junos Pulse Mobile Security Suite mitigates the risk of and cost incurred from viruses, malware, spam, loss, theft, physical compromise, and other looming threats. It delivers zero-day malware protection through its powerful, heuristics-based antimalware services. It also delivers mobile device configuration, provisioning, management, and control that are purpose-built to secure BYOD and manage mobility. Junos Pulse through Junos Pulse Mobile Security Suite can track and locate a lost or stolen mobile device, back up data from that device, and wipe and lock the device, all remotely. It can remotely sound an alarm on a mobile device, and send an alert if its SIM card has been removed, swapped, or replaced. It can also continue to track the device even if the SIM card has been removed. 1 The Junos Pulse Supported Platforms Guide can be found under Software Documentation at www.juniper.net/techpubs/en_us/release-independent/junos-pulse-mobile/. 3

Junos Pulse Mobile Security Suite delivers mobile device configuration, provisioning, and management capabilities for Apple ios and Google Android devices, helping enterprises manage and secure mobile devices connecting to their network. Junos Pulse Mobile Security Suite can detect when a rooted Google Android device or jailbroken Apple ios device attempts network or cloud access. Jailbroken and rooted mobile devices represent new risk points for SMBs, enterprises, and service providers. Jailbroken ios devices and rooted Android devices may bring with them many severe security issues, such as leaving protected features and file system areas open to infestation by malware, or the ability to sideload potentially malware-infested apps from unapproved and unknown application stores. Junos Pulse Mobile Secure protects you, your users, your network, and your data against these threats. For Apple ios devices, Junos Pulse Mobile Security Suite can enforce and set policies, including stringent passcode and encryption policies. These policies can secure ondevice data, provision and remove Microsoft Exchange profiles (which also removes corporate-synched e-mail, contacts) and calendar events), provision VPN and Wi-Fi settings, provision certificates through Simple Certificate Enrollment Protocol (SCEP) configurations, and perform a remote device locate and track 2. Junos Pulse Mobile Security Suite on ios devices can also remotely lock and wipe a lost or stolen device, inventory and restrict applications, restrict services (such as screen capture as well as Siri and other Apple convenience services), enable or disable access to icloud services, and limit browser and Apple App Store access. Junos Pulse Mobile Security Suite also leverages Apple s iphone Configuration Utility (IPCU), a tool which helps administrators build Apple ios profile configurations, allowing them to export configuration profiles for Apple ios devices. By supporting Apple s IPCU, Pulse Mobile Security Suite enables fast, simple support for new Apple ios mobile device management (MDM) features as soon as Apple has released them. Support for importing existing configuration profiles into Junos Pulse Mobile Security Suite, and the application of those profiles to ios devices, can be a huge time saver for your IT and security staff. On Google Android devices, Junos Pulse Mobile Security Suite sets and enforces strict passcode policies, ensures that data-at-rest and stored on the device is safely encrypted, and, on select Android devices, sets and enforces encryption policies on data-at-rest stored on the device s Secure Digital (SD) card 3, in addition to securing on-device data. Junos Pulse Mobile Security Suite can also restrict access to an Android device s camera based on the user s profile, and can even block downloaded third-party camera apps from use. Junos Pulse Mobile Security Suite can remotely configure VPN and Wi-Fi settings for Android devices, The Android Wi- Fi provisioning within Pulse Mobile Security Suite can also control the changing of an active service set identifier (SSID), simplifying and making more intuitive the provisioning of captive portals by wireless LAN (WLAN) devices. Junos Pulse Mobile Security Suite Mobile Security and Device Management + Antimalware Personal Firewall Antispam Real-time protection Heuristics based Scans all files Scans all connections Inbound and outbound filtering Alerts and logging Customizable Blocks SMS and voice spam Blacklist filtering Automatic denial options + Secure Connectivity MAG Series Junos Pulse Gateway with Junos Pulse Secure Access Service Loss and Theft Protection Monitor and Control Remote lock and wipe Backup and restore GPS locate and track SIM change notification Mobile Device Management (MDM) Application inventory and removal Content monitoring Junos Pulse: Securing Mobility 2 Please note: Supports Apple iphones and 3G- and 4G-enabled Apple ipads only. Apple ipod touch devices and Wi-Fi only Apple ipads do not allow GPS location data to be accessed and collected. 4

