Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2012 All rights reserved to Ceedo. Enhanced Mobility with Tighter Security.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Secure Access using IAG 2007 Presented by: Brian Dunleavy - Healthcare Business Manager - Eurodata Susanna Watson – Pre Sales Technical Consultant - Eurodata.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Security and Policy Enforcement Mark Gibson Dave Northey
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Information Security in Real Business
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Cyber Security – Our Approach James Clement Network Specialist ETS: Communications & Network Services
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Remote Access SSL VPN Stewart Duncan Technical Manager.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Access Gateway Operation
1 FirePass 6.0 Sales Training. 2 Agenda FirePass 6.0 Release Highlights Packaging & Pricing Product Availability Q&A.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
SharePoint Services Indiana University Cory P. Retherford May 9 th, 2011.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Name Company A Day in the Life… A Demonstration of Application Delivery.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Module 5: Configuring Internet Explorer and Supporting Applications.
Milestone SAP Portal Learning at the Lakes August 12, 2009.
Securing Remote Access With SSL VPNs: A Best Practice Primer Sikhi Gundu and Kartik Kumar, Juniper Networks India Pvt Ltd.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Integrating and Troubleshooting Citrix Access Gateway.
Microsoft Management Seminar Series SMS 2003 Change Management.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
What’s New in Fireware v WatchGuard Training.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Windows Vista Configuration MCTS : Network Security.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
CudaLaunch for Barracuda NG Firewall.
Self-service enrollment for Windows desktops
Forefront Security ISA
2018 Real Cisco Dumps IT-Dumps
Virtual Private Network (VPN) Market
Unit 27: Network Operating Systems
RASPro is a secure high performance remote application delivery platform through a perfect combination of application hosting and application streaming.
Check Point Connectra NGX R60
Implementing Client Security on Windows 2000 and Windows XP Level 150
Field Systems Engineer F5 Networks Central Europe
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Securing Remote Network Access FirePass ®

Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to provide real-time data and enhance our ability to share this data with State, Federal and local law enforcement Agencies, as well as other authorized users. The simple sharing of information identified yet another challenge - What means shall the DOC use to provide secure remote access across a wide range of client devices? VirginiaCORIS

Remote Access Issues - ‘DOC VPN’ Cisco IPSec VPN Utilizing Managed and Unmanaged Devices Scalability - Growing Number of Users and Mobile Workforce Security Requirements Cost Effective Solution Challenges

Vendor Demonstrations Cisco SSL VPN Solutions Juniper Networks Firewall/SSL VPN Citrix Access Gateway F5’s SSL VPN FirePass

FirePass Unlike an IPsec VPN, FirePass does not require the user to pre-install or configure any software, however the first time remote network access is requested, the user is required to install an ActiveX component. It works directly through a Web browser using a virtual desktop Web page. Solution

Application and Client Access Ready Endpoint Integrity Checks Scalability Internet Explorer, Netscape and Mozilla browsers successfully established a SSL connection Cost Effective Solution Widely use by the Public and Private Sectors Simplified End-User Experience Benefits

Provides portal page customization Automatic drive mapping Allows users access to network file servers Provides secure and full access to Outlook Provides granular access control to the DOC servers, applications and Intranet resources Allows or restrict access to specific applications providing increased security Portal Access Web Applications, Files and

Client Security Client Integrity Checking - Increased security by detecting specific processes on a device before allowing full network access. The FirePass Controller can validate that: The client has a current antivirus Client firewall OS patch levels Google Desktop User-defined policy in place before allowing a full network connection. Cache cleanup control empties recycle bin, removes cookies, browser history and cache, auto-complete info and ActiveX controls installed during the session.

Client Security cont’d Visual Policy Editor – GUI view of DOC access policies – giving you point-and- click ease in profiling and managing groups, users, devices or any combination of the three. This tool enables the creation of custom template policies based on the endpoints accessing the DOC’s network and security profile.

Unmanaged Device

Managed Device

Integrated Endpoint Security delivers pre-login endpoint integrity checks and endpoint trust management. 1 st – Automatic detection of security compliant systems 2 nd – Automatic protection of resources by enabling a secure workspace preventing the theft of sensitive data. 3 rd - Make sure no session residue is left behind. Endpoint Trust Management

Clientele

Corrections Technology Services Unit Q & A Felicia Stretcher Operations Analyst x1809 Sandy Phelps Major Account Manager Felicia Stretcher Operations Analyst x1809 Sandy Phelps Major Account Manager