 SiliconAngle.tv I'm John Furrier, Juno's pulse mobile security site launch, sweet launch is going on behind me. They're about to take the stage here for Juniper Networks defending your mobile life. So we're going to go live to the live feed. We're going to have interviews right after CEO Kevin Johnson among other top executives. The OEM deal just went through. Keep it quiet. Jim, get this info to senior council. Don't really secure three numbers. It'll kill us. Security code 9285. Robert Lewis is getting axed. Robert Lewis is getting axed. CMO of Juniper Networks and I'd really like to welcome everybody for coming this morning to the beautiful Bentley Reserve building. This building is really sort of apropos of today's topic. It's a fantastic backdrop because as many of you probably know this used to be the Federal Reserve of San Francisco equipped with vault and the work. So we are in a sort of icon for security which is really consistent with what we want to talk about today. A year ago, literally to the week, Juniper mapped out both a vision and a set of principles for the new network. And that is the mantra that we've been marching to as many of you know for the past year. And the principles around the new network are centered on automation, are centered on simplicity and most importantly vis-a-vis today's topic, security. What's really fascinating, what's going on in the world which we all live in is that in 2012, mobile phones actually eclipse PCs and 98% of the mobile phones that ship today ship without any form of security. So throughout the course of the day, you're going to be hearing about context for what's going on in the industry, the role that we play. Kevin will start off Kevin Johnson, our CEO giving you an overall perspective about how today's launch fits in the context of the overall Juniper strategy and particularly what we're doing to enable both business professionals and consumers do their work in a secure way. Mark Bauhaus who heads up our security business is going to talk to you very specifically about what our strategy is and why we are so focused on mobile security given the kind of pain points we see from our customers every day. And then Sanjay Berry who's the father of this product with many members of the team is going to take you through what I think is going to be really exciting set of demonstrations so that you can see what mobile posts does. So we won't just be giving you PowerPoints all day, we'll really make it come alive for you in the personas in terms of who it can help and then in a set of demonstrations. What I'm really hoping that you walk away from today is real simple. This is a differentiated offering versus what's going on from the competition. We have the broadest set of support for mobile OSs in the industry. We have the deepest and richest set of offerings in terms of capabilities that business professionals and consumers will care about in the industry. And we offer a set of experience and economics that is unmatched in the industry. So without further ado I'm going to ask Kevin Johnson, my boss and the CEO of Juniper Networks to get us started. Thank you. Good morning. I woke up this morning. My smartphone alarm clock went off bright and early and as I got up out of bed to go work out I had the Wall Street Journal and the New York Times downloading to my iPad. Certainly as I read the news of the morning over breakfast and then driving through the city this morning I VPNed into Juniper to check the latest statistics on sales and shipments which are certainly important to us. And I was just kind of reflecting that this really is a mobile world. And today I just want to take 15 minutes and frame what we're doing in three things. Number one I just want to share a perspective on this industry trend around the mobile internet. Number two a perspective on our approach to securing the mobile internet. And number three I'm just going to frame the high level set of announcements and introduce some of the guests that are here today to help share their perspective on this. So thanks for joining us and you know let's kind of jump right in. You know if you look at the key trend around the mobile internet and as it's unfolding today there are a couple things that are key. Certainly there's this explosion of mobile internet connected devices. Smartphones, tablets and you look at the evolution. The evolution of technology went from PCs over a wired connection to the internet to PCs in laptops over Wi-Fi to now it's going to new form factors. Smartphones and tablets and according to Gartner smartphone sales were up over 50% in the second quarter. In fact Morgan Stanley recently projected that smartphone sales will exceed PC sales worldwide by the year 2012. Certainly if you look at what's happening with this trend certainly there are more and more digital devices. In fact the number of mobile internet devices may grow to over 10 billion in the next 10 years. And so this trend is underway. In fact the trend of this mobile internet is really not only these new devices but the services that are provided to those devices. Whether it's services related to connected socialization or content consumption. You know in fact if you look at some of these devices today in New York City you can take your smartphone device and wave it over a reader to get on the New York subway. The Starbucks gold card is available on your smartphone device. So you can go in and order that double tall non-fat caramel macchiato. Absolutely no whip, no fuss, no mess with the smartphone. So this wide range of services. Now it's time that we look and say you know with this explosion of internet connected devices and smartphones and tablets. It does open up significant implications from a security standpoint. And you know a couple of key statistics. You know first of all you look at mobile devices that are purchased by consumers. The recent study that was done showed that roughly 80% of those devices are coming into corporations and they're accessing corporate internet. They're accessing the corporate network and data on that corporate network. You know oftentimes without permission of the IT organization. In fact close to 60% of them are doing it on a daily basis. Now certainly this presents a set of issues or concerns. In fact over 40% of these smartphones are used for both personal information as a consumer as well as business information. You know I personally carry one smartphone device that I use for my personal use as well as for my business use. And this is happening in a way that provides a set of things across the network that's no longer self-contained. These devices connect over a 3G spectrum through a service provider and they can connect to consumer over the top services. They connect through a 3G, 4G to business services from the enterprise. They then can can roam and connect over Wi-Fi types of links. The fact is these devices are connected. And it's creating significant challenges and concerns for large enterprise customers. In fact one large enterprise just last Wednesday, Alaska Airlines. They asked their employees to connect to their network basically and they restricted it to two mobile devices. On the approved list they had iPhones and Windows Mobile. Not on the list were the range of devices including Symbian operating systems, Android and Blackberries. Their logic, their reason, well security is the challenge that they had and they wanted to make sure that they're being prudent and thoughtful about protecting corporate data and therefore providing a security solution across a wide range of devices is the challenge they're trying to solve. With what we're bringing to market today, we