Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.

Similar presentations


Presentation on theme: "© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks."— Presentation transcript:

1 © 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

2 © 2012 Bradford Networks. All rights reserved. Why We Need to Care About BYOD

3 © 2012 Bradford Networks. All rights reserved. We Encourage Bringing Your Own Dog to Work Bring Your Own Dog

4 © 2012 Bradford Networks. All rights reserved. App Stores Are Really Safe Places to get Apps

5 © 2012 Bradford Networks. All rights reserved. Social Media Tells Me BYOD is Trending

6 © 2012 Bradford Networks. All rights reserved. We’ve Deployed Our Best Personal Firewall

7 © 2012 Bradford Networks. All rights reserved. CEO Won an iPad at Book Club … 7

8 © 2012 Bradford Networks. All rights reserved. Containing the Risk of a Cyber Threat Data Consolidation Data Exfiltration Data Exfiltration Internal Network Scan Internal Network Scan Phishing on Device Phishing on Device Device Compromised Attack Surface is Multiplying With Every New Device

9 © 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Consistent UnmanagedManaged Diverse User DownloadedCorp Push RestrictedFull Access Risk EmergingMature Configuration Settings User’s Privacy Endpoint Protection Non-Standard Devices Unknown Apps

10 © 2012 Bradford Networks. All rights reserved. Network Security Gap / Blindspots NAC is now one of the key mechanisms for mitigating the risks of consumerization (BYOD) Gartner Strategic Road Map for Network Access Control Enable BYOD 60% Know The Devices 9%

11 © 2012 Bradford Networks. All rights reserved. Gartner’s Best Practices to Address BYOD 11

12 © 2012 Bradford Networks. All rights reserved. 3 Phases of Network Access Control Employee Endpoint Compliance Guest Networking Consumerization BYOD Corp Device Guest Device Hybrid Devices GuestHybrid Users

13 © 2012 Bradford Networks. All rights reserved. BYOD Maturity Roadmap BlockBlock DisregardDisregard EmbraceEmbrace Visibility Automation

14 © 2012 Bradford Networks. All rights reserved. Who’s Responsible for Onboarding Devices? CIO Wired/Wireless Network Administration Wired/Wireless Network Administration Endpoint Administration Endpoint Administration IT Strategy & Architecture Network Operations Center VP of Infrastructure App/Service Administration App/Service Administration Help Desk / IT Support Help Desk / IT Support Server/DB Administration Server/DB Administration Project Management Project Management Application Development Bus Unit General Mgr Bus Analyst / IT Liaison Bus Analyst / IT Liaison End Users Business Line Management Bus Process Monitoring & Operations Application QA/Test Security Operations Center Incident Response / Forensics Identify/Access Management CISO Vulnerability Assessment CSO Security Engineering Security Engineering Director of Security Policy Awareness and Administration Policy Awareness and Administration Compliance / Risk Officer Governance, Risk, Compliance Audit and Reporting ComplianceSecurityOperationsBusiness Exec VP Mgr Staff

15 © 2012 Bradford Networks. All rights reserved. 12 Years of Efficient Operations Only $15M Invested Cash Flow Positive About Bradford Networks Operating Efficiency Millions of devices under management 94% Maintenance Renewal 900 Global Customers Designed to manage student-owned devices for large campus networks Healthcare, Financial, Retail, Utilities, … Inspired by EDU Gartner Visionary Forrester Leader SC Magazine Best Buy Rating Pioneer/Leader in Network Access Control Physical / Virtual Appliance Cloud/SaaS Pre-Connect Assessments Most Scalable and Secure Solution

16 © 2012 Bradford Networks. All rights reserved. 10 Years of BYOD Experience 900 Global Customers Inspired by EDU Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution About Bradford Networks NETWORKSENTRY

17 © 2012 Bradford Networks. All rights reserved. Network Edge Visibility W HO W HAT W HEN Real-Time Visibility Single Network Sentry Appliance …. L OCATION 2 L OCATION N L OCATION 1 W HERE VPNVPN

18 © 2012 Bradford Networks. All rights reserved. Trust-Based Network Access Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T RUSTED D EVICES T RUSTED L OCATIONS

19 © 2012 Bradford Networks. All rights reserved. Network Sentry Feature Set Discover All Wired & Wireless Infrastructure NetworkVisibility Safe Network Access Assignment NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices EndpointCompliance Simple and Powerful Device and User Onboarding EasyOnboarding Historical Event Correlation and Trending Analytics Risk Assessment Risk Mitigation Detect and Classify Every Endpoint Device DeviceProfiling SmartEdge Platform Integrations SecuritySecurity MobilityMobility Wired & Wireless

20 © 2012 Bradford Networks. All rights reserved. S ECURITY W IRED & W IRELESS M OBILITY Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORK SENTRY N ETWORK A CCESS C ONTROL S ECURE BYOD G UEST M ANAGEMENT R EGULATORY C OMPLIANCE E DGE V ISIBILITY E NDPOINT C OMPLIANCE E ASY X O NBOARDING N ETWORK A NALYTICS

21 © 2012 Bradford Networks. All rights reserved. Secure BYOD / Network Access Control IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access

22 © 2012 Bradford Networks. All rights reserved. Guest Registration & Management

23 © 2012 Bradford Networks. All rights reserved. Easy 802.1x Onboarding O PEN SSID C APTIVE P ORTAL U SAGE P OLICY D EVICE R EGISTRATION S ECURE SSID A UTHENTICATION S ERVER S UPPLICANT C ONFIGURATION

24 © 2012 Bradford Networks. All rights reserved. Endpoint Compliance Safe Configuration Mandatory Applications Required OS Patch Levels Endpoint Protection Minimum Application Version VLANAssignment Device Risk Assessment

25 © 2012 Bradford Networks. All rights reserved. Eliminate BYOD Blind Spots Guests, Contractors, Students Active Directory Devices And Users Non-Active Directory Devices and Users AD Registered Devices & Users 100% Devices & Users Partial Visibility Remediation 100% Visibility Remediation Palo Alto Networks Agent Palo Alto Networks Firewall

26 © 2012 Bradford Networks. All rights reserved. BYOD Blueprint: NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not

27 © 2012 Bradford Networks. All rights reserved. SC Magazine Product Group Test (Identity Management, NAC, DLP) 27

28 © 2012 Bradford Networks. All rights reserved. Benefits with Bradford Networks CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management 100% Visibility/Control Automated Policies Easy to Manage Totally Integrated

29 © 2012 Bradford Networks. All rights reserved. R ETAIL / H OSPITALITY H EALTHCARE / B IOTECH F INANCIAL S ERVICES E DUCATION G OVERNMENT / D EFENSE T ECHNOLOGY U TILITIES 900+ Customers Around the World

30 © 2012 Bradford Networks. All rights reserved. Taking Action: Request Slides BYOD Whitepaper (NAC, MDM) Custom Demonstration


Download ppt "© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks."

Similar presentations


Ads by Google