Network Access Control 101 Securing the Critical Edge of Your Network
Devices / Person
Internet of Things
Attack Surface is Growing and Changing Parent Company Guests Suppliers Users No Agents BYOD Internet Of Things Partners Your Business Consultants
Endpoints are Easy Targets for Hackers
About Bradford Networks Continually Assess Risk of Every Endpoint 1,000+ Customers 30+ Countries Live Inventory of Network Connections Network Access Policy Engine Gartner MQ Visionary 5 Star Rating from SC Magazine Analytics & Forensics Consistent Mission for 15 Years Appliance / Virtual / Cloud
Leverages the Network Infrastructure Visibility Control SNMP Syslog API Radius SNMP Syslog API SNMP Syslog API SNMP CLI Radius SNMP CLI Radius SNMP CLI Firewall VPN IDS/IPS SIEM Switch Router Wireless Access Point 7
NAC 101: Extensible Policy Engine Risk? Restrict Network Access Trust? Grant Network Access Network Access Policies Inventory of Network Connections Live / Historical
NAC 101: Leveraging Indicators of Trust/Risk Network Access Policies Inventory of Network Connections Live / Historical
NAC 101: Live Inventory of Network Connections Where VPN Who What When Site 1 Inventory of Network Connections Live Site 2 …. Site N
NAC 101: Dynamic Network Provisioning Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access
NAC 101: Endpoint Compliance / Network Segmentation Assign Network Access Assess Risk Identify Device Unrestricted Access Restricted Access Identify User Guest Access No Access
NAC 101: Self-Service Registration
NAC 101: Secure the Critical Edge of Your Network IT Management Safe Devices/Apps Trusted Users Safe Access Users Access They Need Flexibility They Want Privacy They Deserve CxO Embrace BYOD Balance Risk/Cost Maintain Compliance 14
Questions/Request Slides Taking Action … Questions/Request Slides NAC/BYOD Whitepaper Network Security Best Practices