310 likes | 439 Views
Secure Mobility Safely Onboarding Personal Devices to Corporate Networks. Why We Need to Care About BYOD. We Encourage B ringing Y our O wn D og to Work. Bring Your Own Dog. App Stores Are Really Safe Places to get Apps. Social Media Tells Me BYOD is Trending.
E N D
Secure MobilitySafely Onboarding Personal Devices to Corporate Networks
We Encourage Bringing Your Own Dog to Work Bring Your Own Dog
Containing the Risk of a Cyber Threat Phishing Email on Device Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack Surface is Multiplying With Every New Device
Challenge With Employee-Owned Devices Configuration Settings Managed Unmanaged Non-Standard Devices Consistent Diverse Unknown Apps Corp Push User Downloaded Risk User’s Privacy Full Access Restricted Endpoint Protection Mature Emerging
Network Security Gap / Blindspots Know The Devices Enable BYOD NAC is now one of the key mechanisms for mitigating the risks of consumerization (BYOD) 9% 60% Gartner Strategic Road Map for Network Access Control
3 Phases of Network Access Control Hybrid Devices Consumerization BYOD Guest Device Guest Networking Endpoint Compliance Corp Device Employee Guest Hybrid Users
BYOD Maturity Roadmap Embrace Contain Block Disregard Automation Visibility
Who’s Responsible for Onboarding Devices? Compliance Security Operations Business CSO CIO Bus Unit General Mgr Compliance / Risk Officer Exec VP of Infrastructure Project Management Governance, Risk, Compliance CISO Business Line Management VP Audit and Reporting Director of Security IT Strategy & Architecture Bus Analyst / IT Liaison Mgr Wired/Wireless Network Administration Policy Awareness and Administration Security Engineering Bus Process Monitoring & Operations Security Operations Center Network Operations Center Help Desk / IT Support Incident Response / Forensics Endpoint Administration Application QA/Test Staff Identify/Access Management Application Development Server/DB Administration Vulnerability Assessment End Users App/Service Administration
About Bradford Networks • 12 Years of Efficient Operations • Only $15M Invested • Cash Flow Positive Operating Efficiency 900 Global Customers • Millions of devices under management • 94% Maintenance Renewal • Designed to manage student-owned devices for large campus networks • Healthcare, Financial, Retail, Utilities, … Inspired by EDU • Gartner Visionary • Forrester Leader • SC Magazine Best Buy Rating Pioneer/Leader in Network Access Control • Physical / Virtual Appliance • Cloud/SaaS • Pre-Connect Assessments Most Scalable and Secure Solution
About Bradford Networks Security Policy Automation 900 Global Customers Physical Virtual Cloud Network Edge Visibility Inspired by EDU monitor Remediate Profile enforce 10 Years of BYOD Experience Network Sentry Who What When Where Baseline Analytics Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution
Network Edge Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N
Trust-Based Network Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices
Network Sentry Feature Set Risk Assessment Risk Mitigation SmartEdge Platform Integrations Security Network Visibility Device Profiling Easy Onboarding Endpoint Compliance Network Provisioning Mobility Discover All Wired & Wireless Infrastructure Detect and Classify Every Endpoint Device Simple and Powerful Device and User Onboarding Pre-Connect Risk Assessment of Endpoint Devices Safe Network Access Assignment Wired & Wireless Analytics Historical Event Correlation and Trending
SmartEdge Platform / API Network Sentry SmartEdge Platform Security Mobility Wired & Wireless SmartEdge Platform / API Network Access Control Secure BYOD Edge Visibility Guest Management Network Sentry Network Analytics Easy 802.1x Onboarding Endpoint Compliance Regulatory Compliance When Where What Who
Secure BYOD / Network Access Control Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access
Easy 802.1x Onboarding Captive Portal Usage Policy Device Registration Authentication Open SSID Secure SSID Authentication Server Supplicant Configuration
Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version
Eliminate BYOD Blind Spots Partial Visibility Remediation Active Directory Devices And Users AD Registered Devices & Users Palo Alto Networks Firewall Palo Alto Networks Agent 100% Devices & Users Non-Active Directory Devices and Users 100% Visibility Remediation Guests, Contractors, Students
BYOD Blueprint: NAC and MDM Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not Guest Temp Emp Exec R&D IT
SC Magazine Product Group Test(Identity Management, NAC, DLP)
Benefits with Bradford Networks IT Management Users • CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • 100% Visibility/Control • Automated Policies • Easy to Manage • Totally Integrated • Access They Need • Flexibility They Want • Privacy They Deserve
Taking Action: Request Slides info@bradfordnetworks.com BYOD Whitepaper (NAC, MDM) Info@bradfordnetworks.com Custom Demonstration sales@bradfordnetworks.com