Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011



Similar documents
SECURING TODAY S MOBILE WORKFORCE

SHA-256 IAB Q&A. February 2011

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Junos Pulse: Securing Today s Mobile Life

MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Thanks for joining We ll start at 10am

PULSE SECURE FOR GOOGLE ANDROID

ForeScout MDM Enterprise

The ForeScout Difference

AirWatch Solution Overview

Security. Mobile Device FOR. by Rich Campagna, Subbu Iyer, and Ashwin Krishnan. John Wiley & Sons, Inc. Foreword by Mark Bauhaus.

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

SA Series SSL VPN Virtual Appliances

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Embracing Complete BYOD Security with MDM and NAC

Kaspersky Security for Mobile

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Junos Pulse for Google Android

Symantec Mobile Security

Systems Manager Cloud Based Mobile Device Management

If you can't beat them - secure them

Mobile Device Strategy

Secure Your Mobile Device Access with Cisco BYOD Solutions

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2

Mobile Security: The good, the bad, the way forward

Symantec Mobile Management for Configuration Manager 7.2

Systems Manager Cloud-Based Enterprise Mobility Management

Symantec Mobile Management Suite

Jonas Vercruysse Technical Pre-sales February Endpoint Management IBM Corporation

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Total Enterprise Mobility

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Mobile Device Management for CFAES

SANS Mobility/BYOD Security Survey

6 Things To Think About Before Implementing BYOD

Mobile Device Management and Security Glossary

Mobility Challenges & Trends The Financial Services Point Of View

Enterprise Mobility as a Service

POLICY SECURE FOR UNIFIED ACCESS CONTROL

Top 10 Reasons Enterprises are Moving Security to the Cloud

Managing and Securing the Mobile Device Invasion IBM Corporation

Generating leads with Meraki's Systems Manager. Partner Training"

Feature List for Kaspersky Security for Mobile

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Mobile Security BYOD and Consumer Apps

Ben Hall Technical Pre-Sales Manager

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Chris Boykin VP of Professional Services

IBM MobileFirst Protect: Secure & Manage your mobile enterprise

IBM United States Software Announcement , dated February 3, 2015

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Symantec Mobile Management 7.1

M a as3 6 0 fo r M o bile D evice s

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Symantec Mobile Management 7.1

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

"Secure insight, anytime, anywhere."

Bring Your Own Device:

How To Protect Your Mobile Devices From Security Threats

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

When enterprise mobility strategies are discussed, security is usually one of the first topics

Say Yes to BOYD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

Secure Your Mobile Workplace

Meraki: Introduction to Cloud Networking

Delivering Control with Context Across the Extended Network

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Private Geräte im Unternehmen - ein großes Potential mit Risiken

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Mobility, Security Concerns, and Avoidance

Cyber Security. John Leek Chief Strategist

BYOD: End-to-End Security

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision , Juniper Networks, Inc.

MDM and beyond: Rethinking mobile security in a BYOD world

Ensuring the security of your mobile business intelligence

Bring Your Own Device Mobile Security

Mobile Device Management

Hands on, field experiences with BYOD. BYOD Seminar

EasiShare Whitepaper - Empowering Your Mobile Workforce

BENEFITS OF MOBILE DEVICE MANAGEMENT

Tuesday, June 5, 12. Mobile Device Usage

SANS Mobility/BYOD Security Survey

Securing mobile devices in the business environment

Mobile device and application management. Speaker Name Date

SAMSUNG ENTERPRISE MOBILITY SOLUTIONS. Horizontal Solutions Portfolio

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

The User is Evolving. July 12, 2011

Junos Pulse: A Day in the Life of the Mobile Worker

What We Do: Simplify Enterprise Mobility

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

IBM Endpoint Manager for Mobile Devices

Transcription:

Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Legal Statement This product roadmap sets forth Juniper Networks current intention and is subject to change at any time without notice. No purchases are contingent upon Juniper Networks delivering any feature or functionality depicted on this roadmap. 2 Copyright 2011 Juniper Networks, Inc. www.juniper.net