believe we've got a great solution for that. Certainly for service providers, it also creates a number of challenges. The fact that there's multiple points of vulnerability. Vulnerability certainly within the network and the network traffic. Vulnerability on the device. Vulnerability in the back end applications and data. And today our view is that the types of solutions that need to be provided in the marketplace need to be end to end. And then finally for consumers. You think about how much personal information is on your smartphone on your device. Whether it's your social security number, perhaps passwords to different websites that you visit, your online banking information, your personal email, personal photos. And the amount of theft and loss that can occur either through malware and bad actors stealing that data or just simply losing the device. Now we're going to hear a bit more today from both the enterprise customer perspective as well as service provider's perspective. And we're going to take you through some scenarios on the consumer's perspective. But at some level this becomes very personal. This is individual's data. And the fact is that if that data is on that phone and if that phone gets out there, that data is everywhere. And the opportunities for bad actors to exploit that and for people to take that information and use it for unintended outcomes is significant. So clearly we look at this and we say history can teach us a couple of things. Now first of all, if you look at the two key points that history can teach us, is number one is that the bad actors that develop malware, they are going to do nothing but get more sophisticated. In fact, if you look at the evolution of viruses and malware and you start back to Los Alamos, New Mexico and some academic research that was done in 1966 by John Van Neumann. He was a professor working at Los Alamos. He authored a paper that talked about the basis for self-replicating software. And it was a theory that said, hey, self-replicating software can certainly be used for good purposes, but it can also be used for bad purposes. You roll forward. 1981, you saw the first boot sector infections. In the year 2001, you saw significant network worms. And those of you may remember the terms Code Red and NIMDA. In fact, I remember them well. I happened to be working at Microsoft at the time and going to call on a customer that had handwritten a sign on their front door, telling employees not to turn on their PCs or laptops that NIMDA and Code Red had fundamentally shut down the entire network. So these things really are real. And history will tell us that what we saw in the era of PCs will move to smartphones and tablets. In fact, in 2009, we saw Trojan begin to target the Symbian and more recently the Android platforms. So lesson number one is that the trajectory of malware is to become more sophisticated. It will evolve over time. And there are bad actors that will find ways to exploit this data and information in the mobile internet era. Lesson number two is that, for those of us who have worked in the industry for many, many years, can attest to is that waiting and reacting to this after the fact is a very costly proposition. It's costly for the users. It's costly for the businesses. It's costly for the technology industry. And so clearly establishing a leadership role and trying to get out in front of this before this wave of malware and antivirus and security issues hits, we think is the most effective thing to do not only from an industry standpoint, but from a focus on our customers and creating a great set of economics and experiences on this network. So waiting is the wrong answer. And a piecemeal solution will only deal with part of the issue. We're really focused on how we take an end-to-end approach. So we believe it's really fundamentally time to set the mobility security agenda. And we're setting that agenda with a set of five principles that we outlined. Certainly we believe it protection at all points. On the device, in the network as traffic flows through the network, and certainly in the data center for the applications and data that's being accessed. The second point is support across all mobile operating systems and devices. Having a security offering that only addresses a subset of those end devices puts all the challenge on the customer to solve these problems. So support across this wide range of mobile operating systems and devices, as the market continues to mature and develop, we think is a core principle. The third principle is one of extensibility. And this is a common principle in our entire general strategy. The fact that the solutions we provide, we really work to have that software have a set of open APIs and allow third parties and customers to innovate on top of that. Juno's pulse is no different. Fourth is being user-friendly. Clearly impacting, you want this to be non-intrusive to the end user, and you want it to be very easy and simple to configure, set up and deploy. And the flip side of that is easy to administer. In many of these enterprise customers, the chief security officer or their organizations are having to set policy, administer policy. You not only want it to be a great user experience for the end user, but also a great experience for the administrators who set policy and establish those policies. Now why you might ask, you know, why is Juno removing this direction? Well, clearly we're building on a foundation of technology that's been in the market and has evolved over the last seven to eight years. In fact, we've been in the security business since the year 2003. And we've been a market share leader on our high-end firewalls and protecting the data and the traffic within the network. In fact, today with our partnerships and our reach with service providers, we're securing the vast majority of mobile internet traffic that flows on the network today. And certainly with this announcement, we're now extending that to the end devices and how those end devices are now secured as well as the traffic within the network. Now certainly, you know, we look at the majority of smartphone traffic is being secured by our mobile secure solution with what we're announcing today. We believe we now span over 75% of the devices that the mobile internet has people connecting to. And we're fortunate enough to also have great success with the enterprise. What we're announcing today builds on our technology that provides enterprise customer secure sign-in. And the fact that we have over 25 million users or 25 million installations of this technology for secure access to corporate networks, we're extending it now with this mobile security solution. And in fact, 24 of the Fortune 25 companies on the planet use Juniper networks for this SSL VPN secure sign-on. And in case you're wondering why 24 out of 25, certainly our largest competitor has not decided to standardize on Juniper networks, but we'd be happy to license the solution to them as well. Now we've given a great deal of thought about how we put this solution together and how we deliver this, not only for today but for the future. And I think the strategy that we have and what we're trying to do is now extend our leadership position by securing traffic in the network to providing a very seamless end-to-end solution that really focuses on all of not only the current threat vectors, but the anticipated threat vectors, the threat vectors that might span the device, the network, the applications and the data. We're doing that in a way that we're building security in. We're building security into our mobile internet offerings for service providers. We're building security into the data