1 / 7

A Secure Network for All

Learn how to secure your network and protect corporate intellectual property from physical and unintentional access by implementing a visitor, customer, and competitor access system. Explore ways to use non-company laptops on the corporate network for internet and internal application use while ensuring wireless access security. Discover the principle of least privilege, the importance of patching and anti-virus requirements, and strategies to prevent the introduction of malware into your network. Find out how to block valid users and streamline support staff's understanding of access permissions, all without the need for network redesign.

bethanyd
Download Presentation

A Secure Network for All

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Secure Network for All Team Excel

  2. Requirements Business • Add visitor, customer, and competitor access • Use non-company laptops onto corporate network for internet and internal application use • Visitor access to internet, VPN • Wireless access Security • Protect corporate IP • Principle of least privilege • Patch and anti-virus required • Wireless access to internal network prohibited

  3. Challenge = How?

  4. Risks Physical access to multiple networks Protection of Intellectual Property Introduction of Malware Unintentional access to corporate data and applications Blocking of valid users Difficult for support staff to understand who can access what Are you at risk? Anyone with a requirement to protect corporate intellectual property or privacy data: Government Healthcare Research Engineering Many more

  5. Technology

  6. Summary • How do you prevent disclosure to those with physical access? • How do you grant access to some while limiting access to others? • How can you do it without re-designing your network? • How can you meet the business requirements without giving away the corporate secrets? Solution: Week 10

  7. Questions?

More Related