| 0 comments ]

According to release from Juniper website, Juniper now enter mobile security market by releasing Junos Pulse Mobile Security Suite. 
Rapidly growing demands by employees for smartphone access to corporate networks creates a complex enterprise security problem. While the easy access to networks provided by smartphones can improve employee productivity, unprotected devices can lead to loss or theft of valuable confidential data, and can even cause compliance or legal problems. Security threats to smartphones can also mean loss or theft of personal financial information, credit card data, and confidential identity or other files, for consumers.
The Junos Pulse Mobile Security Suite is a comprehensive solution that includes smartphone security, management, and control. It protects smartphones from viruses, malware, loss, theft, physical compromise, and other threats, and delivers robust remote device management tools for administrators. Junos Pulse Mobile Security Suite offers services that are purpose-built for smartphones, including:
  • Antivirus
  • Personal firewall
  • Anti-spam
  • Loss and theft prevention
  • Monitoring and control
Junos Pulse Mobile Security Suite backs up and restores data, it can locate devices in the event of loss or theft, it can remotely wipe data from a lost or stolen smartphone, and it can send an alert when a SIM card has been removed, swapped or replaced. It can even track a device after the SIM card has been removed or replaced. Junos Pulse empowers enterprises to give smartphone users secure access to corporate networks and sensitive applications and data using a zero-touch deployment model.
Junos Pulse Mobile Security Suite is available as a hosted offering. It also offers service providers a mechanism for offering desirable premium services to enterprise and consumer subscribers that increase average revenue per user (ARPU), provide competitive differentiation, and increase user satisfaction.
Junos Pulse is an integrated, multi-service network client that provides dynamic connectivity, security, and application acceleration through mobile or non-mobile devices, with a user experience that requires little or no user interaction. It is identity- and location-aware, and seamlessly migrates from one access method to another based on device location.
Junos Pulse also:
  • Identity-enables network security, access, and application acceleration, increasing visibility and manageability. It allows secure access to network resources based on user identity and role.
  • Reduces the cost and time associated with deployment.
  • Uses industry and open standards-based Trusted Network Connect (TNC) specifications.
  • Is a platform for integration of select third-party, best-in-class network and endpoint security and connectivity applications.
  • Is a value-added services platform for service providers.
Junos Pulse is the only integrated access, security, and acceleration client that today's businesses need.

Juniper Global Threat Center

The Juniper Global Threat Center provides around-the-clock, global monitoring of mobile security threats to consumers and enterprises. It is the first and only center dedicated to tracking, responding to, and researching, threats to mobile devices, including viruses, spyware and other security vulnerabilities that can expose a user's personal, professional and sensitive information.
The research conducted by the Juniper Global Threat Center is shared with the public and private industry, as well as incorporated into the features and functionality of new and existing products, such as the recently announced Junos® Pulse Mobile Security Suite. The Juniper Global Threat Center's primary focus is to monitor and respond to five key types of threats and vulnerabilities:
  • Malware: Viruses, Worms, Trojans, Spyware
  • Direct Attack: Attacking device interfaces, browser exploits, SMS attacks
  • Physical Compromise: Accessing a device and its data by having physical access from loss or theft
  • Data Communication Interception: Intercepting data as it is transmitted and received
  • Exploitation and Misconduct: Inappropriate communications, data leakage, online predators, bullying, sexting

0 comments

Post a Comment