The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more



Similar documents
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Juniper Networks Solution Portfolio for Public Sector Network Security

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Reasons Enterprises. Prefer Juniper Wireless

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

Meeting PCI Data Security Standards with

PRODUCT CATEGORY BROCHURE

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

White Paper. Protect Your Virtual. Realizing the Benefits of Virtualization Without Sacrificing Security. Copyright 2012, Juniper Networks, Inc.

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Juniper Networks Solution Portfolio for Public Sector Network Security

Key Capabilities for Safeguarding Mobile Devices and Corporate Assets

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility

White Paper. Copyright 2012, Juniper Networks, Inc. 1

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

JUNIPER NETWORKS WIRELESS LAN SOLUTION

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)

Key Strategies for Long-Term Success

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

NETWORK AND SECURITY MANAGER

Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation

Securing mobile devices in the business environment

SOLUTION BROCHURE. Juniper Networks. Intelligent Security and Performance for the Distributed Enterprise

Secure Your Mobile Workplace

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document

END-TO-END SECURITY WITH SA SERIES SSL VPN APPLIANCES

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES

Product Description. Product Overview

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

How To Protect Your Network From Attack From A Malicious Computer (For A Network) With Juniper Networks)

PULSE SECURE FOR GOOGLE ANDROID

Web Filtering For Branch SRX Series and J Series

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

Configuring and Implementing A10

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES

PRODUCT CATEGORY BROCHURE INTEGRATED FIREWALL/ VPN PLATFORMS

Demonstrating the high performance and feature richness of the compact MX Series

ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Cisco & Big Data Security

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways

Identity-Based Traffic Logging and Reporting

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

WHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1

White Paper. Five Steps to Firewall Planning and Design

Simplifying the Data Center Network to Reduce Complexity and Improve Performance

Identity-Based Application and Network Profiling

Security Portfolio. Juniper Networks Integrated Firewall/VPN Platforms. Product Brochure. Internet SRX Fixed Telecommuter or Small Medium Office

Guideline on Safe BYOD Management

Mobile Device Management

JUNOS PULSE APPCONNECT

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

End-user Security Analytics Strengthens Protection with ArcSight

Practical Attacks against Mobile Device Management Solutions

Tutorial on Smartphone Security

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

JUNOScope IP Service Manager

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Endpoint protection for physical and virtual desktops

The Global Attacker Security Intelligence Service Explained

Secure Cloud-Ready Data Centers Juniper Networks

Reasons to Choose the Juniper ON Enterprise Network

BYOD: End-to-End Security

The Cloud App Visibility Blindspot

Pharmacy. Regulatory Agency. Medical Equipment. Clinic. Customers Guest Partners Vendors WEB

Mobile App Reputation

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Kaspersky Security for Mobile

Transcription:

The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific applications become widely adopted and standardized across mobile devices, the applications themselves are increasingly becoming the targets of attacks. Read on for the top 10 must-follow rules for implementing Trusted Mobility and securing your organization now. Total mobile malware samples across all operating systems 2010 11, 138 samples 2011 2 28,472 samples

1 2 Employ an organization wide Trusted Mobility use policy Ensure all mobile network users are trained and informed on acceptable use policy as well as to be alert and aware of potential hacker attempts to gain information and/or access to their personal mobile devices and network resources. Implement a robust and comprehensive Mobile Device Management (MDM) Implement a robust and comprehensive Mobile Device Management (MDM) solution to monitor and protect the mobile device being used for network access. The MDM should provide support across a broad array of the most popular smartphones and mobile devices. MDM anti-malware should provide protection against malicious applications, spyware, infected SD cards, and malware based attacks while the on device firewall protects mobile device interfaces. Host checking should be automated to assess device security posture including device, OS version, malware status, patch and jailbreak/rooted status. Additionally, the MDM should provide remote locate, track, lock, wipe, backup and restore functionality to retrieve, protect or restore a lost or stolen mobile device and the corporate data on that device. 3 Provide secure VPN encryption to protect data in transit Provide secure VPN encryption to protect data in transit to and from the mobile device. The best and easiest way to do this is with an SSL VPN client to effortlessly protect data in transit over un-trusted networks. 4 Implement granular network access control (NAC) Implement granular network access control (NAC) to properly authenticate users and to dynamically assign access rights based upon the user, the device, network location, time of day and applications. NAC solution should be standards based and provide access control across all networks for all users and devices while implementing a layered security strategy at multiple enforcement points within the network. 5 Implement firewalls at all entry and exit points Implement firewalls at all entry and exit points (data centers, main offices and branch offices) that integrates with the NAC solution and dynamically enforces firewall policy based upon access controls for all mobile users. 6 Leverage Intrusion Detection and Prevention (IDP) over wired and wireless networks Leverage Intrusion Detection and Prevention (IDP) over wired and wireless networks to monitor all traffic streams from any mobile user and device coming in and out of business networks and locations. IDP should monitor traffic on the business network across WiFi and wired networks as well for connected mobile and static devices. 7 Implement and enforce application level security Track application usage by groups and down to the individual users by device, detect application behavior anomalies, enforce application use policies in real-time, provide application firewalling and protect against application distributed denial of service attacks. 8 Deploy a Security Incident and Event Monitor (SIEM) Deploy a Security Incident and Event Monitor (SIEM) to aggregate and correlate event log reporting across all devices in the network. The SIEM should flag anomaly behavior and rate and order alerts based on the perceived risk, from high to low. 9 Integrate and centralize the management Integrate and centralize the management from the endpoint device, secure access, network access control, firewall and IDP such that the holistic security solution can be managed from a single pane of glass. 10 Employ a KIS model. Keep It Simple by consolidating devices as possible. Many next generation security platforms are able to consolidate stateful firewall security with routing, switching, unified threat management (UTM), IDP, Application layer security and standards based NAC implementations to greatly reduce the number of devices in the network. The most significant reason for network security gaps is human error, hence the most significant thing one can do to protect against this risk is to simplify the security solution being used for trusted mobility. 3

Cumulative Android malware increase Types of malware targeting mobile devices 3500% 3000% 13,302 Malware Samples 0.09% SMS-Flooder 0.09% Worm 2500% 36.43% SMS Trojan 2000% 1500% 1000% 500% 0% 400 Malware Samples Jun Jul Aug Sep Oct Nov Dec 63.39% Spyware In the last seven months of 2011 alone, malware targeting the Android platform rose 3,325%. Attacks 2011: A year in review JANUARY GEINIMI PROVIDES A SIGN OF COMPLEXITY TO COME Geinimi was the first Android malware to leverage botnet-like capabilities and repackage legitimate applications with malware. These repackaged applications, primarily targeting games, were released in third-party application stores in Asia and were sideloaded by users to their Android mobile devices. MARCH DROID DREAM CREATES A NIGHTMARE Droid Dream infected legitimate applications in the official Android Market, affecting more than 50,000 users. By exploiting an existing vulnerability in the Android operating system, the malware gained root account privileges, and installed additional malevolent and dangerous code on the Android device without user intervention or knowledge. JAN FEB MAR APR MAY FEBRUARY ADRD GENERATES TRAFFIC ADRD issued commands to Android devices to send HTTP search requests to specific addresses. The malware increased site rankings for a specific website, resulting in additional advertising revenue. MAY DROID KUNGFU MAKES A DISGUISED ATTACK Droid KungFu leveraged two different exploits that enabled root access of Android devices through encrypted payloads so they could go undetected by malware scanning engines. The result of the attack provided the attacker with total control over the device. JUNE JULY THE RETURN OF DROID KUNGFU 2 AND 3 Droid KungFu gave way to Droid KungFu 2 (June) and Droid KungFu 3 (July), which contained malware that obfuscated their communications and code making it much more difficult for security experts to identify and stop the malware. Like their predecessor, it gave attackers total control over the device. OCTOBER DECEMBER FAKE INSTALLERS SIMPLY FOCUS ON MAKING MONEY Between October and December, there was a sharp rise in fake installers (discussed later in this report), with an 872 percent increase in the number identified. This malware tricks users into paying via premium text messages for otherwise free or pirated versions of applications found in third-party application stores. JUN JUL AUG SEP OCT NOV DEC SEPTEMBER DROID DELUXE TARGETS USER ACCOUNTS Droid Deluxe gained root access on infected Android devices, stealing email credentials, social network account information and banking login information. By leveraging the Android operating system s root permissions, Droid Deluxe was able to bypass existing security controls. NOVEMBER ios CODE SIGNING VULNERABILITY A vulnerability in Apple s ios platform allowed a security researcher to sneak an unreviewed application onto the official Apple App Store, proving it is possible to get malicious applications past Apple s app screening process. Source: Juniper Mobile Threat Center 4

Top 10 Considerations for a Secure Mobile Enterprise 1 Enterprise-wide Trusted Mobility Use Policy 2 Mobile Users Remote Office 6 MDM and Security Mobile Users IDP Intrusion Detection and Prevention Hacker Internet/www Supplier 3 Secure SSL VPN Partner App Store 7 Application Level Security/Policy Corporate NAC Network Access Controls Data Center Private Cloud 8 SIEM Security Incident and Event Monitor 4 5 Hybrid Cloud 9 Source: Juniper Networks 2012 Firewall at all entry/exit points 10 Public Cloud Keep it Simple: Consolidate multiple functions into single platforms with a common OS and integrated Management and Visibility. CNOC Centralized End-to-End Management and Visibility LEGEND Inspection Network Access Control Firewall Application Level Security 5

Corporate and Sales Headquarters Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA Phone: 888.JUNIPER (888.586.4737) or 408.745.2000 Fax: 408.745.2100 www.juniper.net APAC Headquarters Juniper Networks (Hong Kong) 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: 852.2332.3636 Fax: 852.2574.7803 EMEA Headquarters Juniper Networks Ireland Airside Business Park Swords, County Dublin, Ireland Phone: 35.31.8903.600 EMEA Sales: 00800.4586.4737 Fax: 35.31.8903.601 Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Printed on recycled paper 1600064-001-EN Jul 2012