Sie sind auf Seite 1von 21

Courtesy of Juniper.

net (UK) on mobile device security

DATASHEET 1

JuNOS PuLSE MOBILE SECuRITy SuITE


Product Description Juniper Networks Junos Pulse Mobile Security Suite is a comprehensive solution that includes mobile device security, mobile device management (MDM), and control. The Junos Pulse Mobile Security Suite can be deployed with the market-leading Juniper Networks SA Series SSL VPN Appliances or MAG Series Junos Pulse Gateways, or it may be used as a standalone solution. Junos Pulse Mobile Security Suite includes a client component, Juniper Networks Junos Pulse, and the Junos Pulse Mobile Security Gateway, which is available as Software as a Service (SaaS) hosted offering from Juniper. At the end user device, all functionality converges on the Junos Pulse client, which serves as the user interface for Junipers SSL VPN products and additional Junos Pulse services such as the Mobile Security Suite, including: Antivirus Antispam Personal firewall Loss/theft protection (anti-theft) Backup and restore Application monitoring and control Mobile device management (MDM) While mobile attacks are increasing rapidly in number and sophistication, and hackers continue to be financially motivated to steal data, identities, and intercept corporate communications, it has now become crucial to protect mobile devices such as smartphones and tablets. The Junos Pulse Mobile Security Suite supports most major mobile operating system platforms. It provides protection from viruses and malware, from physical compromise, as well as other threats for Apple iOS, Google Android, Research In Motions BlackBerry, Microsoft Windows Mobile, and Nokia Symbian-based mobile devices. Malware protection updates automatically defend you in real time against malicious applications that may be downloaded from various app stores or through files sent via Multimedia Messaging Service (MMS), Short Message Service (SMS), Bluetooth, or e-mail. Theft and loss protection ensures that your sensitive data is secure (and backed up centrally) should your mobile device be lost or stolen. Control and monitoring capabilities ensure that appropriate device usage can be monitored and maintained at all times. Product Overview Smartphones and tablets provide seamless access to information

anytime, anywhere. However, most mobile devices are unprotected while Web browsing, downloading data, checking e-mail, texting, and conducting mobile banking. Most contain sensitive information that should be protected against malware, breach, theft, and other threats. While mobile devices help improve employee productivity, and users wish to use their personal mobile devices to access the corporate network, unprotected devices can mean loss or theft of confidential data, and can cause noncompliance with industry and government regulations. Also, the use of personal mobile devices to access enterprise networks places further burden on already overtaxed IT staff through the consumerization of IT. For consumers, mobile device threats mean loss or theft of financial information, credit card data, and personal files, not to mention the need for parental controls on mobile device use by children. Juniper Networks Junos Pulse Mobile Security Suite delivers enterprises, service providers, and consumers a wide range of mobile security and management features.

Architecture and Key Components Junos Pulse Mobile Security Suite provides the industrys most comprehensive mobile security solution, offering the widest range of security functionality across the broadest set of devices. For example, Figure 1 depicts how the Mobile Security Suite would look on a Google Android phone. All features described below are delivered through the Junos Pulse client, which is available for each of the supported mobile platforms. Junos Pulse clients are available in the following app stores of each mobile platform for download to the mobile device of your choosing: Junos Pulse for iOS: Apple App Store Junos Pulse for Google: Android Market Junos Pulse for Nokia Symbian*: The Nokia Store Junos Pulse for BlackBerry: BlackBerry App World The Junos Pulse for Windows Mobile client may be downloaded from www.juniper.net/support/products/pulse/mobile/#sw. Please note that the Junos Pulse Mobile Security Suite SKus (shown later in the Ordering Information section) do not include the Junos Pulse clients, and only the Junos Pulse apps are free downloads. The Junos Pulse clients are available for download only from the approved mobile app stores mentioned above. The Mobile Security Suite delivers a comprehensive array of mobile device security and mobile device management capabilities, including the following features. Figure 1: Junos Pulse Mobile Security Suite on Google Android smartphone Proactive Malware Protection Virus and malware cause unwanted billing, damage to valuable user data, and can render mobile devices unusable. The Junos Pulse Mobile Security Suite protects mobile devices against viruses and malware delivered via e-mail, SMS, MMS, direct download, Bluetooth, or infrared transmission. The Mobile Security Suite is a * Junos Pulse for Nokia Symbian will be available in 2H 2011. 2 unique solution, built from the ground up for todays mobile devices. It takes into account specific challenges such as limited device memory, CPu utilization, and limited battery capabilities, and it also does not negatively impact device or network performance. Figure 2 depicts how the antivirus module of the Junos Pulse Mobile

