We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byShea Ganter
Modified about 1 year ago
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks
© 2012 Bradford Networks. All rights reserved. Why We Need to Care About BYOD
© 2012 Bradford Networks. All rights reserved. We Encourage Bringing Your Own Dog to Work Bring Your Own Dog
© 2012 Bradford Networks. All rights reserved. App Stores Are Really Safe Places to get Apps
© 2012 Bradford Networks. All rights reserved. Social Media Tells Me BYOD is Trending
© 2012 Bradford Networks. All rights reserved. We’ve Deployed Our Best Personal Firewall
© 2012 Bradford Networks. All rights reserved. CEO Won an iPad at Book Club … 7
© 2012 Bradford Networks. All rights reserved. Containing the Risk of a Cyber Threat Data Consolidation Data Exfiltration Data Exfiltration Internal Network Scan Internal Network Scan Phishing on Device Phishing on Device Device Compromised Attack Surface is Multiplying With Every New Device
© 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Consistent UnmanagedManaged Diverse User DownloadedCorp Push RestrictedFull Access Risk EmergingMature Configuration Settings User’s Privacy Endpoint Protection Non-Standard Devices Unknown Apps
© 2012 Bradford Networks. All rights reserved. Network Security Gap / Blindspots NAC is now one of the key mechanisms for mitigating the risks of consumerization (BYOD) Gartner Strategic Road Map for Network Access Control Enable BYOD 60% Know The Devices 9%
© 2012 Bradford Networks. All rights reserved. Gartner’s Best Practices to Address BYOD 11
© 2012 Bradford Networks. All rights reserved. 3 Phases of Network Access Control Employee Endpoint Compliance Guest Networking Consumerization BYOD Corp Device Guest Device Hybrid Devices GuestHybrid Users
© 2012 Bradford Networks. All rights reserved. BYOD Maturity Roadmap BlockBlock DisregardDisregard EmbraceEmbrace Visibility Automation
© 2012 Bradford Networks. All rights reserved. Who’s Responsible for Onboarding Devices? CIO Wired/Wireless Network Administration Wired/Wireless Network Administration Endpoint Administration Endpoint Administration IT Strategy & Architecture Network Operations Center VP of Infrastructure App/Service Administration App/Service Administration Help Desk / IT Support Help Desk / IT Support Server/DB Administration Server/DB Administration Project Management Project Management Application Development Bus Unit General Mgr Bus Analyst / IT Liaison Bus Analyst / IT Liaison End Users Business Line Management Bus Process Monitoring & Operations Application QA/Test Security Operations Center Incident Response / Forensics Identify/Access Management CISO Vulnerability Assessment CSO Security Engineering Security Engineering Director of Security Policy Awareness and Administration Policy Awareness and Administration Compliance / Risk Officer Governance, Risk, Compliance Audit and Reporting ComplianceSecurityOperationsBusiness Exec VP Mgr Staff
© 2012 Bradford Networks. All rights reserved. 12 Years of Efficient Operations Only $15M Invested Cash Flow Positive About Bradford Networks Operating Efficiency Millions of devices under management 94% Maintenance Renewal 900 Global Customers Designed to manage student-owned devices for large campus networks Healthcare, Financial, Retail, Utilities, … Inspired by EDU Gartner Visionary Forrester Leader SC Magazine Best Buy Rating Pioneer/Leader in Network Access Control Physical / Virtual Appliance Cloud/SaaS Pre-Connect Assessments Most Scalable and Secure Solution
© 2012 Bradford Networks. All rights reserved. 10 Years of BYOD Experience 900 Global Customers Inspired by EDU Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution About Bradford Networks NETWORKSENTRY
© 2012 Bradford Networks. All rights reserved. Network Edge Visibility W HO W HAT W HEN Real-Time Visibility Single Network Sentry Appliance …. L OCATION 2 L OCATION N L OCATION 1 W HERE VPNVPN
© 2012 Bradford Networks. All rights reserved. Trust-Based Network Access Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T RUSTED D EVICES T RUSTED L OCATIONS
© 2012 Bradford Networks. All rights reserved. Network Sentry Feature Set Discover All Wired & Wireless Infrastructure NetworkVisibility Safe Network Access Assignment NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices EndpointCompliance Simple and Powerful Device and User Onboarding EasyOnboarding Historical Event Correlation and Trending Analytics Risk Assessment Risk Mitigation Detect and Classify Every Endpoint Device DeviceProfiling SmartEdge Platform Integrations SecuritySecurity MobilityMobility Wired & Wireless
