SlideShare uma empresa Scribd logo
1 de 23
SIMPLY CONNECTED

BYOD
Presented by Richard Tando
Chief Technology Officer
Universal Data, Inc.
MEET THE UDI TEAM



    Richard Tando                                                           Denise Biskupovich
    CTO                                                                     SLED Account Executive
    Universal Data, Inc.                                                    Universal Data, Inc.


    Alex Battard                                                            Rachel Hymel
    Senior Connectivity Engineer                                            Connectivity Account Manager
    Universal Data, Inc.                                                    Universal Data, Inc.



    Peter Dakin                                                             Joelle McWilliams
    Sales Manager                                                           Account Executive
    Universal Data, Inc.                                                    Universal Data, Inc.




2                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
MEET THE JUNIPER TEAM




    Molly Marks                                                             Chris Calvert
    Sr. Partner Account Manager                                             Mobility Product Specialist
    Juniper Networks                                                        Juniper Networks



                         Greg Luebke
                         Commercial Account Manager
                         Juniper Networks




3                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
Founded 30 years ago by Jim Perrier and remains
active President.

A company built on the principle as technology
changes UDI will adapt additionally helping our clients
realize change.

UDI is not identified by a single product or service, but
by the adaptability and the strength of our team.

4                  Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
UDI AND JUNIPER




5                 Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
TODAY’S MOBILE WORKFORCE DEMANDS AND
CHALLENGES
        ANY Device                      ANY Location                                       ANY Application




    Personal devices used      Anytime, anywhere                                       User’s download
     for work – BYOD             mobile remote access                                     unknown or ill-secured
    Work devices used for      Users with multiple                                      apps
     personal activities         devices                                                 User’s access, store
    Multiple device types                                                                data from
     and service providers                                                                personal, business
6                            Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
                                                                                          apps
INCREASED EXPECTATIONS FOR NETWORKS
                                     Unique Daily Wireless Sessions

                  Large American University ~50,000 Students, Multiple Devices Per Student

    400000

    350000

    300000

    250000                                                                      6x
    200000

    150000

    100000

    50000

        0
             Spring       Summer                   Fall                       Spring             Summer   Fall

                        2010                                                                     2011


7                                   Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
MAJOR MARKET TRENDS…
MOBILITY WITH INCREASING SCALE

                                                      New Devices
      Device
    proliferation



                                                                                   New Applications
        App                             Internet Information Services



    proliferation
                                             ERP

                                                                           Type of Attack
                    Sophistication




                                                                                                                                      APT

     Security
                      (Maturity)




                                                                                                                            Botnets

        risks                                                                                                     Malware
                                                                                                DOS
    proliferation                                                Worms
                                                                             Trojans
                                     Virus




8                                                     Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
IF A COFFEE SHOP CAN DO IT, WHY CAN’T I?




9               Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
HOW ARE WE ADDRESSING THESE CHALLENGES?
SIMPLY CONNECTED

                                                                                     Unified Policy / Security

                                                                     Industry’s most comprehensive solution with
                                                                       unified policy and security for BYOD and
                                                                                        Mobility
       Switching      Wireless
                                                                                  High Performance at Scale


       Security       Routing                                              Industry’s highest performance network


                                                                                              Highly Resilient

                                                                     Industry’s only full automated, uninterrupted
                                                                                    network service




                   “All the great things are simple.” - Albert Einstein
10                               Copyright © 2011 Juniper Networks, Inc.    www.juniper.net
MOBILE USER TYPES
      Open access,                                                                                   BYOD (Employee owned)
      Captive Portal                                                                                  •   Self provisioning
• Self provisioning                                                                                   •   Secure Cert based auth
• Simple experience                                                                                   •   Device type aware policy
• Device type aware policy                                                                            •   Application aware policy

                                                                          Employee
                              Guest                                        Owned
                             Devices                                       Devices




                                                                                        Corporate Issued Devices
                                                 Corporate                          •   Self provisioning
                                                  Owned                             •   Secure Cert based auth
                                                  Devices                           •   Device type aware policy
                                                                                    •   Application aware policy
                                                                                    •   On Device Security
                                                                                    •   Device Management
                                                                                    •   Application Management
                                                                                    •   Content Monitoring



 11                            Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
WHAT ARE THE NEEDS OF BYOD?

