Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1


Ratings: (0)|Views: 13 |Likes:
Published by James Steele
A PDF on Junos Pulse for apple IOS
A PDF on Junos Pulse for apple IOS

More info:

Published by: James Steele on Dec 23, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





Courtesy of Juniper.net (UK) on mobile device securitySOLUTION BRIEF
Junos Pulse Delivers Secure, Mobile Remote Access for Apple iPhone,iPad, and iPod Touch Users
Mobility is the new cornerstone for enterprise productivity. Corporate users, fromgrizzled veteran employees to Generation Y’ers, are all seeking anytime, anywhereChallengeaccess to the enterprise network and its resources. And many of these corporate users—The meteoric growth of Apple’s iPhoneincluding employees, contractors, partners, and the like—wish to access the enterpriseand iPad for personal and corporatenetwork with an Apple iPhone, iPad, or iPod touch. It doesn’t matter to these corporateuse has led to iPhone and iPad usersusers whether the Apple iPhone, iPad, or iPod touch with which they attempt enterprisedemanding mobile remote access tonetwork access is a personal, unmanaged, or corporate-issued managed device.enterprise networks and resources.As a result, the need to secure mobility today is greater than ever, as areits challenges. But how can companies ensure secureAs smartphones such as the Apple iPhone, tablet devices such as theApple iPad, mobile remote access and connectivityand other intelligent mobile devices become ubiquitous tools in everydaypersonal from these mobile devices?and business life, the need for these devices to access critical, sensitive data storedSolutionon enterprise networks continues to grow. The problem is, how can an enterprise beassured that an unmanaged, personal Apple iPhone, iPad, or iPodtouch—or for that Juniper Networks Junos Pulse, inmatter a corporate-issued, managed device serving dual purpose as apersonal mobile conjunction with Juniper Networksdevice—is accessing the enterprise network and its resources securelywhile mobile. SA Series SSL VPN Appliances, or theJuniper Networks MAG Series JunosThe ChallengePulse Gateways running Junos PulseThe Apple iPhone is one of the most popular smartphones on the market.There are Secure Access Service, lets Applemillions of Apple iPhones and other Apple iOS personal or corporatemobile devices such iPhones, iPads, and iPod touch devicesas the Apple iPod touch in use today. The Apple iPad has quickly
become the leading securely connect to the corporatetablet device on the market, with estimates of enterprises purchasingmany more for network and its resources, with userstheir employees. The availability of corporate applications for this platformmakes these enjoying the same experience as ondevices attractive for simple and portable corporate use. Many times,though, the line their notebooks and netbooks.between corporate and personal use blurs, and this can lead to problems for enterprisesBenefits• Fast, secure mobile remote access1 that allow personal or evencorporate-issued iPhones, iPads, and iPod touch devices toaccess their corporate network and its resources.• Support for multiple authenticationmethods, including multifactor authentication methodsFurthermore, when accessing an enterprise network with an unmanaged device (which,in reality, includes most mobile devices today, since users typically are allowed at leastsome control over the use and application of their devices), it is unknown whether thatdevice adheres to corporate security policies. As a further challenge to enterprise network• Split tunneling supportsecurity, personal or even corporate-issued Apple iPhones, iPads, or iPod touch devices• Smart, simple, secure connectivitymay be vulnerable to attack when accessing the corporate network, especially if the user’sand deploymentnetwork access method is not secure or encrypted.These mobile access control issues require the immediate attention of enterprises, toprevent sensitive corporate data from being lost, stolen, and exploited.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->