Larry Edie & Annie Ballew.  Who are you users?  What do you know about your users?  How can you cost-effectively manage this information?  How can.

Slides:



Advertisements
Similar presentations
Beyond Compliance: Advanced SmartGrid Authentication Paul Miller Uniloc.
Advertisements

Policing the Power of Identity Controls Power Behavior Verify that controls are in place and functioning Monitor user behavior and verify that people.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Securing the Intelligent Information Network Mark Swantek Consulting Systems.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Digital DNA Server Login People ®. Login People ˃ IT security vendor ˃ Patented Digital DNA ® technology innovation Digital DNA Server Multi-factor Authentication.
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Microsoft Ignite /16/2017 3:28 PM
Microsoft Ignite /16/2017 4:55 PM
Security and Policy Enforcement Mark Gibson Dave Northey
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Luc Billot Security Consulting Engineer
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Your storage on the ground; Your files in the cloud.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 Directories and Policy-Based Networking - Strassner Directories & Policy-Based Networking 0827_02F8_c1 John Strassner Cisco Systems.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Authentication & Authorization: Security and Integrity in the Cloud Desmond White July 3,
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 8: Configuring Network Access Protection
Auditing Information Systems (AIS)
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Paul Andrew. Recently Announced… Identity Integration Options 2 3 Identity Management Overview 1.
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Configuring Network Access Protection
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
Access resources in a federation partner organization.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Associate.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Managed IT Services JND Consulting Group LLC
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Vulnerability Analysis Dr. X. Computer system Design Implementation Maintenance Operation.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Reduce Risk Across Hybrid IT
Basharat Institute of Higher Education
Secure Connected Infrastructure
Deployment Planning Services
Reduce Risk Across Hybrid IT
CWMS Configuration Making our PowerPoint simpler and more distinctive.
Capabilities Matrix Access and Authentication
Implementing Network Access Protection
CompTIA Security+ Study Guide (SY0-401)
Reduce Risk Across Hybrid IT
Let’s get Started with Your AWS Account
Secure & Unified Identity
Azure AD Deployment Are you maximising your Azure AD investment?
Server-to-Client Remote Access and DirectAccess
Access and Information Protection Product Overview October 2013
Identity & Access Management
Robert Haaverson Imanami Corporation
AD RMS Templates Active Directory Rights Management Services (AD RMS)
Device Registration and Multi-Factor Authentication
Presentation transcript:

Larry Edie & Annie Ballew

 Who are you users?  What do you know about your users?  How can you cost-effectively manage this information?  How can you use this information to enforce policy?

 User Based Identity ◦ Active Directory ◦ LDAP ◦ Tokens  Machine Based Identity ◦ Certificates ◦ Machine accounts  Identity based technologies ◦ 802.1x ◦ Remote Access VPN What else?

4 THE GOAL NAC Server gathers and assesses user/device information  Username and password  Device configuration and vulnerabilities Noncompliant device or incorrect login  Access denied  Placed to quarantine for remediation Device is compliant  Placed on “certified devices list”  Network access granted NAC Server NAC Manager End user attempts to access network  Initial access is blocked  Single-sign-on or web login Authentication Server 123a3b Quarantine Role Intranet / Network

 Regulatory Compliance ◦ PCI ◦ FISMA  Reducing Risk  Forensic Analysis

 Why would we need NAC? ◦ You know who your users are, but do you know what they are carrying into your network?  What are the implications of NAC? ◦ What are the maintenance implications? ◦ How does this affect business productivity?  Deployment Considerations ◦ What solutions are available? ◦ Is it a worthwhile investment?

 Role Based Access Control  Future of NAC  What does Identity mean for future technical paradigms, such as IaaS, SaaS, and PaaS?