You are on page 1of 28

education services courseware

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES


Student Guide

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

NOTE: Please note this Student Guide has been developed from an audio narration. Therefore it will have conversational English. The purpose of this transcript is to help you follow the online presentation and may require reference to it.

Slide 2

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

2010 Juniper Networks, Inc. All rights reserved. | www.juniper.net | Proprietary and Confidential

Welcome to the Juniper Networks Mobile Security Overview and Opportunites eLearning module.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 2

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 3

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 3

Throughout this module, you will find slides with valuable detailed information. You can stop any slide with the Pause button to study the details. You can also read the notes by using the Notes tab. You can click the Feedback link at anytime to submit suggestions or corrections directly to the Juniper Networks eLearning team.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 3

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 4

LEARNING OBJECTIVES
In this course you will learn about: Application Access Trends Security and Business Challenges Security Opportunities Junos Pulse SRX Series Services Gateways Application Aware Security Real World Security Examples

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 4

After completing this course, youll be able to discuss: Application Access Trends Security and Business Challenges Security Opportunities Junos Pulse SRX Series Services Gateways Application Aware Security Real World Security Examples

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 4

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 5

APPLICATION ACCESS TRENDS

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 5

In the recent past, application access trends have changed considerably. Traditionally, an office location had a local server and clients that would access applications on it. Increasingly though, all of these applications are moved into a data center. The data center may be a room in a basement at a location or may be hosted in another area. These data centers are consolidated with multiple servers, meaning that there could be many servers in a location. The goal behind this is efficiency. By placing all these servers in one location, there is the advantage of having heating, cooling and electrical redundancy. On the other hand, these data centers are spread throughout the world, which means that a reliable network is required to be able to access them. This is where telecommunications come into play. Wired and wireless providers are able to provide a network that is highspeed, high access so that anyone can get to these data centers all over the world. With a campus location, there are perhaps some local servers that have survivability in case their WAN location fails. This is justified since in this scenario many of the users are in the same location as the datacenter. However, increasingly, campuses are locating their datacenters off-site. The benefit here is that the users can seamlessly access applications, yet have it in a different location. A branch is a location that is smaller and with typically fewer users. It may be a bank branch, a retail location, etc. In this case, there are typically no servers locally and the implementation is 100% network dependent to connect to the data center. Usually this design is justified because of a lack of a competent IT staff in that location.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 5

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

The home office is another example where the users access all of the data resources over the global network from the data center. The biggest change is the mobile handset. The mobile handset has changed from a simple device used to make calls to literally being a computer. It can be used to access email, browse the web, edit and change attachments, do presentations, etc. The biggest trend here will be the exponential growth in smartphone usage and the increase in functionality offered by these. They rely typically on a cellular data network to be able to access the data centers. This is something that has changed and has really pushed the mobile carriers into requiring a more robust and stronger network to be able to support these various connections.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 6

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 6

MARKET RECEPTION MOBILE SECURITY SYSTEMS

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 6

As a result of the previously mentioned access trends, Service Providers want to protect their backhaul network, which can easily be overwhelmed by a flood of traffic resulting from the advent of smartphones. The solution is to deploy a firewall that will be able to protect connectivity from the Internet into the Mobile Operators network. This is where the SRX comes in. As can be seen on the slide, since its launch, the SRX has grown significantly in market share over other vendors in what is called the high end firewall space, or firewalls that cost more than $30,000. Many carriers around the world have implemented the SRX primarily due to its scalability.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 7

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 7

SECURITY CHALLENGES
Evolving Network Threats Sophisticated exploits, new vulnerabilities For-hire/profit hackers directed at high impact sites (DC, SP, Cloud) Network Architecture Changes Data Center consolidation and collapsed Cloud computing Amplifies computation but decentralizes security Offers security services new business opportunities Scale and Performance (Keeps Growing) Sophisticated client devices and users apps Application proliferation, 3G 4G devices

