So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Network Access Control Systems at Educational Institutions Richard Becker Brian Leslie Kansas State University.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
© 2012 ForeScout Technologies, Page 1 Toni Buhrke, MBA, CISSP - Senior Security Solutions Architect Addressing the BYOD Challenge.
© 2012 ForeScout Technologies, Page 1 Bob Reny, Sr. Systems Engineer Do you know NAC? Data Connectors - Vancouver 4/25/2013.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Secure Computing Network
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
Wireless Network Security
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Luc Billot Security Consulting Engineer
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Automating Endpoint Security Policy Enforcement Computing and Networking Services University of Toronto.
Barracuda Networks Steve Scheidegger Commercial Account Manager
It’s Not Your Father’s NAC: Next-generation NAC
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
May 2015 Toni Buhrke, Director Systems Engineering.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Altai Certification Training Backend Network Planning
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Wireless Intrusion Prevention System
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Security fundamentals Topic 10 Securing the network perimeter.
Synchronized Security Revolutionizing Advanced Threat Protection
7.4 Update - ISE Session.
Understand Server Protection LESSON Security Fundamentals.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Presented by MPIRIRWE BYANAGWA STEPHEN. An approach to computer network security that attempts to unify endpoint security technology (such as antivirus,
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Next Step in Cyber Defense & Response Len Rosenberg, VP of Systems Engineering.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Implementing Network Access Protection
Cisco ISE 1.2 Mobile Device Management Integration
Wireless Network Security
2018 Real Cisco Dumps IT-Dumps
Server-to-Client Remote Access and DirectAccess
Wireless Network Security
Designing IIS Security (IIS – Internet Information Service)
What’s New In WatchGuard Wi-Fi Cloud v8.6
IT Management, Simplified
Presentation transcript:

So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015

ForeScout is a Leader in the NAC Market #1 Strong Foundation Market Leadership Enterprise Deployments In business 13 years Campbell, CA headquarters 200+ global channel partners Independent Network Access Control (NAC) Market Leader Focus: Pervasive Network Security 1,700+ customers worldwide Financial services, government, healthcare, manufacturing, retail, education From 500 to >1M endpoints ForeScout Confidential

Inadequate Visibility Means Security Gaps Corporate Resources Non-corporate VISIBLE NOT VISIBLE Antivirus out of date Endpoints Unauthorized application Agents not installed or not running Network Devices Applications Users

Inadequate Collaboration VA MDM Patch APT Inadequate Collaboration

Detection-Mitigation Divide

Impacts to the Enterprise + IT Risks + IT Costs Greater IT Security Risks Greater IT Costs $ Investigation Mitigation Rogue devices System breach Data leakage Compliance violation

+ Coordinated Controls Desired State Real-time Visibility + Coordinated Controls Ticketing Remediation Systems Management Endpoint Security Wireless SIEM Switches MDM AAA Vulnerability

ForeScout CounterACT Visibility Access Control Onboarding Discovery and inspection - who, what, where Managed, unmanaged, corporate, BYOD, rogue Access Control Flexible policies - allow, alert, audit, limit, block 802.1X, VLAN, ACL, virtual firewall, hybrid-mode Onboarding Guest management and BYOD onboarding Automated MDM enrollment Interoperability Works with your existing IT infrastructure ControlFabric open integration architecture Ease of Deployment Fast implementation, agent-less, all-in-one appliance Multi-vendor environments, no upgrades needed 1 2 3 4 5

Continuous Monitoring and Mitigation Continuous Visibility Endpoint Mitigation Endpoint Authentication & Inspection Network Enforcement Information Integration

1. Visibility Who are you? Who owns your device? What type of device? Where/how are you connecting? What is the device hygiene? Employee Partner Contractor Guest Corporate BYOD Rogue Windows, Mac iOS, Android VM Non-user devices Switch Controller VPN Port, SSID IP, MAC VLAN Configuration Software Services Patches Security Agents

Network Visibility WHO? WHAT? WHERE? POSTURE? INTERNAL EXTERNAL CORE LAYER SWITCH AD / LDAP / RADIUS / DHCP VPN CONCENTRATOR FIREWALL INTERNET USER NAME EMAIL TITLE GROUPS WHO? OS BROWSER AGENT PORTS PROTOCOLS WHAT? DISTRIBUTION LAYER SWITCH CORPORATE LAN GUEST LAN VPN CLIENTS MAC ADDRESS IP ADDRESS SWITCH IP CONTROLLER IP PORT / SSID / VLAN WHERE? Apps Services Processes Versions POSTURE? Registry Patches Encryption Antivirus INTERNAL EXTERNAL

Real-time Network Asset Intelligence Complete Situational Awareness

2. Granular Access Control Policies Modest Strong Alert / Allow Trigger / Limit Remediate / Block Open trouble ticket Send email notification SNMP Traps Start application Run script Auditable end-user acknowledgement Send information to external systems such as SIEM etc. HTTP browser hijack Deploy a virtual firewall around the device Reassign the device to a VLAN with restricted access Update access lists (ACLs) on switches, firewalls and routers to restrict access DNS hijack (captive portal) Automatically move device to a pre- configured guest network Trigger external controls such as endpoint protection, VA etc. Move device to quarantine VLAN Block access with 802.1X Alter login credentials to block access, VPN block Block access with device authentication Turn off switch port (802.1X, SNMP) Install/update agents, trigger external remediation systems Wi-Fi port block

3. Onboarding Visibility of corporate and personal devices Automated onboarding Identify device Identify user Assess compliance Flexible policy controls Register guests Grant access (none, limited, full) Enforce time of day, connection type, device type controls Block unauthorized devices from the network EMPLOYEE CONTRACTOR GUEST UNAUTHORIZED WEB EMAIL CRM

Flexible Onboarding Options User Type Guest Internet Access Guest Registration Sponsor Authorization Limited Internal Access Authenticate via Contractor Credentials BYOD Posture Check Contractor/Partner Personal Device Corporate Asset Authenticate via Corporate Credentials BYOD Posture Check Internal Access Corporate Asset Posture Check Employee

Automated MDM Enrollment Device connects to network Classify by type Check for mobile agent If agent is missing Quarantine device Install mobile agent (HTTP Redirect) Once agent is activated Check compliance Allow policy-based access Continue monitoring 1 ForeScout CounterACT   MDM ? 2   Your Enterprise Network 3 ) ) ) ) ) ) ) MDM MDM 16

Information Sharing and Automation ASSET MANAGEMENT NETWORK OPERATIONS RISK MANAGEMENT Security Gateway GRC Continuous Monitoring and Mitigation Intelligence Exchange AAA SIEM NGFW / VPN VA/DLP System Management MDM / MAM Host Controls

5. Ease of Deployment Easy to use Fast and easy to deploy 802.1X not mandatory Non-intrusive, audit-only mode No agents needed (dissolvable or persistent agent can be used) Fast and easy to deploy All-in-one appliance Out-of-band deployment No infrastructure changes or network upgrades Rapid time to value – unprecedented visibility in hours or days Physical or virtual appliances Ideal for multi-vendor, heterogeneous network environments

Thank You

How CounterACT Detects and Inspects Devices Dynamic and Multi-faceted Multiple methods Poll switches, APs and controllers for list of devices that are connected Receive SNMP trap from switches Monitor 802.1X requests to the built-in or external RADIUS server Monitor DHCP requests to detect when a new host requests an IP address Optionally monitor a network SPAN port to see network traffic such as HTTP traffic and banners Run NMAP scan Use credentials to run a scan on the endpoint Use optional agents RADIUS SERVER DHCP REQUESTS SNMP TRAPS USER DIRECTORY

Type of Information CounterACT can Learn Device Type of device Manufacturer Location Connection type Hardware info Authentication MAC and IP address Certificates Operating System OS Type Version number Patch level Services and processes installed or running Registry File names, dates, sizes Security Agents Anti-malware/DLP agents Patch management agents Encryption agents Firewall status Configuration Network Malicious traffic Rogue devices Applications Installed Running Version number Registry settings File sizes User Name Authentication Status Workgroup Email and phone number Peripherals Type of device Manufacturer Connection type

2. Access Control Authentication Options Access Control Options LDAP based Directory Systems MAC Address Lists RADIUS/802.1X Guest Registration External Repositories Access Control Options VLAN Assignment ACL Management Virtual Firewall 802.1X Block, VLAN, ACL Flexible Implementation Direct integration with directory systems and external databases Built-in RADIUS Can operate as RADIUS proxy Hybrid Mode 802.1X for wireless, non-802.1X for wired Use 802.1X as default, fall back to non-802.1X if needed

4. Interoperability Switches & Routers Endpoint & APT Protection Endpoints Firewall & VPN IT Network Services MDM Wireless Network Devices SIEM/GRC Vulnerability Assessment CEF

Information Sharing and Automation