secure enterprise mobility

25
Aruba / Palo Alto Networks Secure Enterprise Mobility

Upload: aruba-networks-an-hp-company

Post on 18-Jul-2015

886 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Secure Enterprise Mobility

Aruba / Palo Alto NetworksSecure Enterprise Mobility

Page 2: Secure Enterprise Mobility

CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved2 #AirheadsConf

Today’s Agenda

• Mobility / BYOD

• Threat Landscape & Challenges

• Integration Points

• Demonstration

Page 3: Secure Enterprise Mobility

3CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Networking Challenges of Mobility

Silos increase IT touch points and errors

NETWORKNAC, Roles, Policies

DEVICESBYOD, Onboarding, MDM

APPsUse, Distribution, Control

VISIBILITYWhat’s on the Network?

WORKFLOWNo automation on unmanaged devices

SECURITYCompany data on personal devices

Page 4: Secure Enterprise Mobility

4CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Quality of Security Tied to Location

malware

botnets

exploits

Exposed to threats, risky

apps, and data leakage

Enterprise-secured with

full protection

Headquarters Branch Offices

Page 5: Secure Enterprise Mobility

Palo Alto NetworksSafe BYOD Application Enablement

Page 6: Secure Enterprise Mobility

6CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Applications Get Through the Firewall

Network security policy

is enforced at the firewall

• Sees all traffic

• Defines boundary

• Enables access

Traditional firewalls

don’t work any more

Page 7: Secure Enterprise Mobility

7CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Technology Sprawl and Creep

Enterprise Network

• “More stuff” doesn’t solve the problem

• Firewall “helpers” have limited view of traffic

• Complex and costly to buy and maintain

• Doesn’t address application control challenges

IMDLPIPS ProxyURLAV

UTMInternet

Page 8: Secure Enterprise Mobility

8CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Firewall as a Business Enablement Tool

Applications: Safe enablement begins with

application classification by App-ID.

Users: Tying users and devices, regardless of

location, to applications with User-ID and

GlobalProtect.

Content: Scanning content and protecting against

all threats – both known and unknown; with

Content-ID and WildFire.

Page 9: Secure Enterprise Mobility

9CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Security Enforcement in the Enterprise Network

Pe

rim

ete

r

• App visibility and control in the firewall

• All apps, all ports, all the time

• Prevent threats

• Known threats

• Unknown/targeted malware

• Simplify security infrastructure

Da

ta C

en

ter

• Network segmentation

• Based on application and user, not port/IP

• Simple, flexible network security

• Integration into all DC designs

• Highly available, high performance

• Prevent threats

Dis

trib

ute

d E

nte

rpri

se

• Consistent network security everywhere

• HQ/branch offices/remote and mobile users

• Logical perimeter

• Policy follows applications and users, not physical location

• Centrally managed

Page 10: Secure Enterprise Mobility

Enabling Enterprise Mobility & BYOD

Page 11: Secure Enterprise Mobility

12CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

The ClearPass Access Security Platform

CONFIDENTIAL

© Copyright 2013. Aruba Networks, Inc.

All rights reserved12 @arubanetworks

Policy Services

IdentityStores

3rd PartyMDM

App Servers

DIFFERENTIATEDACCESS

UNIFIEDPOLICIES

DEVICEVISIBILITY

GUEST EMPLOYEE

POLICY SERVICES

ENTERPRISE-CLASS AAARADIUS, TACACS+

VPN

OnboardDevice

Provisioning

OnGuardPosture &

Health Checks

GuestVisitor

Management

ONBOARDING AND ASSESSMENT

Multivendor Networks

ClearPass Policy Manager

AAA Services ProfilingPolicy Engine

Page 12: Secure Enterprise Mobility

13CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

All Things Network, Device and App Management

WORKFLOW POLICYVISIBILITY

Role-basedEnforcement

Health/Posture

Checks

Device Context

Device Profiling

Troubleshooting

Per Session Tracking

Onboarding, Registration

Guest Management

MDMIntegration

The ClearPass Solution

Page 13: Secure Enterprise Mobility

Threat Prevention

Page 14: Secure Enterprise Mobility

15CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

The Basics on Threat Prevention

Threat What it is What it does

Exploit Bad application input

usually in the form of

network traffic.

