© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Proprietary and Confidential Secure Mobile Productivity & Collaboration for the Enterprise Secure mobile productivity Access, sync and edit files.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
1 A SIMPLE APPROACH TO BYOD. A Leader in Data Protection  Committed to innovative, easy-to-use security  Recognized by Gartner Research.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
© 2012 ForeScout Technologies, Page 1 Bob Reny, Sr. Systems Engineer Do you know NAC? Data Connectors - Vancouver 4/25/2013.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
Unified Logs and Reporting for Hybrid Centralized Management
Wireless Network Security
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
It’s Not Your Father’s NAC: Next-generation NAC
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Network Access Control 101 Securing the Critical Edge of Your Network.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Network Access Control 101 Securing the Critical Edge of Your Network.
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Moving to BYOD Gary Audin 1.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Workshifting Transform your business – empower your people.
Complete Cloud Security Anyone, anywhere, any app, any device.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Your Partner for Superior Cybersecurity
OIT Security Operations
Barracuda Web Security Flex
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Network Access Control 101 Securing the Critical Edge of Your Network
BYOD: Short-term Gain Without Long-term Pain?
Virtualization & Security real solutions
Network Access Control 101 Securing the Critical Edge of Your Network
BOMGAR REMOTE SUPPORT Karl Lankford
Network Access Control 101 Securing the Critical Edge of Your Network
Technology Management- A CIO Perspective
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Securing the Threats of Tomorrow, Today.
Presentation transcript:

© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

© 2012 Bradford Networks. All rights reserved. Why We Need to Care About BYOD

© 2012 Bradford Networks. All rights reserved. We Encourage Bringing Your Own Dog to Work Bring Your Own Dog

© 2012 Bradford Networks. All rights reserved. App Stores Are Really Safe Places to get Apps

© 2012 Bradford Networks. All rights reserved. Social Media Tells Me BYOD is Trending

© 2012 Bradford Networks. All rights reserved. We’ve Deployed Our Best Personal Firewall

© 2012 Bradford Networks. All rights reserved. CEO Won an iPad at Book Club … 7

© 2012 Bradford Networks. All rights reserved. Containing the Risk of a Cyber Threat Data Consolidation Data Exfiltration Data Exfiltration Internal Network Scan Internal Network Scan Phishing on Device Phishing on Device Device Compromised Attack Surface is Multiplying With Every New Device

© 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Consistent UnmanagedManaged Diverse User DownloadedCorp Push RestrictedFull Access Risk EmergingMature Configuration Settings User’s Privacy Endpoint Protection Non-Standard Devices Unknown Apps

© 2012 Bradford Networks. All rights reserved. Network Security Gap / Blindspots NAC is now one of the key mechanisms for mitigating the risks of consumerization (BYOD) Gartner Strategic Road Map for Network Access Control Enable BYOD 60% Know The Devices 9%

© 2012 Bradford Networks. All rights reserved. Gartner’s Best Practices to Address BYOD 11

© 2012 Bradford Networks. All rights reserved. 3 Phases of Network Access Control Employee Endpoint Compliance Guest Networking Consumerization BYOD Corp Device Guest Device Hybrid Devices GuestHybrid Users

© 2012 Bradford Networks. All rights reserved. BYOD Maturity Roadmap BlockBlock DisregardDisregard EmbraceEmbrace Visibility Automation

© 2012 Bradford Networks. All rights reserved. Who’s Responsible for Onboarding Devices? CIO Wired/Wireless Network Administration Wired/Wireless Network Administration Endpoint Administration Endpoint Administration IT Strategy & Architecture Network Operations Center VP of Infrastructure App/Service Administration App/Service Administration Help Desk / IT Support Help Desk / IT Support Server/DB Administration Server/DB Administration Project Management Project Management Application Development Bus Unit General Mgr Bus Analyst / IT Liaison Bus Analyst / IT Liaison End Users Business Line Management Bus Process Monitoring & Operations Application QA/Test Security Operations Center Incident Response / Forensics Identify/Access Management CISO Vulnerability Assessment CSO Security Engineering Security Engineering Director of Security Policy Awareness and Administration Policy Awareness and Administration Compliance / Risk Officer Governance, Risk, Compliance Audit and Reporting ComplianceSecurityOperationsBusiness Exec VP Mgr Staff

