SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert.

Slides:



Advertisements
Similar presentations
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Advertisements

Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
Windows Defender Next Generation Anti-malware
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Security in Real Business
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
KASPERSKY SECURITY FOR STORAGE Product Launch Presentation Global B2B Product Marketing Teams.
Clinic Security and Policy Enforcement in Windows Server 2008.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Designing Active Directory for Security
Dell Connected Security Solutions Simplify & unify.
Implementing Network Access Protection
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Paul Stich CEO Mobile App Risk Management – Over 5 million mobile apps – Small customer – 300 employees = 13,800 apps – Enterprise customer – 100K employees.
Bluesocket vWLAN Overview. Its ALL about n……
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Security Alberta  Tim McCreight, CISO – Government of Alberta  Moderator: Moderator: Illena Armstrong, editor-in-chief, SC Magazine.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Network security Product Group 2 McAfee Network Security Platform.
Configuring Network Access Protection
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
© CounterSnipe – April 2015 TM CounterSnipe – Network Security Welcome Amar Rathore.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
System Center 2012 Configuration Manager Service Pack 1 Overview.
Small Business Solutions Copyright 2014 Trend Micro Inc.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
Kevin Watson and Ammar Ammar IT Asset Visibility.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
HCNA-Security Huawei Certified Network Associate Security (HCNA-Security) validates the basics of network security knowledge and skills to support the.
Blue Coat Cloud Continuum
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Cloud App Security vs. O365 Advanced Security Management
“Introduction to Azure Security Center”
100% Exam Passing Guarantee & Money Back Assurance
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Journey to Microsoft Secure Cloud
Network Access Control 101 Securing the Critical Edge of Your Network
Implementing Network Access Protection
Forefront Security ISA
Introduction to Cisco Identity Services Engine (ISE)
BOMGAR REMOTE SUPPORT Karl Lankford
2018 Real Cisco Dumps IT-Dumps
Network Access Control 101 Securing the Critical Edge of Your Network
Company Overview & Strategy
Borderless Networks Services Supported
HP Networking OpenFlow in Action
Active Directory Auditing Headaches (and How to Solve Them)
Check Point Connectra NGX R60
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Intel Active Management Technology
Presentation transcript:

SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert

Trustwave Network Access Control

Trustwave NAC Policy Components Network Access Control Match user identity with each endpoint on the network Seamless integration with existing credential stores Analyze every packet from every device Zero-day threat detection L2-L7 behavioral policy enforcement Measure health and compliance status of every endpoint on the network Robust reporting tracks all compliance data Flexible tiered enforcement

BYOD Trustwave NAC Policy Matrix

The Trustwave NAC Process Remediation Trustwave Policy Manager Authenticate Scan Authorize Discover Re-scan Detect Monitor Network Intelligence Enforce Pre-admission “Check on Connect” Post-admission “Continuous Threat Prevention”

Managed Enterprise NAC Architecture Remote Location 2 Remote Location 1 … Managed NAC Sensor Main Office/Campus Trustwave MSS SOC NAC Management Server

Trustwave NAC Summary Agentless −Requires no agent software −Works for every endpoint regardless of device type or operating system Infrastructure Independent −Works in every network −Requires no integration with network infrastructure for discovery or enforcement Virtually Inline −Fails open −Self-contained enforcement −No single point of failure −No latency

8 NAC Patents Awarded 2013 SC Magazine Best NAC Product Scored 9 /10 in Forrester NAC Market Overview Strongest Out-of-Band NAC Appliance in Forrester Wave Frost & Sullivan Global Award for Best Entrepreneurial NAC Company Info Security Products Guide Best Deployment Scenario Info Security Hot Companies Best Anti-Worm, Anti-Malware, SC Magazine/RSA Info Security Customer Trust Product Excellence Award Software Development magazine: four star product review Industry Recognition for Trustwave NAC

Trustwave Network Access Control