Download presentation
Presentation is loading. Please wait.
Published byClementine Philomena Sutton Modified over 8 years ago
1
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2013 Info-Tech Research Group Inc. Secure the Network Against Remote & Rogue Endpoints in Four Steps Focus your attention on non-wired use cases to take the “AACK!” out of NAC Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997 - 2013 Info-Tech Research Group
2
Info-Tech Research Group2 NAC has a bad past – the difficulty of implementation and little-to-no-ROI meant most organizations sought more cost effective solutions. However, as possible use cases expand with BYOD, it is time to revisit NAC to keep your resources secure. Introduction Organizations that are looking to deploy NAC or update their current implementation. Organizations looking to learn more about NAC or present a business case for implementation. Organizations looking to further secure their network from outside threats. Build a practical action plan for the deployment of NAC. Assess the current status of partial NAC deployments. Understand the capabilities of different NAC approaches. This Research Is Designed For:This Research Will Help You:
3
Info-Tech Research Group3 By not implementing NAC, you could be spending 50% more on help desk tickets and incidents. Not doing NAC? It’s costing you Determine your costs. ◦ What does your average help desk ticket cost? ◦ How much reduction can you see in those costs as the result of a NAC implementation? Support LevelCost per incident Vendor$471 Field Support (multi-site)$196 Level 3: IT (apps, networking, NOC, etc.)$85 Level 2: Desktop support$62 Level 1: Service desk$22 Using the pricing examples in the chart, calculate the following: Help desk ticket volume associated with malware. Help desk ticket volume related to setting up guest users. Cost per help desk ticket. Malware Help Desk Tickets + Guest User Access Help Desk Tickets x Cost Per Ticket = Use this formula What you can save by implementing NAC Let us know how this helped you. We want to know what you saved.
4
Info-Tech Research Group4 Challenges stemming from the proliferation of both corporate and employee- owned mobile devices will encourage businesses to see NAC as a method for securing corporate resources. Reconsider NAC in your security portfolio 88.9% Nearly 90% of organizations allow access to corporate email on personal mobile devices. 55.9% The majority of organizations explicitly allow use of personal devices for work purposes. 97% Almost all organizations have personal smartphones in the workplace. Source: Info-Tech Research Group; N = 127+. Traditional NAC failed for good reason, but this is not your grandpa's NAC. The technology has matured beyond what many organizations failed to implement and as BYOD brings new use cases, the value of NAC increases. In a separate survey, Info-Tech Research Group found: BYOD almost always goes hand-in-hand with the separation of corporate wireless and guest wireless. Organizations justifying paying for a wireless guest network have the most difficult task. However, organizations should look at guest wireless as a side benefit that comes with implementing corporate-focused BYOD or WLAN. In a separate survey, Info-Tech Research Group found: BYOD almost always goes hand-in-hand with the separation of corporate wireless and guest wireless. Organizations justifying paying for a wireless guest network have the most difficult task. However, organizations should look at guest wireless as a side benefit that comes with implementing corporate-focused BYOD or WLAN.
5
Info-Tech Research Group5 Workshop Topic Coverage Assess Your NAC Posture Security Scan Understand high-level capabilities of different NAC approaches Customize Your NAC Deployment Perform SWOT Analysis Identify existing & required key NAC supporting elements Capture current and desired NAC for BYOD Capture current and desired NAC for Wired LAN Capture current and desired NAC for Wireless LAN Capture current and desired NAC for Remote Access Manage and Measure Success Select NAC vendor Create appropriate policies Develop communication plan Build training Create Comprehensive Action Plan Alternative approaches to NAC Perform gap analysis based on SWOT Wired NAC strategy Wireless NAC strategy BYOD NAC strategy Remote Access strategy Measure success of NAC deployment Determine cost/benefits of chosen strategies
6
Info-Tech Research Group6 2 Day Schedule and Deliverables ScheduleNameGoal List of Deliverables Day 1 Morning Day 1 Afternoon Assess Your NAC Posture Security Scan. Understand high-level capabilities of different NAC approaches. Comprehensive overview of what NAC can do for your organization. Customize Your NAC Deployment Identify existing and required key NAC supporting elements. Capture current desired NAC for wired LAN, wireless LAN, BYOD, and remote access. Perform SWOT analysis. Establish NAC-related goals. SWOT analysis. Day 1
7
Info-Tech Research Group7 2 Day Schedule and Deliverables ScheduleNameGoal List of Deliverables Day 2 Morning Day 2 Afternoon Create Comprehensive Action Plan Perform gap analysis based on SWOT. Identify alternative approaches to NAC. Establish your priority curriculum topics: wired NAC, wireless NAC, BYOD NAC, remote access NAC. Establish cost/benefits of chosen topics. SWOT analysis. Customized curriculum to optimize NAC in your organization. Cost/benefit analysis. Manage and Measure Success Select a NAC vendor. Create appropriate policies. Develop a communication plan. Build training. Measure success of NAC deployment. NAC vendor shortlist. NAC-related policy templates. Communication plan template. Training resources. Success metrics. Day 2
