Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S09761197.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Security in Real Business
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Internet Protocol Security (IPSec)
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Dell Connected Security Solutions Simplify & unify.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 6 of the Executive Guide manual Technology.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Security fundamentals Topic 10 Securing the network perimeter.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Modern Challenges for IT Governance, Risk, and Compliance in the Enterprise Brian Robison Product Manager McAfee Eric Fredericksen, PhD Solutions Architect.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
Network Access Control
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
1 OS Security. 2 Introduction Network/OS security represents a hot topic in the IT world. Security: warranty/steps that must be taken to protect a computer.
Enterprise Network Security Threats that are Overlooked.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Security fundamentals
Chapter 7. Identifying Assets and Activities to Be Protected
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Firewalls.
Network Access Control 101 Securing the Critical Edge of Your Network
Topic 12: Virtual Private Networks
Presentation transcript:

Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S

Introduction The explosion of fast, reliable network connectivity (internet & enterprise LAN) has transformed the world of business, creating new opportunities & making organizations fast, agile & efficient. Challenge – meet the increasing demands of an “always connected” user (employees, partners, customers) while keeping the security of networks & intellectual assets.

Connectivity versus Security Connectivity is optimized by complete access. Security is optimized by lack of access. Optimum connectivity – design completely open network, then react to security concerns by selectively closing down areas of access. Optimum security – design a completely closed network, then react to connectivity requests by selectively opening areas of access.

Trust Boundaries “In both the physical & virtual worlds, an organization implements security systems & procedures at the distinct points where 2 different trust zones meet”.  LAN & internet: firewalls  Data communications & remote users: VPN tunnel

Why do we need Trust Boundaries…? Strengthen the protection of critical computing & storage resources in recognition of growing exposure to internal risks presented by virus, worms, non- employee users, etc.

The threat from within To protect both the network & the business operations that rely on the network, an additional trust boundary must be erected between them. Security measures must ensure that a user with legitimate access to resources doesn’t inadvertently enable malware to reach those resources, taking advantage of the user’s security clearance to propagate an attack.

The emergence of Explicit Permission & Network Access Management Two changes to provide the network security corporations: IT organizations must change today’s network access model from one of implicit permission to one of explicit permission Explicit permission must be managed through an appliance that grants or denies access based on a real-time assessment of security requirements, network status & user status.

Network Access Management for Business Continuity IT Departments can begin working from a more precise & constructive security model based on: Explicit permission for users accessing resources Adaptivity to changing conditions

Security Shortcomings of Static Network Infrastructure Reactive security measures and lax management of end user devices are no match for new forms of malware that are sweeping the internet – Slammer worm 75,000 machines within 10min The rapid transmission of malware combined with the busy everyday work of large, mobile user populations means that the security state of a network is always in flux – Salesrep connecting laptop, contractor connecting in meeting room

Security Shortcomings of Static Network Infrastructure Network security involves guarding data and controlling its access, not just scanning for malware attacks – Access to information assets must be controlled The cost of these security attacks is simply too high. – USD55 billion in 2003

Recognizing the problem with Static Network Infrastructure Administrators need to make the network infrastructure itself responsive when an attack occurs. – Enforce “guilty until proven innocent” policy Automation solution is in demand to clean devices Today’s infrastructure were designed for static configurations and lack the dynamic, moment-by- moment policy controls that effective network security demands.

Moving to a Dynamic Security Infrastructure Screening users and devices Restricting users to their authorized resources Inspecting traffic continually for threats and potential policy violations Enforcing security policies automatically

Industry Initiatives for Network Access Management Several industry initiatives are under way for creating a solution for screening devices and a system for enforcing regular security policies  Cisco’s Network Admission Control (NAC) initiative  Microsoft’s Network Access Protection (NAP) architecture  The Trusted Computing Group’s Trusted Network Connect (TNC)

The Quandary Facing Enterprises Today Cisco’s NAC solution increases cost and complexity of development – Unlikely to work with other vendor products Microsoft’s initiatives is tied to “Longhorn” release – Other Windows OS requires another product TNC initiative remains a work in progress. – Still deciding which authentication protocols to support.

Verinier Edgewall Network Access Management Appliance Verinier Networks has created a solution for dynamic enforcing security policies and access management control Provides 4 key access management functions  Screening  Restricting  Inspecting  Enforcing

Verinier Edgewall Network Access Management Appliance

“Life is Beautiful”