Secure Mobility Mobile Connectivity with Network Integrity via SSL VPNs & Mobile Clients Raymond Cushman Territory Manager Great Lakes District.

Slides:



Advertisements
Similar presentations
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Advertisements

Encrypting Wireless Data with VPN Techniques
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
What is Wireless LAN? Mika Setälä Chairman, HiperLAN/2 Global Forum Marketing Working Group And what it is not!
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Secure Remote Access from Cyber Cafe Timothy Siu SunONE SE Manager
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
ISSA Presentation. Agenda Remote Access Evolution SSL VPN Drivers Why SSL VPNs Basic Deployment Security vs. IPSec The New Security Concerns Addressing.
Citrix Partner Update The Citrix Delivery Centre.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Confidential FullArmor Corp Platform for SaaS and mobile apps to remotely access, migrate, and sync Active Directory resources with the cloud ADanywhere.
Remote Access SSL VPN Stewart Duncan Technical Manager.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
Be there without going there. Microsoft Lync is an enterprise-ready, unified communications platform that connects users everywhere, providing a consistent,
© Aastra Aastra BluStar for PC High-Quality Audio and HD Video from Your Desktop.
SharePoint Portal Server 2003 JAMES WEIMHOLT WEIDER HAO JUAN TURCIOS BILL HUERTA BRANDON BROWN JAMES WEIMHOLT INTRODUCTION OVERVIEW IMPLEMENTATION CASE.
Barracuda Networks Steve Scheidegger Commercial Account Manager
General Presentation August Based out of the Netherlands 8 years of development Launched in May Sales offices in Los Angeles, Amsterdam, Hong.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Your storage on the ground; Your files in the cloud.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright (C) 2010 Elitecore Technologies Ltd. All rights reserved. Privacy Policy.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Leveraging Oracle Data for Web- Based Reporting Northern California Oracle Users Group May 2001.
Development of Mobile Applications Juan Fernando Arboleda Carlos Avendaño Juan David Gomez Medellín, Colombia South America.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
MIS3300_Team8 Service Aron Allen Angela Chong Cameron Sutherland Edment Thai Nakyung Kim.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study: Cisco VPN Client Cisco Information Technology May 19, 2004.
Name Company A Day in the Life… A Demonstration of Application Delivery.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Citrix Secure Gateway v1.1 Customer Presentation Aug 2002 Customer Presentation Aug 2002.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Introducing… Conferencing Manager. Agenda Citrix MetaFrame Conferencing Manager Solving business challenges Value to our channel Citrix MetaFrame Conferencing.
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
PI for the Enterprise How JEA’s Single PI Server Serves the Entire Company’s Real-time Data Needs Presented by: Robert Raesemann Sea Coast Diversities,
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
TOP 5 Reasons to Migrate IPSec VPN to SSL VPN. 1)Reduce remote access costs by eliminating client software installation, configuration, and maintenance;
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Case Study: Cisco VPN Client
Getting Connected to NGS while on the Road…
Barracuda SSL VPN 2012.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Virtual Private Networks
Virtual Private Networks (VPN)
Check Point Connectra NGX R60
Getting Connected to NGS while on the Road…
Implementing Client Security on Windows 2000 and Windows XP Level 150
Topic 12: Virtual Private Networks
Providing Teleworker Services
Presentation transcript:

Secure Mobility Mobile Connectivity with Network Integrity via SSL VPNs & Mobile Clients Raymond Cushman Territory Manager Great Lakes District

Secure Mobility

Millions ,400 1,200 1, SOURCE: Nokia, Mobile Voice Users Internet PC Users Mobile Internet Users Two Mega Trends: Mobility & the Internet

3GPP cdma2000 1xEV-DV cdma2000 1xEV-DO GSMTDMAGSM/GPRS 3G Phase 1 NetworksEvolved 3G Networks 2G First Steps to 3G WCDMA GSM/GPRS/EDGE 3GPP2 Open interface multiradio network All IP cdma2000 1xcdmaOne G-WCDMA PDC 900 million users 130 million users Inevitable Need for Data Speeds - Global Evolution to 3G Networks

Working on the Move Users want to choose Availability of devices and services drives need Any time, Anywhere Any content Conference calls, , intranet, applications Any device

The Problem: IT Organization Perspective Goal: Enable business advantage Satisfy users Meet business objectives How can we accommodate: all of the various device & network types? the numerous user profiles? How can we ensure network integrity? How can we keep business running? How can we maintain costs? How can we leverage current investments?