Provisioning
        Need to on-board mobile devices easily: clientless & app based
        Support full cross section of devices (iOS, Android, Windows, Mac)
        Self contained certificate management
        Pulse Device Id server: for Pulse based provisioning
Device Profiling and Policy
      Classify the devices types
      Based on device type apply policy
      Continuously profile devices for audit and other security reasons

Visibility
      Inventory of device types, driver version
      Reduce Help desk calls, by simplifying provisioning and remediation
      Keep audit trail of client config


12                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
JUNIPER WIRELESS BYOD SOLUTION COMPONENTS

                                Clientless Provisioning
                                         Smart Pass Connect
      Provisioning
                             Client based Provisioning:                             Smart Pass
                                                                                    Connect
                                            JUNOS PULSE




                                        Basic Profiling
                                Juniper WL Controllers/ SmartPass
     Device Profiling
                                    Advanced Profiling




                                                                                              WLAN
                                                                                            Management
      Visibility and
                               Ringmaster, SmartPass                                         Ringmaster
      Management                                                                             SmartPass




13                      Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
SMART PASS CONNECT
CLIENTLESS PROVISIONING
 Product Offering
   Wired/Wireless endpoint provisioning
   Clientless provisioning: Complementary to JUNOS Pulse
   Best of breed in the industry, very highly tested and widely deployed
                               Windows,
                               Mac,
      Wireless Provisioning    iOS,
                               Android
                               …even Linux!

                               Can provision NAC agents
      Software Provisioning
                               Can provision JUNOS Pulse
                               Or any other mandatory software


                               Check requirements on driver versions
      Advanced Validation      Disable existing Config applications
                               Normalize the Config elements and applications


          Management           Network management gains a 360 deg view
          Closed loop          Ability to post full details about devices
           Feedback            Device type, driver version, ..etc can be sent


       Wired Provisioning      Provisioning of wired Windows, MAC, Linux devices



 15                                   Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
How does SmartPass Connect Work?



       1                                     2                           Web Server                           AAA Server        Network
                                                                                                                               Management



                Admin
               Console




                                                                                               Open SSID                       Secure
                                                                                                                                SSID
SPC allows agent-less network provisioning:                                                                   4


   IT Admin configures network parameters
   1
                                                                                                          3                             6
                                                                                                                           5
   IT Admin deploys the configuration files to local web server
   2

   User connects to local web server downloads configuration
   3

   SPC’s (dissolvable) client runs through configuration on device
   4

   User device connects to secure network
   5

   SPC Client securely logs device details to the network mgmt application and dissolves
   6


  16                                          Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
ONBOARDING GUEST USERS
                                   4
                                  SmartPass sends                                                           3
                                  temporary credential                                                      User selects SmartPass
                                  to end user via                   Clickatell SMS
                                                                                                            self-registration and
     1                            Clickatell SMS                    Gateway service
                                                                                                            creates a temporary
                                  service                                                                   user credential
     Unknown device
     connects to open
     captive portal SSID

                                                                   2
                                                                User session is                       WLC



               
                                                                captured and redirected
                                                                to SmartPass
                                                                                                                            SmartPass



                                           EX Series                                                            EX Series
       Wireless User         AP
     Tablet/smartphone                                                 5
                                                                            User uses temporary
                         6                                                  credentials to
     User is connected to                                                   authenticate against
     the network using                                                      SmartPass
     mobile phone number
     and temporary
     password




17                                        Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
ONBOARDING EMPLOYEE OWNED MOBILE DEVICES

                                                                                                                 3
                                                                                                                SmartPass web portal
     1                                                                                                          presents captive portal
     Unknown device                                                                                             and redirects client to
     connects to open                                                                                           provisioning portal
     captive portal SSID

                                                                      2                                                            SmartPass
                                                                   User session is                       WLC



                
                                                                   captured and redirected
                                                                   to SmartPass
                                                                                                                                      UAC


                                             EX Series
                                                                      4                                               EX Series
       Wireless User            AP
                                                                    Provisioning portal                                           AD/Certificate
     Tablet/smartphone
                                                                    pushes native
                                             6                      supplicant config
                                                                                                                                    Authority

     Provisioning wizard gets EAP-TLS                               wizard to client device
     configuration profile (and cert) from
     provisioning portal; agent dissolves                           5
                                                                          Provisioning portal gets
              User selects secure wireless network
                                                           7              user credentials from                SmartPass
                                                                                                                                    Corporate
                                                                          wizard; validates against             Connect
              and device authenticates to RADIUS                                                                                      Data
              without requiring user to enter                             AD; and requests user                                      Center
              credentials                                                 cert for end user

18                                           Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
PROVISIONING CORPORATE OWNED MOBILE
DEVICES