center architecture that we're providing to enterprise customers and service providers. And we're building now security into those end devices. We're doing that in a way where we think technology and software and automation can provide a very simple, easy to use type of solution for something that can be typically very complicated. We're doing in this in a way that leverages the platform-based operating system approach that we've introduced with Junos. Whether that's the programmability of Junos in the network, and we have many of our customers and partners who are building things on the software developer kit to extend the security capabilities in the network. And we're applying that same process with Junos Pulse on the end device. The fact that we provide a footprint in a platform with a great security suite for these end devices, and we make that programmable, and we embrace innovation from third parties to extend that and to create a broad range of solutions, which means this ecosystem is a very important aspect of what we're trying to do. And certainly this concept is one that I think is familiar to certainly to everyone at Juniper and I think as we, as Lauren pointed out, it was a year ago that we put a stake in the ground around this concept of the new network. And that concept that we talked about a year ago applies to the mobile internet. The fact that we're investing in R&D to really focus on the set of things that create the foundation for high performance networking, we're doing that in an open and extensible way that attracts an ecosystem of innovators so that the the sum of the innovation and the R&D investment that Juniper makes plus the innovation and the R&D investment of our partners in that ecosystem really unleashes this wave of transformative technology addressing the new network. We're applying that today with what we're announcing with Junos Pulse. And in fact we're going to have an opportunity to take you through some specifics of what we're announcing with Junos Pulse and the mobile security suite. We're going to start with the first set of announcements that take you through the features and the capabilities of this mobile security suite for the enterprise user as well as for the consumer. We're also going to take you through a little bit of the work that we've done to to create and invest in and establish this global threat center that provides 24 by 7 around the clock global monitoring of almost mobile security threats to consumers and to enterprise customers. And then third we're going to talk about some partnerships and the work that we're doing with our partners to help secure enterprise customers as well as consumers and really enable this type of solution to have impact. Now it's it's a real pleasure. We've got some guests here today. David Merrill who is a strategist in the Chief Information Security Office at IBM. He's going to share a perspective of what IBM is doing to fundamentally secure the mobile internet and the range of smartphones and mobile devices that are connecting to IBM's network and how that translates to a set of solutions that they are focused on. We're also pleased to have Mark Patterson join us today from BT, General Manager of the Mobile Data Services, and he's going to talk a little bit about the set of offerings that they've created to take to market to help their customers have a more secure mobile internet experience. And John Donovan, the Chief Technology Officer at AT&T, is joining us via video to share a perspective on how AT&T thinks about the security opportunity and some of the implications from a security standpoint in the network. And so let's just kick it off by starting with sort of the perspective on what John has to say. So let's go ahead and enroll that video if we could please. Thank you. We as a company focus a lot of our energy in trying to discover the landscape of threat, find it early, find it in the network, and never allow it to manifest itself to an end-user or an end-device. A lot view us by the size of the corporation and employees and revenue. The total investment dollars that we make and over the last several of years we've been among the top, if not the top, investor in the United States in infrastructure. So security and privacy and some of the things that as a company have become foundations of our reputation become more challenging each and every day. When it comes to securing the network, there is an amount of collaboration that's really required in the ecosystem and in the area of the mobile network connection of security. It'll be no different. And I think you'll see companies differentiate. We certainly have always differentiated ourselves and plan to continue to differentiate ourselves by the breadth of security offerings that we provide. People are using their smartphones and mobile broadband. With that comes an enhanced threats. The best way to manage threats is before they find their way to the handsets. And so we very much think a network-based solution is where we hope to catch everything. We're practical enough to realize that doesn't occur. We need a handset solution that works in conjunction with the network solution. We're interested in security as a service and security as a foundation. So we can expect it at both the handset and the network. We're going to do everything we can for prevention and we're going to make enhanced services available for enterprises and consumers as service offerings that we would present out for folks who are willing to say for that extra amount of security I'm willing to pay for that peace of mind and I'm willing to pay for that peace of mind for my family. And we think about it in the context of all of the other assets that we have whether that's parental controls about when a young child can get text messages to which things they watch on television so our entire infrastructure operates with that philosophy. I'm John Donovan Chief Technology Officer at AT&T. Good morning. As you heard from Kevin and John we really are all living the mobile dream. The killer application is indeed having the internet and all the power of the internet in the palm of our hands and in some cases the crook of our elbow with tablets coming as well. Being able to socially network to find information to be entertained anywhere anytime on a diversity of networks is amazingly powerful. So what is the next killer application and what's really missing? That's what we want to talk about today and specifically the next killer application we think is peace of mind. Now as we get more and more dependent on the internet in a mobile fashion with all these devices as we start to bring them to work as we want to be productive with very sensitive data as we start to store passwords, credit card information, personal information, start to download data from our workplaces and for that matter as consumers at home there's more and more vulnerability that we have and what we're missing is the peace of mind to know that that device and our connection and our relationship with that internet in the palm of our hand is actually safe. Now is that a really valid concern right now? Does it really impact everybody? Well yes it does. Again more and more of us are bringing our phones to work and nine out of ten of us, go back one, nine out of ten of us are very concerned about security of those devices and our access to sensitive data and intellectual property and our own data as well and three out of ten people in 2009 actually were compromised in some way in their mobile experience either email or sms spamming or malware or spyware at least that they know about three out of ten that's a pretty significant number this is not