network access control 101 securing the critical edge of your network
TRANSCRIPT
Network Access Control 101Securing the Critical Edge of Your Network
Notice your network changing?
• # of devices on your network growing?
• % of devices are corporate issued?
• # of devices / user?
• % of devices that are mobile?
• # of guests and/or contractors?
Your Network is Changing
YOURBUSINESS
USERSSUPPLIERS
PARENTCOMPANY
GUESTS
PARTNERSCONSULTANTS
BYOD
INTERNETOF THINGS
Endpoints are Easy Targets for Hackers
Greater Attack Surface = Greater Risk
100% Managed100% Context
Corporate
Less ManagedLess Context
BYOD
4 x Attack Surface
Even Less ManagedEven Less Context
InternetOf Things
Drop in% Managed
Endpoints
ExposureRisk
LEVERAGE INDICATORS OF TRUST/RISK
Bradford Networks
LIVE INVENTORY OF NETWORK CONNECTIONS
APPLIANCE / VIRTUAL / CLOUD DELIVERY
ANALYTICS / PLANNING / FORENSICS
REAL-TIME ENFORCEMENT
NETWORK ACCESS POLICIES
NAC 101:Live Inventory of Network Connections
CONNECTTIMES
….
SITE 2
SITE N
SITE 1
OS/APPS
CONNECTPOINT
VPN
DEVICETYPE
USER & GROUP
NAC 101:Flexible Network Access Policies
DEVICETYPES
NETWORK ACCESSTO INFORMATION
FINANCIALASSETS
CREDITCARDS
CRITICALINFRASTRUCTURE
HEALTHCARERECORDS
LEGALINFORMATION
INTELLECTUALPROPERTY
STUDENTINFORMATION
USERS &GROUPS
CONNECTPOINT
VPN
OS/APPS
CONNECTTIME
NAC 101: Dynamic Network Provisioning
HEALTHCARERECORDS
ONBOARDINGPORTAL
GUESTACCESS
NOACCESS
WHO WHAT WHERE WHENINDICATOR OFTRUST
NAC 101:Endpoint Compliance
IdentifyUser
AssignNetwork Access
AssessRisk
IdentifyDevice
NoAccess
GuestAccess
RestrictedAccess
UnrestrictedAccess
NAC 101:Extensible Policy Engine
RISK?RESTRICT NETWORK ACCESS
TRUST?GRANT NETWORK ACCESS
INDICATORS OF
TRUST
NAC 101:Leveraging Indicators of Trust/Risk
INDICATORS OF
RISK
NAC 101:Self-Service Registration
NAC 101Historical Inventory of Network Connections
NETWORK & DEVICEINVENTORY
REPORTDISTRIBUTION
DEVICE TRENDREPORTS NETWORK &
ENDPOINT RISK
“BLACK BOX” OFNETWORK CONNECTIONS
NAC 101: Secure the Critical Edge of Your Network
CxO
• Embrace BYOD
• Balance Risk/Cost
• Maintain Compliance
Users
• Access They Need
• Flexibility They Want
• Privacy They Deserve
IT Management
• Safe Devices/Apps
• Trusted Users
• Safe Access
Taking Action …
Questions/Request Slides
NAC/BYOD Whitepaper
NAC Checklist