Security Suite would look on a Google Android phone. The Mobile Security Suite employs on-access scanning to monitor the integrity of files every time they are accessed. It will protect your Android, BlackBerry, Windows Mobile, and Symbian-based smartphone or tablet from malware by automatically detecting malicious code infections as they attempt to infect the mobile operating system. In addition, it has the ability to scan secure digital (SD) cards upon insertion to prevent device infection from malware that may have been stored in error. It will also protect your device by scanning all data going to and from your device to ensure that it is free from infection. Junos Pulse Mobile Security Suite is also the only mobile anti-malware solution employing advanced heuristic detection. Key anti-malware capabilities of the Junos Pulse Mobile Security Suite include: Protection against current and emerging mobile threats via automatic virus definition updates from the Juniper Networks Global Threat Center (GTC) Real-time monitoring and scanning of any file received via SMS, MMS, Bluetooth, Wi-Fi, infrared, or desktop sync Scans of internal memory, memory card, and/or full device on demand Alerts upon malware detection Subscription-based license entitling user to automatic updates, with seamless transfer to new devices Figure 2: Junos Pulse Mobile Security Suite antivirus module on Google Android smartphone HA

Advanced Protection for Lost and Stolen Devices (Anti-Theft) The unique loss and theft protection capabilities of the Junos Pulse Mobile Security Suite enable an IT administrator or a service provider to quickly and easily pinpoint the exact location of a lost or stolen mobile device and have that location displayed in an online map. users and administrators also have the option to remotely lock a device, remotely set off an alarm on the lost or stolen device, or wipe data from the device to ensure that personal and business data cannot be accessed or exploited if a mobile device falls into the wrong hands. Data stored on the device can be remotely backed up and easily imported onto a new deviceregardless of the mobile OS. With these capabilities, enterprise customers can minimize the risk of loss of corporate data when employees lose their mobile devices. Key loss and theft protection capabilities in the Junos Pulse Mobile Security Suite include: Capture GPS location commands Remote GPS tracking in case of loss or theft Remote device lock to make sure stored data and saved passwords are not accessible Remote data wipe to ensure personal or business data (contacts and calendar) no longer exist on the device SIM change notification Automatic security measures taken in case of SIM change Remote backup of personal or business data (contacts and calendar) so that it is available for immediate and future use Remote restore of personal or business data (contacts and calendar) to any new device, regardless of mobile operating system Application Monitoring and Control Application monitoring and control features of the Junos Pulse Mobile Security Suite allow administrators to define strict security policy settings for mobile devices. This includes restricting the types of applications installed on mobile devices, and monitoring data such as SMS and MMS that resides on them. The following actions can be taken by administrators to bolster their security policies on smartphones, tablets, and other mobile devices: View applications installed on mobile devices

