We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAyanna Bunnell
Modified over 2 years ago
© 2013 ForeScout Technologies, Page 1 Scott Gordon (CISSP-ISSMP) Vice President – ForeScout Technologies Considerations To Secure Enterprise Mobility / BYOD March, 2013
© 2013 ForeScout Technologies, Page 2 About ForeScout ForeScout is the leading global provider of real-time network security solutions for Global 2000 enterprises and government organizations. Innovative Technologies Real-time visibility and control Leader ranking by Gartner, Forrester and Frost & Sullivan… Global Deployments Financial, healthcare, education, manufacturing and government… Enterprise implementations (> 250k endpoints) At a Glance Founded in 2000 HQ in Cupertino, CA Dominant independent vendor of Network Access Control (NAC) #2 market share, behind Cisco BYOD, endpoint compliance and cloud fueling growth *Magic Quadrant for Network Access Control, December 2012, Gartner Inc. **Forrester Wave Network Access Control, Q2-2011, Forrester Research ***Analysis of the NAC Market, February 2012, Frost & Sullivan
© 2013 ForeScout Technologies, Page 3 Enterprise mobility is the use of wireless, mobile and consumer devices, as well as mobile and cloud-based applications to enable access to corporate resources. Bring Your Own Device (BYOD) strategy is the extent that an IT organization prohibits, tolerates, supports or embraces the use of personal mobile devices at work and the controls to enforce such policy. Framing Enterprise Mobility and IT Consumerization / BYOD Risks Data loss Lost phone or laptop Unauthorized access Compromised system Unknown data protection Malware Phishing, access, mobile/app Compliance Rogue devices, unauthorized apps, inconsistent policy Risks Data loss Lost phone or laptop Unauthorized access Compromised system Unknown data protection Malware Phishing, access, mobile/app Compliance Rogue devices, unauthorized apps, inconsistent policy Challenge Proliferation of mobile devices on corporate networks impacts security Consumers are setting the rules with personal and mobile device and application use IT teams need visibility and control; user, device, application, data and network Challenge Proliferation of mobile devices on corporate networks impacts security Consumers are setting the rules with personal and mobile device and application use IT teams need visibility and control; user, device, application, data and network
© 2013 ForeScout Technologies, Page 4 Market Research – Mobile Security Product Requirements Generally, virtually all respondents rate all of these MDM features as being important oressential (90% or higher). Essential features of network access control andunified policy management are unavailable from MDM solutions. Boston Research Group, ForeScout Sponsored Mobile Security Study, 2012 Network Access Control Security Posture Security Management Software Management Unified Policy Management Inventory Management
© 2013 ForeScout Technologies, Page 5 1. Form a committee 2. Gather data 3. Identify use cases 4. Formulate policies –Which corporate applications? –Which users? –How will data be secured? –Who will be responsible for BYOD support? –What happens if the device is lost or stolen? –How will the endpoint device be updated? –Acceptable use policies? Framework: Securing BYOD Implementation
© 2013 ForeScout Technologies, Page 6 5. Decide how to enforce policies –Network controls? –Device controls? –Data controls? –App controls? 6. Build a project plan –Device enrollment –Remote device management? –Cloud storage? –Wipe devices when employees are terminated? 7. Evaluate solutions –Ease of implementation? –Cost? –Security? –Usability? Framework: Securing BYOD Implementation
© 2013 ForeScout Technologies, Page 7 1. Form a committee 2. Gather data 3. Identify use cases 4. Formulate policies 5. Decide how to enforce policies 6. Build a project plan 7. Evaluate solutions 8. Implement solutions –Network controls? –Device controls? –Data controls? –App controls? Framework: Securing BYOD Implementation
© 2013 ForeScout Technologies, Page 8 1. Form a committee 2. Gather data 3. Identify use cases 4. Formulate policies 5. Decide how to enforce policies 6. Build a project plan 7. Evaluate solutions 8. Implement solutions Framework: Securing BYOD Implementation
© 2013 ForeScout Technologies, Page 9 Enterprise Mobility Control Characteristics NAC is Fundamental to Secure BYOD/CYOD CHARACTERISTICS APPROACH Block all personal devices Very secure! Career limiting… Manage all personal devices (MDM) Good security at the device level Phones/tables… not Win & Macs Separate management console Restrict the data (VDI) Strong data protection Varying user experience Not for the road warrior Control apps (MEAM, MAW) Secure the app and data Must be used with other controls Control the network (NAC) Foundational, simple, real-time coverage Network-centric visibility and control
© 2013 ForeScout Technologies, Page 10 CounterACT: Continuous Monitoring & Remediation Proven Platform for Real-time Visibility and Automated Control Port-based Enforcement [With or without 802.1x] Natively or with 3 rd party Integration SIEM, MDM Identity, HBSS Complete Visibility Complete Visibility Enforcement Remediation System Integration System Integration Endpoint Authenticate & Inspect Device Discovery, Profiling [HW/SW USER LOC...] Multi-factor, Complete, Clientless Interrogation Continuous Monitoring
© 2013 ForeScout Technologies, Page 11 CounterACT: Continuous Monitoring & Remediation See Grant Fix Protect Real-time Network Asset Intelligence Device type owner, login, location Applications, security profile CRM Web Guest User Sales Policy-based Controls Grant access, register guests Limit or deny access Automated Enforcement Remediate OS, configuration, security agents Start/stop applications, disable peripherals Block worms, zero-day attacks, unwanted apps Phased-in, manual or fully automated X