© 2012 Bradford Networks. All rights reserved. S ECURITY W IRED & W IRELESS M OBILITY Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORK SENTRY N ETWORK A CCESS C ONTROL S ECURE BYOD G UEST M ANAGEMENT R EGULATORY C OMPLIANCE E DGE V ISIBILITY E NDPOINT C OMPLIANCE E ASY X O NBOARDING N ETWORK A NALYTICS
© 2012 Bradford Networks. All rights reserved. Secure BYOD / Network Access Control IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access
© 2012 Bradford Networks. All rights reserved. Guest Registration & Management
© 2012 Bradford Networks. All rights reserved. Easy 802.1x Onboarding O PEN SSID C APTIVE P ORTAL U SAGE P OLICY D EVICE R EGISTRATION S ECURE SSID A UTHENTICATION S ERVER S UPPLICANT C ONFIGURATION
© 2012 Bradford Networks. All rights reserved. Endpoint Compliance Safe Configuration Mandatory Applications Required OS Patch Levels Endpoint Protection Minimum Application Version VLANAssignment Device Risk Assessment
© 2012 Bradford Networks. All rights reserved. Eliminate BYOD Blind Spots Guests, Contractors, Students Active Directory Devices And Users Non-Active Directory Devices and Users AD Registered Devices & Users 100% Devices & Users Partial Visibility Remediation 100% Visibility Remediation Palo Alto Networks Agent Palo Alto Networks Firewall
© 2012 Bradford Networks. All rights reserved. BYOD Blueprint: NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not
© 2012 Bradford Networks. All rights reserved. SC Magazine Product Group Test (Identity Management, NAC, DLP) 27
© 2012 Bradford Networks. All rights reserved. Benefits with Bradford Networks CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management 100% Visibility/Control Automated Policies Easy to Manage Totally Integrated
© 2012 Bradford Networks. All rights reserved. R ETAIL / H OSPITALITY H EALTHCARE / B IOTECH F INANCIAL S ERVICES E DUCATION G OVERNMENT / D EFENSE T ECHNOLOGY U TILITIES 900+ Customers Around the World
© 2012 Bradford Networks. All rights reserved. Taking Action: Request Slides BYOD Whitepaper (NAC, MDM) Custom Demonstration
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Network Access Control 101 Securing the Critical Edge of Your Network.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
February 2015 Andrew Noonan, SE ForeScout. © 2014 ForeScout Technologies, Page 2 Strong FoundationMarket LeadershipEnterprise Deployments #1#1 In business.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Moving to BYOD Gary Audin 1.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Copyright © 2012 Accenture & Symantec. All rights reserved. This Sales Accelerator presentation is intended to provide sales teams fast facts on solutions.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Complete Cloud Security Anyone, anywhere, any app, any device.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection Committed to innovative, easy-to-use security Recognized by Gartner Research.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
© 2013 ForeScout Technologies, Page 1 © 2014 ForeScout Technologies, Page 1.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Check Point Virtual Gateway Protects Microsoft Azure Cloud Infrastructure with a Full Range of Security Defenses and Threat Prevention Solutions MICROSOFT.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Wireless Network Security. Why wireless? Wifi, which is short for wireless fi … something, allows your computer to connect to the Internet using magic.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Proprietary and Confidential Secure Mobile Productivity & Collaboration for the Enterprise Secure mobile productivity Access, sync and edit files.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Workshifting Transform your business – empower your people.
Secure Bring Your Own Device (BYOD) for Higher Education Name Title .
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Total Enterprise Mobility Comprehensive Management and Security
Empowering People-centric IT User and Device Management Access and Information Protection Microsoft Virtual Desktop Infrastructure.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
© 2017 SlidePlayer.com Inc. All rights reserved.