8
Info-Tech Research Group8 How to use this blueprint We recommend that you supplement the Best Practices Blueprint with a Guided Implementation. For most Info-Tech members, these Guided Implementations are included in your membership plan.* Our expert analysts will provide telephone assistance to you and your team at key project milestones to review your materials, answer your questions, and explain our methodology. Info-Tech Research Group’s expert analysts will come onsite to help you work through our project methodology in a 2-5 day project accelerator workshop. We take you through every phase of the project and ensure that you have a road map in place to complete your project successfully. In some cases, we can even complete the project while we are onsite. Do-It-Yourself Implementation Use this Best Practice Blueprint to help you complete your project. The slides in this Blueprint will walk you step-by-step through every phase of your project with supporting tools and templates ready for you to use. Project Accelerator Workshop You can also use this Best Practice Blueprint to facilitate your own project accelerator workshop within your organization using the workshop slides and facilitation instructions provided in the Appendix. Book your workshop now by emailing: WorkshopBooking@InfoTech.com WorkshopBooking@InfoTech.com Best Practice Blueprint Free Guided ImplementationOnsiteWorkshops * Gold and Silver level subscribers only Or calling: 1-888-670-8889 Ext. 3000 There are multiple ways you can use this Info-Tech Best Practice Blueprint in your organization. Choose the option that best fits your needs:
9
Info-Tech Research Group9 Book a free guided implementation today! Info-Tech is just a phone call away and can assist you with your project. Our expert Analysts can guide you to successful project completion. For most members, this service is available at no additional cost.* Here’s how it works: 1. Enroll in a Guided Implementation for your project Send an email to GuidedImplementations@InfoTech.com Or call 1-888-670-8889 Ext. 3000GuidedImplementations@InfoTech.com 2. Book your analyst meetings Once you are enrolled in a Guided Implementation, our analysts will reach out to book a series of milestone-related telephone meetings with you and your team. 3. Get advice from a subject matter expert At each Guided Implementation point, our Consulting Analyst will review your completed deliverables with you, answer any of your questions, and work with you to plan out your next phase. * Gold and Silver level subscribers only This symbol signifies when you’ve reached a Guided Implementation point in your project.
10
Info-Tech Research Group10 When we introduce new Blueprints, we offer workshops to our members at no charge for a short beta testing period. Please check the Workshop section of our website for a list of free beta workshops. Book a workshop today! An Info-Tech project accelerator workshop will help you to engage your stakeholders, gather important data, make key decisions, and generate a customized project road map. Here’s how it works: 1. Enroll in a 2-5 day workshop for your project Send an email to WorkshopBooking@InfoTech.com or call 1-888-670-8889 Ext. 3001. Your account manager will contact you and quote you the cost of a workshop.WorkshopBooking@InfoTech.com 2. Book your workshop A Workshop Coordinator will contact you to book a workshop planning call with one of our Facilitators and arrange dates for your workshop. We can hold the workshop in Info-Tech’s world-class facility in Toronto or at your location. 3. Plan your workshop A Workshop Facilitator will contact you to go over the workshop outline and choose the contents that are appropriate to your situation. 4. Participate in your workshop Our experienced Workshop Facilitators will take your project team through your tailored slides and exercises and will summarize all the workshop outputs into a final report. Free Beta Workshops
11
Info-Tech Research Group11 Guided Implementation Points in the NAC project Book a Guided Implementation Today: Info-Tech is just a phone call away and can assist you with your project. Our expert Analysts can guide you to successful project completion. Here are the suggested Guided Implementation points in the NAC project: Section 1: Assess your NAC posture Understand high-level capabilities of different NAC components. Talk to us about your organization’s size and unique risk profile and we will help you determine how to get what you need out of NAC. Section 2: Customize your NAC deployment Capture current and desired NAC states for wired LAN, wireless LAN, BYOD, and remote access. Work with us and the Capture Tool to identify current and long-term goals. Section 3: Create a comprehensive action plan Perform a gap analysis. The completed SWOT analysis will be discussed to identify weaknesses and threats – areas that you will eventually need to address and prioritize. Section 4: Manage and measure success Select a NAC vendor. We will provide you with the right Vendor Landscape to review. Feel free to contact us if you have further questions on product/vendor selection. To enroll, send an email to GuidedImplementations@InfoTech.com or call 1-888-670-8889 Ext. 3000GuidedImplementations@InfoTech.com This symbol signifies when you’ve reached a Guided Implementation point in your project.
12
Info-Tech Research Group12 Info-Tech Research Group Helps IT Professionals To: Sign up for free trial membership to get practical solutions for your IT challenges www.infotech.com Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: 1-888-670-8889
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.