SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Copyright © 2013 Juniper Networks, Inc. www.juniper.net
THIRD ANNUAL
MOBILE THREATS REPORT
Juniper Mobile Threat Center Research
June 2013
2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E D E V I C E S
MARKET TRENDS
“Of the 1.875 billion mobile phones to be sold in 2013, 1 billion units will be
smartphones, compared with 675 million units in 2012.” – Gartner
“Tablet shipments alone to outpace the entire PC market by 2015” - IDC
Canalys: 2012 worldwide smart phone shipments
3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
GROWING EXPONENTIALLY
614% increase in malware samples!
Total mobile malware samples across all platforms
increased to 276,259 at the end Q1-2013
133% more mobile applications analyzed!
Juniper’s MTC examined 1.85 million mobile
applications compared to 793,631 in 2011
M O B I L E M A L W A R E
4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
ANDROID - GAINING SHARE
M O B I L E M A L W A R E
5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
SUPPLY CHAIN
Russia and Eastern Europe - hotbeds for malicious mobile activity. Malware is an
easy moneymaking venture…
China - rapidly expanding population of smartphones and an attractive market for
cyber criminals…
US and Western Europe - large smartphone markets…
6 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
PATHS TO PROFITS
9 out of every 10 malicious mobile
applications:
• 29% Fake Install apps
• 48% SMS Trojans
• 19% Spyware Applications
7 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
FRAGMENTED ECOSYSTEM
A Fragmented Android Ecosystem
contributes further to malware threat
• 41% of devices still running
Gingerbread or older version
• Only 4% running version 4.2x
• In contrast iOS6 reported close to
90% adoption ( third party est. )
Android - Open for Malware
•Annonymity of app developers
• Loosely managed marketplace
• Fragmented ecosystem
8 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
IT’S THE SEASON!
More than half of malware is created from Oct to Jan
• Smartphones and tablets are hot gift items
• App download picks up as new devices come online
9 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
BYOD: ENTERPRISE THREAT
MTC Research indicates several attacks that could impact enterprise
• Attacks could be used to steal information
• Or, stage larger network intrusions
• Junos Pulse Mobile Security Suite data: 3.1% of enteprise user
device with at least one infection over the year
NotCompatible
• Malware distributed by drive-by downloads, connects to C&C server
• Evidence of distribution by email phishing attacks suggests it could be used for
directed device attacks leading to an enterprise breach
Tascudap
• Example of a complex and feature-rich mobile botnet that could be used to attack,
distribute spam and be part of DDoS against an enterprise.
• Tascudap mimics the Google Play icon to trick user to click in third pary app stores,
webpages or phishing messages
• Messages supported could compromise the device to become part of DDoS, send
premium SMS or monitor messages/calls
10 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
BYOD: DATA & APP PRIVACY
Insecure or Voracious Mobile Apps could
undermine enterprise security:
• One-third free apps had permission to
track user’s location
• Apps downloaded without corporate
oversight can access corporate
address book, documents and location
App Privacy Violations: An Upward Trend
• Juniper MTC researched 1.6 M Apps;
increasing population of apps, both free
and paid, that are seeking more access
• FTC Staff report recommended number
of improvements in Feb ’13, but
progress is slow
11 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
BYOD:DEVICE LOSS & THEFT
Loss of Data and Intellectual Property are top of mind concerns in
BYOD
• Loss of device, specially without strong access password and data
encryption can be a serious loss to business and gov organizations
• MTC saw that a sizable number of Junos Pulse Mobile Security Suite
customers used Locate and Lock functions but only a small fraction
actually used Wipe function
12 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
REVISITING 2011 PREDICTIONS
Prediction 1: Further dramatic malware growth
Numbers don’t lie - the growth of malware through March of 2013 continues to grow at a
steady clip, with a clear focus on Android. We were on target with this prediction.
Prediction 2: Targeting of device applications
The continued popularity of Fake Installer malware suggests that malicious actors have
found easier means to do so than by exploiting vulnerabilities in the underlying mobile
application code. Mark this as “to be continued.”
Prediction 3: Focus on mobile banking
Mobile banking was a focal point for malware writers and security researchers alike in
2012. Malware such as Zitmo (Zeus-in-the-Mobile) or similar styles of applications geared
towards thwarting financial transaction authentication mechanisms continued to surface.
We were mostly right on this prediction.
Prediction 4: Direct attacks grow
While exposed vulnerabilities certainly exist in nearly every mobile operating platform, it
remains difficult for attackers to launch viable attacks at devices whose locations,
network reliance and identities continually change. This prediction didn’t pan out.
13 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
FUTURE OUTLOOK
1. Android adoption – and Android malware – outpaces competitors
We believe that the current trends in smartphone and tablet adoption will continue, if not
intensify. While direct attacks on Android are possible, we expect that the current focus on
Trojan-izing mobile applications will continue, as attackers are still garnering plenty of
success in penetrating official and third-party Android application marketplaces.
2. Continue to keep an eye on research of the iOS platform
However, with a shrinking share of the smartphone market, especially outside of North
America, Apple could find itself in the same position with its mobile operating system as with
the MAC desktop operating system: controlling a small piece of the market and seeing a
proportionally small share of the malicious activity.
3. Coordinated efforts to snuff out SMS fraud
The SMS Trojan problem is linked closely with “Premium SMS” operations in Europe and
Asia, creating something of a choke point for Premium SMS or “Toll Fraud” malware.
Concerted efforts by regulators to put pressure on SMS aggregators and wireless providers
to implement features that make it harder for malware to send or approve premium SMS
messages could dry the swamp of illegal funds linked to this major category of mobile
malware.
14 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
ENTERPRISE GUIDANCE
3. Control the Attack Surface
• Implement secure access systems that provide network-level mobile security
• Consider mobile security solutions that integrate well with back-end servers, NAC
and policy servers for internal and regulatory compliance
• Utilize mobile device management (MDM) features that blacklist known bad
applications
• Manage what corporate device users can download
1.Secure Connectivity
• Implement mobile VPN, with strong
identity-based authentication, SSO, etc.
• Explore application-level VPN and
container technologies
2. Protect against Malware
• Enable on-device mobile anti-virus and
network level protection
• Use device tracking and control,
including strong passcode and encryption
enforcement
15 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
JUNOS PULSE MOBILE THREAT CENTER
Worldwide 24/7 Team of Leading Security Experts
 Team with vast experience in Security, Information
Technology, Engineering, Software Development, and
Management
 Team members have advanced degrees in Engineering and
various training courses completed
 Certified Ethical Hackers (CEH),Certified Hacking Forensic
Investigators (CHFI) and Certified Wireless Network
Administrators (CWNA)
 Certified Information Systems Security Professionals
(CISSP)
 Team members located in different time zones to ensure
timely responses to emerging threats
16 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
JUNIPER MOBILE SECURITY
Juniper Networks’ Junos Pulse client and Junos Pulse services
simplify secure access and connectivity to networks based on the
device type and device security posture, location, user identity and
role, and adherence to corporate access security policies. For mobile
devices, Junos Pulse provides secure connectivity, mobile threat
protection, and remote mobile device configuration and management
in a single solution. Junos Pulse is available for major mobile
operating systems in addition to Windows and Mac OS: iOS, Android,
BlackBerry and Windows Mobile.
For more information please visit: www.juniper.net/junos-pulse
17 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
M O B I L E M A L W A R E
THROUGH BROAD COVERAGE,
FLEXIBLE DEPLOYMENT
OPTIONS, SCALABILITY AND
OPERATIONAL SIMPLICITY,
JUNIPER PROVIDES SOLUTIONS
THAT SPAN THE ENTIRE
SECURITY SPECTRUM
Platforms
Applications
and Content
COMPREHENSIVE
SECURITY Connectivity
18 Copyright © 2013 Juniper Networks, Inc. www.juniper.net
T h a n k y o u !

