JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.

Slides:



Advertisements
Similar presentations
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
The System Center Family Microsoft. Mobile Device Manager 2008.
End to End Security Westcon / Juniper 5 daagse Pieter van Dijk Dennis de Leest.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Managed Infrastructure. 2 ©2015 EarthLink. All rights reserved. IT resources are under pressure… is it time to rethink the IT staffing model? Sources:
Desktop Central Managing Desktops, Servers & Devices Romanus Prabhu R Technical Account Manager LinkedIn : romanus.prabhu.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The Natural way for Secure Mobile v.1.4
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Meraki Mobile Device Management
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
Unified Logs and Reporting for Hybrid Centralized Management
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
MIGRATION FROM SCREENOS TO JUNOS based firewall
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Securing Microsoft® Exchange Server 2010
StoneGate SSL VPN 1.2 Technical Overview
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
MOBYLLA 2012 Mobylla Hellas – InfocomAPPs, ATHENS, Feb.21 st, 2012.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Craig Pringle & Derek Moir
JUNOS PULSE Ing Stephen Vella Computime Ltd. Head of Technology Solutions.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Analysis And Research Of System Security Based On.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
MAG SERIES JUNOS PULSE GATEWAYS April Copyright © 2011 Juniper Networks, Inc. AGENDA 1.Overview of MAG Series 2.MAG Series Models.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Selecting the Management Platform Cloud-based Management Standalone Windows Intune No existing Configuration Manager deployment Simplified policy.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
InGenius Connector Enterprise Microsoft Dynamics CRM
Threat Management Gateway
Implementing Client Security on Windows 2000 and Windows XP Level 150
Increase and Improve your PC management with Windows Intune
IT Management, Simplified
Presentation transcript:

JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite

2 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS AGENDA JUNOS PULSE 1 JUNOS PULSE MOBILE SECURITY SUITE 3 MOBILE SECURITY CONSOLE 4 2 SUMMARY 5

3 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE Integrated Client supporting: Windows desktop & Mobile Security Windows Client Mobile Security Client

4 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS AGENDA JUNOS PULSE 1 JUNOS PULSE MOBILE SECURITY SUITE 3 MOBILE SECURITY CONSOLE 4 2 SUMMARY 5

5 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS Integrated Client Solution Dynamically provisioned client for:  Connectivity  Security  Acceleration Support for notebooks, netbooks, and smartphones Location aware and identity-enabled Builds on Juniper’s market leading SA Series SSL VPN, UAC solution, and WXC Series technology!

6 Copyright © 2011 Juniper Networks, Inc. Applications (of any type) JUNOS PULSE COMPONENTS Junos Pulse Gateways Junos Pulse Client Junos Pulse Mobile Client Juniper Extensive “Clientless”/ Browser Support SA Series SSL VPN (also available as virtual appliance) IC Series UAC WXC Series Application Acceleration

7 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS SECURE CONNECTIVITY SA SSL-VPN Secure SSL VPN Connectivity to Enterprise SA Appliance Full secure network access to corporate data Dynamic download from SA appliance Optional Enhanced Endpoint security

8 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS ACCESS CONTROL Standards-based Agent-based or agent-less  Customizable agent-less mode web page Comprehensive integrity checks  Antivirus, personal firewall, OS and application patches, anti-X, machine certificates, custom checks,… Dynamic, market-leading antispyware/antimalware checks Simple, automatic  Remediation – unparalleled user experience  Updates – reduces administrative tasks IC Series UAC

9 Copyright © 2011 Juniper Networks, Inc. PULSE LOCATION AWARENESS OVERVIEW Junos Pulse is network location aware Acts upon location based policies for SA, IC, and, FW-VPN connection. Policies created by administrator based on their network characteristics Pulse does the right thing depending on user location  Example: If I’m at the office, establish UAC connection  Example: If I’m at home, establish NC connection Results in minimal to no end user interaction WX connections not tied to location policies

10 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WAN ACCELERATION SA Series SSL VPN WXC Series Application Acceleration Junos pulse client supports client acceleration with WX appliances Junos Pulse can integrate SSLVPN and WAN acceleration to offer secure optimized/accelerated tunnels Automatic and seamless acceleration by Pulse Clients Pulse Client auto discovers LowSpeed/High Latency connections SSLVPN + Acceleration

11 Copyright © 2011 Juniper Networks, Inc. DATA CENTER 2 JUNOS PULSE MOBILE WORKFORCE SECURITY MADE SIMPLE REMOTE EMPLOYEE SA Series SSL VPN dynamically installs Junos Pulse. Pulse includes anti-spyware/anti-malware for Windows enabled endpoints and removes threat before access is granted Imagine you have a remote doctor accessing medical records via SA Series SSL VPN using an infected endpoint INTERNET 1 5 STRM Series and Junos Space report that this doctor’s endpoint has been infected 5 times in two months, alerting IT Junos Pulse also includes dynamic provisioning of application acceleration client (WXC Series) based on user’s role and encrypts traffic (Windows devices only) User enjoys secure access with faster file transfer times 3 4 LAN 6 As user moves from remote location to LAN Junos Pulse provisions seamless connectivity with no additional sign-ons SRX Series SA SSL VPN VPN UACWXC Series

