Download presentation
Presentation is loading. Please wait.
Published byBerniece Marshall Modified over 9 years ago
1
Network Access Control 101 Securing the Critical Edge of Your Network
2
Devices / Person
3
Internet of Things
4
Attack Surface is Growing and Changing Y OUR B USINESS S UPPLIERS P ARENT C OMPANY G UESTS P ARTNERS C ONSULTANTS BYOD I NTERNET O F T HINGS N O A GENTS U SERS
5
Endpoints are Easy Targets for Hackers
6
Continually Assess Risk of Every Endpoint About Bradford Networks Live Inventory of Network Connections Appliance / Virtual / Cloud Analytics & Forensics Network Access Policy Engine 1,000+ Customers 5 Star Rating from SC Magazine 30+ Countries Gartner MQ Visionary Consistent Mission for 15 Years
7
FirewallVPNIDS/IPSSIEMRouterSwitchWireless Access Point VisibilityControl Leverages the Network Infrastructure SNMP CLI SNMP CLI Radius SNMP Syslog API SNMP Syslog API Radius SNMP Syslog API SNMP CLI Radius
8
NAC 101: Extensible Policy Engine R ISK ? R ESTRICT N ETWORK A CCESS T RUST ? G RANT N ETWORK A CCESS
9
I NDICATORS O F T RUST NAC 101: Leveraging Indicators of Trust/Risk I NDICATORS O F R ISK
10
NAC 101: Live Inventory of Network Connections W HEN …. S ITE 2 S ITE N S ITE 1 W HERE VPNVPN W HO W HAT
11
NAC 101: Dynamic Network Provisioning H EALTHCARE R ECORDS O NBOARDING P ORTAL G UEST A CCESS N O A CCESS W HO W HAT W HERE W HEN I NDICATOR OF T RUST
12
NAC 101: Endpoint Compliance / Network Segmentation IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access
13
NAC 101: Self-Service Registration
14
NAC 101: Secure the Critical Edge of Your Network CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management Safe Devices/Apps Trusted Users Safe Access
15
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper Network Security Best Practices
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.