Contenu connexe

Tendances

The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chainaletarw
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get InterestingIBM Security
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiKnowledge Group
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoMark John Lado, MIT
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckDon Gulling
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security PoliciesMark John Lado, MIT
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Ekonomikas ministrija
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 

Tendances (20)

The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
IT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John LadoIT Security and Management - Prelim Lessons by Mark John Lado
IT Security and Management - Prelim Lessons by Mark John Lado
 
IT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide DeckIT Security and Wire Fraud Awareness Slide Deck
IT Security and Wire Fraud Awareness Slide Deck
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
IT Security and Management - Security Policies
IT Security and Management - Security PoliciesIT Security and Management - Security Policies
IT Security and Management - Security Policies
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...Cyber Security in the Manufacturing Industry: New challenges in the informati...
Cyber Security in the Manufacturing Industry: New challenges in the informati...
 
2019 Cyber Security Trends
2019 Cyber Security Trends2019 Cyber Security Trends
2019 Cyber Security Trends
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 

Similaire à Third Annual Mobile Threats Report

Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile SecurityTharaka Mahadewa
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Arnold Bijlsma
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile securityKavita Rastogi
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsBMI Healthcare
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecuritySubho Halder
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppEric Zhuo
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_reportIsnur Rochmad
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesrebelreg
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 

Similaire à Third Annual Mobile Threats Report (20)

Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Article on Mobile Security
Article on Mobile SecurityArticle on Mobile Security
Article on Mobile Security
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Unicom Conference - Mobile Application Security
Unicom Conference - Mobile Application SecurityUnicom Conference - Mobile Application Security
Unicom Conference - Mobile Application Security
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
Smartphone
SmartphoneSmartphone
Smartphone
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
2012 nq mobile_security_report
2012 nq mobile_security_report2012 nq mobile_security_report
2012 nq mobile_security_report
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Ms810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devicesMs810 assignment viruses and malware affecting moblie devices
Ms810 assignment viruses and malware affecting moblie devices
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 

Plus de Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseJuniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANJuniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesJuniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANJuniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

Plus de Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Third Annual Mobile Threats Report