Define a blacklist of applications that should not be allowed on mobile devices Monitor SMS, MMS, or e-mail message content Monitor phone call log and contacts View photos stored on the device These features enable enterprise customers to control the types of applications deployed on their employees mobile devices. For service providers, these features enable parental control services, whereby parents can control the use of their childrens mobile devices. The Mobile Security Suite enables a parent to monitor a childs device and mobile activities via a web-based dashboard. With this easy-to-use interface, parents can view a list of all applications currently installed on the childs mobile device. Mobile Device Management (MDM) Junos Pulse Mobile Security Suite Apple iOS MDM Capabilities Junos Pulse Mobile Security Suite also delivers MDM for Apple iOS devices such as the Apple iPhone, iPad, and iPod touch devices. By supporting MDM capabilities on Apple iOS, Junos Pulse Mobile Security Suite is easing the workload of overburdened IT teams when it comes to the consumerization of IT, as well as their ability to address the trend of Bring your Own Device (ByOD). With Mobile Security Suite, Juniper is delivering a comprehensive mobile device management and security offering. By empowering IT teams to enable or disable certain features, to allow or disallow specific applications, and to remotely enforce security policies on a users Apple iPhone, iPad, or iPod touch devicewhether the device is a business device or a personal device used to access the enterprise network and its sensitive applications and data, Junos Pulse Mobile Security Suite provides enterprises and service providers with needed security from unsecured, ill-secured or unmanaged personal mobile devices, and disapproved or offending applications and functions which may be loaded on them. The following are the MDM features of the Junos Pulse Mobile Security Suite which support Apple iOS-enabled devices, including the Apple iPhone, iPad, and iPod touch: Apple iOS device configurations, including: - Accounts, including defining VPN, Wi-Fi, and Microsoft Exchange accounts

- Policies and policy enforcement, such as defining and enforcing device passcode strength, expiry, maximum passcode age, number of passcode attempts before initiating remote device wipe, and more - Application restrictions such as disallowing use of a mobile devices camera, screen capture capabilities, the use of specific disallowed or offending applications, browser access, application store access and the like on a users personal device when used within the enterprise, or when accessing the corporate network and its resources - Provisioning of certificates through Simple Certificate Enrollment Protocol (SCEP) configurations - Over-the-air (OTA) configuration and account services management such as e-mail accounts, VPN, Wi-Fi settings, certificates, configuration policies, etc. Querying of Apple iOS devices, for which the following attributes may be collected: - Device information such as unique Device Identifier (uDID), device name, Apple iOS version, device serial number, International Mobile Equipment Identity (IMEI), and more - Compliance information such as profiles installed, certificates, the presence or absence of a passcode, etc. - Enrollment of users and devices - Asset management of Apple iOS devices via polling and gathering data from devices, including an inventory of apps loaded on a device - GPS location of the device (Apple iPhones and 3G-enabled Apple iPads only) 3

Device management configuration options, including: - Remote lock - Remote wipe - Clearing the device passcode - Configurating and provisioning profiles The Apple iOS MDM features within Junos Pulse Mobile Security Suite are available for enterprise and consumer users. The Mobile Security Suites Apple iOS MDM features are available on devices which run Apple iOS version 4.3 and above, and are supported on Apple iPhone, iPad, and iPod touch devices. Please note: The Apple iOS MDM functionality in Junos Pulse Mobile Security Suite is available only to customers who have applied to and are a part of the Apple iOS Enterprise Developer Program. The Apple iOS Enterprise Developer Program enables applicants to gain access to resources to help them develop proprietary, in-house Apple iOS apps that they can then distribute to employees or organization members. For more information on, or to apply for Apples iOS Enterprise Developer Program, and to in turn access and enjoy the Apple iOS MDM functionality within Junos Pulse Mobile Security Suite, please go to http://developer.apple.com/programs/ios/enterprise. Junos Pulse Mobile Security Suite MDM Capabilities for Google Android-Based Devices Junos Pulse Mobile Security Suite also delivers several MDM capabilities for Google Android devices. Junos Pulse Mobile Security Suite allows enterprises and service providers with the proper permissions and access rights to automatically remove any disallowed, offensive, or dangerous applications, including detected malware, from a users mobile device, without user interaction, approvals, or notification. The MDM capabilities for Android-based devices in the Mobile Security Suite are available with Android-based mobile devices from various manufacturers. Please refer to the Junos Pulse supported platforms document for further details about supported Android devices. If an application is automatically removed from a users device, the removal of the application will be noted in the Junos Pulse Mobile Security Gateway console. Mobile Endpoint Firewall The mobile endpoint firewall capability in the Junos Pulse Mobile

