Home / / Juniper introduces mobile security solutions

Juniper introduces mobile security solutions

The suite incorporates antivirus, anti-spam, theft prevention and parental controls

Juniper introduces mobile security solutions
Juniper's new Junos Pulse Mobile Security Suite promises to protect mobile users against most internet threats and also incorporates parental controls.

Juniper Networks has introduced a comprehensive security software solution for mobile devices, the pro Junos Pulse Mobile Security Suite.

The Suite is the only integrated solution on the market to provide security and secure connectivity for virtually all mobile devices across any platform.

The software contains anti-virus, personal firewall, anti-spam, loss and theft prevention, and monitoring and control services to mobile users and enables businesses to provide employees secure access to corporate applications and e-mail via mobile devices.

Not only for business users, the software also allows parents to protect their children from inappropriate content on the web as well as exploitation via the internet.

"It's no secret that personal mobile devices are quickly becoming the defacto means for access to corporate networks, making them one of the most valuable, but also most vulnerable portals to sensitive personal and professional information," said Mark Bauhaus, executive vice president and general manager, Service Layer Technologies Business Group at Juniper Networks. "For the first time, using our Junos Pulse Mobile Security Suite, consumers and businesses have a way to fully protect and secure their mobile work and lifestyles, opening up new applications and opportunities for the entire mobility market."

Just four percent of users use their mobile devices strictly for work, according to a study by Juniper and 44% use them for both business and personal.  Almost 81% of these users access their company's network via their mobile device without their employer's knowledge and 58% do this every day.

For IT departments, mobile devices represent a new and vulnerable endpoint for email, text messaging, Bluetooth, Wi-Fi, and application download threats.

According to Juniper, business data is at risk every time a device is lost or stolen.

Junos Pulse Mobile Security Suite is one of the only mobile security solutions that allows IT departments to support most mobile devices, regardless of platform.

With the software suite, mobile networks can ensure their non-business users' data remains safe.  The suite allows networks to offer value-added security services, including protection from viruses, spam and malware, as well as parental controls, including inappropriate device use, such as the sending or receiving of sexually explicit messages or images.

"Consumers and business users rely on smartphones for e-mail, contacts, mobile banking and other applications that require sensitive personal data, and most users don't have a full understanding of what would happen if their phone was lost or stolen," said Jeff Wilson, principal analyst for network security at Infonetics Research. "Juniper is a trailblazer when it comes to end-to-end security for mobile infrastructure, and their Junos Pulse Mobile Security Suite extends their mobile security vision to the devices themselves."

Consumers will also be able to easily locate lost or stolen devices through the devices' GPS, and activate remote data wipes to protect critical information. 

Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.