Network Access Control 101 Securing the Critical Edge of Your Network
Devices / Person
Internet of Things
Attack Surface is Growing and Changing Y OUR B USINESS S UPPLIERS P ARENT C OMPANY G UESTS P ARTNERS C ONSULTANTS BYOD I NTERNET O F T HINGS N O A GENTS U SERS
Endpoints are Easy Targets for Hackers
Continually Assess Risk of Every Endpoint About Bradford Networks Live Inventory of Network Connections Appliance / Virtual / Cloud Analytics & Forensics Network Access Policy Engine 1,000+ Customers 5 Star Rating from SC Magazine 30+ Countries Gartner MQ Visionary Consistent Mission for 15 Years
FirewallVPNIDS/IPSSIEMRouterSwitchWireless Access Point VisibilityControl Leverages the Network Infrastructure SNMP CLI SNMP CLI Radius SNMP Syslog API SNMP Syslog API Radius SNMP Syslog API SNMP CLI Radius
NAC 101: Extensible Policy Engine R ISK ? R ESTRICT N ETWORK A CCESS T RUST ? G RANT N ETWORK A CCESS
I NDICATORS O F T RUST NAC 101: Leveraging Indicators of Trust/Risk I NDICATORS O F R ISK
NAC 101: Live Inventory of Network Connections W HEN …. S ITE 2 S ITE N S ITE 1 W HERE VPNVPN W HO W HAT
NAC 101: Dynamic Network Provisioning H EALTHCARE R ECORDS O NBOARDING P ORTAL G UEST A CCESS N O A CCESS W HO W HAT W HERE W HEN I NDICATOR OF T RUST
NAC 101: Endpoint Compliance / Network Segmentation IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access
NAC 101: Self-Service Registration
NAC 101: Secure the Critical Edge of Your Network CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management Safe Devices/Apps Trusted Users Safe Access
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper Network Security Best Practices