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 7

There have also been new network architectural changes for the data center. Data centers are typically consolidated and collapsed to have fewer layers and have more density around servers. This is also similar to cloud computing. Cloud computing provides more computational power, but provides a unique challenge for security as it is decentralized. This offers new business opportunities when providing a security service which needs to be scalable to meet these types of needs. Another aspect is that customers expect speed. They expect to be able to have very complex applications such as voice-over-IP, music streaming, and to be able to access them at anytime, for any period of time, with any type of bandwidth required. It is challenging for a Service Provider to provide security for these applications as there are so many different protocols involved. Also, at the various speeds that are requested, and based upon the density and the geographic location, it can be very difficult to offer security for a customer to be able to meet these needs.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 8

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 8

BUSINESS CHALLENGES

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 8

There are many business challenges for customers to deal with. They have a decline in connectivity and legacy service revenue. The goal is to have network cost decline as well, because by having less cost on the network, it will allow profits to increase. Customers want to be able to provide additional services to their customers and that way they can increase overall profits. So, the new business model, plus the new network, is designed to drive profitable growth over the next three to five years.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 9

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 9

US WIRELESS CARRIER MARKET INFORMATION


AT&T Oldest wire line company in US Incumbent wireless carrier iPhone exclusivity driving majority of new business GSM or 2G/3G network technology ~82 Million subscribers Verizon #1 in coverage, data speeds, and customer satisfaction Focused on Blackberry and Android devices CDMA technology ~92 Million subscribers Other Carriers Sprint #3 CDMA - ~49 Million Subscribers T-Mobile #4 2G/3G/GSM ~34 Million Subscribers

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 9

Verizon Wireless is considered to be the number one wireless carrier in the US with about 92 million subscribers, as their model is Americas most reliable wireless network. AT&T comes in at number two with about 82 million subscribers using CDMA technology. At number three is Sprint, a CDMA-based technology, and about 42 million subscribers, and number four being T-Mobile with GSM, 2G, 3G technology and about 34 million subscribers.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 10

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 10

MOBILE SECURITY PRESS

Sprint Selects Juniper to Secure Its Mobile Data Network Sprint reached an agreement to purchase Juniper SRX, which will enable the company to securely deliver mobile data services. Provides a high-end, scalable security solution to accommodate growth in mobile data subscribers and handle increased data usage per subscriber.
http://www.marketwatch.com/story/sprint-selects-juniper-networks-to-secure-its-mobile-data-network-infrastructure-2010-02-14

Verizon Wireless Selects Juniper to Protect Expanding Mobile Data Network "Verizon Wireless selected the Juniper SRX Series based on its performance, scalability, and security," said Nicola Palmer, vice president-Network, Verizon Wireless. "In addition to the reliability of the Verizon Wireless network, our customers also expect and deserve the highest levels of security that we can provide. Juniper's solution helps us continue to meet that commitment by providing enhanced security for our mobile data customers."
http://www.marketwatch.com/story/verizon-wireless-selects-juniper-networks-to-protect-expanding-mobile-data-network-201002-17
2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 10

Juniper has had great success with the SRX product line in the mobile security space. Recently at the Mobile World Congress in Barcelona in February 2010, there were several press releases, two of which were very important in that Sprint and Verizon Wireless selected Junipers SRX product to secure their mobile networks. This shows that Juniper has distinct leadership for mobile security throughout the world. Besides these two vendors, other Service Providers throughout the world have chosen the SRX as its mobile security platform too.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 11

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 11

SECURITY OPPORTUNITIES IN 3G MOBILE NETWORKS

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 11

The point in question is also referred to as the Gi firewall. Junipers sales of the SRX have for the most part have been in this location in Mobile Providers networks. It can be deployed at this GI or network edge location protecting against Internet attacks.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 12

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 12

THE MOVE TO A GI FIREWALL


Originally Using Cisco CSG Primary billing and limited firewalling Attack on the Network Black Berry packet sweeps turned on all of the devices radios Cellular towers crashed causing service outages Limited firewalling services enabled on CSG and limited scale Scalable Security Stateful firewalling device allows for increased security by understanding the entire conversation Can understand a DoS or DDoS attack and prevent with screening Further inspection provided by IPS and AppSecure to look deeper into the packets

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 12

Verizon Wireless was the first major customer for the Juniper SRX high end firewall. They originally used Ciscos CSG, which is designed primarily as a billing gateway, but also provided limited firewall. Verizon had attacks on their network where BlackBerry devices were sent packet sweeps that turn on all the devices radios. This caused service outages where cell phone towers crashed by being overwhelmed. Customers are looking for stateful firewalling devices that allow increased security by understanding the entire conversation and that could withstand DoS and DDoS attacks, and eventually provide IPS services. This is where the SRX came into play.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 13

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 13

WHAT IS JUNOS PULSE MOBILE?

Junos Pulse Mobile consists of 2 components Software clients (some Juniper developed, some native to handset OSs) on various mobile handsets Juniper Networks SA Series SSL VPN gateways communicating with clients Junos Pulse for laptops/desktops with 3G cards for example consists of same 2 components but includes built-in WAN acceleration capabilities for Windows systems

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 13

A new solution from Juniper is Junos Pulse Mobile. Pulse Mobile is a client that allows multiple services enabled into a device. It can be used on multiple handsets as well as laptop systems. It can be used over 3G network services, Ethernet or wireless. It provides a unified client that businesses can use to secure and enable application access from various devices. The goal is to be able to provide this on Windows Mobile and Symbian operating systems as of today, and then iPhone, shortly after the iPhone 4.0 launch, as well as Android in the future. This will cover the majority of mobile phones in the industry today. It will also enable service providers to have a new business model where they can use SSL VPN devices and WX devices in their data centers to be able to secure and accelerate traffic and delivery to corporate headquarters.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 14

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 14

BUILD HIGH-PERFORMANCE NETWORKS WITH SRX SERIES SERVICES GATEWAYS

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 14

Junipers SRX Series devices allow providers to build high-performance scalable networks using a dynamic services architecture. The operational simplicity provided by Junos adds to the solutions advantage.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 15

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 15

DYNAMIC SERVICES ARCHITECTURE (DSA)


Scales performance, capacity and service density Worlds fastest firewall and IPS

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 15

Junipers SRX Series devices are purpose-built to perform essential networking security functions. Optimized for maximum performance and feature integration, they are designed on top of the robust networking, field proven operating system, Junos. With a dynamic services architecture, these devices are modular, using expandable chassis for a build as you grow approach to deployment, providing linear scalability. Carrier class reliability is inherent due to Junipers design philosophy of separating control and data planes and chassis wide redundancy.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 16

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 16

SRX / Data Center Services Platforms

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 16

The SRX Services Data Center platform can be considered an extension of the existing platforms that were provided by NetScreen the ISG1000, 2000 and then the NS5000 Series with the 5200 and 5400. The originally launched platforms the SRX5000 Series were at a new high end of scale and performance that is way beyond what had existed before. Adding to that is the SRX3000 Series, which is the same hardware and software, except in a small form factor but below the SRX5000 Series performance. Juniper will also be launching an SRX1400. The SRX1400 Series is a smaller version of an SRX3400, allowing for less performance, but at an attractive price. The existing NS platforms will still be sold due to their low latency capabilities and their time tested and tried feature sets.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 17

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 17

BREAK THE PERFORMANCE/INTEGRATION TRADEOFF

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 17

Typically a device provides one or two services and is scaled across multiple appliances. Integrating services with dedicated appliances is difficult and complex to manage and deploy. On the other hand, performance typically suffers as a result of having multiple devices to perform the different functions required. Junipers goal is to create services integration through Junos, processing scalability with SPC (Services Processing Cards), I/O scalability with IOC (Input/Output Cards), and management and deployment simplicity using a singe device: the most amount of services at the highest possible performance.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 18

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 18

SRX SERIES APPSECURE


Application Identification Context, protocol and signatures Any application on any TCP or UDP port SSL Inspection Decrypt and inspect SSL encrypted traffic on any TCP or UDP port Visibility and protection against threats embedded in SSL encrypted traffic Application Denial of Service Multi-stage detection Identify and mitigate attacks targeting applications Prevent service disruptions