© 2013 ForeScout Technologies, Page 12 What is Mobile Device Management The Essentials Device enrollment OTA configuration Security policy management Real-time reporting Remote lock, wipe, selective wipe Self-service portal Enterprise App portal Advanced Management access controls Application management Document management Certificate management Profile lock-down Corporate directory integration Geo sensing PII Protection Event-based Security & Compliance Device Enrollment, Acceptable Use Corp App Storefront MDM Actions
© 2013 ForeScout Technologies, Page 13 NAC+MDM Synergies: 1+1=3 Unify visibility, compliance and access control NAC focus is network MDM focus is mobile device MDM AloneNAC AloneNAC+MDM VisibilityFull info on managed only. Basic OS info on all devices Complete Access ControlFor managed and only Partial (Missing endpoint info) Complete DeploymentPre-reg agentNetwork-based, Automated Complete EnforcementPolling rateOn network accessComplete Network controlNoYesComplete Root detectionOn profile checkOn network accessComplete
© 2013 ForeScout Technologies, Page 14 ForeScout CounterACT
© 2013 ForeScout Technologies, Page 15 Unified Visibility and Control Security operators gain greater visibility and control
© 2013 ForeScout Technologies, Page 16 Easy to use and deploy with Low TCO Hybrid 802.1X/Agentless approach; works within existing/legacy environment Easy, centralized administration; high availability, scalable, non-disruptive Real-time situational awareness All users, devices, applications - infrastructure agnostic Wired, wireless, managed, rogue, VMs, PC, mobile, embedded Flexible, Integrated Mobile Security Value of NAC with MDM device security ForeScout: broadest integration with leading MDM vendors Rapid results and time-to-value Extensible templates and controls with robust SIEM, HBSS, CMDB, MDM and directory integration ForeScout CounterACT Advantages
© 2013 ForeScout Technologies, Page 17 Thank You ** The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. ***Frost & Sullivan chart from 2012 market study Analysis of the Network Access Control Market: Evolving Business Practices and Technologies Rejuvenate Market Growth Base year 2011, n-20 *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service ]depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
© 2013 ForeScout Technologies, Page 1 © 2014 ForeScout Technologies, Page 1.
My Sites (2003) Blogs & Wikis (2007) Kits (2008+)
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
“HP has best-in-class capabilities across the board.” “HP’s functional testing solution…turned in the best scores in four of our five major evaluation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
IBM Software Group | WebSphere software 1 Summary of Forrester Wave Forrester Ranks IBM as a Leader in Both B2B and B2C E-Commerce B2BB2C The Forrester.
Teradata Overview. Teradata Highlights Teradata Corporation >Global Leader in Enterprise Data Warehousing and Analytics –EDW/ADW Database Technology –Analytic.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
© 2012 ForeScout Technologies, Page 1 Toni Buhrke, MBA, CISSP - Senior Security Solutions Architect Addressing the BYOD Challenge.
Gartner Magic Quadrants HP named a leader in Solid State and General-Purpose Disk Arrays © Copyright 2015 Hewlett-Packard Development Company, L.P. The.
© 2012 IBM Corporation IBM Endpoint Manager for Mobile Devices Mobile Device Management.
Empowering People-centric IT Speaker name 00/00/0000.
February 2015 Andrew Noonan, SE ForeScout. © 2014 ForeScout Technologies, Page 2 Strong FoundationMarket LeadershipEnterprise Deployments #1#1 In business.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Availability for the modern datacenter. The Era of the “Always-On Business” ™
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
Integrated Marketing Solution. Agenda Quick Introduction Integrated Marketing Solution Demo Summary Questions PRESENTATION.
Empowering People-centric IT User and Device Management Access and Information Protection Microsoft Virtual Desktop Infrastructure.
Microsoft Confidential2 3 Paul Hamerman, China Martens, Forrester Research Inc., May 2011 ”Microsoft Commits to ERP in the Cloud” 4 Product-centric.
Empowering people-centric IT Patrick Rogers May 29, 2014.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
(C) 2010, Aruba Networks Inc. CONFIDENTIAL Securing The Network EDGE December 2010.
© 2012 ForeScout Technologies, Page 1 Bob Reny, Sr. Systems Engineer Do you know NAC? Data Connectors - Vancouver 4/25/2013.
2 Industry trends and challenges Windows Server 2012: Modern workstyle, enabled Access from virtually anywhere, any device Full Windows experience.
1. 2 Oracle + Hyperion Integrated Enterprise Performance Management System Provides industry’s first EPM System Align operational intelligence with strategy:
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Private vs. Public: What’s Your Risk? San Diego’s 3 rd Annual Cloud Computing Conference September 22, 2011.
Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Secure. Everywhere. ©2012 Zscaler, Inc. All rights reserved. Enabling business beyond the.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
© 2014 IBM Corporation Introduction to Cognos Business Intelligence.
Enable Bring Your Own Device with SCCM 2012 David Caddick Solutions Architect, Quest Software WCL315.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
| © 2013 Axway | All rights reserved. 1 Govern the Flow of Data: Moving from Chaos to Control Steve Jordan Director, Industry Marketing.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Copyright © 2015, SAS Institute Inc. All rights reserved. LOWERING THE ENTRY POINT TO GETTING GOING WITH HADOOP AND OBTAINING BUSINESS VALUE.
Copyright © 2006, SAS Institute Inc. All rights reserved. SAS® Data Integration Solution Gary Gray, Solutions Specialist.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
The System Center Family Microsoft. Mobile Device Manager 2008.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
© 2017 SlidePlayer.com Inc. All rights reserved.