1    Device completes                3
     registration with MSS
     and downloads                  Device installs profile
     wireless iOS profile via       and acquires user cert
     MDM profile (user is           from Corp Certificate
     still connected to open        Authority via SCEP
     SSID)                          enrollment process


                                                                                                          WLC



               
                                                                                                                              W2K8 Certificate
                                                                                                                                 Server




                                                                                                                  EX Series        UAC
                                               EX Series
       Wireless User            AP                                          2
     Tablet/smartphone
                                                                           Wireless profile
                                                                                                                                  Corporate
                                                                           contains: 1) WiFi EAP-
      4                         5                                          TLS settings
                                                                                                                                    Data
                                                                                                                                   Center
     User connects to               User is now connected                  (certificate based auth)
     secure SSID and                to secure SSID with no                 2) SCEP profile for                  Mobile Security
     authenticates to               user input of credentials              device to enroll for                     Suite
     RADIUS using                   required                               new certificate 3) CA
     certificate                                                           cert to use for server
                                                                           validation


19                                            Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
ENFORCING A “NO BYOD” POLICY WITH DEVICE
PROFILING
                                                                                                           3
                                                                                                           Device type policy is
                                                                                                           configured to restrict
     1                                                                                                     iPads; WLA holds
                                                                                                           device traffic for
     Mobile device connects                                                                                inspection
     to secure wireless
     network                                                   4
                                                             WLA sends device
                                                             type info to WLC for
                                                             matching against                        WLC



               
                                                             policy

                                                                                                                              UAC



                                         EX Series                                                              EX Series
          Android             AP
     Tablet/smartphone

                                     5                                                                         User dot1x           2
                                                                                                               authenticates to
           Device is determined to                                                                             wireless network
           be an Android device
           and is allowed on the
           network




20                                       Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
NETWORK SEGREGATION AND APPLICATION
FILTERING FOR BYOD DEVICES
                                                           SRX AppTrack feature


     1                               2
                                                             combined with MAG
                                                            data collects per user
                                                           application information
                                                                                                                                        
                                                                                                                          Active Directory
                                    DHCP Server/Smartpass     providing detailed                                               /LDAP


                                                                                                                                        
     Device authenticated           communicates User and      reports in STRM
     on wireless network             IP information to UAC
                                           via IF-MAP
                                                                                                       WLC
                                                                                                                               Data


                                                                                                             SRX
                                                                                                                                       
                                                                                                                              Finance




  Wireless User          AP              EX Series
                                                                                                                                        
                                                                                                                               Video
Tablet/smartphone

                                                                                                       DHCP and
                                                                                                        IF-MAP                          
                                                                                                                               Apps
                    5           4                                3                                     UAC         Corporate Data Center
    SRX AppSecure               SRX enforces user
Polices block non-work        policies allowing user            UAC pushes role based
                                                                                                                         
                                                                                                                                        
 related applications           basic access to all             ACL and FW policies to
 like Hulu and Netflix        servers except finance                 EX and SRX                                             Internet


21                                         Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
ENFORCING NETWORK ACCESS POLICIES


1                     2                   3
Pulse detects         During 802.1x
                      authentication.
                                           Compliance check
                                           fails. Antivirus
                                                                                                                                        
                                                                                                                         Active Directory
device is on                               signatures are out                                                                 /LDAP
corporate             MAG verifies         of date and user
                                                                                                                                        
                      PC meets                                           SRX AppTrack feature
network and                                is quarantined to
                      company                                            combined with MAG
per user policy                            remediation VLAN.
                      software and         Patch server                  data collects per user                               Data
disables any
                      security policy      updates signatures.           application information
active VPN
sessions
              Virus
                      requirements         User is now in
                                           compliance and
                                                                         providing detailed
                                                                         reports in STRM
                                                                                           WLCs
                                                                                                                                        
             SW too                        granted network                                                                  Finance
               old                         access                                                                SRX

                                                                                                                                        
            
                                        EX4200 VC                                                                           Patch
                                                                                                                          Remediation



      PC user
                                                                                                      EX4500 VC and
                                                                                                        EX4200 VC             Video
                                                                                                                                        
6                          5                             4
SRX AppSecure
                           SRX enforces user
                           policies allowing             MAG pushes role                                                      Apps
                                                                                                                                        
Polices block non-                                                                                       MAG
                           user basic access             based FW policies                                             Corporate Data Center
work related
                           to all servers                to EX and SRX
applications
                           except finance                                                                               
                                                                                                                            Internet
                                                                                                                                        
