SlideShare uma empresa Scribd logo
1 de 6
SECURING THE MOBILE
ENTERPRISE
2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
A new approach to mobile security means
different things to different groups:
 Employees want to connect to the network
using multiple devices, based on their needs.
This makes them more productive and
happier.
 IT faces a security challenge because
meeting enterprise objectives requires
looking at security on a per-person basis so
that people’s security profile can follow them
to different locations, devices and
applications. These security profiles must be
provided for each device used and may
dictate what each user can or cannot do in
an unobtrusive way.
 Mobile device management requires
security policies, software
patches, updates, policy
enforcement, remote wipe and lock
capabilities and application blacklisting or
whitelisting.
3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
Devising a security policy:
 User groups covered by security policies
include internal
constituencies, visitors, customers, partners
and contractors.
 Security policies must include
enforcement mechanisms to ensure that
policies are carried out and agreements from
BYOD users that state that:
 Users will secure the device with a password.
 Users will allow the company to wipe the email
account and certain data if the device is
compromised.
 Companies need to determine which
applications will or won’t be
allowed, depending on the user group. For
example, the marketing group may be
allowed to use web apps like Facebook for
work-related purposes only. Companies
should also be able to prevent the use of
mobile features or functions such as
cameras in sensitive areas.
All policies for mobile devices must sync with the company’s overall IT policy.
4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
SECURING THE MOBILE ENTERPRISE
Mobile-Ready Security Solution:
Benefits Enabled Owner Approach Resolved?
Can you create policies once,
across wired, wireless and
remote access networks? This
should include device coverage for
BYOD and IT-managed devices.
Can you get a deep
understanding of app behavior
and traffic flows for protection from
common evasion techniques and
malware attacks?
Will you get context-aware
policies, tailored to security risk?
Do you have a choice between
client and clientless deployment?
Does your solution allow
enterprise access from outside the
enterprise perimeter?
Do users get a better user
experience regardless of how they
connect, wired or wirelessly?
Are you offered connectivity for on-
demand business
applications, fewer
devices, simplified management and
more automation?
Use the following checklist to consider a mobile security solution to meet your needs.
5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
Click to access the white paper and get the complete CIO
Playbook: Building the Anytime, Anywhere Network at
http://juni.pr/cioPBss.
BUILDING THE ANYTIME, ANYWHERE NETWORK
Securing the Mobile Enterprise

Mais conteúdo relacionado

Mais de Juniper Networks

Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic
Juniper Networks
 

Mais de Juniper Networks (20)

SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 
What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?What Are Virtual Chassis and Virtual Chassis Fabric?
What Are Virtual Chassis and Virtual Chassis Fabric?
 
MetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data CenterMetaFabric Architectures 1.0 - Virtualized IT Data Center
MetaFabric Architectures 1.0 - Virtualized IT Data Center
 
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution BriefWAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
WAN Solution Meets The Challenges Of The Large Enterprise Solution Brief
 
Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic
 
Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]Juniper switching infographic_final_0415[2]
Juniper switching infographic_final_0415[2]
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Securing the Mobile Enterprise

  • 2. 2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE A new approach to mobile security means different things to different groups:  Employees want to connect to the network using multiple devices, based on their needs. This makes them more productive and happier.  IT faces a security challenge because meeting enterprise objectives requires looking at security on a per-person basis so that people’s security profile can follow them to different locations, devices and applications. These security profiles must be provided for each device used and may dictate what each user can or cannot do in an unobtrusive way.  Mobile device management requires security policies, software patches, updates, policy enforcement, remote wipe and lock capabilities and application blacklisting or whitelisting.
  • 3. 3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE Devising a security policy:  User groups covered by security policies include internal constituencies, visitors, customers, partners and contractors.  Security policies must include enforcement mechanisms to ensure that policies are carried out and agreements from BYOD users that state that:  Users will secure the device with a password.  Users will allow the company to wipe the email account and certain data if the device is compromised.  Companies need to determine which applications will or won’t be allowed, depending on the user group. For example, the marketing group may be allowed to use web apps like Facebook for work-related purposes only. Companies should also be able to prevent the use of mobile features or functions such as cameras in sensitive areas. All policies for mobile devices must sync with the company’s overall IT policy.
  • 4. 4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net SECURING THE MOBILE ENTERPRISE Mobile-Ready Security Solution: Benefits Enabled Owner Approach Resolved? Can you create policies once, across wired, wireless and remote access networks? This should include device coverage for BYOD and IT-managed devices. Can you get a deep understanding of app behavior and traffic flows for protection from common evasion techniques and malware attacks? Will you get context-aware policies, tailored to security risk? Do you have a choice between client and clientless deployment? Does your solution allow enterprise access from outside the enterprise perimeter? Do users get a better user experience regardless of how they connect, wired or wirelessly? Are you offered connectivity for on- demand business applications, fewer devices, simplified management and more automation? Use the following checklist to consider a mobile security solution to meet your needs.
  • 5. 5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net Click to access the white paper and get the complete CIO Playbook: Building the Anytime, Anywhere Network at http://juni.pr/cioPBss. BUILDING THE ANYTIME, ANYWHERE NETWORK