a theoretical thread and it does travel the same sort of growth pattern that we saw in the pc space as they started to get connected to the internet in the late 90s and early 2000s. Now for service providers this presents an enormous opportunity there are a billion mobile workers in the world today people that want to be able to connect to sensitive data wherever they are and a third of the workforce globally by the year 2013 will be mobile as well this is an opportunity for service providers to monetize a value added extra service that provides that safety that defense of all of our mobile lives and to do that on a broad basis at amazing scale for consumers as I mentioned most of us eight out of ten of us store some kind of really sensitive data on these phones and there are many ways to access that data electronically and through spyware malware viruses and other vectors that I'll talk about but just the prospect of losing the phone or having it stolen is terrifying these become not only the internet in the palm of our hand but the life in the palm of our hand or if we're workers the office in our in the palm of our hand that happens to also be our personal life going back and forth as Kevin said 40% of us at least depending on the country even even more in many cases are using phones for both personal and business use so for consumers in the United States alone over two million phones stolen or missing last year that's a big number if you're one of those two million you've had that experience of losing your identity losing your data and it's a big worry so we're pleased today to be introducing three announcements the first of which is for the first time the Juno's pulse mobile security suite now you'll see offerings from some of our competitors that may have point offerings in this space around one platform or a particular aspect of security but this is the first time you have this level of depth of security across all the threat vectors that we're seeing in the mobile space when we talk about antivirus we're talking about preventing and identifying spyware viruses themselves looking at other threats where code insertion may be a problem basically monitoring the health of the phone based on all the intelligence that we have about threats that are coming into the mobile space a personal firewall so that you're able to filter out bad content and very importantly device monitoring and control not just for one platform not just for one phone but for the diversity of phones that you may own again more and more of us are multi-device power consumers or power workers that means that we may have different operating systems we have different form factors in our smartphones and our tablets in our pcs notebooks and netbooks so the ability to be able to monitor those smartphones and mobile devices to be able to control the content and watch what's happening to be able to secure sensitive data and shut down access from potential applications that we download that shouldn't shouldn't be doing accessing certain data is very important being able to shut down spam to be able to stop the sms and the email threats that come through spamming very important and I think the vast majority of us have started to receive these nasty messages that we'd rather do without and that often are trying to link us to malware attacks as well and last but not least for those two million people and the people around them who are afraid of losing or having their phone stolen with all the data on board theft and lost protection so the ability to find your phone to be able to identify and locate it on a map to be able to wipe it and shut it down and shut down its access if you indeed have lost it for good very very important functionalities and this is what defending your mobile life is about so we're very excited to be announcing the deepest set of functionality for the mobile security world with this announcement today now what does this mean well for enterprises it's a whole suite of functionality that allows us to enable people to bring whatever phone they have into work and be productive and be safe and to secure our intellectual property as a company so the ability to find a phone to be able to wipe data to be able to stop access rights when the phone is lost or stolen immediately and do so remotely very very important we're also combining access and security for the first time no other vendor offers authentication with encryption to tunnel safely into the intranet environment offer access to enterprise applications remotely on the go in a completely safe fashion as if you were sitting at your desk but remotely doesn't matter whether you're on a 3g network a wi-fi network you have that accessibility and you know that your endpoint is safe and secure with the mobile security suite that combination is the new secure network client for mobility and that's that's what we're announcing we're also able to enforce policies consistently across the entire network so you hear from one of our major customers today and how they think about that but the ability to across devices be able to offer consistent policy on a global basis so that everybody has the same kind of safety security for the devices is very important and then at the end of the day to keep it really simple to have a nice integrated client that's very easy to access on a phone doesn't require a lot of technical configuration very very simple to set up and the back end ability to go monitor and manage these policies consistently simply and at low cost very very important and again to do it across the full range of security functionality that we're talking about not one phone or one silo at a time the way some of our competition all of our competition approaches the problem now for service providers as I mentioned this is an unparalleled opportunity to monetize a service that is of value to all of us to be able to have innovative security services that transcend the the range of smartphone and mobile devices that we have to be able to scale across all customers with a single solution much lower cost for a service provider to implement much more broad and reach in terms of potential market and then to offer both managed services and the opportunity to offer self-managed services to be able to go find a phone to be able to manage that relationship and as I'll talk about in a minute for consumers the ability to help defend and protect our children as well in their access of network services and then at the end of the day to be able to tailor these services specifically for the service providers offering in their target market you'll hear from bt shortly in a very innovative offering where they've done exactly this for their their target market in an innovative fashion so for service providers this is a truly value add this is not about cost this is about monetization and adding value added services that are new in the market comprehensive and provide more reach very quickly for consumers a whole different set of opportunities here again we have sensitive data in our own right it's not just about what we do at work and the information that we might download from a work environment it's the ability to protect our multi-use device from viruses and other types of malware from spam from spyware to be able to defend our kids from cyber bullying from online predators to help them not be inundated with the bad aspects the bad actors on the internet you know most of us buy our kids phones so that they can be safe so that they can reach us and we can reach them so that we could pick them up at the right time that we have communication we think that that's really about their safety and yet at the same