 22                                       Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
SIMPLY CONNECTED
MOST COMPLETE CAMPUS/BRANCH ARCHITECTURE

                                                                   Simply Connected
                                                                    Unified Management
                                                                             Network
                                                                             Services
                                                                             Policy
                                                                   Unified Network Architecture
                                                                    EX Series Switching
                                                                    Unified Space
                                                                    JUNOSAccess Control
                                                                    AppSecure / Firewall
                                                                      Complete enterprise portfolio with
                                                                       options for deployments of all
                                                                       Virtual /wirelessglass
                                                                         Single pane of
                                                                         Wired chassis
                                                                         Wired/Wireless/VPN
                                                                        sizes: WL, EX, SRX, UAC, Pulse
                                                                      
                                                                      
                                                                          Highly appfault mgmt
                                                                           Proactive aware policy
                                                                           L2-L7 scalable
                                                                           Role based access
            One Policy                                                  Architectural evolutions for
                                                                           Automated services
                                                                      
                                                                          Highaware QoS
                                                                           App performance
                                                                           Policy orchestration
                                                                          seamless integration and
           One Network                                                
                                                                      
                                                                          Highly lifecycle mgmt
                                                                           Policy resilient
                                                                          investment protection
                                                                           Hostaware firewall
                                                                           App checking
            One Mgmt
                                                                     Ringmaster security for BYOD
                                                                       Best in class
                                                                      WL Series Wireless
                                                                      Wired or wireless devices
                                                                      Location
                                                                      
                                                                       and corporate liable
                                                                          Full lifecycle
                                                                         Clustering
                                                                     
                                                                         Full lifecycle integration
                                                                          Seamless network management
                                                                          Guest self provisioning
                                                                          Advanced troubleshooting
                                                                         Highly scalable
                                                                        Application,support
                                                                          Automated reporting location
                                                                          3rd Party user, device,
                                                                          Sophisticated policy
                                                                         aware performance
                                                                          High network
                                                                         Integrated guest access
                                                                          IF-MAP coordination
                                                                          RF-Firewall
                                                                         Highly resilient

23                Copyright © 2011 Juniper Networks, Inc.   www.juniper.net
LEARN MORE ABOUT SIMPLY CONNECTED

                              Topographies for the
     Simply Connected         Simply Connected Campus                                     Horizontal Campus
     Solution Brief           Solution Brochure                                           Validated Design Guide




     Enterprise Strategy Group White Paper:
     A Business-Driven Approach to Mobile                              More Simply Connected Information
     Enterprise Security




24                           Copyright © 2011 Juniper Networks, Inc.    www.juniper.net

Mais conteúdo relacionado

Mais procurados

Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed servicesPranowo Budi Sulistyo
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep GuptaAbhilash Ravishankar
 
110657 emc rick_devenuti_dd9_fina_lb
110657 emc rick_devenuti_dd9_fina_lb110657 emc rick_devenuti_dd9_fina_lb
110657 emc rick_devenuti_dd9_fina_lbTina Jiang
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transitionCisco Canada
 
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kamp
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kampAccenture Mobility MWC 2012 - Bubble over barcelona - lars kamp
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kampLars Kamp
 
Accenture Mobility - Trends for the Next Decade
Accenture Mobility - Trends for the Next DecadeAccenture Mobility - Trends for the Next Decade
Accenture Mobility - Trends for the Next DecadeLars Kamp
 
Pavel burba cisco_pre_final
Pavel burba cisco_pre_finalPavel burba cisco_pre_final
Pavel burba cisco_pre_finalmoldovaictsummit
 
Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Draka Communications
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Bridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiBridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiDr. Mazlan Abbas
 
Connected Lifestyle Solutions
Connected Lifestyle SolutionsConnected Lifestyle Solutions
Connected Lifestyle SolutionsAjay Hampapur
 

Mais procurados (17)

Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Mobile Service Edge
Mobile Service EdgeMobile Service Edge
Mobile Service Edge
 
Ronny haraldsvik new managed services
Ronny haraldsvik new managed servicesRonny haraldsvik new managed services
Ronny haraldsvik new managed services
 
"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta"Mobile value-chain" by Sundeep Gupta
"Mobile value-chain" by Sundeep Gupta
 
110657 emc rick_devenuti_dd9_fina_lb
110657 emc rick_devenuti_dd9_fina_lb110657 emc rick_devenuti_dd9_fina_lb
110657 emc rick_devenuti_dd9_fina_lb
 
