
3
Personal Firewall
The personal firewall capability of the Mobile Security Suite
protects you from current and future threats by providing filtering
and blocking of TCP/IP traffic. Through a bidirectional, port, and
IP-based packet filtering option, it automatically protects the
mobile device from accessing harmful or questionable content,
preventing malicious content from being transferred to the device.
The personal firewall of the Mobile Security Suite provides
inbound and outbound traffic monitoring using network-level
packet filtering and two levels of protection: high and low. By
selecting a high level of protection, the user limits allowed ports
to the ones specified in the “whitelist,” and blocks traffic from
all other unknown ports. The low level of protection will allow
communication with all but the blacklisted ports. The firewall
can also be configured to block/accept traffic from a specific IP
or range of IP addresses, giving you ultimate control over all data
traffic on the device.
Key capabilities of the personal firewall capability in the Mobile
Security Suite include:
• Inbound and outbound traffic monitoring
• Network-level packet filtering
• Full control of alerts and logging functions
• Filtering based on a customizable whitelist and blacklist
Spam Protection
The antispam capability of the Mobile Security Suite is the premier
message and call manager for mobile devices. Enhanced call
and message filtering allow you to prevent interruptions and
disturbances, blocking voice and SMS spam. With the capability
of customizing the contacts into groups of blacklisted (blocked)
numbers, you can choose to block calls and messages from those
numbers.
The convenient auto-add feature lets you block incoming calls and
messages from rejected numbers. Upon rejecting a call, you will
be prompted with the option to add the number to the blacklist,
preventing further calls.
Key capabilities of the antispam feature in the Junos Pulse Mobile
Security Suite include:
• Blacklist and whitelist filtering
• Simple settings for message disposition (save in the inbox, save
to the spam folder, or delete)
• Option to block calls or messages or both
• Automatic addition of contacts to the blacklist
• Option to disable alerts for incoming messages
• Automatic denial for unknown or unwanted calls
Advanced Protection for Lost and Stolen Devices
(Anti-The)
Without question, the number of lost and stolen mobile devices
is staggering. The ultra-portable nature of smartphones enables
you to essentially carry your personal computer in your pocket
to sporting events, grocery stores, airports, and restaurants,
significantly increasing the chance of loss and theft.
The unique loss and theft prevention capabilities of the Junos
Pulse Mobile Security Suite enables an IT administrator to quickly
and easily pinpoint the exact location of a lost or stolen device
and have that location displayed in an online map. Users and
administrators also have the option to remotely lock a device,
remotely set off an alarm on the lost or stolen device, or wipe
a user’s personal data to ensure that if it falls into the wrong
hands, their personal and business data will not be accessed. The
personal data can be remotely backed up and easily imported into
a new device. With these capabilities, enterprise customers can
minimize the risk of loss of corporate data when their employees
lose their smartphones.
Key capabilities of loss and theft protection in the Junos Pulse
Mobile Security Suite include:
• Remote backup of personal or business data so that it is
available for immediate and future use
• Remote restore of personal or business data to any new device
regardless of operating system
• GPS location commands
• Remote GPS tracking in case of loss or theft
• Remote lock of device to make sure identity data is not
accessible
• Remote data wipe to ensure personal or business data no
longer exists on the device
• SIM change notification
• Automatic security measures taken in case of SIM change
Application Monitoring and Control
Application monitoring and control features of the Junos Pulse
Mobile Security Suite allow administrators to define strict security
policy settings for mobile devices. This includes restricting the
types of applications installed on them, and monitoring data such
as SMS, MMS, etc., that resides on them. The following actions
can be taken by administrators to bolster their security policies on
smartphone devices:
• View applications installed on mobile handsets
• Define a blacklist of applications that should not be allowed
• Monitor SMS, MMS, or email message content
• Monitor phone call log and contacts
• View photos stored on the device
These features enable enterprise customers to control the types
of applications deployed on their employees’ smartphone devices.
As a use case for service providers, these features enable parental
control services, whereby parents can control the smartphone
usage of their children. The Junos Pulse Mobile Security Suite
enables a parent to monitor their child’s device and mobile
activities via a web-based “dashboard.” Via this easy-to-use
interface, parents can view a list of all applications currently
installed on the child’s mobile device.