RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

International center of the analysis of threats Juniper

Company

The international center of the analysis of threats Juniper Networks – the following step of development of the Center of threats working with the SMobile Systems agency which researches threats in the field of mobile security more than 7 years. The staff of the center is the industry experts with extensive experience certified in the field of technologies and security (The certified professional in the field of security of information systems – Certified Information Systems Security Professional (CISSP), the Certified specialist hacker – Certified Ethical Hacker (CEH) and the Certified criminalist in the field of computer crimes – Certified Hacking Forensic Investigator (CHFI)). The command of the center is authors of numerous publications in the field of security and the experts participating in scientific conferences around the world.

Owners:
Juniper Networks

Owners

The Juniper Networks company announced in October, 2010 opening of the International center of the analysis and a research of threats Juniper which is designed to provide the round-the-clock global monitoring of security risks of mobile devices and access for end users and the enterprises. The center located in Columbus, the State of Ohio - the first and only center which is engaged in tracking, neutralization and a research of threats for mobile devices including spread of viruses, spywares, emergence of weak spots in networks which can damage to protection of personal and corporate information and confidentiality.

Mobile devices became a popular access facility to corporate network irrespective of location of the employee. But they also put corporations at risk of penetration harmful programs, unauthorized access as a result of theft or loss of the device that is danger to the employees working far off. According to results of the research conducted by Juniper Networks company, 80% of connections to corporate networks happen without control or permission of the companies, 59% of such connections are performed daily. Normal users appear under blow too: they use smartphones for mobile banking and storage of confidential information as that: information on bank accounts, passwords, personal data which can be used by malefactors.

In the first half of 2011 the International center of the analysis of threats will publish "The report about a status of mobile security in 2010" - a research in the field of mobile security.

Preliminary results of a research:

  • The analysis of Android applications of Market capable to have malicious codes showed that 1 of 20 applications require permission of the user to making changes, further capable to charge funds off an account of the user without his permission.
  • One of the companies, entering the first the 15th list of Fortune, recognized that 5% or 25000 mobile devices of her employees were struck with malware.
  • 20% of teenagers admitted the fact of transfer of the bared images from mobile devices.
  • The number of malware increased by 250% from 2009 to 2010.
  • 61% of all viruses on mobile devices – the spywares capable to monitor communication from the mobile device.
  • 17% of all viruses on mobile devices are the text messages trojans charging funds off an account of the user.


The research conducted by the International center of the analysis of threats will be widespread among private and corporate customers and also is used during the developing and adaptation of functions and characteristics of the new and already existing products as, for example, recently presented solution Junos Pulse Mobile Security Suite. The international center of the analysis of threats Juniper aims at work with such threats as:

  • The malicious software – viruses, worms, trojans, spywares
  • The direct attack – the attacks through device interfaces, the browser, the SMS
  • Unauthorized use – gaining access to the mobile device after theft or loss by the owner
  • Interception of data – interception of data during transmission or receiving
  • Unauthorized use – unseemly communication, date leak, obscene behavior, threats and insults, sexual harassments.