Network Access Control 101 Securing the Critical Edge of Your Network
Notice your network changing? # of devices on your network growing? % of devices are corporate issued? # of devices / user? % of devices that are mobile? # of guests and/or contractors?
Your Network is Changing Y OUR B USINESS U SERS S UPPLIERS P ARENT C OMPANY G UESTS P ARTNERS C ONSULTANTS BYOD I NTERNET O F T HINGS
Endpoints are Easy Targets for Hackers
Greater Attack Surface = Greater Risk 100% Managed 100% Context Corporate Less Managed Less Context BYOD
L EVERAGE I NDICATORS OF T RUST / RISK Bradford Networks L IVE I NVENTORY OF N ETWORK C ONNECTIONS A PPLIANCE / V IRTUAL / C LOUD D ELIVERY A NALYTICS / P LANNING / F ORENSICS R EAL -T IME E NFORCEMENT N ETWORK A CCESS P OLICIES
NAC 101: Live Inventory of Network Connections C ONNECT T IMES …. S ITE 2 S ITE N S ITE 1 OS/ A PPS C ONNECT P OINT VPNVPN D EVICE T YPE U SER & G ROUP
NAC 101: Flexible Network Access Policies D EVICE T YPES N ETWORK A CCESS T O I NFORMATION F INANCIAL A SSETS C REDIT C ARDS C RITICAL INFRASTRUCTURE H EALTHCARE R ECORDS L EGAL I NFORMATION I NTELLECTUAL P ROPERTY S TUDENT I NFORMATION U SERS & G ROUPS C ONNECT P OINTVPNVPN OS/ A PPS C ONNECT TIME
NAC 101: Dynamic Network Provisioning H EALTHCARE R ECORDS O NBOARDING P ORTAL G UEST A CCESS N O A CCESS W HO W HAT W HERE W HEN I NDICATOR OF T RUST
NAC 101: Endpoint Compliance IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access
NAC 101: Extensible Policy Engine R ISK ? R ESTRICT N ETWORK A CCESS T RUST ? G RANT N ETWORK A CCESS
I NDICATORS O F T RUST NAC 101: Leveraging Indicators of Trust/Risk I NDICATORS O F R ISK
NAC 101: Self-Service Registration
NAC 101 Historical Inventory of Network Connections N ETWORK & D EVICE I NVENTORY R EPORT D ISTRIBUTION D EVICE T REND REPORTS N ETWORK & E NDPOINT R ISK “B LACK B OX ” OF N ETWORK C ONNECTIONS
NAC 101: Secure the Critical Edge of Your Network CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management Safe Devices/Apps Trusted Users Safe Access
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist