Industry’s Only Integrated Mobile Security Solution for Personal & Business Data Across All Mobile Devices

Juniper Networks has unveiled a suite of software designed to keep smartphones safe from malware and malicious attacks; that enterprises and service providers can use to protect employee and customer devices.

With the proliferation of devices and the number of smartphones sales set to exceed PC sales in 2012, the move follows corporate adoption of devices that offer connected socialization and content consumption along with corporate communications, bringing the need to manage security across all devices connected to the corporate network.

The Junos Pulse Mobile Security suite runs on all mobile operating systems and devices including the Android, Blackberry, Symbian, Windows Mobile and Apple iOS operating systems. It includes antivirus, personal firewall, antispam, and remote monitoring and control services. It remotely backs up and restores data and can locate devices that are lost and stolen, as well as wipe data from stolen devices. It also can send an alert when a SIM card has been removed or replaced. For enterprise users, it protects devices accessing networks via SSL-based virtual private network.

The suite is available now to enterprises and Juniper's reseller partners and will be available to consumers through service providers. Service providers also will be able to offer enhanced security services like parental controls to consumers.

Juniper also announced the opening of a Juniper Global Threat Center, based in Columbus, Ohio, that will track mobile security threats worldwide and issue reports. The center released new research as part of the launch, which includes findings of a survey of more than 6,000 smartphone and tablet users in 16 countries commissioned by Juniper:

The company said that its new Juniper Global Threat Center will provide 24/7 monitoring of security threats. Research shows malware threats focused on mobile devices have increased 250% since 2009.

Additional research findings:
  • Nearly 80 percent of users access their employer’s network without their employer’s knowledge or permission and 59 percent do so every day.
  • Analysis of Android Market applications capable of malicious activity showed that 1 out of every 20 applications requested permissions that could allow the application to place a call without the user’s knowledge.
  • A Fortune 15 company found that 5 percent or 25,000 of its mobile devices were infected with malware.
  • A 250 percent increase in malware from 2009 to 2010.61 percent of all reported smartphone infections were spyware, capable of monitoring communication from the device.
  • 17 percent of all reported infections were text message Trojans, which charge fees to a device’s account holder.
  • More than 76% of consumers surveyed use their smartphones or tablets to access sensitive personal or business information, including: 51% to enter or modify passwords; 43% to access banking or credit card statements; 30% to access utility bills; 20% to share financial information such as credit card numbers; 18% to access employer’s proprietary information; 17% to access medical records; and 16% to share social security numbers.
  • Of the 16 countries surveyed, India (90%) showed the highest level of user concern for mobile security issues, followed by Brazil and Russia (88% each), Germany (86%) and China and Italy (both at 85%). Respondents in Hong Kong (70%), Belgium/Netherlands (74%) and the US and Japan (77% each) were a little less concerned.
  • Russia and Singapore were well above the norm for phone/data loss (68% Russia, 79% Singapore) and identity theft (82% each).
The survey was conducted via global omnibus surveys by phone and online during October 2010 with more than 6,000 smartphone and tablet users from a pool of 16,000 consumers across 16 countries, including the United States, Canada, Brazil, UK, France, Germany, Italy, Netherlands, Belgium, Russia, China, India, Australia, Hong Kong, Singapore and Japan. The survey was conducted by KRC Research and Synovate on behalf of Juniper Networks.

Check out some video 1 and video 2.

Comments