time there's significant data now that shows malicious use of sexting of inappropriate content coming in being shared socially and now we have the ability to protect and defend our children through offerings that service providers can can provide to defend those kids on those devices and make sure that the the mobile life for our kids is what we intended it and that includes the ability to be able to back up and restore devices remotely again across platforms reflecting the real diverse and heterogeneous mobile life that we all live and finally to be able to find and wipe content and contacts on demand if we have indeed lost the phones somewhere in our family so for consumers these issues are just as acute the mobile life is just as a need of defending as it is in the prosumer or the enterprise context now equally important in terms of the depth of offering and this integration of security and secure access is our reach across platforms again the real world here is that whether you're a service provider or you're an enterprise or your family you have multiple platforms different operating systems different devices they're heterogeneous and you want that same kind of protection ability to manage devices ability to defend your mobile life whatever device you might have so whether you're on an android platform whether you happen to use a blackberry a simbian device a windows mobile device or an apple ios device you want protection and this is the first time in the industry that a mobile security suite like this has offered that breadth of coverage across devices this again we think reflects the reality of this killer application of the internet in the palm of your hand where you want peace of mind around all the devices in your world the second announcement today after the mobile security suite is our new juniper global threat center now this is built on a history seven years of experience through our s mobile acquisition of monitoring the network and mobile devices and our customers looking at emerging threats looking at vulnerabilities looking at the bad actors and what they're doing and being able to publish and provide research on that information and also incorporate that research into threat management and basically supplying the information these phones and the mobile security suite needs to protect our mobile life so we this is a threat center that's located in Columbus Ohio but networked globally an integral part of our value proposition and the value that we want to offer to the new secure mobile world the third announcement today has to do with new research that we've just conducted so this is just being published today brand new no one seen it other than you we went out and talked to 4500 mobile consumers globally in 13 countries and got a current as in this month october pulse of what's happening with their secure security concerns their mobile life so what we found is that globally and it varies a little bit by country but 40 percent of smartphone users use their phones both for personal and for business use 81 percent access their workplace their work network without permission of the it organization now that one's really interesting and i note that the number is a little bit less but not much less in the united states where we have typically fairly secure networks in companies and slightly higher in other countries where often networks aren't quite as secure technically as in the united states but 81 percent eight out of ten people are accessing their employers network to do things that have to do with secure intellectual property with the intranet environment often with email but often with other back doors to access network properties and applications 59 percent do it every day that is an enormous number and we're not yet as an industry obviously protecting those endpoint environments or providing a secure connection so that we can authenticate and on a policy basis and crypt access information in a safe way so 52 percent of respondents with children rank for our controls is extremely or very important i suspect that number will go up as more and more kids have phones over time and over 50 percent are very concerned about theft or loss 72 percent access sensitive data so seven out of ten of us think about this room seven out of ten of us are accessing and storing banking credit password information social security numbers medical record information in our phones and often without any kind of password security or other security on the device and last but not least in the bottom right and this scares me as a parent one out of five teens admit to sending inappropriate content and that is not exactly what we all had in mind when we bought phones for safety and security and now we do have a set of solutions that can protect our kids lives as well as our own in this new mobile world so very very interesting research and there's more detail and more numbers behind that that you can analyze at your leisure but very interesting the moving target the changing world that we're in right now and it's really bringing together this set of mobile security technologies that we're about that we're investing in not just in the cloud not just in the network but now at the endpoint device that for the first time we're able to provide security and remote access in a combined smart mobile network client with the broadest support across devices of any vendor in the industry and with a single solution that enables you from an enterprise perspective particularly to have security and policy for the mobile device but also for PCs notebooks and netbooks with our 25 million user installed base using the same access technology part of the solution so we really have invested significantly again we're a market leader from a mobile security perspective in the cloud and data center environment we're a market leader in terms of access to enterprise networks we're now putting out the leading software in the mobile security suite for defending your mobile life so for customers what should they do next well enterprises can contact juniper and our value-added resellers right now all of this software is available now service providers can accelerate their certification of these kinds of technologies because I know everybody in this room wants this kind of security wants this kind of safety and there is a market immediately available right now for this kind of technology and consumers can also go to our website there's lots of information about these offerings and find out more about how they can register their interest for this kind of technology and also get more information about how to secure themselves and their families using their their mobile phones and devices today so with that I would like to introduce our next speaker Dave Merrill is the chief endpoint security strategist for the largest technology company in the world IBM Dave welcome thanks so much good morning and and and welcome I'm very excited to be here share this with my my trusted partner in juniper and tell a little bit of our story on this challenging journey ahead of us so as you'd expect let me put this into context from my view this is kind of really about a second revolution right in mobility so we started at the enterprise very much desktop right and I think if you if you remember back far enough very on-premise desktop so that kind of led us to the first the first mobile revolution right it was really about giving our employees laptop so they could start to compute anywhere any time but but really put it in the in quotes because let's face it it's not really practical to be able to use a laptop anywhere any place but it certainly got them off-premise and