Healthcare as an industry in transition
Healthcare as an industry in transitionHealthcare as an industry in transition
Healthcare as an industry in transition
 
iPICS
iPICSiPICS
iPICS
 
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kamp
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kampAccenture Mobility MWC 2012 - Bubble over barcelona - lars kamp
Accenture Mobility MWC 2012 - Bubble over barcelona - lars kamp
 
Accenture Mobility - Trends for the Next Decade
Accenture Mobility - Trends for the Next DecadeAccenture Mobility - Trends for the Next Decade
Accenture Mobility - Trends for the Next Decade
 
Pavel burba cisco_pre_final
Pavel burba cisco_pre_finalPavel burba cisco_pre_final
Pavel burba cisco_pre_final
 
Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"Peter Ludin - "Spirit of Innovation"
Peter Ludin - "Spirit of Innovation"
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Bridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWiBridging the Digital Divide Using MIMOS WiWi
Bridging the Digital Divide Using MIMOS WiWi
 
Connected Lifestyle Solutions
Connected Lifestyle SolutionsConnected Lifestyle Solutions
Connected Lifestyle Solutions
 

Semelhante a Udi and juniper networks BYOD

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD OpportunityJuniper Networks
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJuniper Networks
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USIBM Danmark
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityDirk Nicol
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network SecurityDjadja Sardjana
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidMobile March
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Juniper Networks
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 

Semelhante a Udi and juniper networks BYOD (20)

Seizing the BYOD Opportunity
Seizing the BYOD OpportunitySeizing the BYOD Opportunity
Seizing the BYOD Opportunity
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM USUdløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Lam Chee Keong
Lam Chee KeongLam Chee Keong
Lam Chee Keong
 
The Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew DavidThe Mobile Evolution‚ Systems vs. Apps - Matthew David
The Mobile Evolution‚ Systems vs. Apps - Matthew David
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)Programmable WAN Networking is SFW (Open Networking Summit version)
Programmable WAN Networking is SFW (Open Networking Summit version)
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 

Último

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Udi and juniper networks BYOD