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 18

Junipers AppSecure is a suite of application-aware security services for the SRX Series Services Gateways that classify traffic flows, bringing greater visibility, enforcement, control, and protection to network security. AppSecure uses a sophisticated classification engine to accurately identify applications regardless of port or protocol, including nested applications that reside within trusted network services. The result is a powerful tool that helps bring context and clarity to the setting and enforcement of security policies, provides protection against common evasion techniques, and helps mitigate against modern malware attacks, all while delivering the industrys highest performance and scale. AppSecure gives security administrators the context to regain control of their network traffic, set and enforce policies based on accurate information, and deliver the performance and scale required to address business needs. AppSecure also works with the SRX Series integrated intrusion prevention system (IPS) solution to deliver deeper protection against zero-day attacks.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 19

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 19

APPLICATION-AWARE SECURITY
Introducing AppSecure
AppSecure is a suite of application based services designed for deploying security in a knowledgeable manner Builds on existing SRX integrated services to deliver finer-grain policies Leverages integrated application intelligence

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 19

The services that are enabled by AppSecure include: Application Visibility with AppTrack AppTrack collects byte, packet, session, and time statistics while accurately identifying hundreds of applications, giving network administrators detailed analysis of application data. AppTrack quickly and easily provides visibility into the types of applications traversing through the SRX Series gateway and allows classification based on risk level, user ID, zones, source, and destination addresses, as well as volumes. This information can be used to assess adherence to usage policies, help address bandwidth management, or simply report on the most active users and applications. Application Enforcement with AppFW AppFW allows administrators to create fine grained application control policies to allow or deny traffic based on dynamic application name or group names rather than static IP/port information. It is designed to simplify security policies by using application white lists and black lists, as well as to define what actions to perform on matched traffic while taking default action against all other traffic. Application Control with AppQoS With the increased use of web-based customer relationship management (CRM), enterprise resource planning (ERP), and other business tools, network administrators need a way to prioritize business critical traffic over the network. AppQoS provides the ability to meter and mark traffic based on the application policies set by the administrator. This allows lower

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 20

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

priority Web traffic to continue when network bandwidth allows, but ensures that mission critical traffic is delivered when usage levels surge. Application Protection with AppDoS AppDoS identifies attacking botnet traffic against legitimate client traffic based on application-layer metrics and remediates against these botnet attacks. Employing a multistage approach that includes server connection monitoring, deep protocol analysis, and botclient classification, AppDoS provides the ability to detect subtle changes in traffic patterns and client behaviors that could indicate an application-level denial-of-service (DoS) attack. Once suspicious activity is detected, AppDoS can then issue an alert, block offending IP addresses, or completely drop irregular sessions and packets. AppDos is typically deployed with the SRX Series integrated IPS service to increase protection against malicious attacks.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 21

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 20

SECURITY SERVICES/SRX PRODUCT VISION

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 20

While Juniper continues to focus on being the market leader for firewall and IPS in performance and scale, it is also looking to add additional services in the future, such as client VPN services, server load balancing, WAN acceleration, etc., while relying on next generation hardware to further increase performance and scalability.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 22

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 21

WHY USE A FIREWALL AT THE GI LOCATION?


Devices Have Changed Powerful smart phones More compute power than the technology that sent man to the moon New Capabilities VoiP, always on applications (AOA), a world driven on instant information Open Development Anyone can develop for the platforms The platforms can be understood and exploited Closed Mobile Networks Can Be Attacked From the Inside Powerful devices can be used to manipulate the carriers network

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 21

SRX devices are typically deployed at the Gi interface location. The Gi Interface is a GPRS interface which is located between the GGSN (Gateway GPRS Support Node) and the external PDN (Public Data Network). The justification for deploying SRX appliances at this location is due to the ever increasing capabilities of mobile phones, or smartphones. These devices now have the computing power of regular PCs and can be used to exploit the mobile network infrastructure for malevolent uses, causing outages and the consequent financial loss involved. Firewall capabilities need to be implemented to protect services such as VoIP and always on applications. This may be from a flurry of text messages, to instant messages, to messaging through news applications, news readers, news feeds, voice information, streaming media. Some of the software platforms on these mobile devices are open development which means that anyone can develop for the platforms and run services on them.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 23