then started this revolution so as we look at the next revolution and and I really see this as the next the next part of our journey right as we look at the workplace of the future and certainly the smartphone becomes not the only solution that very much the first revolution the laptop was almost a one-size-fits-all right everyone kind of got within a given choice maybe a couple models but it was standard image controls all the same it was not role-based at all as we look at the workplace of the future it really is about what what's the role of the employee and then what's the right solution for them and and so in a lot of cases I think you'll see that this takes various forms some folks it may be still the traditional laptop may be supplemented with a secondary smartphone but for some folks we really envisioned that this will become smartphone really does become a primary device for a lot of our mobile workers right the folks are in front of our customers adding value to our clients and because it really gives them the kind of efficiency that that they need there right so that we can better serve our clients certainly at the same time the security side of me says this is a challenging transformation because we can't lose sight of of kind of the primary concern we have which is really all about our data as I look at this space for us it really is about the data we have very clear requirements for how we protect data well established you know kind of says for this classification of data here's the controls we require that's that's really very finite in in most cases and so what it says is all right as I look at how I need to protect the data and I look at the kinds of roles I talked about right in this transformation it really says what's the likely kind of data I'll have on a given smartphone because the challenge then becomes what's the right technology to ensure that that data is every bit of secure as it was on the laptop and on the desktop and in our data centers so it really comes down to you know how do we make sure that we've lost nothing in terms of security while we enable this transformation the one thing that really resonates for me here is the fact that because we put the data on a smartphone it really isn't any less valuable and so that's kind of become this guiding principle of you know how do I enable this how do I let our employees take that that those huge efficiencies that are available at the same time can't sacrifice you know the security of our data of our clients data of in some cases regulated data so they become very important let me talk a little bit about smartphone malware and and of course this is the journey that we've been on for a couple of years when I started this journey I was actually told that I was fixing a problem that didn't exist how much you'd expect right as I went forward said you know geez I need the money for this this new project because certainly there are there are problems out there that we could have spent that money on that were real then but clearly from my view and I think one of the great things is it's a view that as I partnered with Juniper and the Juno's pulse team you know I was able to find that that partner that really kind of understood where my head was at because it doesn't to me it's very obvious that while the threat landscape right now is kind of very focused on you know windows as smartphones become the primary computing device guess where it's going to go guys it will be there whether that's an 18 months 24 months and the really great thing is as I started working with the Juniper team in our initial pilots and looking at the product they told me oh rest assured it's there right it's already there you just don't see it and and you know certainly sure enough as we piloted that first that first deployment we found malware on smartphones so so again I would I would share with you that the one important point that this really isn't an urban legend it's real today I think it becomes a bigger problem as we look forward and certainly it's important that we're all prepared when it does become you know prevalent and that's really what I have to share with you today I appreciate the opportunity and certainly thanks again to the Juno's pulse team they've they've again been a wonderful partner for us thank you thank you Dave great first of all to take your time here to come here and share your insights and thanks for obviously deploying Juno's pulse worldwide to protect your workforce so we've heard about Juno's pulse we've heard about the broad juniper strategy we've heard about the details of Juno's pulse we've heard from a real-life enterprise customer what we'd like to do now is dive into the next level of detail we're going to bring the end users into the equation we're going to do that via three personas personas that you probably relate to three people who will voice the great things that smartphones and tablets have enabled them to do in the enterprise and the consumer but also the threats and the security problems that lurk beneath that they've realized so the first persona that we're going to show you a video is an employee all of us for example using our corporate computing devices accessing our network sensitive data and also using it for personal use doing that without perhaps realizing the threats that are underneath that the first video will show you someone who realized that and what happened the second video is going to walk you through really a consumer's view a family's view a parent's view of mobile devices that they've given to their children that enable a whole plethora of things right social connectivity contacting their friends the ability for the parent to contact their kid yet also the notion that wait a minute the parent also wants to protect and defend those children in case malicious things do happen and how do they do that the third video is really a video of all of us perhaps driving in here today talking on our smartphones while on our taxi cab perhaps forgetting our smartphone shuffling through an airport and losing your phone and see what happens when that happens and how does a person deal with that so three videos after that i'm going to come back and i'm going to show you how junos pulse solves every one of those problems so let's roll the videos yeah i'll see you in a little bit okay i love you too bye i'm busy with work a lot so i'm always on my phone someone's emailing me about this event someone needs to check availability for this thing a couple of months ago i went on a site and clicked on some file and just like that everyone on my contact list was hit with a virus everyone at work 150 channel partners my boss her boss it was a disaster i didn't realize we didn't have security on the phone i thought the business info and contacts would be locked but it wasn't anything could have happened viruses hackers it only took a second for that virus to get in there but it's taken us months to undo the damage remember her asking and asking for a phone a year ago her girlfriend shaelyn and kate had them so i thought okay it can be that bad we can keep tabs on her she can use the phone to call me if she needs to so we made the rules she doesn't like the rules but that's the deal there's one thing when phones were just phones but now you've got the web out there you've got texting the camera it just all makes me think she's just out there i have no idea what's going on i don't know who's calling her who's texting her who's sending picks i don't even know who has access to her i got her the phone to help keep her safe and i don't know if she's safe on it to me it's not a phone it's my computer it's my email it's my contacts