  • 1. SIMPLY CONNECTED BYOD Presented by Richard Tando Chief Technology Officer Universal Data, Inc.
  • 2. MEET THE UDI TEAM Richard Tando Denise Biskupovich CTO SLED Account Executive Universal Data, Inc. Universal Data, Inc. Alex Battard Rachel Hymel Senior Connectivity Engineer Connectivity Account Manager Universal Data, Inc. Universal Data, Inc. Peter Dakin Joelle McWilliams Sales Manager Account Executive Universal Data, Inc. Universal Data, Inc. 2 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 3. MEET THE JUNIPER TEAM Molly Marks Chris Calvert Sr. Partner Account Manager Mobility Product Specialist Juniper Networks Juniper Networks Greg Luebke Commercial Account Manager Juniper Networks 3 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 4. Founded 30 years ago by Jim Perrier and remains active President. A company built on the principle as technology changes UDI will adapt additionally helping our clients realize change. UDI is not identified by a single product or service, but by the adaptability and the strength of our team. 4 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 5. UDI AND JUNIPER 5 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 6. TODAY’S MOBILE WORKFORCE DEMANDS AND CHALLENGES ANY Device ANY Location ANY Application Personal devices used Anytime, anywhere User’s download for work – BYOD mobile remote access unknown or ill-secured Work devices used for Users with multiple apps personal activities devices User’s access, store Multiple device types data from and service providers personal, business 6 Copyright © 2011 Juniper Networks, Inc. www.juniper.net apps
  • 7. INCREASED EXPECTATIONS FOR NETWORKS Unique Daily Wireless Sessions Large American University ~50,000 Students, Multiple Devices Per Student 400000 350000 300000 250000 6x 200000 150000 100000 50000 0 Spring Summer Fall Spring Summer Fall 2010 2011 7 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 8. MAJOR MARKET TRENDS… MOBILITY WITH INCREASING SCALE New Devices Device proliferation New Applications App Internet Information Services proliferation ERP Type of Attack Sophistication APT Security (Maturity) Botnets risks Malware DOS proliferation Worms Trojans Virus 8 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 9. IF A COFFEE SHOP CAN DO IT, WHY CAN’T I? 9 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 10. HOW ARE WE ADDRESSING THESE CHALLENGES? SIMPLY CONNECTED Unified Policy / Security Industry’s most comprehensive solution with unified policy and security for BYOD and Mobility Switching Wireless High Performance at Scale Security Routing Industry’s highest performance network Highly Resilient Industry’s only full automated, uninterrupted network service “All the great things are simple.” - Albert Einstein 10 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 11. MOBILE USER TYPES Open access, BYOD (Employee owned) Captive Portal • Self provisioning • Self provisioning • Secure Cert based auth • Simple experience • Device type aware policy • Device type aware policy • Application aware policy Employee Guest Owned Devices Devices Corporate Issued Devices Corporate • Self provisioning Owned • Secure Cert based auth Devices • Device type aware policy • Application aware policy • On Device Security • Device Management • Application Management • Content Monitoring 11 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 12. WHAT ARE THE NEEDS OF BYOD? Provisioning  Need to on-board mobile devices easily: clientless & app based  Support full cross section of devices (iOS, Android, Windows, Mac)  Self contained certificate management  Pulse Device Id server: for Pulse based provisioning Device Profiling and Policy  Classify the devices types  Based on device type apply policy  Continuously profile devices for audit and other security reasons Visibility  Inventory of device types, driver version  Reduce Help desk calls, by simplifying provisioning and remediation  Keep audit trail of client config 12 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 13. JUNIPER WIRELESS BYOD SOLUTION COMPONENTS Clientless Provisioning Smart Pass Connect Provisioning Client based Provisioning: Smart Pass Connect JUNOS PULSE Basic Profiling Juniper WL Controllers/ SmartPass Device Profiling Advanced Profiling WLAN Management Visibility and Ringmaster, SmartPass Ringmaster Management SmartPass 13 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 14. SMART PASS CONNECT CLIENTLESS PROVISIONING Product Offering  Wired/Wireless endpoint provisioning  Clientless provisioning: Complementary to JUNOS Pulse  Best of breed in the industry, very highly tested and widely deployed  Windows,  Mac, Wireless Provisioning  iOS,  Android  …even Linux!  Can provision NAC agents Software Provisioning  Can provision JUNOS Pulse  Or any other mandatory software  Check requirements on driver versions Advanced Validation  Disable existing Config applications  Normalize the Config elements and applications Management  Network management gains a 360 deg view Closed loop  Ability to post full details about devices Feedback  Device type, driver version, ..etc can be sent Wired Provisioning  Provisioning of wired Windows, MAC, Linux devices 15 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 15. How does SmartPass Connect Work? 1 2 Web Server AAA Server Network Management Admin Console Open SSID Secure SSID SPC allows agent-less network provisioning: 4  IT Admin configures network parameters 1 3 6 5  IT Admin deploys the configuration files to local web server 2  User connects to local web server downloads configuration 3  SPC’s (dissolvable) client runs through configuration on device 4  User device connects to secure network 5  SPC Client securely logs device details to the network mgmt application and dissolves 6 16 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 16. ONBOARDING GUEST USERS 4 SmartPass sends 3 temporary credential User selects SmartPass to end user via Clickatell SMS self-registration