MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions



Similar documents
Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

SA Series SSL VPN Virtual Appliances

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

PULSE SECURE FOR GOOGLE ANDROID

POLICY SECURE FOR UNIFIED ACCESS CONTROL

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Smart Givaudan. From BYOD experience to new mobile opportunities

Mobile Access Software Blade

A Bring-Your-Own-Device (BYOD) Solution Brief

Embracing Complete BYOD Security with MDM and NAC

Junos Pulse: A Day in the Life of the Mobile Worker

Accessing TP SSL VPN

Codeproof Mobile Security & SaaS MDM Platform

Junos Pulse. Administration Guide. Release 3.0. Published: Copyright 2012, Juniper Networks, Inc.

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

Generating leads with Meraki's Systems Manager. Partner Training"

[BRING YOUR OWN DEVICE POLICY]

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Enterprise Mobility as a Service

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Symantec Mobile Management Suite

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

Systems Manager Cloud-Based Enterprise Mobility Management

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

Secure Your Mobile Device Access with Cisco BYOD Solutions

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

Junos Pulse for Google Android

Cisco Mobile Collaboration Management Service

Secure Cloud-Ready Data Centers Juniper Networks

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

The BYOD of Tomorrow: BYOD 2.0. What is BYOD 1.0? What is BYOD 2.0? 3/27/2014. Cesar Picasso, MBA SOTI Inc. April 02, 2014

BYOD: End-to-End Security

Managing Mobility in the BYOD Era:

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

SHA-256 IAB Q&A. February 2011

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

What is Driving BYOD Adoption? SOLUTION CARD WHITE PAPER

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

BYOD. and Mobile Device Security. Shirley Erp, CISSP CISA November 28, 2012

Securing BYOD With Network Access Control, a Case Study

Pulse Secure Client. Administration Guide. Product Release 5.1. Document Revision 1.0 Published:

BEFORE YOU START... 1 Set Up Your PC Desktop Computer/Laptop... 1 Set Up Remote Desktop on Your ipad... 3

Symantec Endpoint Security Management Solutions Presentation and Demo for:

Securing your Juniper SSL VPN with two-factor authentication.

Mobile Devices Policy

Secure BYOD with Enterprise Mobile Management

ADDING STRONGER AUTHENTICATION for VPN Access Control

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS. Junos WebApp Secure Junos Spotlight Secure

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Pulse Policy Secure. Data Sheet. Published Date

Kaspersky Security for Mobile

When enterprise mobility strategies are discussed, security is usually one of the first topics

Move over, TMG! Replacing TMG with Sophos UTM

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Simple security is better security Or: How complexity became the biggest security threat

JUNOS PULSE APPCONNECT

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

Systems Manager Cloud Based Mobile Device Management

Chris Boykin VP of Professional Services

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Deployment Guide Sept-2014 rev. a. Array Networks Deployment Guide: AG Series and DesktopDirect with VMware Horizon View 5.2

What We Do: Simplify Enterprise Mobility

ClearPass: Understanding BYOD and today s evolving network access security requirements

BYOD: BRING YOUR OWN DEVICE.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Document Sharing on Mobile Devices. Securing Productivity on the Go!

Athena Mobile Device Management from Symantec

Symantec Mobile Management 7.2 MR1Quick-start Guide

How To Manage A Mobile Device Management (Mdm) Solution

Enterprise Mobility Management

Microsoft Enterprise Mobility Suite

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

How To Write A Mobile Device Policy

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Transcription:

MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions

BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires coordinated access 2 Copyright 2012 Juniper Networks, Inc. www.juniper.net

USER EXAMPLES FOR MOBILITY Guest Devices Employee Owned Corporate Owned Doctor s own ipad Hotel employees on ipad Teacher s own ipad Student s own ipad Employee owned laptops, smartphones and tablets at an enterprise Visitors at a museum Visitors at an enterprise Hospital issued ipad School issued mobile devices Visitors at a hospital Visitors at a hotel Hospital issued laptops School issued laptops 3 Copyright 2012 Juniper Networks, Inc. www.juniper.net

MOBILE USER TYPES AND REQUIREMENTS Open Access, Guest Users Self provisioning Open, no encryption, captive portal Simple experience Device aware policy Differentiated access Guest Devices Corporate Issued Devices Self provisioning Secure certificate based authentication User, application, device aware policy Device management On-device security Secure network, cloud SSO Device agnostic Follow-me policies Application management Content monitoring Corporate Owned Devices Employee Owned Devices BYOD (Employee owned) Self provisioning Secure certificate based authentication User, application, device aware policies Device management On-device security Device, data loss, data theft prevention Secure network, cloud access Device agnostic Follow-me policies 4 Copyright 2012 Juniper Networks, Inc. www.juniper.net