IBM & Juniper 3 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE Unified Client für Desktops, Laptops, Smartphones und Tablets für den sicheren Zugriff auf das Firmennetzwerk 4 Copyright 2011 Juniper Networks, Inc. www.juniper.net

AGENDA Junos Pulse Strategie Junos Pulse Junos Pulse Mobile Security Suite 5 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE STRATEGIE 6 Copyright 2011 Juniper Networks, Inc. www.juniper.net

CLEAR MISSION AND FOCUSED STRATEGY CONNECT EVERYTHING; EMPOWER EVERYONE SILICON SYSTEMS SOFTWARE THROUGH HIGH-PERFORMANCE NETWORKING AND INDUSTRY INNOVATION 8 Copyright 2011 Juniper Networks, Inc. www.juniper.net

OS AND APPLICATIONS: MOVING UP THE VALUE STACK User Application Layer STANDARDS INTERFACES (TCG, IEEE) CONNECTIVITY SECURITY FUTURE SERVICES Partner opportunity for network end-point innovation Network Application Layer PLATFORM AND UI SDK PLATFORM Developer opportunity for cross-device innovation DEVICE API Network Layer DEVICE API CONTROL PLANE DATA PLANE SDK SERVICES PLANE Developer opportunity for on-device innovation 9 Copyright 2011 Juniper Networks, Inc. www.juniper.net

MORE USERS, MORE NOTEBOOKS, NETBOOKS, AND SMARTPHONES 10 Copyright 2011 Juniper Networks, Inc. www.juniper.net

UNIFIED NETWORK CLIENT ON THE DEVICE 11 Copyright 2011 Juniper Networks, Inc. www.juniper.net

MOBILITY WITH JUNOS PULSE Finance Server SRX Engineering Server Corporate Network Finance Server SRX Engineering Server LAN UAC IF-MAP SSL Data Center NY UAC IF-MAP Data Center Tokyo SSL SSL VPN User: Adam Role: Finance User: Adam Role: Finance Head Quarters Remote Site 12 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE PLATFORM: Unified Client + Unified Gateway Junos Pulse Clients Junos Pulse Gateways Junos Pulse Client MAG2600 Junos Pulse Gateway MAG4600 Junos Pulse Gateway Junos Pulse Client MAG6610 Junos Pulse Gateway 13 Copyright 2011 Juniper Networks, Inc. www.juniper.net MAG6611 Junos Pulse Gateway

JUNOS PULSE AS AN INTEGRATION PLATFORM - Junos Pulse is also an integration platform for select 3 rd party applications and services - Delivers additional revenue stream for service providers Junos Pulse Applications A P P 1 A P P 2 A P P 3 A P P 4 Applications SSL VPN NAC Application Acceleration EES JP MSS and more A P P 1 A P P 2 A P P 3 A P P 4 Junos Pulse Platform Junos Pulse Client Junos Pulse Gateways Base OS NOTE: Applications different per OS 14 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE 15 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE DESKTOP SOLUTION Dynamic, standards-based, anytime/anywhere unified network client Easy-to-use, intuitive and simple user experience Delivers anytime/anywhere access and acceleration automatically, without end user intervention Identity-enabled Standards-based and future-proofs network investments Integration platform for select 3rd party applications E.g: ipass Dynamically provisioned software client for: Remote access Enterprise LAN access control Application acceleration Single client that enables SSL VPN, NAC (UAC) and Application Acceleration services 16 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE APPLICATION ACCELERATION Provides "Fast" with access Increases productivity for key enterprise functions such as file sharing, email, document sharing, application access etc Automatically discovers and connects with Junos Pulse Gateway (or WXC) to accelerate traffic without end user interaction Easily integrates into SSL VPN deployments through provisioning from the Junos Pulse Secure Access (SA) service. 17 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE: Dynamic Unified Network Client Remote Access LAN Access Control Application Acceleration Dynamic IPsec VPN MAG Series MAG Series MAG Series Branch SRX Series 18 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE PLATFORM: Unified Client + Unified Gateway Junos Pulse Clients Junos Pulse Gateways MAG2600 Junos Pulse Gateway Junos Pulse Client MAG4610 Junos Pulse Gateway MAG4611 Junos Pulse Gateway Sep 2011 MAG6610 Junos Pulse Gateway MAG-SM160, MAG-SM360, MAG-SM161, MAG-SM361 Sep 2011 19 Copyright 2011 Juniper Networks, Inc. www.juniper.net MAG6611 Junos Pulse Gateway MAG-SM160, MAG-SM360, MAG-SM161, MAG-SM361 Sep 2011