Security Suite protects you from current and future threats by providing filtering and blocking of TCP/IP traffic. Through bidirectional, port, and IP-based packet filtering options, it automatically protects your mobile device from accessing harmful or questionable content, and it prevents malicious content from being transferred to your device. The mobile endpoint firewall of the Mobile Security Suite provides inbound and outbound traffic monitoring using network-level packet filtering and two levels of protection (high or low). By selecting a high level of protection, you may limit allowed ports 4 to the ones specified in the whitelist, and block traffic from all other unknown ports. The low level of protection will allow communication with all but the blacklisted ports. The firewall can also be configured to block/accept traffic from a specific IP or range of IP addresses, giving you ultimate control over all data traffic on your device. The mobile endpoint firewall in the Mobile Security Suite is currently available for Windows Mobile and Nokia Symbian-based mobile devices. Key capabilities of the mobile endpoint firewall capability in the Junos Pulse Mobile Security Suite include: Inbound and outbound traffic monitoring Network-level packet filtering Full control of alerts and logging functions Filtering based on a customizable whitelist and blacklist Spam Protection The antispam capability of the Junos Pulse Mobile Security Suite is the premier message and call manager for mobile devices. Enhanced call and message filtering allow you to prevent interruptions and disturbances by blocking voice and SMS spam. With the ability to categorize contacts into groups of blacklisted (blocked) numbers, you can choose to block calls and messages from those numbers. The convenient auto-add feature lets you block incoming calls and messages from rejected numbers. upon rejecting a call, you will be prompted with the option to add the number to your blacklist, preventing further calls from that number. The antispam capabilities of the Mobile Security Suite are currently available for

Windows Mobile and Nokia Symbian-based mobile devices. Key capabilities of the antispam feature in the Junos Pulse Mobile Security Suite include: Blacklist and whitelist filtering Simple settings for message disposition (save in the inbox, save to the spam folder, or delete) Option to block calls, messages, or both Automatic addition of contacts to a blacklist Option to disable alerts for incoming messages Automatic denial for unknown or unwanted calls Simple, Flexible On-Demand Deployment The Junos Pulse client for mobile platforms enables simple, scalable, and flexible feature deployment for the Junos Pulse Mobile Security Suite, including the following: Over-the-air (OTA) license enablement and registration Automatic boot upon device restart user-friendly interface Full logging capability with ability to e-mail logs for troubleshooting

Junos Pulse Mobile Security Suite also enables fully automated registration for Google Android, Apple iOS, and RIM BlackBerry mobile devices, simplifying the registration process for users by not requiring them to enter any codes or information in order to register for the Mobile Security Suite. This enables enterprises to track which of their users mobile devices are registered, and the service expiration date for each users mobile device. And, the Mobile Security Suite provides internationalization for all text inputs and display fields in the Junos Pulse client as well as for the Junos Pulse Mobile Security Suite and the Junos Pulse Mobile Security Gateway, supporting the following languages: Chinese (Simplified and Traditional) English French German Italian Japanese Korean Spanish Table 1: Mobile OS Supported with Junos Pulse Mobile Security Suite JUNOS PULSE MOBILE SECURITY SUITE FEATURE Software as a Service (SaaS) Deployment Junos Pulse introduces the Junos Pulse Mobile Security Gateway an easy-to-use console for managing and controlling all of the Junos Pulse Mobile Security Suite features for mobile devices. The Junos Pulse Mobile Security Gateway is available as a Software as a Service (SaaS) hosted option for easy deployment. The SaaS deployment of the Junos Pulse Mobile Security Suite allows IT administrators to manage mobile security and remote management policies by logging into a web-based console using any SSL-enabled Web browser. The management console is hosted on a secure data center, with secure access anytime enabled for IT administrators to manage policies. With the management console in the SaaS deployment hosted in a secure data center, it is able to deliver protected access to administrators so that they can manage policies at any time, from virtually anywhere. The SaaS deployment of the Junos Pulse Mobile BLACKBERRY 4.2 AND LATER

