Wireless operators have a chance to differentiate their services –and make money – by becoming the trusted security resource for wireless subscribers, according to Juniper Networks Inc. (JNPR), which is hoping to leverage that opportunity with a new mobile security suite, a global threat center and research on mobile security threats.
Following a presentation at 4G World on how carriers can partner with enterprises and over-the-top companies to bring new revenues into their businesses, Juniper updated its mobile security offerings. The company, which in July announced it would pay $70 million to acquire SMobile Systems Inc., a Columbus, Ohio-based software company that specializes in mobile device security for smart phones and tablets, is now opening a global threat center in Columbus that is says is the only center dedicated to tracking, responding and researching threats to mobile devices. “We feel mobile is different from laptops and desktops and built this product from the ground up,” said Sanjay Beri, VP and GM at Juniper.
Juniper released research that said four out of five people cite “level of security” as a top or high priority when buying or using smart phones and tablets, and three out of four people surveyed access sensitive personal or business information, like mobile banking or sharing credit card numbers from their mobile devices. KRC Research and Synovate surveyed more than 6,000 smart-phone and tablet subscribers across 16 countries on behalf of Juniper. Fewer than 4% of people surveyed said they use their devices strictly for business, and more than 80% said they access their employer’s network without the employer’s knowledge or permission from their mobile devices. Even in the United States, which was the most conservative country surveyed, 52% of respondents said they accessed their employer’s network without the business’s knowledge.) “Enterprises realize that threat,” Beri said.
People continue to bring their personal devices into the workplace so IT departments need solutions to make sure they can swipe the device or set policies on information employees can access across a wide variety of devices and operating systems, said Neil Book, VP of Mobility and former SMobile Systems CEO. “The easiest way (for malware) to get on a device is through app stores,” he said. End users think they are downloading a harmless game that contains a virus or other threats. People can recognize potential threats to their laptops and desktops, but are less familiar with threats to their mobile devices.
Service providers can take a leadership role by offering security solutions, Beri said. IT departments can set policies for their companies and parents can set policies for their children.
Juniper’s software suite includes anti-virus, personal firewall, anti-spam, loss and theft prevention, and monitoring and control services.
The threat center, which should be operational in 2011, will monitor five types of threats and share that information with public and private industry. The five threats are:
Malware – Viruses, Worms, Trojans, Spyware
Direct Attack – Attacking device interfaces, browser exploits, SMS attacks
Physical Compromise – Accessing a device and its data by having physical access from loss or theft
Data Communication Interception -Intercepting data as it is transmitted and received
Exploitation and Misconduct – Inappropriate communications, data leakage, online predators, bullying and sexting.
Online bullying has received increased attention lately after a Rutgers University student committed suicide last month following inappropriate posts on Facebook about him.
Juniper: Operators should be trusted security resource: Global threat center can monitor business security, mobile bullying
ABOUT AUTHOR