network access control 101 securing the critical edge of your network

16
Network Access Control 101 Securing the Critical Edge of Your Network

Upload: eugene-poole

Post on 24-Dec-2015

220 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Network Access Control 101 Securing the Critical Edge of Your Network

Network Access Control 101Securing the Critical Edge of Your Network

Page 2: Network Access Control 101 Securing the Critical Edge of Your Network

Notice your network changing?

• # of devices on your network growing?

• % of devices are corporate issued?

• # of devices / user?

• % of devices that are mobile?

• # of guests and/or contractors?

Page 3: Network Access Control 101 Securing the Critical Edge of Your Network

Your Network is Changing

YOURBUSINESS

USERSSUPPLIERS

PARENTCOMPANY

GUESTS

PARTNERSCONSULTANTS

BYOD

INTERNETOF THINGS

Page 4: Network Access Control 101 Securing the Critical Edge of Your Network

Endpoints are Easy Targets for Hackers

Page 5: Network Access Control 101 Securing the Critical Edge of Your Network

Greater Attack Surface = Greater Risk

100% Managed100% Context

Corporate

Less ManagedLess Context

BYOD

4 x Attack Surface

Even Less ManagedEven Less Context

InternetOf Things

Drop in% Managed

Endpoints

ExposureRisk

Page 6: Network Access Control 101 Securing the Critical Edge of Your Network

LEVERAGE INDICATORS OF TRUST/RISK

Bradford Networks

LIVE INVENTORY OF NETWORK CONNECTIONS

APPLIANCE / VIRTUAL / CLOUD DELIVERY

ANALYTICS / PLANNING / FORENSICS

REAL-TIME ENFORCEMENT

NETWORK ACCESS POLICIES

Page 7: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101:Live Inventory of Network Connections

CONNECTTIMES

….

SITE 2

SITE N

SITE 1

OS/APPS

CONNECTPOINT

VPN

DEVICETYPE

USER & GROUP

Page 8: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101:Flexible Network Access Policies

DEVICETYPES

NETWORK ACCESSTO INFORMATION

FINANCIALASSETS

CREDITCARDS

CRITICALINFRASTRUCTURE

HEALTHCARERECORDS

LEGALINFORMATION

INTELLECTUALPROPERTY

STUDENTINFORMATION

USERS &GROUPS

CONNECTPOINT

VPN

OS/APPS

CONNECTTIME

Page 9: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101: Dynamic Network Provisioning

HEALTHCARERECORDS

ONBOARDINGPORTAL

GUESTACCESS

NOACCESS

WHO WHAT WHERE WHENINDICATOR OFTRUST

Page 10: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101:Endpoint Compliance

IdentifyUser

AssignNetwork Access

AssessRisk

IdentifyDevice

NoAccess

GuestAccess

RestrictedAccess

UnrestrictedAccess

Page 11: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101:Extensible Policy Engine

RISK?RESTRICT NETWORK ACCESS

TRUST?GRANT NETWORK ACCESS

Page 12: Network Access Control 101 Securing the Critical Edge of Your Network

INDICATORS OF

TRUST

NAC 101:Leveraging Indicators of Trust/Risk

INDICATORS OF

RISK

Page 13: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101:Self-Service Registration

Page 14: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101Historical Inventory of Network Connections

NETWORK & DEVICEINVENTORY

REPORTDISTRIBUTION

DEVICE TRENDREPORTS NETWORK &

ENDPOINT RISK

“BLACK BOX” OFNETWORK CONNECTIONS

Page 15: Network Access Control 101 Securing the Critical Edge of Your Network

NAC 101: Secure the Critical Edge of Your Network

CxO

• Embrace BYOD

• Balance Risk/Cost

• Maintain Compliance

Users

• Access They Need

• Flexibility They Want

• Privacy They Deserve

IT Management

• Safe Devices/Apps

• Trusted Users

• Safe Access

Page 16: Network Access Control 101 Securing the Critical Edge of Your Network

Taking Action …

Questions/Request Slides

NAC/BYOD Whitepaper

NAC Checklist