VPN to the Juniper Networks SSL VPN Appliances/Gateways APPLE IOS 4.X AND ABOVE GOOGLE ANDROID 2.X AND 3.0 (HONEYCOMB) WINDOWS MOBILE 6.0, NOKIA SYMBIAN S60 5TH 6.1, 6.5 EDITION, SYMBIAN ^3 / Layer 3 VPN for / / Web access only specific Android- based mobile devices1; Web-based access on all other Android devices Antivirus * / / / / Firewall * * / / * Antispam * * / / * Monitor and Control * / / / / Backup and Restore * / / / / Loss and Theft Protection / / / / / Mobile Device Management (MDM) / / Available only on specific Android- based mobile devices1 *** * The features of the Junos Pulse Mobile Security Suite are dependent on the roots and hooks available within the supported mobile operating systems for Juniper to use to adapt features and functions. As mobile OS developers and device manufacturers open access to more roots and hooks for developers, the list of features within the Junos Pulse Mobile Security Suite is likely to expand in future versions. 1Please refer to the Junos Pulse supported platforms document for further details about supported Android devices Security Suite enables customers to: Quickly deploy and secure their network from unsecured or illsecured mobile devices Expedite mitigation of their risk of infection, exploit, or infiltration from insecure or ill-secured mobile devices accessing their network Cut their overall securityand specifically, mobile security costs Protect new mobile devices and users, and monitor and manage security coverage simply and quickly Add or leverage new mobile security features and capabilities as soon as they are released by Juniper Networks Key capabilities of the Junos Pulse Mobile Security Gateway include:

Detailed security policies for mobile devices Protection of mobile devices with antivirus and anti-malware Detailed security reports on infections, updates, firewall rules, and the latest threats Quick list and removal of unwanted third-party applications installed across the entire mobile device population 5

With Remote locate, track, lock, wipe, backup, and restore of lost or the introduction of the Junos Pulse Mobile Security Suite, stolen devices a new enhancement has been added to Host Checker. If Host Device antispam to control unwanted text and voice Checker is enabled on a MAG Series gateway or SA Series communications appliance, Junos Pulse will ensure that the Mobile Security Suite Device-based firewall is enabled and active on the mobile device. If the Mobile Security Document compliance to HIPAA, SOX, Gramm-Leach-Bliley Act Suite is not enabled, the mobile device will not be allowed to (GLBA), and others authenticate to the MAG Series gateway or SA Series appliance, Apple iOS device configurations for accounts, policies, disallowing access into the network. This Host Checker feature application restrictions, and provisioning of certificates through on the Juniper SSL VPN gateways and appliances ensures that SCEP configurations mobile devices are protected by the Junos Pulse Mobile Security Querying Apple iOS devices for and collecting device Suite prior to being allowed within the enterprise network, information, application inventory, and GPS device location enabling greater control of and security for mobile devices that are Device management configuration, including clear passcodes, granted access into the corporate network. configuration, and provisioning profiles For more information about the MAG Series Junos Pulse Gateways, Delivery of a streamlined policy-based client user interface please visit www.juniper.net/us/en/products-services/security/ Host Checker Enhancement on Juniper SSL VPN Gateways and Appliances Host Checker is a key feature on the Juniper Networks MAG Series mag-series/. For more information about the SA Series SSL VPN Appliances, please visit www.juniper.net/us/en/productsservices/security/sa-series. Junos Pulse Gateways and SA Series SSL VPN Appliances. Host Features and Benefits Checker verifies that an endpoint device meets corporate security