USE CASE LOCATION AWARENESS AND SESSION MIGRATION Location-, identityaware acceleration Location-aware remote access Corporate Office User data session migration Home Remote Office Firewall SA Series AAA Location-aware local access, session data seamlessly coordinated Apps EX Series WXC Series IC Series / UAC Partner Retail Firewall Data Center Finance Server Database Server 20 Copyright 2011 Juniper Networks, Inc. www.juniper.net Apps Server Data Server

JUNOS PULSE 2.0 USE CASES High Level WX Junos Pulse Use Cases Small Branch Offices Mobile and Telecommuter employees Partner and Contractor personnel Branch SRX Series 21 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE MOBILE SECURITY SUITE 22 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SMARTPHONES & TABLET PCS Exponential Growth increasing challenges for the IT BYOD Consumerization 23 Copyright 2011 Juniper Networks, Inc. www.juniper.net

Notes from the Consultant's Jungle Top CIO Trends for 2011 January 9th, 2011 2. Mobile applications and media tablets. Tablet PC s and touch screens aren t new, but as Apple has leveraged the iphone ecosystem, and the ipad is as common as pocketbooks, the game has changed considerably. Items of note: Access to enterprise applications on the tablet will be commonly expected by users. Developing mobile applications is complicated by the diversity of platforms available. Context aware computing can connect to customers better Marketing will drive a lot of projects to utilize tablets, but these devices can also be used for inspections, surveys, image capture, documentation and training. 24 Copyright 2011 Juniper Networks, Inc. www.juniper.net http://notesfromtheconsultantsjungle.com/2011/01/09/top-cio-trends-for-2011/

NEW RESEARCH REVEALS A GAP BETWEEN BEHAVIOR AND THE DESIRE TO BE SAFE 40% use their smartphone for both personal and business 72% share or access sensitive info such as banking, credit card, social security, medical records 80% access their employer s network without permission 59% do it everyday 50%+ are very concerned about loss, theft and identity theft resulting from their mobile usage Sources: KRC Research and Juniper Mobile Threat Center 25 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Enabling secure connectivity Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 26 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE ACCESS FROM MOBILE DEVICES Junos Pulse for mobile devices enables smartphone and mobile device access to email, Web, and corporate applications Applications Email Web Apps Corporate Apps More Applications on More Devices Over Time 27 Copyright 2011 Juniper Networks, Inc. www.juniper.net

JUNOS PULSE: FULL SSL VPN ACCESS FROM MOBILE PHONES 28 Copyright 2011 Juniper Networks, Inc. www.juniper.net

LAYER 3 VPN ON ANDROID Lack of remote VPN support on native Android Juniper-designed workaround with individual Android vendors Juniper-designed plugin software shared with each device vendor Junos Pulse 2.1 will detect plugin and enable full Layer 3 VPN on supported devices Strategic partnerships with device vendors to include plugin in their Android distributions Vendors on right-hand side are partnership candidates 29 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE FOR SECURE ACCESS Junos Pulse Clients Junos Pulse Gateways Secure Connectivity Junos Pulse Client 30 Copyright 2011 Juniper Networks, Inc. www.juniper.net

