1 / 30

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks. Why We Need to Care About BYOD. We Encourage B ringing Y our O wn D og to Work. Bring Your Own Dog. App Stores Are Really Safe Places to get Apps. Social Media Tells Me BYOD is Trending.

infinity
Download Presentation

Secure Mobility Safely Onboarding Personal Devices to Corporate Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure MobilitySafely Onboarding Personal Devices to Corporate Networks

  2. Why We Need to Care About BYOD

  3. We Encourage Bringing Your Own Dog to Work Bring Your Own Dog

  4. App Stores Are Really Safe Places to get Apps

  5. Social Media Tells Me BYOD is Trending

  6. We’ve Deployed Our Best Personal Firewall

  7. CEO Won an iPad at Book Club …

  8. Containing the Risk of a Cyber Threat Phishing Email on Device Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack Surface is Multiplying With Every New Device

  9. Challenge With Employee-Owned Devices Configuration Settings Managed Unmanaged Non-Standard Devices Consistent Diverse Unknown Apps Corp Push User Downloaded Risk User’s Privacy Full Access Restricted Endpoint Protection Mature Emerging

  10. Network Security Gap / Blindspots Know The Devices Enable BYOD NAC is now one of the key mechanisms for mitigating the risks of consumerization (BYOD) 9% 60% Gartner Strategic Road Map for Network Access Control

  11. Gartner’s Best Practices to Address BYOD

  12. 3 Phases of Network Access Control Hybrid Devices Consumerization BYOD Guest Device Guest Networking Endpoint Compliance Corp Device Employee Guest Hybrid Users

  13. BYOD Maturity Roadmap Embrace Contain Block Disregard Automation Visibility

  14. Who’s Responsible for Onboarding Devices? Compliance Security Operations Business CSO CIO Bus Unit General Mgr Compliance / Risk Officer Exec VP of Infrastructure Project Management Governance, Risk, Compliance CISO Business Line Management VP Audit and Reporting Director of Security IT Strategy & Architecture Bus Analyst / IT Liaison Mgr Wired/Wireless Network Administration Policy Awareness and Administration Security Engineering Bus Process Monitoring & Operations Security Operations Center Network Operations Center Help Desk / IT Support Incident Response / Forensics Endpoint Administration Application QA/Test Staff Identify/Access Management Application Development Server/DB Administration Vulnerability Assessment End Users App/Service Administration

  15. About Bradford Networks • 12 Years of Efficient Operations • Only $15M Invested • Cash Flow Positive Operating Efficiency 900 Global Customers • Millions of devices under management • 94% Maintenance Renewal • Designed to manage student-owned devices for large campus networks • Healthcare, Financial, Retail, Utilities, … Inspired by EDU • Gartner Visionary • Forrester Leader • SC Magazine Best Buy Rating Pioneer/Leader in Network Access Control • Physical / Virtual Appliance • Cloud/SaaS • Pre-Connect Assessments Most Scalable and Secure Solution

  16. About Bradford Networks Security Policy Automation 900 Global Customers Physical Virtual Cloud Network Edge Visibility Inspired by EDU monitor Remediate Profile enforce 10 Years of BYOD Experience Network Sentry Who What When Where Baseline Analytics Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution

  17. Network Edge Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N

  18. Trust-Based Network Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices

  19. Network Sentry Feature Set Risk Assessment Risk Mitigation SmartEdge Platform Integrations Security Network Visibility Device Profiling Easy Onboarding Endpoint Compliance Network Provisioning Mobility Discover All Wired & Wireless Infrastructure Detect and Classify Every Endpoint Device Simple and Powerful Device and User Onboarding Pre-Connect Risk Assessment of Endpoint Devices Safe Network Access Assignment Wired & Wireless Analytics Historical Event Correlation and Trending

  20. SmartEdge Platform / API Network Sentry SmartEdge Platform Security Mobility Wired & Wireless SmartEdge Platform / API Network Access Control Secure BYOD Edge Visibility Guest Management Network Sentry Network Analytics Easy 802.1x Onboarding Endpoint Compliance Regulatory Compliance When Where What Who

  21. Secure BYOD / Network Access Control Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access

  22. Guest Registration & Management

  23. Easy 802.1x Onboarding Captive Portal Usage Policy Device Registration Authentication Open SSID Secure SSID Authentication Server Supplicant Configuration

  24. Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version

  25. Eliminate BYOD Blind Spots Partial Visibility Remediation Active Directory Devices And Users AD Registered Devices & Users Palo Alto Networks Firewall Palo Alto Networks Agent 100% Devices & Users Non-Active Directory Devices and Users 100% Visibility Remediation Guests, Contractors, Students

  26. BYOD Blueprint: NAC and MDM Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not Guest Temp Emp Exec R&D IT

  27. SC Magazine Product Group Test(Identity Management, NAC, DLP)

  28. Benefits with Bradford Networks IT Management Users • CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • 100% Visibility/Control • Automated Policies • Easy to Manage • Totally Integrated • Access They Need • Flexibility They Want • Privacy They Deserve

  29. 900+ Customers Around the World

  30. Taking Action: Request Slides info@bradfordnetworks.com BYOD Whitepaper (NAC, MDM) Info@bradfordnetworks.com Custom Demonstration sales@bradfordnetworks.com

More Related