Targets a vulnerability

to hijack control of the

target application or

machine.

Malware Malicious application

or code.

Anything – Downloads,

hacks, explores,

steals…

Command and

Control (C2)

Network traffic

generated by malware.

Keeps the remote

attacker in control ands

coordinates the attack.

Page 15: Secure Enterprise Mobility

16CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

The Lifecycle of Network Attacks

16 | ©2012, Palo

Alto Networks.

Bait the

end-user

1

End-user lured to

a dangerous

application or

website

containing

malicious content

Exploit

2

Infected content

exploits the end-

user, often

without their

knowledge

Download

Backdoor

3

Secondary

payload is

downloaded in

the background.

Malware

installed

Establish

Back-Channel

4

Malware

establishes an

outbound

connection to the

attacker for

ongoing control

Explore &

Steal

5

Remote attacker

has control inside

the network and

escalates the attack

Page 16: Secure Enterprise Mobility

17 | ©2012, Palo Alto Networks. Confidential and Proprietary.

Secondary

Payload

Spread

Laterally

Custom C2

& Hacking

Data Stolen

Exploit Kit Malware From

New Domain

ZeroAccess

Delivered

C2

Established

Hidden

within SSL

New domain

has no

reputation

Payload

designed to

avoid AV

Non-standard

port use evades

detection

Custom

malware = no

AV signature

Internal traffic is

not monitored

Custom protocol

avoids C2

signatures

RDP & FTP

allowed on the

network

Page 17: Secure Enterprise Mobility

18CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Our systematic approach for better security

Copyright © 2014, Palo Alto Networks, Inc. All Rights Reserved

Provide global visibility & intelligence correlation

Discover

unknown

threats

Inspect all traffic across ports, protocols & encryption

Prevent

known threats

2 3Apply

positive

controls

1

Page 18: Secure Enterprise Mobility

Aruba / Palo Alto NetworksValidated Architecture

Page 19: Secure Enterprise Mobility

20CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Aruba and Palo Alto Networks

Mobility Services• Core AAA, NAC

• Device Profiling

• Guest + BYOD

Aruba Wi-Fi &

ClearPass

Palo Alto Networks

Next Generation

Firewall• L7+ AppFW

• Content Security

• Threat Protection

• Exchange rich endpoint

context and access

policies to securely

support BYOD

• Identify, monitor and

control traffic by

user, device and

application

• Map and enforce

security of head-less

network devices such

as printers, faxes and

automation systems

Page 20: Secure Enterprise Mobility

21CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Solution Overview

Feed User-ID Data

– Centralized Username to IP address

mapping

– No software agents required, support

multiple identity stores

– Rich visibility and reporting for compliance

Endpoint/Device Context

– Feed device context to PAN eg.

iPad, Android Phone

– Enable policy enforcement based

on new device context

– Extensible schema allows adding more

context to endpoint data

Centralized Identity Store

– FW admin authentication using Radius

– Provide services for VPN authentication

Page 21: Secure Enterprise Mobility

22CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Populate the Device Objects

Page 22: Secure Enterprise Mobility

23CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Aruba ClearPass Configuration

Page 23: Secure Enterprise Mobility

24CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved#AirheadsConf

Customer Benefits

Improved visibility and security

– Identify all devices connecting to the

network, including headless devices

– NAC / access control policies designed for

mobility

– Protection against a wide variety of threats

Granular, context-aware policies

– Address emerging trends of

BYOD, cloud, SDN, PFE / guest access and

more

Improved performance

– Optimize app performance over wired and

wireless

– Deliver better end-user experience

Page 24: Secure Enterprise Mobility

25CONFIDENTIAL

© Copyright 2014. Aruba Networks, Inc.

All rights reserved

Thank You

#AirheadsConf

Page 25: Secure Enterprise Mobility

26