VISIT THE SIMPLY CONNECTED LIVE DEMO AND TOMORROW S SIMPLY CONNECTED IN ACTION - AN OVERVIEW OF DIFFERENT USE-CASES 5 Copyright 2012 Juniper Networks, Inc. www.juniper.net

Enterprises should focus on mobile data protection (MDP), network access control (NAC), and mobile device management (MDM) tools to support their BYOD and new enterprise mobile platform efforts. MOBILITY BEYOND BYOD END TO END REMOTE ACCESS, ANYTIME, ANY DEVICE 6 Copyright 2012 Juniper Networks, Inc. www.juniper.net

CREATE YOUR DEVICE ACCESS REQUIREMENTS Client Deployed Mobile Security Mobile Device/Appl. Mgmt LAN/WLAN Access Remote Access Access to Corporate Resources Corporate Device Personal Device (BYOD) Guest Device Contractor / Consultant Device Its not about BYOD.. Its about an Access Management policy / solution. 7 Copyright 2012 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE SINGLE CLIENT, GATEWAY MULTIPLE SERVICES Junos Pulse PCs & Macs Junos Pulse Smartphones & Tablets MAG Series Junos Pulse Gateway Junos Pulse Services supported: Junos Pulse Secure Access Service (SSL VPN) Junos Pulse Access Control Service (UAC) Junos Pulse Application Acceleration Service Junos Pulse Mobile Security Suite Access Enterprise Resources 8 Copyright 2012 Juniper Networks, Inc. www.juniper.net

ANYTIME, ANY DEVICE FROM ANYWHERE Identify User Device Role 1 Onboard Corporate or Personal On Campus Offsite From Home 2 Manage Device-specific Ensure Adherence to Policy 4 Secure 24/7 Protection Anywhere Loss & Theft 3 Protection Device Location 9 Copyright 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEES ON PERSONAL/COMPANY OWNED DEVICE HOST CHECKING & APPLICATION RESTRICTION Corporate Network Junos Pulse Mobile Security Suite Remote onboarding & access and the highest level of security with automatic scan for latest OS, viruses signatures, jail broken Dr. Rose 369 Scan Connect is Clean Complete Access MAG Series Gateway running Junos Pulse Secure Access Service (SSL VPN) Any Device Any Guest Devices Time Employee Owned Corporate Owned 10 Copyright 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEES ON CORPORATE LIABLE DEVICE ON BOARDING, HOST CHECKING AND APPLICATION RESTRICTION 1 User downloads Junos Pulse Client from App Store 2 JPMSS pushes: VPN Profile WiFi Profile SCEP Profile JPMSS delivers 24/7 security via AV & antimalware MDM such as password mgmt Jailbroken/ Compliant? Rooted? 3 The device initiates a tunnel to the MAG Series Junos Pulse Gateway 4 Secure Access Service runs a HostCheck on the device Active Directory /LDAP Data Finance Patch Remediation 8 Mobile User User has appropriate access to his role 7 User matched to corporate role 6 Valid user on AD; device is OK 5 Secure Access authenticates the user against AD MAG Series Junos Pulse Gateway running Secure Access Service SSL VPN Video Apps Corporate Data Center 11 Copyright 2012 Juniper Networks, Inc. www.juniper.net

EMPLOYEES ON CORPORATE LIABLE DEVICE APPLICATION RESTRICTION AND COORDINATED THREAT CONTROL 10 User requests data from application Client issues an attack of some kind 11 12 SRX get the User/Role/IP information. Applies AppSecure polices 9 Session is published to IF-MAP Active Directory /LDAP Data Finance SRX Series Patch Remediation 16 Mobile User User/device is Quarantined or Disconnected 15 SA gets the event and takes Action 14 UAC takes action or publish event to IF-MAP 13 SRX IPS detects the attack and issues a Sensor Event to UAC MAG Series Junos Pulse Gateway running both Secure Access Service Access Control Service Video Apps Corporate Data Center 12 Copyright 2012 Juniper Networks, Inc. www.juniper.net

DEMO 13 Copyright 2012 Juniper Networks, Inc. www.juniper.net

Q & A 14 Copyright 2012 Juniper Networks, Inc. www.juniper.net

15 Copyright 2012 Juniper Networks, Inc. www.juniper.net

16 Copyright 2012 Juniper Networks, Inc. www.juniper.net

17 Copyright 2012 Juniper Networks, Inc. www.juniper.net