Junos Pulse Mobile Security Suite offers the broadest platform policy requirements before granting the device access into the coverage with the most comprehensive range of security network. In addition, Host Checker can remediate the device and applications, including antivirus, antispam, endpoint firewall, quarantine users when necessary if security policies are not met. parental controls, anti-theft, identity protection, and MDM. Below In essence, Host Checker protects network resources from being are some of the significant features and benefits of the Mobile infected by devices that are not in compliance with corporate Security Suite. security policies. Table 2: Features and Benefits FEATURE BENEFIT Automatic virus and spyware definition updates Provides full real-time protectionover the airfrom whatever latest mobile device threats occur. Scanning of files received over all network connections Protects the mobile device from potential malware that can infiltrate from multiple sources, including via SMS, MMS, Bluetooth, Wi-Fi, 2.5G, 3G, 4G, infrared, or desktop sync. Inbound and outbound traffic monitoring Protects mobile devices from accessing harmful or questionable content and prevents malicious content from being transferred to the device. Blacklist and whitelist filtering Blocks calls and SMS spam (blacklisted) and allows acceptable calls from whitelisted contacts. Loss/theft protection Mitigates the risks of losing corporate and personal data on a lost or stolen smartphone or tablet by remotely locating the mobile device, remotely locking it, setting off an alarm on it, or even remotely wiping the device contents. Remote backup/restore Allows remote backups of personal and business data, and easily imports data into a new mobile device, if needed. Mobile device monitoring and control If desired, can enable service providers to protect subscribers childrens smartphones from exploitand enterprises from IP theft and corporate espionageby allowing a view into all messages (SMS, MMS, and e-mail content) sent and received, providing call logs of all voice conversations conducted on the mobile device, and enabling the viewing of all photos stored on the mobile device. Mobile device management (MDM) capabilities For Apple iOS devices, the ability to define and control mobile device configurations, including accounts, policies and policy enforcement, application restrictions, certificates provisioning, querying and collecting mobile device and compliance information, asset and application management, GPS location data, and device management configuration options such as remote lock and wipe, clearing passcodes, and configuring and provisioning profiles, to enable enterprises and service providers to control the manner in which Apple iPhones, iPads, and iPod touch devices access and use their network and its resources. For certain, specific Google Android-based devices the ability with proper permissions and access rights to automatically remove any disallowed, offensive, or dangerous applications, including detected malware, from a users

device without user interaction to further protect the enterprise and service provider network from threat and misuse. 6

Juniper Networks Services and Support Juniper Networks is the leader in performance-enabling services that are designed to accelerate, extend, and optimize your high-performance network. Our services allow you to maximize operational efficiency while reducing costs and minimizing risk, achieving a faster time to value for your network. Juniper Networks ensures operational excellence by optimizing the network to maintain required levels of performance, reliability, and availability. For more details, please visit www.juniper.net/us/en/ products-services. Ordering Information Each SKu includes the following: License to deploy the Junos Pulse client on as many devices as indicated in the SKu Subscription license for the duration indicated in the SKu Service and support for the duration indicated in the SKu Junos Pulse Mobile Security Gateway as a Hosted (SaaS) deployment MODEL NUMBER DESCRIPTION ACCESS-MSS-50u-1yR Mobile Security Suite (MSS) 1 year subscription for 50 users ACCESS-MSS-100u-1yR Mobile Security Suite (MSS) 1 year subscription for 100 users ACCESS-MSS-250u-1yR Mobile Security Suite (MSS) 1 year subscription for 250 users ACCESS-MSS-500u-1yR Mobile Security Suite (MSS) 1 year subscription for 500 users ACCESS-MSS-1000u-1yR Mobile Security Suite (MSS) 1 year subscription for 1,000 users ACCESS-MSS-2000u-1yR Mobile Security Suite (MSS) 1 year subscription for 2,000 users ACCESS-MSS-2500u-1yR Mobile Security Suite (MSS) 1 year subscription for 2,500 users ACCESS-MSS-5000u-1yR Mobile Security Suite (MSS) 1 year subscription for 5,000 users ACCESS-MSS-7500u-1yR Mobile Security Suite (MSS) 1 year subscription for 7,500 users ACCESS-MSS-10Ku-1yR Mobile Security Suite (MSS) 1 year subscription

