Download presentation
Presentation is loading. Please wait.
Published byPamela Grant Modified over 6 years ago
1
Network Access Control 101 Securing the Critical Edge of Your Network
2
Devices / Person
3
Internet of Things
4
Attack Surface is Growing and Changing
Parent Company Guests Suppliers Users No Agents BYOD Internet Of Things Partners Your Business Consultants
5
Endpoints are Easy Targets for Hackers
6
About Bradford Networks
Continually Assess Risk of Every Endpoint 1,000+ Customers 30+ Countries Live Inventory of Network Connections Network Access Policy Engine Gartner MQ Visionary 5 Star Rating from SC Magazine Analytics & Forensics Consistent Mission for 15 Years Appliance / Virtual / Cloud
7
Leverages the Network Infrastructure
Visibility Control SNMP Syslog API Radius SNMP Syslog API SNMP Syslog API SNMP CLI Radius SNMP CLI Radius SNMP CLI Firewall VPN IDS/IPS SIEM Switch Router Wireless Access Point 7
8
NAC 101: Extensible Policy Engine
Risk? Restrict Network Access Trust? Grant Network Access Network Access Policies Inventory of Network Connections Live / Historical
9
NAC 101: Leveraging Indicators of Trust/Risk
Network Access Policies Inventory of Network Connections Live / Historical
10
NAC 101: Live Inventory of Network Connections
Where VPN Who What When Site 1 Inventory of Network Connections Live Site 2 …. Site N
11
NAC 101: Dynamic Network Provisioning
Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access
12
NAC 101: Endpoint Compliance / Network Segmentation
Assign Network Access Assess Risk Identify Device Unrestricted Access Restricted Access Identify User Guest Access No Access
13
NAC 101: Self-Service Registration
14
NAC 101: Secure the Critical Edge of Your Network
IT Management Safe Devices/Apps Trusted Users Safe Access Users Access They Need Flexibility They Want Privacy They Deserve CxO Embrace BYOD Balance Risk/Cost Maintain Compliance 14
15
Questions/Request Slides
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper Network Security Best Practices
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.