Secure Network Connectivity Claus Jespersen Solution Architect (the new) HP

Slides:



Advertisements
Similar presentations
Security Features in Microsoft® Windows® XP James Noyce, Senior Consultant Security Solutions Team, Business Critical Services Microsoft Security Solutions,
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Ljubomir Ivaniš CPU d.o.o.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Chapter 7 HARDENING SERVERS.
Group Presentation Design and Implementation of a company- wide networking & communication technologies strategy 9 th December 2003 Prepared By: …………
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Information Security in Real Business
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Windows 2003 and 802.1x Secure Wireless Deployments.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Security Security Securing Your IT Infrastructure Kim Mikkelsen Senior Technology Specialist Enterprise & Partner Group Microsoft Denmark.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Clinic Security and Policy Enforcement in Windows Server 2008.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
09-Sept-2004Internet 2 Meeting1 Ad hoc Collaboration - Scalability Kristie Kosaka Boeing Company.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
WIRELESS LAN SECURITY Using
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Joseph Ferracin Director IT Security Solutions Managing Security.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
System Security Basics. Information System Security The protection of information systems against unauthorized access to or modification of information,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 3 Planning for Active Directory®
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Identity and Access Management
Basharat Institute of Higher Education
Secure Connected Infrastructure
Chapter 7. Identifying Assets and Activities to Be Protected
Quick Comparison of workspaces
Unit 27: Network Operating Systems
Message Digest Cryptographic checksum One-way function Relevance
Virtual Private Network
Identity & Access Management
Networking and Security
Security Insights: Secure Messaging
Presentation transcript:

Secure Network Connectivity Claus Jespersen Solution Architect (the new) HP

Secure Connected Infrastructure Comprehensive Security Management & Operations Secure Network Connectivity Integrated Solution for Identity Management Directory Services (AD & MMS)Directory Services (AD & MMS) Authentication (PKI, Kerberos, Passport)Authentication (PKI, Kerberos, Passport) Authorization (ACLs, Roles, Federation)Authorization (ACLs, Roles, Federation) Policy based management (GP, and GPMC)Policy based management (GP, and GPMC) Secure Internet connectivitySecure Internet connectivity Secure remote accessSecure remote access Secure wireless networksSecure wireless networks Tools (MBSA, MSUS)Tools (MBSA, MSUS) Guidance (MOC, PAGs, Security Best Practices)Guidance (MOC, PAGs, Security Best Practices) Services (MSQS, PSS, & professional services)Services (MSQS, PSS, & professional services)

Network Access Challenges High management overhead  Multiple points of network access  Multiple user databases & identities  Desktop intelligence, network presence Vulnerable to unauthorized access  Data encryption over open networks  Weak credentials on VPN  Weak wireless security via WEP LAN Wireless LAN VPNGateway Firewall Identity Repository Shift from traditional networks to bubble networks

Business objective for Bubble networks Easier B2B communication Easier B2B communication Compartmentalize risk Compartmentalize risk Make applications/solutions available inside and outside of company xyz. Make applications/solutions available inside and outside of company xyz. Reorganize, acquire, rapid ajust access to network resources Reorganize, acquire, rapid ajust access to network resources Desktop users can collaborate directly with business partners (netmeeting etc.) Desktop users can collaborate directly with business partners (netmeeting etc.)

High Network Security Low Host Security One Compartment Company wide risk TodayTomorrow Balanced Network and Host Security Several compartments Localized risk.NET supports this new way of thinking

Secure Internet Connectivity Firewall Challenges:  How to control Internet access based on userid  How to control the use of bandwith  How to control external access to internal resources  How to manage multiple Internet access points  How to secure client desktops accessing the Internet  How to protect your internal assets ICSA certified Firewall (ISA server) Software Update Server Service.NET extended authentication Software Restriction policies

Secure Remote Access Home Office or hotspot Wireless LAN VPN client VPNGateway Firewall Challenges  How to authenticate remote users and business partners  How to force policies on corporate desktop clients  How to control use of personal firewalls and anti virus  How to keep up with security updates  How to handle dynamic ”client location” (standby/hybernate)  How to separate home office lan and access to corporate network  How to integrate smart cards, access tokens VPN Server (RRAS), Radius Server (IAS), Personal Firewall, PKI and SmartCard support Software Restriction Policies.NET extended policies AuthenticationServer

Secure Wireless Networks Home Office or hotspot Wireless LAN VPN client Firewall Challenges  How to force policies on desktop clients  How to control use of personal firewalls and anti virus  How to keep up with security updates Certificates (PKI) x support in.NET Radius (proxy) server Client -> Server VPN on top of wireless Support for Smartcards Built-in Personal firewall VPNGateway AuthenticationServer