All Rights Reserved © Alcatel-Lucent 2010 1 | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.

Slides:



Advertisements
Similar presentations
OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Brocade VDX 6746 switch module for Hitachi Cb500
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
All Rights Reserved © Alcatel-Lucent 2010 Jean-François Rey – Alcatel-Lucent offer manager October 2010 Leverage SIP for a smooth transformation plan to.
All Rights Reserved © Alcatel-Lucent | Enterprise mobility | 2010 Laurent Bouchoucha October, 2010 Seamless mobility in a secure and controlled.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Unified Logs and Reporting for Hybrid Centralized Management
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
Wireless Network Security
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Presentation Title | 2010 Gianvero Durly, Craig Walker Product Marketing October 2010 Drive Business Performance.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
All Rights Reserved © Alcatel-Lucent | Presentation Title | 2010 Phil Morrison October, 2010 Improving Business Efficiencies with Unified Management.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Enhanced Collaboration and other benefits of Sharepoint Technologies Kern Sutton Business Productivity Group Microsoft Corporation.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Unified Student-Centric Authentication and Authorization Nathan Wilder Special Assistant - Technology Office of the CIO.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Tim Vander Kooi Systems
Implementing Network Access Protection
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Module 8: Configuring Network Access Protection
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Bluesocket vWLAN Overview. Its ALL about n……
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Configuring Network Access Protection
Chapter 6: Securing the Local Area Network
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
7.4 Update - ISE Session.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Hybrid Management and Security
Implementing Network Access Protection
Forefront Security ISA
Introduction to Cisco Identity Services Engine (ISE)
BOMGAR REMOTE SUPPORT Karl Lankford
2018 Real Cisco Dumps IT-Dumps
Free Dumps With Real Exam Question Answers | Free Update
Tailor slide to customer industry/pain points
Check Point Connectra NGX R60
Wireless Network Security
Microsoft Data Insights Summit
What’s New In WatchGuard Wi-Fi Cloud v8.6
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access Control Fabrice Lieuvin Director, Business Development EMEA – Data & Security Division

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | Enterprise strategy 2.SafeNAC 3.Conclusion

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Enterprise strategy 1

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Alcatel-Lucent Enterprise Network Infrastructure SIP Conversation Engine  choice  User Centric Experience Contact Center & Customer Service applications Communication & Collaboration applications On premisesin Cloud Application Fluent Network Provides Application Fluent Networks that uniquely enable a high quality user experience with reduced operations complexity

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Introducing Alcatel-Lucent’s Application Fluent Network Operations Control Convergence Without Complexity Architecture A simplified, optimized and resilient network with market-class leading capacity and built-in security Control Provides unique dynamic tuning of network performance to ensure high quality real-time application delivery Operations Reduced complexity through automation, consistency of features, and integrated troubleshooting tools

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 SafeNAC 2

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 PRODUCTIVITY ENHANCED DEPLOYMENT IS SIMPLE THREAT PROTECTION ENTERPRISE IS SECURE NAC Challenges Endpoints are Compliant Malware is Contained No Rogue Endpoints Continuous Surveillance Secured Guest Access Secured Partner Access Secured Contractor Access Services are Available Supports Existing Infrastructure Multi-Vendor Networks Multiple Endpoint platforms Multiple Authentication Methods Reduced Help Desk Costs Reduced Management Costs Enterprise is Compliant Data is Protected 4. KNOWLEDGE 3.PROCESS 1. NETWORK2.PEOPLE

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Introducing Safe NAC Key Features Access Control for Guests, LAN & Wireless Endpoint Malware Protection Verify OS and End Point Configuration Controls Automatic Remediation Role-based Post Admission Control Audit Reports for Compliance Differentiation Non Disruptive Multi-vendor Deployment Support for Multi-authentication, Multi-endpoint environments Integration with Multiple Network Elements Provides Reduced Cost Centralized Management Trusted Dynamic Enterprise

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Key Benefits  End-to-End LAN/WLAN Security solution  Role Based Access policy tailored to your business  Can be deployed on existing infrastructure  Simple deployment scenarios  Cost effective, based on open standards Authentication, Authorization, Accounting Works with Existing Directory Services Host Integrity Check Clientless and Light Client Based Role Based Access map user’s profile to security policies Quarantine and Remediation Isolate and fix problematic users Anomaly Detection–IPS/IDS Stop malwares with behavioral detection Zero-day protection, no signature updates Monitoring/Compliance Unique ability to log users activities and monitor access to sensitive information Safe NAC: User Aware Network Security Solution

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Safe NAC: Solution’s components

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 OmniSwitch – Secure LAN Switches Embedded Network Access Control  Granular per-user profiling (User Network Profiles) Host Integrity Policy Enforcement  Tight integration with CyberGatekeeper Broad Range of Security Features  Port Mapping, Learned Port Security, DHCP Snooping, ARP Poisoning Detection,  Traffic Anomaly Detection – Threat mitigations

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Access Guardian Key Advantages  Devices and Users Authentication Identifies devices based on location and or 802.1x standard Bann or quarantine network access when not authenticated  Integrated Guest Access Web Portal Visitors can be authenticated via the integrated Captive Portal No limitation of number of users or Works seamlessly with connected WiFi access points  User Network Profile Simplifies Network Access Management Roles and profiles assigned to users during authentication Profiles include VLAN, ACL, QOS and Mobility Parameters  Verify Endpoint Compliance Before Network Access Policy enforcement is performed by the OmniSwitch Compliance enforcement is independent of authentication  Stronger Edge Security Integrated automatic Traffic Anomalies Detection based on traffic behavior Simple Access Control List and Quarantine Management

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 OmniSwitch and 8950 AAA Process Group Mobility VLAN ID UNP Captive Portal 8950 AAA eDIR / LDAP Other Radius Guests 802.1x Yes No Fail Group Mobility VLAN ID UNP Group Mobility VLAN ID UNP Group Mobility VLAN ID UNP Quarantine Fail Supplicant Managed Users Access Policy Parameters are pushed to the OmniSwitch Bandwidth enforcement and Anomaly Detection

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Safe NAC and Compliance Enforcement Scenario 802.1x User Regular LAN User Guest Remediation Server(s) Production Network 1 Employee, contractor or guest connects to the network OmniSwitch provides authentication and identifies user profile. It checks if HIC check is needed for this user. (802.1x, MAC, captive portal) OmniSwitch redirects traffic to the CyberGatekeeper Policy Server and the remediation servers. CyberGatekeeper policy server receives HIC report from CyberGatekeeper Agent and informs the OnmiSwitch if the device has passed or failed. If HIC passed, OmniSwitch selectively allows device traffic to production network following policy in user profile. If HIC Failed, OmniSwitch restricts traffic to remediation network only CyberGatekeeper Policy Server 2 Alcatel-Lucent OmniSwitch 34 Resident or on-demand agent Continuous surveillance AAA + Directory

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Conclusion 3

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 User Centric Security Allowing Flexible Deployments throughout multiple environments

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Why Alcatel-Lucent? Comprehensiveness Innovation Flexibility

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Evaluation of this session A

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 Evaluation of this session  Please take 2 minutes to fill out the evaluation form, distributed to you by the speaker  Please fill out as title of this presentation: « Safe NAC»  Submit the form when leaving the room or put it in one of the boxes that you find everywhere in the venue THANK YOU

All Rights Reserved © Alcatel-Lucent | Safe NAC Solution - DET | 2010 User Centric Security Allowing Flexible Deployments throughout multiple environments