for 10,000 users ACCESS-MSS-15Ku-1yR Mobile Security Suite (MSS) 1 year subscription for 15,000 users ACCESS-MSS-20Ku-1yR Mobile Security Suite (MSS) 1 year subscription for 20,000 users ACCESS-MSS-25Ku-1yR Mobile Security Suite (MSS) 1 year subscription for 25,000 users ACCESS-MSS-50u-2yR Mobile Security Suite (MSS) 2 year subscription for 50 users ACCESS-MSS-100u-2yR Mobile Security Suite (MSS) 2 year subscription for 100 users MODEL NUMBER DESCRIPTION ACCESS-MSS-250u-2yR Mobile Security Suite (MSS) 2 year subscription for 250 users ACCESS-MSS-500u-2yR Mobile Security Suite (MSS) 2 year subscription for 500 users ACCESS-MSS-1000u-2yR Mobile Security Suite (MSS) 2 year subscription for 1,000 users ACCESS-MSS-2000u-2yR Mobile Security Suite (MSS) 2 year subscription for 2,000 users ACCESS-MSS-2500u-2yR Mobile Security Suite (MSS) 2 year subscription for 2,500 users ACCESS-MSS-5000u-2yR Mobile Security Suite (MSS) 2 year subscription for 5,000 users ACCESS-MSS-7500u-2yR Mobile Security Suite (MSS) 2 year subscription for 7,500 users ACCESS-MSS-10Ku-2yR Mobile Security Suite (MSS) 2 year subscription for 10,000 users ACCESS-MSS-15Ku-2yR Mobile Security Suite (MSS) 2 year subscription for 15,000 users ACCESS-MSS-20Ku-2yR Mobile Security Suite (MSS) 2 year subscription for 20,000 users ACCESS-MSS-25Ku-2yR Mobile Security Suite (MSS) 2 year subscription for 25,000 users ACCESS-MSS-50u-3yR Mobile Security Suite (MSS) 3 year subscription for 50 users ACCESS-MSS-100u-3yR Mobile Security Suite (MSS) 3 year subscription for 100 users ACCESS-MSS-250u-3yR Mobile Security Suite (MSS) 3 year subscription for 250 users

ACCESS-MSS-500u-3yR Mobile Security Suite (MSS) 3 year subscription for 500 users ACCESS-MSS-1000u-3yR Mobile Security Suite (MSS) 3 year subscription for 1,000 users ACCESS-MSS-2000u-3yR Mobile Security Suite (MSS) 3 year subscription for 2,000 users ACCESS-MSS-2500u-3yR Mobile Security Suite (MSS) 3 year subscription for 2,500 users ACCESS-MSS-5000u-3yR Mobile Security Suite (MSS) 3 year subscription for 5,000 users ACCESS-MSS-7500u-3yR Mobile Security Suite (MSS) 3 year subscription for 7,500 users ACCESS-MSS-10Ku-3yR Mobile Security Suite (MSS) 3 year subscription for 10,000 users ACCESS-MSS-15Ku-3yR Mobile Security Suite (MSS) 3 year subscription for 15,000 users ACCESS-MSS-20Ku-3yR Mobile Security Suite (MSS) 3 year subscription for 20,000 users ACCESS-MSS-25Ku-3yR Mobile Security Suite (MSS) 3 year subscription for 25,000 users About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at www.juniper.net. 7

EMEA Corporate and Sales Headquarters APAC Headquarters Headquarters Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland 1194 North Mathilda Avenue 26/F, Cityplaza One Airside Business Park Sunnyvale, CA 94089 uSA 1111 Kings Road Swords, County Dublin, Ireland Phone: 888.JuNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600 or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737 Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601 www.juniper.net Copyright 2011 Juniper Networks, Inc.. Alll rights reserved. . Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the united States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 1000328-006-EN Sept 2011 Printed on recycled paper 8 To purchase Juniper Networks solutions, please contact your Juniper Networks representative at 1-866-298-6428 or authorized reseller.

Das könnte Ihnen auch gefallen