Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Secure Network for All Team Excel. Requirements Business Add visitor, customer, and competitor access Use non-company laptops onto corporate network.

Similar presentations


Presentation on theme: "A Secure Network for All Team Excel. Requirements Business Add visitor, customer, and competitor access Use non-company laptops onto corporate network."— Presentation transcript:

1 A Secure Network for All Team Excel

2 Requirements Business Add visitor, customer, and competitor access Use non-company laptops onto corporate network for internet and internal application use Visitor access to internet, VPN Wireless access Security Protect corporate IP Principle of least privilege Patch and anti-virus required Wireless access to internal network prohibited

3 Challenge = How? Access requiredProsRisks EmployeesPhysical Internet Intranet Corporate Applications Standard builds Regular patches Updated Anti-Virus Physical access to most areas Visitors (frequent, short meetings) Physical Internet Wireless access External access only Escort required Unfiltered access to internet No login Wireless security Contractors (Few days to 1 year) Physical Internet Corporate Applications NDA required Easy to control application access Login created for access Access typically same as employee Customers and/or Competitors (Regularly on-site for specific projects) Physical Internet Some internal applications Non-standard builds Limited ability to control Login created for access Considerable access to building Intentional or unintentional disclosure

4 Risks Physical access to multiple networks Protection of Intellectual Property Introduction of Malware Unintentional access to corporate data and applications Blocking of valid users Difficult for support staff to understand who can access what Are you at risk? Anyone with a requirement to protect corporate intellectual property or privacy data: Government Healthcare Research Engineering Many more

5 Technology ProCon Electronic badgeLimits access to buildings and certain rooms Auditing is available Once in a building, access is open to most areas Physical access to network available in empty offices, etc LDAP loginLimits access to domainOccurs after network access is granted DHCP address granted to anyone Active Directory groupsAllows or restricts access to specific applications Easy to maintain Auditing available Can be easy to get added to a group Separate networksLimits access to subnet and specific IP’s and ports May require additional authentication Requires additional infrastructure Firewall rules can be complex Network Access ControlPrevents access to network without authentication Policy-based access can limit access anywhere at a site Cost Complex support Blocking valid users EncryptionPrevents reading data even if disclosed Requires infrastructure Support issues

6 Summary How do you prevent disclosure to those with physical access? How do you grant access to some while limiting access to others? How can you do it without re-designing your network? How can you meet the business requirements without giving away the corporate secrets? Solution: Week 10

7 Questions?


Download ppt "A Secure Network for All Team Excel. Requirements Business Add visitor, customer, and competitor access Use non-company laptops onto corporate network."

Similar presentations


Ads by Google