190 likes | 677 Views
2. Participants: Jay Kelley, Juniper NetworksProduct Marketing Manager, Junos Pulse Dan Thormodsgaard, FishNet Security Director of Solutions Architecture Mark Lambiase, SecureAuth Corporation Director of SecureAuth Network Products. All attendee audio lines are mutedQuestions will be answered at the end of the sessionSubmit brief questions on the Q
E N D
1. Juniper Networks, FishNet Security and SecureAuth Present:Securing Access to Enterprise Apps from iPhones/iPads March 3, 2011
2. 2
Participants:
Jay Kelley, Juniper Networks
Product Marketing Manager, Junos Pulse
Dan Thormodsgaard, FishNet Security
Director of Solutions Architecture
Mark Lambiase, SecureAuth Corporation Director of SecureAuth Network Products
3. Agenda 3
Apple iOS and Remote Access Jay, Juniper
Juniper Pulse and Apple OS Jay, Juniper
Real World Usage Dan, FishNet Security
Security Concerns Dan, FishNet Security
Demo Mark, SecureAuth
Questions Panel
4. The Challenge 4
iPhones are popular
People want to use them as a business tool
Primary desire is enterprise email
Explosion of Applications
Enterprises may not want to deploy Exchange/email servers or applications on the Internet
Deploying iPhone settings can be cumbersome
5. Customer Challenges & Dynamics 5
6. 6
7. 7 Mobile Security Risks Are Growing Fast!
8. 8
9. 9
10. 10 Juniper Networks Junos Pulse Granular role-based, secure VPN for Apple iPhones, iPads, iPod touch devices, and all Apple iOS enabled mobile devices
Secures communications to/from and manages Apple iOS devices
Alleviates a primary concern with mobile devices—loss & theft
11. 11 Junos Pulse Secures Mobile Connectivity Covers a range of application access requirements
Web VPN (browser-based applications)
Secure Email (secure ActiveSync proxy)
Full Layer 3 Tunnel
Unparalleled “Data in Transit” Security
Leverages SSL VPN
Multi-factor authentication
Granular auditing and logging
12. Junos Pulse Mobile Security SuiteNew Apple iOS Features and Functions Mobile Device Management (MDM) for Apple iOS Devices
Configuration and provisioning of:
Access policies
On-device security enforcement
Usage restrictions
Reporting of:
Mobile device information
Installed applications and policies
Policy management for:
Remote lock and wipe
Password resets
13. 13 Secures and Manages Mobility for Apple iPhone and iPad Users
14. 14
15. 15 SecureAuth
16. 16
17. 17
18. CORAID: Redefining Storage EconomicsConfidential Analyst Presentation - January 2010 Questions
19. CORAID: Redefining Storage EconomicsConfidential Analyst Presentation - January 2010
www.juniper.net
www.fishnetsecurity.com
www.gosecureauth.com