my calendar my company internet it's my mobile office it's how i do my work without it i'm lost worst day of my career january 23rd 2010 i'm in tulsa snowstorm jet lag delays i go to make a call and my phone is gone i had everything on there i had spreadsheets i had sales projections my entire sales rolodex i had marketing information i had new products on there everything so we go into a three month panic sweating that that information is not lifted from that phone i almost lost my job that information is out there somewhere someone's got it just not me this is my new phone i still use it for everything i'm not going to stop using it the question is how am i going to protect it so three videos three end users three problems what i said is we're going to show you how junos pulse can address each one of those remember back to the first one an employee accessing corporate data also using it as a personal device all of a sudden her contacts had been emailed had been infiltrated how do you solve that problem junos pulse we're going to show you a quick demo of how it solves that problem so let's roll the demo let's say a user's phone has a virus a notification pops up on their screen the user can then access the virus report telling them what's been found one press of a button deletes the viruses it's that simple junos pulse continually runs its virus detection in the background helping to protect the user even when the phone is not being operated the junos pulse home screen also allows users to control a variety of features they can update virus definitions manually scan the device files or folders for viruses and look at scan history an administrator can also access antivirus information via the mobile security console a window into the mobile devices in their enterprise virus discovery alerts allow the administrator to access files that have previously been identified as viruses and removed from users devices it's an instant easy way to protect the enterprise's entire mobile workforce and help ensure secure connectivity on each user's device a quick sample on android of how you could solve that problem a couple key points that i want to make one think about how threats come into your phone wi-fi sms mms email whatever it is an antivirus malware engine built from the ground up for mobile devices to protect no matter how communication happens on your device built to take into consideration battery life memory usage processing that is unique to a mobile device very different from a laptop or desktop built from the ground up for these devices that's what junos pulse is we also showed you the enterprise console looking across all your devices no matter what they are android simbian windows mobile blackberry having a common view of the malware in your environment and being able to remediate it with one solution versus four or five different ones two big differentiators of junos pulse so we're going to move on to now the next demo you remember the second video the parent the family the person who is very happy they'd enable their kid with a great communication mechanisms yet also in the background wondering wait how do i protect and defend in case for example you saw some of the statistics around sexting and so on we're going to show you as a offering a service provider could build to a consumer to a family member to a parent that could solve this problem everything you see here could be turned on could be turned off it's really up to the service provider to configure the offering but why don't we roll the demo to see the power of how we protect against this with junos pulse the junos pulse parental control dashboard lets parents have an insider's view on how their children are using mobile devices on the family account by logging in a parent will access a multitude of features that they can control remotely on their child's device including locking unlocking locating backing up and restoring wiping content and the ability to sound a deterrent alarm on a lost or stolen phone other features parents can use include alerts that can be set up to monitor certain words their child is using in their texts these alerts can be sent directly to a parent's mobile device a call log would show activity and gives parents the ability to blacklist numbers and block incoming calls to their child's phone antivirus reports that display corrupt files that have been detected the ability to install and uninstall applications on their child's phone a photo log which allows parents to see photos that have been looked at on the browser or taken with the camera on their child's mobile device and finally pulse allows parents to track location via gps to see where their child's mobile device is instantly so a couple key things i do want to point out that offering is an offering a service provider can use and build into their offering to offer to families how do they want to package it do they want to offer for example backup or store buyers protection services do they want to offer inbound sms protection against text sexting all capabilities that they can manage and package such that they can best address their consumer customer that's the extensibility of junos pulse and enabling carriers to deliver value added offerings to their customers in their specific geographic region so the third video and third demo that i'm going to show is that man in the taxi cab remember lost their phone all of their sensitive data on the phone all of their data lurking out there someone else perhaps using it pouring through financial records they even their personal data how do you solve that problem how do you enable that person to attempt to retrieve their phone and if they can't forever wipe the phone that's what we're going to show you through this demo of junos pulse so let's roll the demo it's an unfortunate but common scenario a user has lost their mobile phone the mobile security console from junos pulse allows a user or administrator to take the first step quickly they can send an instant command to lock the phone so it can't be used then they can view the backup history on the mobile device if it's been a while they can instantly back it up right then and there so the information is saved before the device is wiped commands can be sent to the device to track where the phone is via gps and a deterrent alarm can be activated on the lost phone itself once those commands have been sent a user can view the location of the device if the phone cannot be located by gps tracking let's say it was left on a subway it can be wiped immediately preserving the security of the device as well as any sensitive business information stored there so a couple key things on that last demo what happens when you lose your phone or any device the first thing you want to make sure is you have a backup junos pulse enabling a backup regardless of smartphone the second thing you want to do is let me go find that device where is it in the world let me go try to retrieve it junos pulse enables that find it on a gps map set off an alarm so once you get close you can hear it well wait i can't find it now what do i do well then you wipe it remove it so nobody else can do what you don't want them to do with your data after that you get a new phone and you restore your data from junos pulse full life cycle management of handling that use case that's junos pulse so three personas three real life end user problems three demos of how junos pulse addresses them obviously there's many more that we could have given but hopefully you got a flavor with those three so with that i'm actually going to introduce mark paterson from bt come on up mark mark is the general manager of the mobile data