  • 1. Copyright © 2013 Juniper Networks, Inc. www.juniper.net THIRD ANNUAL MOBILE THREATS REPORT Juniper Mobile Threat Center Research June 2013
  • 2. 2 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E D E V I C E S MARKET TRENDS “Of the 1.875 billion mobile phones to be sold in 2013, 1 billion units will be smartphones, compared with 675 million units in 2012.” – Gartner “Tablet shipments alone to outpace the entire PC market by 2015” - IDC Canalys: 2012 worldwide smart phone shipments
  • 3. 3 Copyright © 2013 Juniper Networks, Inc. www.juniper.net GROWING EXPONENTIALLY 614% increase in malware samples! Total mobile malware samples across all platforms increased to 276,259 at the end Q1-2013 133% more mobile applications analyzed! Juniper’s MTC examined 1.85 million mobile applications compared to 793,631 in 2011 M O B I L E M A L W A R E
  • 4. 4 Copyright © 2013 Juniper Networks, Inc. www.juniper.net ANDROID - GAINING SHARE M O B I L E M A L W A R E
  • 5. 5 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E SUPPLY CHAIN Russia and Eastern Europe - hotbeds for malicious mobile activity. Malware is an easy moneymaking venture… China - rapidly expanding population of smartphones and an attractive market for cyber criminals… US and Western Europe - large smartphone markets…
  • 6. 6 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E PATHS TO PROFITS 9 out of every 10 malicious mobile applications: • 29% Fake Install apps • 48% SMS Trojans • 19% Spyware Applications
  • 7. 7 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E FRAGMENTED ECOSYSTEM A Fragmented Android Ecosystem contributes further to malware threat • 41% of devices still running Gingerbread or older version • Only 4% running version 4.2x • In contrast iOS6 reported close to 90% adoption ( third party est. ) Android - Open for Malware •Annonymity of app developers • Loosely managed marketplace • Fragmented ecosystem
  • 8. 8 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E IT’S THE SEASON! More than half of malware is created from Oct to Jan • Smartphones and tablets are hot gift items • App download picks up as new devices come online
  • 9. 9 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E BYOD: ENTERPRISE THREAT MTC Research indicates several attacks that could impact enterprise • Attacks could be used to steal information • Or, stage larger network intrusions • Junos Pulse Mobile Security Suite data: 3.1% of enteprise user device with at least one infection over the year NotCompatible • Malware distributed by drive-by downloads, connects to C&C server • Evidence of distribution by email phishing attacks suggests it could be used for directed device attacks leading to an enterprise breach Tascudap • Example of a complex and feature-rich mobile botnet that could be used to attack, distribute spam and be part of DDoS against an enterprise. • Tascudap mimics the Google Play icon to trick user to click in third pary app stores, webpages or phishing messages • Messages supported could compromise the device to become part of DDoS, send premium SMS or monitor messages/calls
  • 10. 10 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E BYOD: DATA & APP PRIVACY Insecure or Voracious Mobile Apps could undermine enterprise security: • One-third free apps had permission to track user’s location • Apps downloaded without corporate oversight can access corporate address book, documents and location App Privacy Violations: An Upward Trend • Juniper MTC researched 1.6 M Apps; increasing population of apps, both free and paid, that are seeking more access • FTC Staff report recommended number of improvements in Feb ’13, but progress is slow
  • 11. 11 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E BYOD:DEVICE LOSS & THEFT Loss of Data and Intellectual Property are top of mind concerns in BYOD • Loss of device, specially without strong access password and data encryption can be a serious loss to business and gov organizations • MTC saw that a sizable number of Junos Pulse Mobile Security Suite customers used Locate and Lock functions but only a small fraction actually used Wipe function