Remote Access Challenges Dial-up access is costly, hard to manage and doesn’t utilize the explosion of broadband links worldwide IPSec remote access VPNs are excellent, but can be a challenge to deploy and manage What about the large user base who rely on desktop systems at the office? How to best handle partners, suppliers and contractors? A new approach using a browser connected to the Internet to provide access Most enterprises have well-developed intranets and extranets Why not use the same technology that has driven e-commerce to provide access to enterprise data resources? Remote Access Annual Cost Analysis Source: Yankee Group, 2003

For large screens User and device level access control from any browser Ideal for employees, partners & contractors Detailed reporting Wired Public WiFi Secure access via SSL SSL Browser-based VPN Web enabled, & key client -server apps Nokia Mobile Connectivity User Solutions Device Type Benefits & Features VPN Client IPSec VPN’s Enable secure Client Server app remote access & eliminate costs of dial- up Cost savings with Nokia Wireless Accelerator Nokia Mobile VPN for Symbian Leverage existing IPSec infrastructure to extend secure remote access to Symbian devices Over the air secure service provisioning via Nokia SSM Wired WiFi, 3G & Accelerated GSM and GPRS with Nokia Wireless Accelerator Secure access via IPSec Wireless Cellular GSM Data, GPRS & 3G Secure access via IPSec Connectivity Type IPSec VPN’s Application Type Any IP Application

Nokia Secure Access System (NSAS) GroupWise Exchange Lotus Notes R TN3270 SSH TELNET FTP Fileshares Citrix Intranet Key Product Features: Client Integrity Scan Advanced Access Control Session Persistence Unit IP130 IP350 IP380 User License Total Cost $3,495 $6,495 $10,995 $23,795 $35,795 $54,995 Price includes HW/SW/SW Subscription Licenses are based on # of concurrent users Raymond Cushman NES - Territory Manager (248) DMZ Firewall Internet Secure Access System Mobile User PDA Home User

What have we learned Why are they so successful?  For the IT admin - ease of deployment (new installations in 1 or 2 hours on average)  For the end user - flexibility / mobility (everyone has multiple access devices these days, laptop, home PC, PDA)  For the Exec - increased productivity, rapid response to changes (several NSAS evals used for Executive travel access)  Rapid response for: Unplanned trips, Outages, Temporary Extranets, New Hires, New Apps Mobility is more than people working from home and a travelling sales force  ---> changing extranet / business partners, temporary connections  ---> intra-campus movement (employees aren't tied to their desks for and document retrieval)  --> PDAs and Mobile Terminals (a special case requiring Content Rendering)

What have we learned (cont) New Security Concerns:  With traditional VPNs, we implicitly trust the access device (corporate issued laptop with VPN client, AV, firewall, etc) and need only authenticate the user  With SSL VPNs, we need to examine the device (scan) and the user (authentication)  Authentication: cannot put another authentication obstacle between user and information so the gateway must use common authentication methods (Radius, LDAP, DigCerts, NTLM)  Potential problem: the security team is often responsible for authentication (LDAP for instance).  Device Scanning: the scan of the system needs to be under admin control (what to look for, and what to do with results)  Flexible Client Scanning vs APIs to specific (that is, very limited) firewall and AV vendors  Access Control Granularity vs. All-or-Nothing approach of other vendors

What have we learned (cont)  Session cleanup - what to do with sensitive data on non-corporate owned devices  Cache cleanup / wipers are best effort, leave recoverable data and do not work at all if session is not properly terminated  Encrypted containers - new and better approach; if the data remains, it is not readable  Split-Tunneling - this is browser based connection only, not a full LAN-like connection that can be hijacked, so it is difficult to see how the session could be exploited (assuming the Scan has determined that the device is trustworthy)  Admins still rely on trusting your authenticated users to not do stupid or malicious things when connected  SSL gateway concerns: since users are directly interacting with the device (unlike most firewalls)  Does it use exploitable CGI scripting, ActiveX controls?  Is the OS itself hardened?

What have we learned (cont) Concerns:  Scalability of SSL based session - hardware acceleration will be required, as is common for IPSec  Robustness - HA mechanisms are still being worked out  Device Agnostics - multiple browsers, multiple OS (MAC, Unix, Linux, not just Windows based)