Network Access Control 101 Securing the Critical Edge of Your Network
Notice your network changing? # of devices on your network growing? % of devices are corporate issued? # of devices / user? % of devices that are mobile? # of guests and/or contractors?
Your Network is Changing Parent Company Guests Suppliers Users BYOD Internet Of Things Partners Your Business Consultants
Endpoints are Easy Targets for Hackers
Greater Attack Surface = Greater Risk Even Less Managed Even Less Context Internet Of Things Drop in % Managed Endpoints Exposure Risk Less Managed Less Context BYOD Corporate 4 x Attack Surface 100% Managed 100% Context
Bradford Networks Live Inventory of Network Connections Leverage Indicators of Trust/risk Network Access Policies Analytics / Planning / Forensics Real-Time Enforcement Appliance / Virtual / Cloud Delivery
NAC 101: Live Inventory of Network Connections Point VPN User & Group Device Type OS/ Apps Connect Times Site 1 Inventory of Network Connections Live Site 2 …. Site N
NAC 101: Flexible Network Access Policies To Information Users & Groups Device Types OS/ Apps Connect Point VPN Connect time Financial Assets Credit Cards Critical infrastructure Healthcare Records Legal Information Intellectual Property Student Information
NAC 101: Dynamic Network Provisioning Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access
NAC 101: Endpoint Compliance Assign Network Access Assess Risk Identify Device Unrestricted Access Restricted Access Identify User Guest Access No Access
NAC 101: Extensible Policy Engine Risk? Restrict Network Access Trust? Grant Network Access Network Access Policies Inventory of Network Connections Live / Historical
NAC 101: Leveraging Indicators of Trust/Risk Network Access Policies Inventory of Network Connections Live / Historical
NAC 101: Self-Service Registration
NAC 101 Historical Inventory of Network Connections Forensics Planning Network & Device Inventory “Black Box” of Network Connections Analytics Historical Inventory of Network Connections Device Trend reports Network & Endpoint Risk Report Distribution
NAC 101: Secure the Critical Edge of Your Network IT Management Safe Devices/Apps Trusted Users Safe Access Users Access They Need Flexibility They Want Privacy They Deserve CxO Embrace BYOD Balance Risk/Cost Maintain Compliance 15
Questions/Request Slides Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist