YOU ARE AT:CarriersJuniper: Operators should be trusted security resource: Global threat center can monitor...

Juniper: Operators should be trusted security resource: Global threat center can monitor business security, mobile bullying

Wireless operators have a chance to differentiate their services –and make money – by becoming the trusted security resource for wireless subscribers, according to Juniper Networks Inc. (JNPR), which is hoping to leverage that opportunity with a new mobile security suite, a global threat center and research on mobile security threats.
Following a presentation at 4G World on how carriers can partner with enterprises and over-the-top companies to bring new revenues into their businesses, Juniper updated its mobile security offerings. The company, which in July announced it would pay $70 million to acquire SMobile Systems Inc., a Columbus, Ohio-based software company that specializes in mobile device security for smart phones and tablets, is now opening a global threat center in Columbus that is says is the only center dedicated to tracking, responding and researching threats to mobile devices. “We feel mobile is different from laptops and desktops and built this product from the ground up,” said Sanjay Beri, VP and GM at Juniper.
Juniper released research that said four out of five people cite “level of security” as a top or high priority when buying or using smart phones and tablets, and three out of four people surveyed access sensitive personal or business information, like mobile banking or sharing credit card numbers from their mobile devices. KRC Research and Synovate surveyed more than 6,000 smart-phone and tablet subscribers across 16 countries on behalf of Juniper. Fewer than 4% of people surveyed said they use their devices strictly for business, and more than 80% said they access their employer’s network without the employer’s knowledge or permission from their mobile devices. Even in the United States, which was the most conservative country surveyed, 52% of respondents said they accessed their employer’s network without the business’s knowledge.) “Enterprises realize that threat,” Beri said.
People continue to bring their personal devices into the workplace so IT departments need solutions to make sure they can swipe the device or set policies on information employees can access across a wide variety of devices and operating systems, said Neil Book, VP of Mobility and former SMobile Systems CEO. “The easiest way (for malware) to get on a device is through app stores,” he said. End users think they are downloading a harmless game that contains a virus or other threats. People can recognize potential threats to their laptops and desktops, but are less familiar with threats to their mobile devices.
Service providers can take a leadership role by offering security solutions, Beri said. IT departments can set policies for their companies and parents can set policies for their children.
Juniper’s software suite includes anti-virus, personal firewall, anti-spam, loss and theft prevention, and monitoring and control services.
The threat center, which should be operational in 2011, will monitor five types of threats and share that information with public and private industry. The five threats are:
 Malware – Viruses, Worms, Trojans, Spyware
 Direct Attack – Attacking device interfaces, browser exploits, SMS attacks
 Physical Compromise – Accessing a device and its data by having physical access from loss or theft
 Data Communication Interception -Intercepting data as it is transmitted and received
 Exploitation and Misconduct – Inappropriate communications, data leakage, online predators, bullying and sexting.
Online bullying has received increased attention lately after a Rutgers University student committed suicide last month following inappropriate posts on Facebook about him.

ABOUT AUTHOR

Tracy Ford
Tracy Ford
Former Associate Publisher and Executive Editor, RCR Wireless NewsCurrently HetNet Forum Director703-535-7459 [email protected] Ford has spent more than two decades covering the rapidly changing wireless industry, tracking its changes as it grew from a voice-centric marketplace to the dynamic data-intensive industry it is today. She started her technology journalism career at RCR Wireless News, and has held a number of titles there, including associate publisher and executive editor. She is a winner of the American Society of Business Publication Editors Silver Award, for both trade show and government coverage. A graduate of the Minnesota State University-Moorhead, Ford holds a B.S. degree in Mass Communications with an emphasis on public relations.