190 likes | 371 Views
Rapid Threat Response From 7 Days to 7 Seconds. Agenda. Changing Threat Landscape Evolution of NAC to Security Automation Intro to Bradford Networks Leveraging Integration and Correlation Rapid Threat Response Business Impact. Profile of Today’s Advanced Cyber Threats. Phishing
E N D
Agenda Changing Threat Landscape Evolution of NAC to Security Automation Intro to Bradford Networks Leveraging Integration and Correlation Rapid Threat Response Business Impact
Profile of Today’s Advanced Cyber Threats Phishing Email on End User’s Device User’s Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack surface is now3x what is was just a few years ago.
The Enterprise Today … Dynamic, Complex Devices Users SAFE Network BLINDSPOT Visibility Datacenter SAFE SAFE Policies SAFE Secure BACKDOOR Enforcement Network Access Control Assessing the Risk of Every User and Device Risk
Network Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N
Flexible Network Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices
Policy Enforcement Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access
Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version
Gaining and Removing Network Access Criteria for Gaining Network Access Criteria for Removing Network Access Network Access Control Security Information & Event Management Active Directory Visibility Intrusion Detection Systems Antivirus Network Access Policies Patch Management Trusted Configurations Risk Indication Advanced Persistent Threat Detection Mobile Device Management Self-Service Onboarding Threat / Device Correlation Security Intelligence & Big Data Analytics Application Whitelisting Endpoint Visibility & Compliance Threat Investigation Workflows Control Network Access Network Change Automation Rapid Threat Response Connect Reassign Reconfigure Isolate Investigate Block
Evolution of NAC NAC 3.0 Security Automation Rapid Threat Response Minimize Threat Think Time Threat Investigation Simplify Investigation Workflows NAC 2.0 BYOD Consumerization/ BYOD Enable Safe Network Provisioning Endpoint Compliance NAC 1.0 Safe Onboarding Ensure Safe Devices Self-Service Onboarding Enable Scalable Onboarding
Cyber Threat Lifecycle Attack To Compromise Compromise To Detection Detection To Containment Attack Compromise Detection Containment Cyber Threat Lifecycle
Why Detection to Containment Takes 7 Days Escalating Total Cost More Impact on Brand Impact Threats Are Targeted and Complex Fragmented IT Skills Silos of Security Information More Records Breached Theft Detection to Containment Time Too Many Security Events
Getting Threat Response Down to 7 Seconds Cyber Security Strategy Visibility Prevention Detection Response Manual Automation 7 SECONDS Threat Intelligence Threat Containment Remediate Device Block Device Restrict Access Determine Motive Trace Method Uncover Mistakes
About Bradford Networks Leader in Rapid Threat Response SMARTEDGE PLATFORM SmartEdge Integration Platform Network Visibility Rapid Threat Response Remediate monitor Profile Isolate Live Inventory of Network Connections (LINC) Block Correlate Best Buy Rating From SC Magazine Network Analytics and Forensics
SmartEdge Platform BYOD Endpoint Protection SIEM SmartEdge Platform Network Firewalls Detection User Time Applications Connection Device
Rapid Threat Response (RTR) Essentials … Live Inventory of Wired, Mobile and VPN Connections Integrated High Fidelity Security Alerts Business-Criticality of User and Endpoints Real-Time and Flexible Control of Network Access
Network Sentry/RTR in Action Detection Response 7 SECONDS Threat Containment IP Address Block Device + User Name + Security Group + Device Type + Operating System + Wired Adapters + Wireless Adapters + Installed Applications + Network Location + Connection Port Restrict Access Remediate Device
Business Impact with Bradford Networks Reduce Threat Response Time From Days to Seconds Automate Response and Reduce Burden on Security Staff Quickly Contain Threats, Prevent Propagation Minimize Cost , Protect Brand, Protect Assets