1 / 23

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks. CEO Won an iPad at Book Club …. Containing the Risk of a Cyber Threat. Phishing Email on Device. Device Compromised. Internal Network Scan. Data Exfiltration. Data Consolidation.

leigh
Télécharger la présentation

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure MobilitySafely Onboarding Personal Devices to Corporate Networks

  2. CEO Won an iPad at Book Club …

  3. Containing the Risk of a Cyber Threat Phishing Email on Device Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack Surface is Multiplying With Every New Device

  4. Challenge With Employee-Owned Devices Configuration Settings Managed Unmanaged Non-Standard Devices Consistent Diverse Unknown Apps Corp Push User Downloaded Risk User’s Privacy Full Access Restricted Endpoint Protection Mature Emerging

  5. Addressing the BYOD Security Gap Know The Devices Enable BYOD 9% 60%

  6. 3 Phases of Network Access Control Hybrid Devices Consumerization BYOD Guest Device Guest Networking Endpoint Compliance Corp Device Employee Guest Hybrid Users

  7. Maturing Visibility & Control to Address BYOD Embrace Automation Policies Contain Visibility Block Disregard Visibility Policies Automation

  8. BYOD Essentials: TotalNetwork Edge Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N

  9. BYOD Essentials: Role-Based Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices

  10. BYOD Essentials: Automation & Control Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access

  11. Who’s Responsible for Onboarding Devices? Compliance Security Operations Business CSO CIO Bus Unit General Mgr Compliance / Risk Officer Exec VP of Infrastructure Project Management Governance, Risk, Compliance CISO Business Line Management VP Audit and Reporting Director of Security IT Strategy & Architecture Bus Analyst / IT Liaison Mgr Wired/Wireless Network Administration Policy Awareness and Administration Security Engineering Bus Process Monitoring & Operations Security Operations Center Network Operations Center Help Desk / IT Support Incident Response / Forensics Endpoint Administration Application QA/Test Staff Identify/Access Management Application Development Server/DB Administration Vulnerability Assessment End Users App/Service Administration

  12. About Bradford Networks Security Policy Automation 900 Global Customers Physical Virtual Cloud Network Edge Visibility Inspired by EDU monitor Remediate Profile enforce 10 Years of BYOD Experience Network Sentry Who What When Where Baseline Analytics Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution

  13. Network Sentry Feature Set Risk Assessment Risk Mitigation SmartEdge Platform Integrations Security Network Visibility Device Profiling Easy Onboarding Endpoint Compliance Network Provisioning Mobility Discover All Wired & Wireless Infrastructure Detect and Classify Every Endpoint Device Simple and Powerful Device and User Onboarding Pre-Connect Risk Assessment of Endpoint Devices Safe Network Access Assignment Wired & Wireless Analytics Historical Event Correlation and Trending

  14. SmartEdge Platform / API Network Sentry SmartEdge Platform Security Mobility Wired & Wireless SmartEdge Platform / API Network Access Control Secure BYOD Edge Visibility Guest Management Network Sentry Network Analytics Easy 802.1x Onboarding Endpoint Compliance Regulatory Compliance When Where What Who

  15. Guest Registration & Management

  16. Easy 802.1x Onboarding Captive Portal Usage Policy Device Registration Authentication Open SSID Secure SSID Authentication Server Supplicant Configuration

  17. Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version

  18. BYOD Blueprint: NAC and MDM Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not Guest Temp Emp Exec R&D IT

  19. SC Magazine Product Group Test(Identity Management, NAC, DLP)

  20. Benefits with Bradford Networks IT Management Users • CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • 100% Visibility/Control • Automated Policies • Easy to Manage • Totally Integrated • Access They Need • Flexibility They Want • Privacy They Deserve

  21. Case Studies: Hospitality / Financial Services / Healthcare • Challenges: • BYOD - Keep unsafe devices off the network • PCI DSS compliance • Benefits: • Automatically identify who and what is accessing their network • Automatically provisions network access according to the role, device, and location • Enforce access policy based on MDM enrollment status • Challenges: • Enable scalable port security in a 200 VLAN environment • Highly distributed NYC, Tokyo, London • Benefits: • Automatically register who and what device is accessing their network • Blocks unsafe devices and unauthorized users • Automatically provisions network access according to risk profile: role, device, and location • Plan to integrate with Palo Alto to isolate problematic users/devices • Challenges: • BYOD - Allow physicians, medical students and staff to access EMR using personal devices • HIPAA compliance • Benefits: • Automatically identifies every device and user accessing the network • Validates MDM is installed before access is granted • Automatically provisions network access according to the user’s designated profile

  22. 900+ Customers Around the World

  23. Taking Action: Request Slides info@bradfordnetworks.com BYOD Whitepaper (NAC, MDM) Info@bradfordnetworks.com Custom Demonstration sales@bradfordnetworks.com

More Related