230 likes | 381 Views
Secure Mobility Safely Onboarding Personal Devices to Corporate Networks. CEO Won an iPad at Book Club …. Containing the Risk of a Cyber Threat. Phishing Email on Device. Device Compromised. Internal Network Scan. Data Exfiltration. Data Consolidation.
E N D
Secure MobilitySafely Onboarding Personal Devices to Corporate Networks
Containing the Risk of a Cyber Threat Phishing Email on Device Device Compromised Internal Network Scan Data Exfiltration Data Consolidation Attack Surface is Multiplying With Every New Device
Challenge With Employee-Owned Devices Configuration Settings Managed Unmanaged Non-Standard Devices Consistent Diverse Unknown Apps Corp Push User Downloaded Risk User’s Privacy Full Access Restricted Endpoint Protection Mature Emerging
Addressing the BYOD Security Gap Know The Devices Enable BYOD 9% 60%
3 Phases of Network Access Control Hybrid Devices Consumerization BYOD Guest Device Guest Networking Endpoint Compliance Corp Device Employee Guest Hybrid Users
Maturing Visibility & Control to Address BYOD Embrace Automation Policies Contain Visibility Block Disregard Visibility Policies Automation
BYOD Essentials: TotalNetwork Edge Visibility Where What When Who Location 1 Real-Time Visibility VPN Location 2 Single Network Sentry Appliance …. Location N
BYOD Essentials: Role-Based Access Policies Who What Where When Trusted Locations Trusted Users Trusted time Trusted Devices
BYOD Essentials: Automation & Control Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access
Who’s Responsible for Onboarding Devices? Compliance Security Operations Business CSO CIO Bus Unit General Mgr Compliance / Risk Officer Exec VP of Infrastructure Project Management Governance, Risk, Compliance CISO Business Line Management VP Audit and Reporting Director of Security IT Strategy & Architecture Bus Analyst / IT Liaison Mgr Wired/Wireless Network Administration Policy Awareness and Administration Security Engineering Bus Process Monitoring & Operations Security Operations Center Network Operations Center Help Desk / IT Support Incident Response / Forensics Endpoint Administration Application QA/Test Staff Identify/Access Management Application Development Server/DB Administration Vulnerability Assessment End Users App/Service Administration
About Bradford Networks Security Policy Automation 900 Global Customers Physical Virtual Cloud Network Edge Visibility Inspired by EDU monitor Remediate Profile enforce 10 Years of BYOD Experience Network Sentry Who What When Where Baseline Analytics Pioneer/Leader in Network Access Control Most Scalable and Secure NAC Solution
Network Sentry Feature Set Risk Assessment Risk Mitigation SmartEdge Platform Integrations Security Network Visibility Device Profiling Easy Onboarding Endpoint Compliance Network Provisioning Mobility Discover All Wired & Wireless Infrastructure Detect and Classify Every Endpoint Device Simple and Powerful Device and User Onboarding Pre-Connect Risk Assessment of Endpoint Devices Safe Network Access Assignment Wired & Wireless Analytics Historical Event Correlation and Trending
SmartEdge Platform / API Network Sentry SmartEdge Platform Security Mobility Wired & Wireless SmartEdge Platform / API Network Access Control Secure BYOD Edge Visibility Guest Management Network Sentry Network Analytics Easy 802.1x Onboarding Endpoint Compliance Regulatory Compliance When Where What Who
Easy 802.1x Onboarding Captive Portal Usage Policy Device Registration Authentication Open SSID Secure SSID Authentication Server Supplicant Configuration
Endpoint Compliance Device Risk Assessment VLAN Assignment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version
BYOD Blueprint: NAC and MDM Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not Guest Temp Emp Exec R&D IT
SC Magazine Product Group Test(Identity Management, NAC, DLP)
Benefits with Bradford Networks IT Management Users • CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • 100% Visibility/Control • Automated Policies • Easy to Manage • Totally Integrated • Access They Need • Flexibility They Want • Privacy They Deserve
Case Studies: Hospitality / Financial Services / Healthcare • Challenges: • BYOD - Keep unsafe devices off the network • PCI DSS compliance • Benefits: • Automatically identify who and what is accessing their network • Automatically provisions network access according to the role, device, and location • Enforce access policy based on MDM enrollment status • Challenges: • Enable scalable port security in a 200 VLAN environment • Highly distributed NYC, Tokyo, London • Benefits: • Automatically register who and what device is accessing their network • Blocks unsafe devices and unauthorized users • Automatically provisions network access according to risk profile: role, device, and location • Plan to integrate with Palo Alto to isolate problematic users/devices • Challenges: • BYOD - Allow physicians, medical students and staff to access EMR using personal devices • HIPAA compliance • Benefits: • Automatically identifies every device and user accessing the network • Validates MDM is installed before access is granted • Automatically provisions network access according to the user’s designated profile
Taking Action: Request Slides info@bradfordnetworks.com BYOD Whitepaper (NAC, MDM) Info@bradfordnetworks.com Custom Demonstration sales@bradfordnetworks.com