services group and he's been kind enough also to share his time and walk us through how bt is leveraging junos pulse thanks mark thank you and thank you juniper for giving us the opportunity to talk about mobile security and what it means from a service provider perspective i think you know the role of a service provider within mobile security can be best summed up by this simple adage that enterprise security is a journey not a destination so david you have some job security ahead of you the um i think that the main thing that we've gained in terms of our perspective both as a consumer brand as well as providing an enterprise service to multinational corporations is that device security and mobile devices in general is a multifaceted in industry and much like our relationship with juniper we found that the ability to be able to bring into the enterprise smartphone technology is often a big balancing act between what is simple and sexy in the consumer space with the smartphones that are coming out today and the natural inclination for enterprises to look towards security and stability to be able to provide solutions now you know from a bt perspective there are two major services that we have out there in the consumer space we have the bt total broadband anywhere solution which is rarely where our journey with juniper started back in 2007 on the enterprise side mobile express provides for organizations the true managed service that takes these capabilities the security capabilities and provides a single solution to customers so back in 2007 we brought in the anti virus and the firewall capabilities into our consumer platform within the the handsets that we were releasing to our customers and at the time we decided to offer it for free value added service provider offering service for free why well one thing we recognized in 2007 is that the smartphone proliferation and the applications that were getting driven had longevity longevity beyond the consumer and really provided the foundation for what has become the prosumer space today you look at the applications now that are driving this this fanatic approach towards smartphones into the enterprise the application is being used or common and really what is driving this prosumer threat in some cases it's really the end users end users are providing really the impetus for the consumerization of the enterprise so from a bt perspective that creates a huge market opportunity millions of end users on the bt total broadband anywhere solution over 1900 customers in the enterprise space on mobile express the stronger that we can build the relationship with that end user the stronger we can drive services and value into the prosumer space so the market opportunity is huge like i said in the uk alone bt is servicing millions of end users with their kind of these kinds of solutions in the enterprise space equally looking at the multinational corporations that today you know range from having half a million end users that are out there to even the very small small businesses that are out there that are right now trying to see how they can bring these kinds of handsets how they can bring this kind of technology into the into their enterprises today this creates a huge opportunity for us why juniper well like i said the juniper relationship with bt is multifaceted it ranges from network security to providing device security and today for us you know what was most important in the smartphone space in the smart device space cross-platform capability was critical the ability for us to be able to deploy this not only within our network environment and offer it as a service mobile security as a service but the ability for our customers to be able to integrate it into their own security environment because in the enterprise space enterprises don't outsource security enterprises integrate security capabilities security policies that they define into a broader spectrum of devices that is a service provider market opportunity technology performance was important and i'll tell you that you know dating back to 2007 at a time when a lot of organizations were struggling with point solutions and coming up with point capabilities that at times weren't very stable the ability for us to be able to integrate this quickly have it be stable and reduce the amount of support calls that customers and end users who are just getting into this whole smartphone space you know reducing that for us lower total cost of ownership for a service provider which we can translate into value that we're providing organizations now the technology was very strong in terms of its performance but i think the most important thing of all has been our relationship today we are offering a very comprehensive set of solutions to the enterprise that range beyond the device and really look at the continuum that today is really going to define where mobile security is going it used to be that mobile security was very protocol driven we used to think in terms of you know what is going to be the the access technology that's out there what's going to be you know the ip standard that we're going to adopt we're now in that next stage where we've gone beyond the the protocol to now talking about the device and the individual but we all know that the number of devices that that individual is using is going up and as that happens we see a continuum that takes us to where the applications become the center of everything it's why enterprises today are talking in terms of you know app stores they're talking about why the applications are important they're talking in terms of consumerized technology that's adapted to the enterprise and being able to provide a service that rides that continuum well that's the journey we're on it's the journey our customers are on and it's the reason why our customers see value in what bt is doing so to sum up we started in the consumer space we recognize that smart devices were going to provide a very strong foundation for what mobile devices were going to be tomorrow and we use that as a mechanism for us to be able to drive our enterprise offering incorporating the lessons learned in the consumer space to build better mobile security solutions within mobile express so with that i'll hand it back over to the nice folks that were juniper and i thank you for your time i just want to recap a couple of quick things i think we heard some really interesting messages particularly from our partners you know john donovan cto of at&t talked about the fact that this is strategic to the overall business strategy and priorities of at&t you know david merrill talked about the fact that the opportunity was huge and i love this notion of the consumerization of the enterprise it shows this intersection between what business professionals and consumers want and mark paterson i think did a really nice job of reinforcing what i hope you took away which is what sets us apart is a combination of performance and a combination of the broadest set of capabilities both in terms of features as well as in terms of os's so with that i would just like to thank you all very much for coming today um we're really excited about the junos post mobile security suite you know we're a technology company and sometimes it's really hard to show you how exciting a router can be but hey um this is a really exciting offering from us it makes much of what we do as a company come alive and so we're delighted to have the privilege to share it with you i know many of you have one-on-ones meeting with members of the team who will be around for about another hour so thanks very much for taking the time and thank you for your interest in juniper appreciate it