Network Access Control 101 Securing the Critical Edge of Your Network.

Slides:



Advertisements
Similar presentations
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
City of Boroondara Mobile Device Management
Introducing the Mason Infotech BYOD Commercial Smart Solution Presented by Mark Powelll-Mason Infotech Ltd January 2013.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Ingram Micro:
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Work Better Together Work Better Together Bring Ideas to Life Bring Ideas to Life Use Office Anywhere Use Office Anywhere Collaboration Without Compromise.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Virtual Machine Security Summer 2013 Presented by: Rostislav Pogrebinsky.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
KASPERSKY ENDPOINT SECURITY FOR BUSINESS
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
It’s Not Your Father’s NAC: Next-generation NAC
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Natural id Markus Jakobsson SebastienTaveau The Case for Replacing Passwords with Biometrics validity.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
1 MIKE MARCELLIN VP PRODUCT MARKETING. THE NEW NETWORK ENABLES CLOUD SERVICES, SECURITY, MOBILITY AND CONTENT DELIVERY NETWORKS.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Adam Hall Technology Strategist Gavin Bennett Systems Engineer – Citrix NZ Session Code: SVR309.
W HAT DOES THIS MEAN FOR Y OUR TEAMS & SUPPLIERS? With all of the new technologies represented, it will be imperative that managers and transportation.
Desktop Virtualization Overview
Network Access Control 101 Securing the Critical Edge of Your Network.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Kevin Watson and Ammar Ammar IT Asset Visibility.
Workshifting Transform your business – empower your people.
Complete Cloud Security Anyone, anywhere, any app, any device.
Duke Heaton, Network Engineer, UVU
NAC 101 Transforming Network Security through Visibility, Control and Response Sanjit Shah, VP BD & Marketing Hello and welcome to today’s session on.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Network Access Control 101 Securing the Critical Edge of Your Network
BYOD: Short-term Gain Without Long-term Pain?
Security. Audit. Compliance
Introduction to Cisco Identity Services Engine (ISE)
Network Access Control 101 Securing the Critical Edge of Your Network
CMGT 582 Competitive Success-- snaptutorial.com
CMGT 582 STUDY Lessons in Excellence--cmgt582study.com.
CMGT 582 Education for Service-- snaptutorial.com
CMGT 582 Teaching Effectively-- snaptutorial.com
Network Access Control 101 Securing the Critical Edge of Your Network
Company Overview & Strategy
Understanding IDENTITY Assurance
Endpoint Security and Conditional Access
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

Network Access Control 101 Securing the Critical Edge of Your Network

Notice your network changing? # of devices on your network growing? % of devices are corporate issued? # of devices / user? % of devices that are mobile? # of guests and/or contractors?

Your Network is Changing Y OUR B USINESS U SERS S UPPLIERS P ARENT C OMPANY G UESTS P ARTNERS C ONSULTANTS BYOD I NTERNET O F T HINGS

Endpoints are Easy Targets for Hackers

Greater Attack Surface = Greater Risk 100% Managed 100% Context Corporate Less Managed Less Context BYOD

L EVERAGE I NDICATORS OF T RUST / RISK Bradford Networks L IVE I NVENTORY OF N ETWORK C ONNECTIONS A PPLIANCE / V IRTUAL / C LOUD D ELIVERY A NALYTICS / P LANNING / F ORENSICS R EAL -T IME E NFORCEMENT N ETWORK A CCESS P OLICIES

NAC 101: Live Inventory of Network Connections C ONNECT T IMES …. S ITE 2 S ITE N S ITE 1 OS/ A PPS C ONNECT P OINT VPNVPN D EVICE T YPE U SER & G ROUP

NAC 101: Flexible Network Access Policies D EVICE T YPES N ETWORK A CCESS T O I NFORMATION F INANCIAL A SSETS C REDIT C ARDS C RITICAL INFRASTRUCTURE H EALTHCARE R ECORDS L EGAL I NFORMATION I NTELLECTUAL P ROPERTY S TUDENT I NFORMATION U SERS & G ROUPS C ONNECT P OINTVPNVPN OS/ A PPS C ONNECT TIME

NAC 101: Dynamic Network Provisioning H EALTHCARE R ECORDS O NBOARDING P ORTAL G UEST A CCESS N O A CCESS W HO W HAT W HERE W HEN I NDICATOR OF T RUST

NAC 101: Endpoint Compliance IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access

NAC 101: Extensible Policy Engine R ISK ? R ESTRICT N ETWORK A CCESS T RUST ? G RANT N ETWORK A CCESS

I NDICATORS O F T RUST NAC 101: Leveraging Indicators of Trust/Risk I NDICATORS O F R ISK

NAC 101: Self-Service Registration

NAC 101 Historical Inventory of Network Connections N ETWORK & D EVICE I NVENTORY R EPORT D ISTRIBUTION D EVICE T REND REPORTS N ETWORK & E NDPOINT R ISK “B LACK B OX ” OF N ETWORK C ONNECTIONS

NAC 101: Secure the Critical Edge of Your Network CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management Safe Devices/Apps Trusted Users Safe Access

Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist