The Office of Information Technology Network Access Control (NAC) Anthony Espinoza Information Security Officer UTSA Office of Information Security.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
The Office of Information Technology OIT UPDATES University Assembly September 13, 2011 Rob Robinson Assistant Vice Provost Director, Office of Learning.
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
ITA/ISA Monthly Meeting July 18, 2014 Facilitator: Ben Garcia, Director OIT Support Services.
How the Private Virtual Office delivers Scalable and Elastic computing resources to your Organization Without Additional Investment in Server Capacity.
May 6 th, 2014 FAR Meeting 1. 2 Welcome Douglas Hartzler HCM PeopleSoft Lead.
Johnson Logistics Solutions Office of Systems and Information Technology.
Technology Plan EDLD 5362 Casey Smith.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
© Cisco Systems, Inc. All rights reserved. Cisco Public ITE PC v4.1 Chapter 4 1 Chapter 12: Advanced Troubleshooting IT Essentials v5.0.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
CAH Technology Office Technology Office Technology Support Web, Programming and Communication Network and Security Support Research Provides hardware.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Imaging Services, WebNow and ImageNow are provided by MAIS - Document Imaging Services. Presentation originally developed by Michigan Business Services.
Graduate System for Management of Admissions, Alumni & Records Tracking (Grad SMAART) January 8, 2007 Office of Graduate Studies.
University of California, Davis1 Draft Wireless Network Policy Administrative Computing Coordinating Council September 10, 2001.
Title put our names here. General Problem Statement Ability to give customized information to a user based on the user’s current location, the current.
The Computer Network.
Technology Steering Group January 31, 2007 Academic Affairs Technology Steering Group February 13, 2008.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Luna Rajbhandari Manager, Business Intelligence Solutions Business Intelligence Solutions.
Payment Card Industry (PCI) Data Security Standard
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Mr. Mark Welton.  Good documentation is key in a network design  Well-written documentation saves both time and money  Makes troubleshooting issues.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
The Office of Information Technology Two-Factor Authentication.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
IT Update Faculty Senate September 1, 2004 University of Houston Information Technology.
Technology Services. Agenda Options available to guests KSB (departmental) responsibilities Guest responsibilities Technology Services responsibilities.
Networks What are they and how do they work? What is a Network?  Hardware and software data communication system  Two or more devices connected for.
Portable Computer Registration Jean-Michel Jouanigot et al. Presentation to FOCUS on 2 October 2003.
NETWORKING PRACTICAL EXAMPLE. REQUIRED HARDWARE BASICS Network Interface Card Ethernet Cable Client Server.
Information Technologies and the University Making the Most of Our Abundant Resources.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
The University of Texas at San Antonio The Office of Information Technology Network Upgrade Overview.
Chapter 6 of the Executive Guide manual Technology.
PRESENTATION ON WI-FI TECHNOLOGY
The Computer Science Labs Important Information. Undergraduate Lab Sites Located in EMS on the 2 nd floor The EMS building labs are: – E270 ASCII and.
The Office of Information Technology Campus Network Upgrade A three year plan facilitating increased reliability, functionality and speed for the UTSA.
California State University, Northridge Certification Process Team B Carlos Guzman John Kramer Stacey LaMotte University of Phoenix.
ITA/ISA Monthly Meeting March 20, 2015 Facilitator: David Miller Manager – OIT Support Services.
Computer Emergency Notification System (CENS)
Financial Aid and Billing Presented by Gary West.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Chapter 2 Securing Network Server and User Workstations.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
1 Introducing WebNow for Viewing Document Images 2006 User Interchange Dates: Thu Feb 16 1:00 – 2:30 pm Suite 18 Wolverine Tower * Mon Feb 20 8:30 – 10:00.
Membership Competitions FIBA Organizer Information is stored offline, either on a desktop computer or on a Laptop. FIBA Organizer application installed.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Secure Communications Tony Payne YJB IT Security Officer
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
IS3220 Information Technology Infrastructure Security
Module 1: Introduction to Windows 2000 and Networking.
Information Technology Division Customer Service Support Center.
Project Information. Contact Information Project Being Developed.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Printing (Net-Print) Joanne Button August 23rd 2016.
Control system network security issues and recommendations
Unit 27: Network Operating Systems
Network Models, Hardware, Protocols and number systems
Operating Systems Security
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

The Office of Information Technology Network Access Control (NAC) Anthony Espinoza Information Security Officer UTSA Office of Information Security

The Office of Information Technology NAC – What is it? UTSA Office of Information Security The Network Access Control (NAC) project integrates hardware and software to set up rules for how devices (desktops, laptops, etc.) connect to the UTSA computer network.

The Office of Information Technology NAC – What is it? (cont.) UTSA Office of Information Security The NAC will ensure minimum security requirements are met prior to a device being allowed to connect to the network allow us to see all computers and other devices connected to our network better ensure the security of the network by only allowing authorized persons/devices on the network.

The Office of Information Technology NAC – Why implement? UTSA Office of Information Security The NAC addresses a recent UTSA information security assessment and other UT System security initiatives. What is on our network? How is important data (research, etc.) being protected?

The Office of Information Technology NAC – How will it affect you? UTSA Office of Information Security Over the next few months, the NAC will be implemented at all UTSA campuses in phases by individual buildings. Authentication: A new log-in screen may be displayed and you will be asked to provide your myUTSA ID and passphrase. In the first phase of the project, only wired devices will be affected - all computers and other devices that are connected directly to the network by an Ethernet cable.

The Office of Information Technology NAC Schedule (tentative) UTSA Office of Information Security Internal testing will continue through July 2013 Connect to Production environment Aug 2013 – Oct 2013 Turn on authentication starting Nov 2013 Authentication (only) will remain in effect through Mar 2014

The Office of Information Technology Potential issues / adverse impact UTSA Office of Information Security Departmental servers may not work Computers not on domain (or using local accounts) may not work Account / authentication issues

The Office of Information Technology What we are doing to minimize issues UTSA Office of Information Security Multiple communication venues – , post cards, etc. Engagement with our users Meetings with faculty / staff members Presentations at Staff Council, Student Affairs, VPBA, etc. Deployed to small groups Testing of various use cases

The Office of Information Technology NAC – Questions / Comments UTSA Office of Information Security Contact Info: Questions about the NAC: All other IT-related questions: or call