© 2012 Bradford Networks. All rights reserved. 12 Years of Efficient Operations Only $15M Invested Cash Flow Positive About Bradford Networks Operating Efficiency Millions of devices under management 94% Maintenance Renewal 900 Global Customers Designed to manage student-owned devices for large campus networks Healthcare, Financial, Retail, Utilities, … Inspired by EDU Gartner Visionary Forrester Leader SC Magazine Best Buy Rating Pioneer/Leader in Network Access Control Physical / Virtual Appliance Cloud/SaaS Pre-Connect Assessments Most Scalable and Secure Solution

© 2012 Bradford Networks. All rights reserved. 10 Years of BYOD Experience 900 Global Customers Inspired by EDU Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution About Bradford Networks NETWORKSENTRY

© 2012 Bradford Networks. All rights reserved. Network Edge Visibility W HO W HAT W HEN Real-Time Visibility Single Network Sentry Appliance …. L OCATION 2 L OCATION N L OCATION 1 W HERE VPNVPN

© 2012 Bradford Networks. All rights reserved. Trust-Based Network Access Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T RUSTED D EVICES T RUSTED L OCATIONS

© 2012 Bradford Networks. All rights reserved. Network Sentry Feature Set Discover All Wired & Wireless Infrastructure NetworkVisibility Safe Network Access Assignment NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices EndpointCompliance Simple and Powerful Device and User Onboarding EasyOnboarding Historical Event Correlation and Trending Analytics Risk Assessment Risk Mitigation Detect and Classify Every Endpoint Device DeviceProfiling SmartEdge Platform Integrations SecuritySecurity MobilityMobility Wired & Wireless

© 2012 Bradford Networks. All rights reserved. S ECURITY W IRED & W IRELESS M OBILITY Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORK SENTRY N ETWORK A CCESS C ONTROL S ECURE BYOD G UEST M ANAGEMENT R EGULATORY C OMPLIANCE E DGE V ISIBILITY E NDPOINT C OMPLIANCE E ASY X O NBOARDING N ETWORK A NALYTICS

© 2012 Bradford Networks. All rights reserved. Secure BYOD / Network Access Control IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Restricted Access Unrestricted Access

© 2012 Bradford Networks. All rights reserved. Guest Registration & Management

© 2012 Bradford Networks. All rights reserved. Easy 802.1x Onboarding O PEN SSID C APTIVE P ORTAL U SAGE P OLICY D EVICE R EGISTRATION S ECURE SSID A UTHENTICATION S ERVER S UPPLICANT C ONFIGURATION

© 2012 Bradford Networks. All rights reserved. Endpoint Compliance Safe Configuration Mandatory Applications Required OS Patch Levels Endpoint Protection Minimum Application Version VLANAssignment Device Risk Assessment

© 2012 Bradford Networks. All rights reserved. Eliminate BYOD Blind Spots Guests, Contractors, Students Active Directory Devices And Users Non-Active Directory Devices and Users AD Registered Devices & Users 100% Devices & Users Partial Visibility Remediation 100% Visibility Remediation Palo Alto Networks Agent Palo Alto Networks Firewall

© 2012 Bradford Networks. All rights reserved. BYOD Blueprint: NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not

© 2012 Bradford Networks. All rights reserved. SC Magazine Product Group Test (Identity Management, NAC, DLP) 27

© 2012 Bradford Networks. All rights reserved. Benefits with Bradford Networks CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Access They Need Flexibility They Want Privacy They Deserve IT Management 100% Visibility/Control Automated Policies Easy to Manage Totally Integrated

© 2012 Bradford Networks. All rights reserved. R ETAIL / H OSPITALITY H EALTHCARE / B IOTECH F INANCIAL S ERVICES E DUCATION G OVERNMENT / D EFENSE T ECHNOLOGY U TILITIES 900+ Customers Around the World

© 2012 Bradford Networks. All rights reserved. Taking Action: Request Slides BYOD Whitepaper (NAC, MDM) Custom Demonstration