  • 12. 12 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E REVISITING 2011 PREDICTIONS Prediction 1: Further dramatic malware growth Numbers don’t lie - the growth of malware through March of 2013 continues to grow at a steady clip, with a clear focus on Android. We were on target with this prediction. Prediction 2: Targeting of device applications The continued popularity of Fake Installer malware suggests that malicious actors have found easier means to do so than by exploiting vulnerabilities in the underlying mobile application code. Mark this as “to be continued.” Prediction 3: Focus on mobile banking Mobile banking was a focal point for malware writers and security researchers alike in 2012. Malware such as Zitmo (Zeus-in-the-Mobile) or similar styles of applications geared towards thwarting financial transaction authentication mechanisms continued to surface. We were mostly right on this prediction. Prediction 4: Direct attacks grow While exposed vulnerabilities certainly exist in nearly every mobile operating platform, it remains difficult for attackers to launch viable attacks at devices whose locations, network reliance and identities continually change. This prediction didn’t pan out.
  • 13. 13 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E FUTURE OUTLOOK 1. Android adoption – and Android malware – outpaces competitors We believe that the current trends in smartphone and tablet adoption will continue, if not intensify. While direct attacks on Android are possible, we expect that the current focus on Trojan-izing mobile applications will continue, as attackers are still garnering plenty of success in penetrating official and third-party Android application marketplaces. 2. Continue to keep an eye on research of the iOS platform However, with a shrinking share of the smartphone market, especially outside of North America, Apple could find itself in the same position with its mobile operating system as with the MAC desktop operating system: controlling a small piece of the market and seeing a proportionally small share of the malicious activity. 3. Coordinated efforts to snuff out SMS fraud The SMS Trojan problem is linked closely with “Premium SMS” operations in Europe and Asia, creating something of a choke point for Premium SMS or “Toll Fraud” malware. Concerted efforts by regulators to put pressure on SMS aggregators and wireless providers to implement features that make it harder for malware to send or approve premium SMS messages could dry the swamp of illegal funds linked to this major category of mobile malware.
  • 14. 14 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E ENTERPRISE GUIDANCE 3. Control the Attack Surface • Implement secure access systems that provide network-level mobile security • Consider mobile security solutions that integrate well with back-end servers, NAC and policy servers for internal and regulatory compliance • Utilize mobile device management (MDM) features that blacklist known bad applications • Manage what corporate device users can download 1.Secure Connectivity • Implement mobile VPN, with strong identity-based authentication, SSO, etc. • Explore application-level VPN and container technologies 2. Protect against Malware • Enable on-device mobile anti-virus and network level protection • Use device tracking and control, including strong passcode and encryption enforcement
  • 15. 15 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E JUNOS PULSE MOBILE THREAT CENTER Worldwide 24/7 Team of Leading Security Experts  Team with vast experience in Security, Information Technology, Engineering, Software Development, and Management  Team members have advanced degrees in Engineering and various training courses completed  Certified Ethical Hackers (CEH),Certified Hacking Forensic Investigators (CHFI) and Certified Wireless Network Administrators (CWNA)  Certified Information Systems Security Professionals (CISSP)  Team members located in different time zones to ensure timely responses to emerging threats
  • 16. 16 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E JUNIPER MOBILE SECURITY Juniper Networks’ Junos Pulse client and Junos Pulse services simplify secure access and connectivity to networks based on the device type and device security posture, location, user identity and role, and adherence to corporate access security policies. For mobile devices, Junos Pulse provides secure connectivity, mobile threat protection, and remote mobile device configuration and management in a single solution. Junos Pulse is available for major mobile operating systems in addition to Windows and Mac OS: iOS, Android, BlackBerry and Windows Mobile. For more information please visit: www.juniper.net/junos-pulse
  • 17. 17 Copyright © 2013 Juniper Networks, Inc. www.juniper.net M O B I L E M A L W A R E THROUGH BROAD COVERAGE, FLEXIBLE DEPLOYMENT OPTIONS, SCALABILITY AND OPERATIONAL SIMPLICITY, JUNIPER PROVIDES SOLUTIONS THAT SPAN THE ENTIRE SECURITY SPECTRUM Platforms Applications and Content COMPREHENSIVE SECURITY Connectivity
  • 18. 18 Copyright © 2013 Juniper Networks, Inc. www.juniper.net T h a n k y o u !