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 22

IPHONE JAIL BREAK ATTACK


Jailbroken iPhones contain a backdoor Secure shell (SSH) is enabled with a default password Easily found if not protected Real World Exploitation Hackers scanned for phones in the Netherlands Gained control over the devices Demanded money or information would be stolen Real World Possibilities Many devices with a similar configuration Control over the devices can allow for a powerful army to attack the network

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 22

An example of a real world threat that has actually occurred, is the iPhone jail break attack. The iPhone comes in a state where it cannot be modified for specific uses outside of what the vendor wants as well as the carrier. To be able to exit this state, the phone can be unblocked in what is termed as a jail break. This causes the device to contain a backdoor, meaning that using a protocol such as SSH, the device can be accessed and controlled from another device in another location, such as a PC. Hackers exploited this by scanning phones that existed in the Netherlands and identified devices that had these backdoors open. They gained control over the devices and then sent a message to the user demanding money or their information would be stolen. Potentially the attackers could have taken over these devices and used them as a simple bot-net by being able to do ping floods or UDP floods, causing serious damage to the mobile provider.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 24

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 23

ANDROID EXPLOITATION AND ROOTING


Exploiting Android Open platform with exposed source code Devices allow for private modified builds of the OS to run Allows advanced users get pure access to the device and potentially the network Open Development No software review before application publication Password stealing software on the market place since day one Rooting software allows users to take over a device Powerful Processing Android devices are the most powerful mobile devices in the world Powerful devices with unsanctioned software gives unparalleled access

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 23

Another example is the Android platform. The Android platform has an open source operating system, meaning that the source code is available to the public at large. This means that the devices can run private modified builds of the OS and it gives advanced users access to the hardware and potentially even the network. Users can develop applications which can be used to exploit weaknesses in the mobile providers network, and once again, cause considerable damage. This is where devices such as the SRX can be used to detect and stop this malware before it is installed on the devices and used to cause damage.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 25

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 24

NEXT GENERATION DEVICES


iPad Media centric mobile compute platform Streaming media and high demands on the network Another powerful device demanding more data Chrome OS A cloud based operating system designed for netbooks All user data is stored in the cloud Eliminates the need to manage or maintain a device Ideal OS for 3G/WLAN connected notebooks Demanding on the network

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 24

New generation devices such as netbooks and tablets will increase the demands on the 3G network too. The average iPhone user consumes about 250 megabytes of data per month; the average 3G card user uses about 1.5-Gigabits of data per month. As you can see, that is considerably higher for an average laptop as of course it would consume more media. The same thing may be able to be true for the iPad, meaning the fact that it may be able to use much more throughput on the 3G network. If one user were to simply to download a single high definition movie, it would easily be over one Gigabyte in size. Thats something that alone will be four times the usage on the iPad versus what you will do for the iPhone. The goal of Chrome OS is to provide a cloud-based service operating system, so all the data from Chrome OS will be stored in the cloud. What this means is that if users want to access their data, they have to access it remotely over wireless or WiFi and/or 3G depending on the network because all the data stored on the cloud. This requires greater performance from the network.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 26

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 25

LEARNING OBJECTIVES
In this course you learned about:
Application Access Trends Security and Business Challenges Security Opportunities Junos Pulse SRX Series Services Gateways Application Aware Security Real World Security Examples

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 25

In this course, you learned about: Application Access Trends Security and Business Challenges Security Opportunities Junos Pulse SRX Series Services Gateways Application Aware Security Real World Security Examples

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 27

MOBILE SECURITY OVERVIEW AND OPPORTUNITIES

Slide 26

2010 Juniper Networks, Inc.

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

2010 Juniper Networks, Inc. All rights reserved.

CONFIDENTIAL

SOT-MOB-SECURITY

www.juniper.net | 26

Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JunosE is a trademark of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks or registered service marks are the property of their respective owners. Juniper Networks reserves the right to change, modify, transfer or otherwise revise this publication without notice.

Course SOT-MOB-SECURITY

Juniper Networks, Inc. 28

You might also like