Mais conteúdo relacionado Mais de Juniper Networks (20) Securing the Mobile Enterprise2. 2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
A new approach to mobile security means
different things to different groups:
Employees want to connect to the network
using multiple devices, based on their needs.
This makes them more productive and
happier.
IT faces a security challenge because
meeting enterprise objectives requires
looking at security on a per-person basis so
that people’s security profile can follow them
to different locations, devices and
applications. These security profiles must be
provided for each device used and may
dictate what each user can or cannot do in
an unobtrusive way.
Mobile device management requires
security policies, software
patches, updates, policy
enforcement, remote wipe and lock
capabilities and application blacklisting or
whitelisting.
3. 3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
Devising a security policy:
User groups covered by security policies
include internal
constituencies, visitors, customers, partners
and contractors.
Security policies must include
enforcement mechanisms to ensure that
policies are carried out and agreements from
BYOD users that state that:
Users will secure the device with a password.
Users will allow the company to wipe the email
account and certain data if the device is
compromised.
Companies need to determine which
applications will or won’t be
allowed, depending on the user group. For
example, the marketing group may be
allowed to use web apps like Facebook for
work-related purposes only. Companies
should also be able to prevent the use of
mobile features or functions such as
cameras in sensitive areas.
All policies for mobile devices must sync with the company’s overall IT policy.
4. 4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
Mobile-Ready Security Solution:
Benefits Enabled Owner Approach Resolved?
Can you create policies once,
across wired, wireless and
remote access networks? This
should include device coverage for
BYOD and IT-managed devices.
Can you get a deep
understanding of app behavior
and traffic flows for protection from
common evasion techniques and
malware attacks?
Will you get context-aware
policies, tailored to security risk?
Do you have a choice between
client and clientless deployment?
Does your solution allow
enterprise access from outside the
enterprise perimeter?
Do users get a better user
experience regardless of how they
connect, wired or wirelessly?
Are you offered connectivity for on-
demand business
applications, fewer
devices, simplified management and
more automation?
Use the following checklist to consider a mobile security solution to meet your needs.
5. 5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
Click to access the white paper and get the complete CIO
Playbook: Building the Anytime, Anywhere Network at
http://juni.pr/cioPBss.
BUILDING THE ANYTIME, ANYWHERE NETWORK