Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S09761197.

Similar presentations


Presentation on theme: "Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S09761197."— Presentation transcript:

1 Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S09761197

2 Introduction The explosion of fast, reliable network connectivity (internet & enterprise LAN) has transformed the world of business, creating new opportunities & making organizations fast, agile & efficient. Challenge – meet the increasing demands of an “always connected” user (employees, partners, customers) while keeping the security of networks & intellectual assets.

3 Connectivity versus Security Connectivity is optimized by complete access. Security is optimized by lack of access. Optimum connectivity – design completely open network, then react to security concerns by selectively closing down areas of access. Optimum security – design a completely closed network, then react to connectivity requests by selectively opening areas of access.

4 Trust Boundaries “In both the physical & virtual worlds, an organization implements security systems & procedures at the distinct points where 2 different trust zones meet”.  LAN & internet: firewalls  Data communications & remote users: VPN tunnel

5 Why do we need Trust Boundaries…? Strengthen the protection of critical computing & storage resources in recognition of growing exposure to internal risks presented by virus, worms, non- employee users, etc.

6 The threat from within To protect both the network & the business operations that rely on the network, an additional trust boundary must be erected between them. Security measures must ensure that a user with legitimate access to resources doesn’t inadvertently enable malware to reach those resources, taking advantage of the user’s security clearance to propagate an attack.

7 The emergence of Explicit Permission & Network Access Management Two changes to provide the network security corporations: IT organizations must change today’s network access model from one of implicit permission to one of explicit permission Explicit permission must be managed through an appliance that grants or denies access based on a real-time assessment of security requirements, network status & user status.

8 Network Access Management for Business Continuity IT Departments can begin working from a more precise & constructive security model based on: Explicit permission for users accessing resources Adaptivity to changing conditions

9 Security Shortcomings of Static Network Infrastructure Reactive security measures and lax management of end user devices are no match for new forms of malware that are sweeping the internet – Slammer worm 75,000 machines within 10min The rapid transmission of malware combined with the busy everyday work of large, mobile user populations means that the security state of a network is always in flux – Salesrep connecting laptop, contractor connecting in meeting room

10 Security Shortcomings of Static Network Infrastructure Network security involves guarding data and controlling its access, not just scanning for malware attacks – Access to information assets must be controlled The cost of these security attacks is simply too high. – USD55 billion in 2003

11 Recognizing the problem with Static Network Infrastructure Administrators need to make the network infrastructure itself responsive when an attack occurs. – Enforce “guilty until proven innocent” policy Automation solution is in demand to clean devices Today’s infrastructure were designed for static configurations and lack the dynamic, moment-by- moment policy controls that effective network security demands.

12 Moving to a Dynamic Security Infrastructure Screening users and devices Restricting users to their authorized resources Inspecting traffic continually for threats and potential policy violations Enforcing security policies automatically

13 Industry Initiatives for Network Access Management Several industry initiatives are under way for creating a solution for screening devices and a system for enforcing regular security policies  Cisco’s Network Admission Control (NAC) initiative  Microsoft’s Network Access Protection (NAP) architecture  The Trusted Computing Group’s Trusted Network Connect (TNC)

14 The Quandary Facing Enterprises Today Cisco’s NAC solution increases cost and complexity of development – Unlikely to work with other vendor products Microsoft’s initiatives is tied to “Longhorn” release – Other Windows OS requires another product TNC initiative remains a work in progress. – Still deciding which authentication protocols to support.

15 Verinier Edgewall Network Access Management Appliance Verinier Networks has created a solution for dynamic enforcing security policies and access management control Provides 4 key access management functions  Screening  Restricting  Inspecting  Enforcing

16 Verinier Edgewall Network Access Management Appliance

17 “Life is Beautiful”


Download ppt "Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S09761197."

Similar presentations


Ads by Google