and 1 Clickatell SMS Gateway service creates a temporary service user credential Unknown device connects to open captive portal SSID 2 User session is WLC  captured and redirected to SmartPass SmartPass EX Series EX Series Wireless User AP Tablet/smartphone 5 User uses temporary 6 credentials to User is connected to authenticate against the network using SmartPass mobile phone number and temporary password 17 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 17. ONBOARDING EMPLOYEE OWNED MOBILE DEVICES 3 SmartPass web portal 1 presents captive portal Unknown device and redirects client to connects to open provisioning portal captive portal SSID 2 SmartPass User session is WLC  captured and redirected to SmartPass UAC EX Series 4 EX Series Wireless User AP Provisioning portal AD/Certificate Tablet/smartphone pushes native 6 supplicant config Authority Provisioning wizard gets EAP-TLS wizard to client device configuration profile (and cert) from provisioning portal; agent dissolves 5 Provisioning portal gets User selects secure wireless network 7 user credentials from SmartPass Corporate wizard; validates against Connect and device authenticates to RADIUS Data without requiring user to enter AD; and requests user Center credentials cert for end user 18 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 18. PROVISIONING CORPORATE OWNED MOBILE DEVICES 1 Device completes 3 registration with MSS and downloads Device installs profile wireless iOS profile via and acquires user cert MDM profile (user is from Corp Certificate still connected to open Authority via SCEP SSID) enrollment process WLC  W2K8 Certificate Server EX Series UAC EX Series Wireless User AP 2 Tablet/smartphone Wireless profile Corporate contains: 1) WiFi EAP- 4 5 TLS settings Data Center User connects to User is now connected (certificate based auth) secure SSID and to secure SSID with no 2) SCEP profile for Mobile Security authenticates to user input of credentials device to enroll for Suite RADIUS using required new certificate 3) CA certificate cert to use for server validation 19 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 19. ENFORCING A “NO BYOD” POLICY WITH DEVICE PROFILING 3 Device type policy is configured to restrict 1 iPads; WLA holds device traffic for Mobile device connects inspection to secure wireless network 4 WLA sends device type info to WLC for matching against WLC  policy UAC EX Series EX Series Android AP Tablet/smartphone 5 User dot1x 2 authenticates to Device is determined to wireless network be an Android device and is allowed on the network 20 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 20. NETWORK SEGREGATION AND APPLICATION FILTERING FOR BYOD DEVICES SRX AppTrack feature 1 2 combined with MAG data collects per user application information  Active Directory DHCP Server/Smartpass providing detailed /LDAP  Device authenticated communicates User and reports in STRM on wireless network IP information to UAC via IF-MAP WLC Data SRX  Finance Wireless User AP EX Series  Video Tablet/smartphone DHCP and IF-MAP  Apps 5 4 3 UAC Corporate Data Center SRX AppSecure SRX enforces user Polices block non-work policies allowing user UAC pushes role based   related applications basic access to all ACL and FW policies to like Hulu and Netflix servers except finance EX and SRX Internet 21 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 21. ENFORCING NETWORK ACCESS POLICIES 1 2 3 Pulse detects During 802.1x authentication. Compliance check fails. Antivirus  Active Directory device is on signatures are out /LDAP corporate MAG verifies of date and user  PC meets SRX AppTrack feature network and is quarantined to company combined with MAG per user policy remediation VLAN. software and Patch server data collects per user Data disables any security policy updates signatures. application information active VPN sessions Virus requirements User is now in compliance and providing detailed reports in STRM WLCs  SW too granted network Finance old access SRX   EX4200 VC Patch Remediation PC user EX4500 VC and EX4200 VC Video  6 5 4 SRX AppSecure SRX enforces user policies allowing MAG pushes role Apps  Polices block non- MAG user basic access based FW policies Corporate Data Center work related to all servers to EX and SRX applications except finance  Internet  22 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 22. SIMPLY CONNECTED MOST COMPLETE CAMPUS/BRANCH ARCHITECTURE Simply Connected Unified Management Network Services Policy Unified Network Architecture EX Series Switching Unified Space JUNOSAccess Control AppSecure / Firewall  Complete enterprise portfolio with  options for deployments of all  Virtual /wirelessglass Single pane of Wired chassis Wired/Wireless/VPN sizes: WL, EX, SRX, UAC, Pulse    Highly appfault mgmt Proactive aware policy L2-L7 scalable Role based access One Policy  Architectural evolutions for Automated services   Highaware QoS App performance Policy orchestration seamless integration and One Network    Highly lifecycle mgmt Policy resilient investment protection Hostaware firewall App checking One Mgmt Ringmaster security for BYOD Best in class WL Series Wireless Wired or wireless devices Location  and corporate liable Full lifecycle  Clustering   Full lifecycle integration Seamless network management Guest self provisioning Advanced troubleshooting  Highly scalable  Application,support Automated reporting location 3rd Party user, device, Sophisticated policy  aware performance High network  Integrated guest access IF-MAP coordination RF-Firewall  Highly resilient 23 Copyright © 2011 Juniper Networks, Inc. www.juniper.net
  • 23. LEARN MORE ABOUT SIMPLY CONNECTED Topographies for the Simply Connected Simply Connected Campus Horizontal Campus Solution Brief Solution Brochure Validated Design Guide Enterprise Strategy Group White Paper: A Business-Driven Approach to Mobile More Simply Connected Information Enterprise Security 24 Copyright © 2011 Juniper Networks, Inc. www.juniper.net

