Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2012 Bradford Networks. All rights reserved. Secure BYOD.

Similar presentations


Presentation on theme: "© 2012 Bradford Networks. All rights reserved. Secure BYOD."— Presentation transcript:

1 © 2012 Bradford Networks. All rights reserved. Secure BYOD

2 © 2012 Bradford Networks. All rights reserved. The Enterprise Before – Total Control 2 Datacenter Network Trusted Users Manage Devices Secure

3 © 2012 Bradford Networks. All rights reserved. The Mobile Enterprise Today 3 Datacenter Network Unmanaged Users Unmanaged Devices Secure ? ConstantlyChanging IncreasedRisk Exponential Volume of Devices ? Threats

4 © 2012 Bradford Networks. All rights reserved. Profile of a Threat Data Consolidation Data Exfiltration Data Exfiltration Internal Network Scan Internal Network Scan Phishing Email on Device Phishing Email on Device Device Compromised Attack Surface is Multiplying With Every New Device

5 © 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Less MoreLess More Less MoreLess Risk MoreLess Devices / User Personal/Business Use Corporate Data Device Types # of Apps

6 © 2012 Bradford Networks. All rights reserved. Managing Change, Risk, and Volume IgnoranceIgnorance ControlControl Network VisibilitySecurity AutomationNetwork Access Policies

7 © 2012 Bradford Networks. All rights reserved. Know The Devices On Your Network Know Your Network Inspired by EDU (BYOD) Network Access Control Most Scalable and Secure NAC Solution About Bradford Networks NETWORKACCESSPOLICIES

8 © 2012 Bradford Networks. All rights reserved. Network Sentry Key Features Discover All Wired & Wireless Infrastructure NetworkVisibility Safe Network Access Assignment NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices EndpointCompliance Simple and Powerful Device and User Onboarding EasyOnboarding Historical Event Correlation and Trending Analytics Visibility / Policies / Automation Detect and Classify Every Endpoint Device DeviceProfiling SmartEdge Platform Integrations MDMMDM EndpointProtectionEndpointProtection Wired,Wireless& VPN SIEM & IDS/IPS SecurityIntelligenceSecurityIntelligence

9 © 2012 Bradford Networks. All rights reserved. Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired / WirelessNetworks SIEM & IDS/IPS SecurityIntelligence & Next-Gen Firewalls MDM Registration & On-boarding Endpoint Compliance Compliance Bring Your Own Device SecurityAutomation Rapid Threat Response Endpoint Protection & Patch Mgmt

10 © 2012 Bradford Networks. All rights reserved. Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired / WirelessNetworks SecurityIntelligence & Next-Gen Firewalls MDM Endpoint Protection & Patch Mgmt SIEM & IDS/IPS

11 © 2012 Bradford Networks. All rights reserved. Network Visibility W HO W HAT W HEN Real-Time Visibility …. L OCATION 2 L OCATION N L OCATION 1 W HERE VPNVPN

12 © 2012 Bradford Networks. All rights reserved. Network Access Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T RUSTED D EVICES T RUSTED L OCATIONS

13 © 2012 Bradford Networks. All rights reserved. Security Automation Safe Network Provisioning IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Unrestricted Data Sensitive Data

14 © 2012 Bradford Networks. All rights reserved. BYOD Visual Policy Roles InformationLocationsDevices Sensitive IntranetInternet School Classroom Library Home Laptop Smart Phone iPad Desktop Faculty/Staff    Grade 9-12    Grade 7-8    Grade K-6    Guests   

15 © 2012 Bradford Networks. All rights reserved. Endpoint Compliance Safe Configuration Mandatory Applications Required OS Patch Levels Endpoint Protection Minimum Application Version VLANAssignment Device Risk Assessment

16 © 2012 Bradford Networks. All rights reserved. BYOD Blueprint: NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not

17 © 2012 Bradford Networks. All rights reserved. Security Automation Rapid Threat Response Real-timeRemediation ThreatResponse

18 © 2012 Bradford Networks. All rights reserved. Bradford Networks CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Flexibility Productivity Access They Need IT Management Manage Change Manage Risk Manage Volume


Download ppt "© 2012 Bradford Networks. All rights reserved. Secure BYOD."

Similar presentations


Ads by Google