MOBILE DEVICE ACCESS iphone ipad SA6500 AAA Corporate Intranet Virtual SSL VPN Infrastructure Firewall Internet Router Applications Server Email Server Improved Ease of Use, Higher Productivity Access from any mobile device ActiveSync facilitates secure access to Exchange Enforce mobile device integrity and security 31 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY GARTNER MAGIC QUADRANT FOR SSL VPN 2010 Magic Quadrant Key Takeaways: 2008 Gartner Magic Quadrant for SSL VPN Juniper has maintained the product vision, execution and overall momentum so effectively that it has held a Magic Quadrant leadership position continuously entrenched in the Fortune 500 with a track record for large deployments. Juniper is the No. 1 competitive threat cited by peer vendors Junos Pulse is expected to pose a strong competitive advantage for Juniper SSL VPN sales. 32 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY FUNDAMENTAL CHANGE IN MOBILE SECURITY Smartphones ARE computers Threat vectors are at the device, application and network level Threat landscape has evolved from SMS-based attacks Junos Pulse Mobile Security Suite 33 Copyright 2011 Juniper Networks, Inc. www.juniper.net

MOBILE DEVICE LOSS AND THEFT A survey of consumer users found that one out of every three users lost their mobile device 1 Approximately 2 million smartphones were stolen in the U.S. in 2008 2 Over 56,000 mobile devices were left in the back seats of the city of London taxi cabs during 6 month period between 2008 and 2009 Over the 2010 holidays, in the U.K. alone, a total of 5,100 smartphones and 3,844 notebook computers were lost at 15 different airports 3 In Paris, 75% of 991 violent crimes that took place in October 2010 happened because of mobile phone theft 4 34 Copyright 2011 Juniper Networks, Inc. www.juniper.net 1 Information obtained from Junos Pulse Mobile Security Suite internal transaction logs; 2 Forrester Research; 3 Credant Technologies; 4 The Sydney Morning Herald, 12/10/10

SECURE MOBILITY CUSTOMER PRIORITIES Customer Priorities Securing handsets against new vulnerabilities Protecting company data User & location based security Juniper Mobile Security Solution Unified Access Control AppSecure Software Security Research Teams 35 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE FOR Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 36 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Junos Pulse Clients Junos Pulse Gateways Junos Pulse Client Junos Pulse Mobile Security Gateway Mobile Security Hosted (SaaS) Deployment 37 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Oct. 2010 July 2011 Q3 2011 Oct. 2010 Q3 2011 38 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE iphone, ipod Touch, ipad (Q3 2011) Features MDM Phase I: ios enrollment, provisioning (via APNS) ios Lock, Wipe, Locate ios OS and App inventory Remote policy configuration VPN, Exchange, Passcode policies, email, etc. App and Usage restrictions (camera) ipad/tablet user interface VPN access enforcement 39 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE MOBILE SECURITY SUITE Antivirus Real-time protection Auto updates Scan all files All connections Personal Firewall Inbound & outbound filtering Alerts & logging Customizable Secure Access Anti Spam Block SMS & voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Remote lock and wipe Backup & restore GPS locate SIM change notification Device Control App inventory & control Content monitoring 40 Copyright 2011 Juniper Networks, Inc. www.juniper.net

SECURE MOBILITY JUNOS PULSE Junos Pulse Clients Junos Pulse Gateways Secure Connectivity Junos Pulse Client Junos Pulse Mobile Security Gateway Mobile Security Hosted (SaaS) Deployment 41 Copyright 2011 Juniper Networks, Inc. www.juniper.net

IBM - ENTERPRISE CASE STUDY Extending Corporate Access IBM The modern workforce is increasingly mobile, with many jobs performed in the field, far from standard workplace tools, such as desk-bound computers and wired networks. Key Market Decision Factors Key Product Decision Factors Extending Corporate Services Proliferation of Smartphone Usage Increased Security Threats Adherence to Internal Security Policies Cross Platform Support Solution Manageability Ease of Deployment Technology Performance Vendor Expertise 42 Copyright 2011 Juniper Networks, Inc. www.juniper.net

Uwe Nelkel Business Development Manager Junos Pulse Phone: +49 (0)89-2 03 01 20 87 Mobile: +49 172 45 26 177 E-mail: unelkel@juniper.net