©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
A Federated Approach to Systems Management Todd Nugent Mike Huffstatler Sr. Product Specialist Systems Engineer.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Wireless Network Security
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
KASPERSKY SECURITY FOR STORAGE Product Launch Presentation Global B2B Product Marketing Teams.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
It’s Not Your Father’s NAC: Next-generation NAC
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
May 2015 Toni Buhrke, Director Systems Engineering.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Changing World of Endpoint Protection
Frontline Enterprise Security
About Us Vulsec’s security experts deliver versatile tactics tailored to arm your IT department in the fight against hackers. We assess your organization.
Network Access Control 101 Securing the Critical Edge of Your Network.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Why IT auditing is a must in your security strategy ?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Your Partner for Superior Cybersecurity
Barracuda Web Security Flex
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Network Access Control 101 Securing the Critical Edge of Your Network
BYOD: Short-term Gain Without Long-term Pain?
Introduction to Cisco Identity Services Engine (ISE)
Network Access Control 101 Securing the Critical Edge of Your Network
CMGT 582 Competitive Success-- snaptutorial.com
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- snaptutorial.com
CMGT 582 Teaching Effectively-- snaptutorial.com
Network Access Control 101 Securing the Critical Edge of Your Network
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Organisation Model Assistant Director: IT & Digital
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
In the attack index…what number is your Company?
Presentation transcript:

©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

©2011 Bradford Networks. All rights reserved. What We Are Dealing With … 2

©2011 Bradford Networks. All rights reserved. BYOD Momentum The BYOD phenomenon is driving orgs to apply policies specific to personally owned mobile devices.

©2011 Bradford Networks. All rights reserved. Why are Personal Devices Risky? Download/Store/Forward Sensitive Information Have Access to Corporate Networks, Systems, and Data 4

©2011 Bradford Networks. All rights reserved. Profile of a Cyber Threat Sensitive Data is Collected and on an Innocuous Server Data Consolidation Remote Command & Control Exfiltrates Sensitive Data Data Exfiltration Data Exfiltration Malware Scans Network Segments Looking for Sensitive Data Network Scan Network Scan Unknowing User Opens a Phishing or Visits a Malicious Website Malicious Application Installed Malicious Application Installed Compromised Device Acts as a Back Door to The Network Compromised Device Compromised Device Can You Prevent Users From Opening s and Visiting Malicious Websites? Can You Contain Network Access to Minimize Your Risk?

©2011 Bradford Networks. All rights reserved. Managing Risk of Personal Devices Minimize Risk to the Network –Limit Network Access –Device Compliance –Forced Registration Minimize Risk to the Device –Antimalware –Encryption/Wipe –Timeouts/Passwords 6

©2011 Bradford Networks. All rights reserved. 3 Phases of Network Access Control Endpoint Compliance NAC has matured and will now be one of the key mechanisms for mitigating the risks of consumerization. Gartner Strategic Road Map for Network Access Control Published: 11 October 2011 ID:G Guest Networking Consumerization/ BYOD

©2011 Bradford Networks. All rights reserved. NAC Maturity Model BlockBlock DisregardDisregard EmbraceEmbrace Visibility Automation

©2011 Bradford Networks. All rights reserved. Who’s Responsible for Onboarding Devices? CIO Wired/Wireless Network Administration Wired/Wireless Network Administration Endpoint Administration Endpoint Administration IT Strategy & Architecture Network Operations Center VP of Infrastructure App/Service Administration App/Service Administration Help Desk / IT Support Help Desk / IT Support Server/DB Administration Server/DB Administration Project Management Project Management Application Development Bus Unit General Mgr Bus Analyst / IT Liaison Bus Analyst / IT Liaison End Users Business Line Management Bus Process Monitoring & Operations Application QA/Test Security Operations Center Incident Response / Forensics Identify/Access Management CISO Vulnerability Assessment CSO Security Engineering Security Engineering Director of Security Policy Awareness and Administration Policy Awareness and Administration Compliance / Risk Officer Governance, Risk, Compliance Audit and Reporting ComplianceSecurityOperationsBusiness Exec VP Mgr Staff

©2011 Bradford Networks. All rights reserved. Who is Bradford Networks Mission: –Safely onboard any device to any network Solution: –Experts in Network Access Control –Network Visibility –Device Discovery & Profiling –Provision Safe Network Access Visionary in Gartner MQ Leader in Forrester Wave 10

©2011 Bradford Networks. All rights reserved. BYOD Must Haves Who What Where When

©2011 Bradford Networks. All rights reserved. Granular Network Access Policies Who What Where When

©2011 Bradford Networks. All rights reserved. Wireless Access Points Network Access Control MAC Address Device Type Logged in User Time of Day Jailbroken AV/AS Smart Network Access Limited VLANSGuest VLANFull Access Registered/Known IP Address Operating System Access Point Switch Port Blocked Network Access

©2011 Bradford Networks. All rights reserved. High Risk VLAN Med Risk VLAN Guest VLAN Jailbroken AV/AS Time of Day Access Point MAC Address Device Type OS User Switch Port Secure Network Access for Mobile Devices Block         

©2011 Bradford Networks. All rights reserved. The “BYOD Blueprint” w/MDM Safe Network AccessSafe DevicesSafe Applications Mobile Device Management Mobile Application Management Network Access Control

©2011 Bradford Networks. All rights reserved. 16 Traditional NAC Deployment Headquarters Data Center Remote office

©2011 Bradford Networks. All rights reserved. Bradford Networks Out-of-Band Architecture Mgmt Console Mgmt Appliance Location 1 Location 2 Location N ….

©2011 Bradford Networks. All rights reserved. Key Requirements °

©2011 Bradford Networks. All rights reserved. E DUCATION H EALTHCARE / B IOTECH F INANCIAL S ERVICES R ETAIL / H OSPITALITY G OVERNMENT / D EFENSE T ECHNOLOGY U TILITIES Key Customers by Vertical

©2011 Bradford Networks. All rights reserved. Key Takeaways Endpoint Compliance Guest Network Bring Your Own Device NAC Evolution 100% Visibility of Who, What, Where, When No Tradeoffs - Granular, Flexible Access Policies BYOD Requirements Experience & Best Practices Automation Makes It Feasible and Effective Methodology

©2011 Bradford Networks. All rights reserved. Next Steps: Request Slides / Additional Information bradfordnetworks.com/resources