![Page 1: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/1.jpg)
Network Access Control 101Securing the Critical Edge of Your Network
![Page 2: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/2.jpg)
Notice your network changing?
• # of devices on your network growing?
• % of devices are corporate issued?
• # of devices / user?
• % of devices that are mobile?
• # of guests and/or contractors?
![Page 3: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/3.jpg)
Your Network is Changing
YOURBUSINESS
USERSSUPPLIERS
PARENTCOMPANY
GUESTS
PARTNERSCONSULTANTS
BYOD
INTERNETOF THINGS
![Page 4: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/4.jpg)
Endpoints are Easy Targets for Hackers
![Page 5: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/5.jpg)
Greater Attack Surface = Greater Risk
100% Managed100% Context
Corporate
Less ManagedLess Context
BYOD
4 x Attack Surface
Even Less ManagedEven Less Context
InternetOf Things
Drop in% Managed
Endpoints
ExposureRisk
![Page 6: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/6.jpg)
LEVERAGE INDICATORS OF TRUST/RISK
Bradford Networks
LIVE INVENTORY OF NETWORK CONNECTIONS
APPLIANCE / VIRTUAL / CLOUD DELIVERY
ANALYTICS / PLANNING / FORENSICS
REAL-TIME ENFORCEMENT
NETWORK ACCESS POLICIES
![Page 7: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/7.jpg)
NAC 101:Live Inventory of Network Connections
CONNECTTIMES
….
SITE 2
SITE N
SITE 1
OS/APPS
CONNECTPOINT
VPN
DEVICETYPE
USER & GROUP
![Page 8: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/8.jpg)
NAC 101:Flexible Network Access Policies
DEVICETYPES
NETWORK ACCESSTO INFORMATION
FINANCIALASSETS
CREDITCARDS
CRITICALINFRASTRUCTURE
HEALTHCARERECORDS
LEGALINFORMATION
INTELLECTUALPROPERTY
STUDENTINFORMATION
USERS &GROUPS
CONNECTPOINT
VPN
OS/APPS
CONNECTTIME
![Page 9: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/9.jpg)
NAC 101: Dynamic Network Provisioning
HEALTHCARERECORDS
ONBOARDINGPORTAL
GUESTACCESS
NOACCESS
WHO WHAT WHERE WHENINDICATOR OFTRUST
![Page 10: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/10.jpg)
NAC 101:Endpoint Compliance
IdentifyUser
AssignNetwork Access
AssessRisk
IdentifyDevice
NoAccess
GuestAccess
RestrictedAccess
UnrestrictedAccess
![Page 11: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/11.jpg)
NAC 101:Extensible Policy Engine
RISK?RESTRICT NETWORK ACCESS
TRUST?GRANT NETWORK ACCESS
![Page 12: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/12.jpg)
INDICATORS OF
TRUST
NAC 101:Leveraging Indicators of Trust/Risk
INDICATORS OF
RISK
![Page 13: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/13.jpg)
NAC 101:Self-Service Registration
![Page 14: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/14.jpg)
NAC 101Historical Inventory of Network Connections
NETWORK & DEVICEINVENTORY
REPORTDISTRIBUTION
DEVICE TRENDREPORTS NETWORK &
ENDPOINT RISK
“BLACK BOX” OFNETWORK CONNECTIONS
![Page 15: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/15.jpg)
NAC 101: Secure the Critical Edge of Your Network
CxO
• Embrace BYOD
• Balance Risk/Cost
• Maintain Compliance
Users
• Access They Need
• Flexibility They Want
• Privacy They Deserve
IT Management
• Safe Devices/Apps
• Trusted Users
• Safe Access
![Page 16: Network Access Control 101 Securing the Critical Edge of Your Network](https://reader036.vdocuments.mx/reader036/viewer/2022062516/56649dd15503460f94ac7103/html5/thumbnails/16.jpg)
Taking Action …
Questions/Request Slides
NAC/BYOD Whitepaper
NAC Checklist