12 Copyright © 2011 Juniper Networks, Inc. AGENDA JUNOS PULSE 1 JUNOS PULSE MOBILE SECURITY SUITE 3 MOBILE SECURITY CONSOLE 4 JUNOS PULSE FOR WINDOWS 2 SUMMARY 5

13 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE MOBILE SECURITY SOLUTIONS SecureConnectivity Enterprise Network SSLVPN Secure, Hosted Deployment Mobile Security Antivirus Anti-spam Backup & Restore Loss & Theft Protection Device Control JUNOS Pulse MSS: 2 applications for mobile security

14 Copyright © 2011 Juniper Networks, Inc. SA Series SSL VPN Gateway Junos Pulse Client SECURE, MOBILE CONNECTIVITY ARCHITECTURE Enterprise Network Dedicated or Virtual Appliance Deployment SecureConnectivity

15 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE SECURING MOBILE CONNECTIVITY Covers range of application access requirements  Web VPN (browser-based applications)  Secure (secure ActiveSync proxy)  Full Layer 3 Tunnel Unparalleled “Data in Transit” Security  Leverages SSL VPN  Multi-factor authentication  Granular auditing and logging Supported Platforms Microsoft Windows Mobile 6.x Apple iPhone 4.0 Google Android 2.x Nokia Symbian S60

16 Copyright © 2011 Juniper Networks, Inc. Junos Pulse Mobile Security Gateway Junos Pulse Client SECURE MOBILITY ARCHITECTURE Enterprise Network Secure, Hosted Deployment MobileSecurity SA Series SSL VPN Gateway Dedicated or Virtual Appliance Deployment SecureConnectivity

17 Copyright © 2011 Juniper Networks, Inc. SECURE MOBILITY SOLUTION Antivirus Real-time protection Auto updates Scan all files Scan all connections Personal Firewall Personal Firewall Inbound and outbound filtering Alerts and logging Customizable Anti Spam Block SMS and voice spam Blacklist filtering Disable alerts options Automatic denial options Loss & Theft Protection Loss & Theft Protection Remote lock and wipe Backup and restore GPS locate SIM change notification Device Control Device Control App inventory and control Content monitoring MobileSecurity Junos Pulse Mobile Security Gateway SA Series SSL VPN SecureConnectivity

18 Copyright © 2011 Juniper Networks, Inc. PULSE MOBILE CLIENT AVAILABILITY Google AndroidWindows MobileNokia SymbianBlackBerry Apple iOSGoogle AndroidWindows MobileNokia SymbianBlackBerry Apple App Store Google Apps Marketplace Windows Marketplace BlackBerry App World Nokia Ovi Store *Q2’11 Available as a free download from App Stores

19 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE MOBILE SECURITY SUITE LICENSING Licenses Sold as 1, 2 or 3-year Subscriptions for Number of Handset Devices to Secure—Ranging from 50 to Tens of Thousands License includes Mobile Security Console available in either  Software-as-a-Service (SaaS) option or  Virtual Appliance (VM) option SA 7.0 R2 will include Host Checker option on the admin UI for Mobile Devices  Enabling the feature will require the Mobile Security Console  Enabling the feature will require the security client software on the mobile devices Junos Pulse Client  Apps for each mobile platform will be available in respective App Stores  Apps will include mobile security features, activated only upon license enablement

20 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE MOBILE SECURITY SUITE LICENSE ENABLEMENT Enterprise receives a license activation key upon enablement from Juniper License activation key needs to be distributed to mobile users Simple, intuitive user activation on Junos Pulse mobile apps Features remain active for duration of subscription

21 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS JUNOS PULSE 1 JUNOS PULSE MOBILE SECURITY SUITE 3 JUNOS MOBILE SECURITY CONSOLE 4 2 SUMMARY 5

22 Copyright © 2011 Juniper Networks, Inc. PULSE MSS PARTNER/ENTERPRISE CONSOLE

23 Copyright © 2011 Juniper Networks, Inc. JUNOS PULSE FOR WINDOWS AGENDA JUNOS PULSE 1 JUNOS PULSE MOBILE SECURITY SUITE 3 SUMMARY 5 JUNOS MOBILE SECURITY CONSOLE 4 2

24 Copyright © 2011 Juniper Networks, Inc. Benefits For The Enterprise SECURES MOBILITY FOR ALL ENTERPRISE MOBILE DEVICE USERS Wipe data and access rights from lost and stolen devices remotely Combine security and access in a single client Enforce policies across all devices attached to the network Reduce IT overhead by better managing complexity

Westcon Sales contact: Bart Degroote +32 (0)