Notas do Editor

  1. Universal Data is a local IT firm that provides the people, hardware & software to implement, maintain and support all facets of your IT infrastructure. We give our clients the ability to have access to their business information anytime and anywhere. UDI has been recognized to be in the top 1% of technology companies in North America for both its deep technical expertise and premier certifications. Universal Data has been in business for 30 years and has an established reputation with our clients and community.
  2. Universal Data offers deeply integrated service offerings for seamless, dependable solutions. This is why UDI has chosen Juniper Networks as one of our premier technology partners. Juniper products and technologies run the world’s largest and most demanding networks today, enabling clients to create value and accelerate business success within the new, rapidly changing global marketplace. Juniper clients include the top 130 global service providers, the Fortune Global 100, as well as hundreds of federal, state and local government agencies and higher education organizations throughout the world.
  3. Mobile devices have infiltrated every aspect of our lives, from our home and leisure time, to work. And, today’s workforce is mobile, which presents opportunities and challenges for enterprises and SMBs alike.For instance, today’s mobile worker would rather use their own personal, mobile device while at work. Today’s consumer mobile devices are many times more powerful and easier and more fun to use than standard, corporate-issued mobile devices. And, in many cases, organizations are encouraging their employees and contractors to use their personal mobile devices to access the corporate network, cloud, applications and data – this is the Bring Your Own Device, or BYOD initiative. Even companies that still distribute corporate-managed mobile devices have challenges, such as those corporate devices being put to personal use by employees and contractors. And, many mobile workers today have multiple devices – one, two or sometimes even three different smartphones, a tablet, and so on – all of which may be managed by different service providers and data plans, have different mobile operating systems, with all requested for use to access the corporate network and applications.Today’s mobile, global workforce also requires mobile, remote access to the corporate network, cloud, and resources from virtually anywhere in the world, at anytime.And, with the surge in personal, mobile devices being used in the corporate environment – as well as corporate-issued mobile devices being used personally – the organization no longer has control over this device that is accessing their “crown jewels”. The organization has no control over a user downloading unknown, unapproved or even ill- or unsecured apps to their personal or corporate issued mobile device. Plus, users store all sorts of data on mobile devices, whether they are their own device or the company’s. Personal information such as usernames and passwords, banking information, personal health data and more, as well as sensitive corporate data, critical apps, even corporate IP can be stored on these mobile devices. So, what happens to that stored data if the device is infected, hacked, lost or stolen?”
  4. Global mobile data traffic to grow 26x in next 5 years to over 6M terabytes per month, Example:if you take a look at this graph we’ve got right here, I call that the “I” phenomenon. It’s a very large Midwestern university, about 9,000 access points, 300 acres, 50,000 students and you can see in the spring of 2010, about 40,000 wireless sessions per day, a little bit of a lull over the summer break and then come back in the fall of 2010 and more than three times the number of daily wireless sessions. Now look at the Fall of 2011 300000 wireless sessions .Now, the university didn’t go out and get another 100,000 students. This is students coming back with mobile devices, iPads, that kind of thing.
  5. The time for enterprise mobility is now. According to IDC, by 2013, more than 1.19 billion workers worldwide will be using mobile technology, accounting for 34.9% of the workforce.*Mobile Internet just reached an inflection point – taking center stage as desktop computers becomes secondary The new security landscape Attacker - - in 2005, we saw a shift in attacker motivation from pursuing notoriety, to profitability. Today, cybercrime is fully organized and we see crime syndicates out to profit from attacksThreats - While we see new types of attacks we also see the morphing of existing attack types. As an example a few years ago, the majority of malware was in cleartext which could often be detected by AV or IDP solutions. Today over 80% of malware uses encryption, compression or file packing to bypass traditional AV or IDP technologies. We also see a transition of threats with the Web 2.0 trend, through the browsers and traditionally open ports like port 80.Target - Finally, we also see significant changes with attack targets. Over the past few years there has been an explosion in the volume of data, the devices that attackers target ranging from smartphones, to tablets and to cloud servicesThe explosive growth in mobility has no signs of slowing down and is driving demand for network innovations.
  6. Identity theftLiabilityManagement of devices
  7. How do we need to address these major market trends1.) Mobility to empower business success -Safe and simple mobility while protecting assets2.) Wired like experience every ware - Scalability without complicating the network 3.) Continuity of rich media app -Automated, uninterrupted service (NOTE that we need to add to the Simplicity message here)
  8. Key points – Juniper provides a complete set of wireless, Ethernet and security products to easily manage multiple devices per user. The same access policy is applied irrespective of the number of devices and it is specific to A.J.In order for A.J. to connect to the VoIP and video websites, he will have to have both sessions authenticated and access via the wireless network. Let’s take a look at the functional blocks involved. We start by having both the phone and iPad authenticate to the AP using 802.1x. The AP then passes this information about A.J. to the wireless LAN controller . The WLC sends the request to the UAC/MAG for Radius authentication. After the authentication is verified, the information is sent to the LDAP for registration/validation and then it is passed back to the WLC. The WLC notes the new policy and send the access approval back to the AP. The AP sets the policies determined for A.J. Then it passes the IP addresses assigned down to the phone and iPad. Step one is complete. A.J. is authenticated for access on the company network.