Junos Pulse Mobile Security Suite also supports Google Cloud Messaging (GCM), a framework from Google that allows application servers to send lightweight messages to Android applications. GCM is available for all devices running Pulse Mobile Security Suite supported Android versions (note that the devices must also have Google Play installed to be eligible). GCM enhances the command delivery mechanism in Pulse Mobile Security Suite, saving cost and increasing its reliability. Junos Pulse Mobile Security Suite allows apps on certain Google Android devices to be automatically removed from a user s mobile device without user intervention, with the proper permissions and access rights. Junos Pulse Mobile Security Suite also allows an administrator to automatically remove malware, if detected on an Android device, once again without user interaction. The ability to disable Bluetooth and Wi-Fi on specific Android devices is also available in Junos Pulse Mobile Security Suite. With Pulse Mobile Security Suite and specific Android devices, administrators can quickly define and just as easily tear down Microsoft Exchange ActiveSync (EAS) profiles, which contain configuration data to allow for synchronization of e-mail, contacts, calendar, tasks, and notes from a messaging server to a mobile device. Pulse Mobile Security Suite also enables administrators to remotely configure Microsoft EAS account information, such as adding, modifying, or removing an EAS profile from certain Android devices. Finally, on certain Android devices, Junos Pulse Mobile Security Suite can disable the USB port on a lost or stolen device to ensure that the device lock cannot be circumvented by connecting it to a computer to access its contents. These capabilities are available for Android-based mobile devices from specific manufacturers. Please refer to the Junos Pulse supported platforms document3 for further details about supported Android devices. As a managed service, Junos Pulse Mobile Security Suite delivers robust security against malware and viruses, which translates into increased breadth of offerings and revenues for service providers, mobile network operators (MNOs), and managed service providers (MSPs). Summary Delivering Peace of Mind for Today s Mobile Life Junos Pulse Mobile Security Suite protects you, your children, and your financial security by securing your smartphones, tablets, or other mobile devices from viruses, malware, and spam, preventing lost or stolen devices from ruining your economic security, alleviating identity theft, and protecting your family by securing your mobile device from and monitoring it for inappropriate use and contact. Junos Pulse Mobile Security Suite is flexible, securing and managing mobile devices through a zero touch deployment model. A cloud-based, Software-as-a-Service (SaaS) offering, Junos Pulse Mobile Security Suite speeds and simplifies deployment and user rollout. It expedites the mitigation of risk of infection, exploitation, or infiltration from insecure or poorly secured mobile devices accessing the corporate network, and it decreases overall security costs specifically, mobile security costs. It is highlyscalable and enables enterprises and service providers to add new mobile security features or take advantage of security features and capabilities quickly and remotely. Junos Pulse Mobile Security For Service Providers Protect your network For The Enterprise Secure mobile, remote network access Monetize innovative mobile device security and remote access services Scale with a single solution Differentiate your offerings For Consumers Defend kids from cyber misuse and abuse Monitor email, texts, photos for inappropriate content or use Remotely wipe data and contacts from lost or stolen devices Enforce consistent mobile security and access policies Protect against viruses, trojans and other malware Prevent data loss due to lost or stolen mobile devices Reduce IT overhead and burden Junos Pulse Delivers Secure Mobility to Mobile Device Users 5

Suite includes the Juniper Networks Junos Pulse Mobile Security Gateway, a hosted, web-based, administrative management console from which Junos Pulse Mobile Security Suite features, services, policies, and profiles are provisioned, managed, and maintained by enterprises and service providers. Junos Pulse, through Junos Pulse Mobile Security Suite, enables service providers to offer profitable premium, managed services to their enterprise and consumer subscribers, increasing average revenue per user (ARPU), providing competitive differentiation, and raising user satisfaction levels. Junos Pulse Mobile Security Suite eases an enterprise s mobile device management (MDM) burden, extends corporate security policies (even addressing and insuring BYOD policies), simplifies and protects the continued consumerization of IT, and ensures that corporate information cannot be exploited on a lost or stolen mobile device. Junos Pulse powerfully yet simply centralizes mobile security, device and configuration management, application management, mobile 1600055data security, and access services enabling secure, mobile remote access while insuring the integrity and secure use of managed and unmanaged, personal, and corporate issued smartphones, tablets, and other mobile devices. Junos Pulse, enabling and integrating Juniper s SSL VPN offerings, and Junos Pulse Mobile Security Suite, delivers a robust, secure, trusted mobility solution supporting most major mobile devices and operating systems with an unparalleled depth and breadth of mobile access, security, management, and control services. Junos Pulse connects, protects, and manages the critical aspects of your mobile digital life, 24/7 securing your company, your corporate and personal data, your identity, and your family. About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net. Corporate and Sales Headquarters Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or +1.408.745.2000 Fax: +1.408.745.2100 www.juniper.net APAC and EMEA Headquarters Juniper Networks International B.V. Boeing Avenue 240 1119 PZ Schiphol-Rijk Amsterdam, The Netherlands Phone: +31.0.207.125.700 Fax: +31.0.207.125.701 Copyright 2015 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 1600055-005-EN May 2015