Download presentation
Presentation is loading. Please wait.
Published byRandi Lauritzen Modified over 6 years ago
1
Network Access Control 101 Securing the Critical Edge of Your Network
2
Notice your network changing?
# of devices on your network growing? % of devices are corporate issued? # of devices / user? % of devices that are mobile? # of guests and/or contractors?
3
Your Network is Changing
Parent Company Guests Suppliers Users BYOD Internet Of Things Partners Your Business Consultants
4
Endpoints are Easy Targets for Hackers
5
Greater Attack Surface = Greater Risk
Even Less Managed Even Less Context Internet Of Things Drop in % Managed Endpoints Exposure Risk Less Managed Less Context BYOD Corporate 4 x Attack Surface 100% Managed 100% Context
6
Bradford Networks Live Inventory of Network Connections
Leverage Indicators of Trust/risk Network Access Policies Analytics / Planning / Forensics Real-Time Enforcement Appliance / Virtual / Cloud Delivery
7
NAC 101: Live Inventory of Network Connections
Point VPN User & Group Device Type OS/ Apps Connect Times Site 1 Inventory of Network Connections Live Site 2 …. Site N
8
NAC 101: Flexible Network Access Policies
To Information Users & Groups Device Types OS/ Apps Connect Point VPN Connect time Financial Assets Credit Cards Critical infrastructure Healthcare Records Legal Information Intellectual Property Student Information
9
NAC 101: Dynamic Network Provisioning
Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access
10
NAC 101: Endpoint Compliance
Assign Network Access Assess Risk Identify Device Unrestricted Access Restricted Access Identify User Guest Access No Access
11
NAC 101: Extensible Policy Engine
Risk? Restrict Network Access Trust? Grant Network Access Network Access Policies Inventory of Network Connections Live / Historical
12
NAC 101: Leveraging Indicators of Trust/Risk
Network Access Policies Inventory of Network Connections Live / Historical
13
NAC 101: Self-Service Registration
14
NAC 101 Historical Inventory of Network Connections
Forensics Planning Network & Device Inventory “Black Box” of Network Connections Analytics Historical Inventory of Network Connections Device Trend reports Network & Endpoint Risk Report Distribution
15
NAC 101: Secure the Critical Edge of Your Network
IT Management Safe Devices/Apps Trusted Users Safe Access Users Access They Need Flexibility They Want Privacy They Deserve CxO Embrace BYOD Balance Risk/Cost Maintain Compliance 15
16
Questions/Request Slides
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.