160 likes | 170 Views
Discover the changing landscape of network access control amidst expanding BYOD and IoT trends. Learn how to safeguard critical endpoints from cyber threats with real-time enforcement, dynamic provisioning, and extensible policy management. Embrace flexibility while maintaining compliance and protecting sensitive data. Access comprehensive network inventory, analytics, and historical reports to enhance security posture.
E N D
Network Access Control 101Securing the Critical Edge of Your Network
Notice your network changing? • # of devices on your network growing? • % of devices are corporate issued? • # of devices / user? • % of devices that are mobile? • # of guests and/or contractors?
Your Network is Changing Guests Parent Company Users Suppliers Your Business BYOD Internet Of Things Consultants Partners
Greater Attack Surface = Greater Risk Internet Of Things Drop in % Managed Endpoints BYOD Exposure Risk Corporate 4 x Attack Surface Less Managed Less Context Even Less Managed Even Less Context 100% Managed 100% Context
Bradford Networks Live Inventory of Network Connections Leverage Indicators of Trust/risk Network Access Policies Analytics / Planning / Forensics Real-Time Enforcement Appliance / Virtual / Cloud Delivery
NAC 101:Live Inventory of Network Connections Connect Point User & Group Device Type OS/ Apps Connect Times Site 1 VPN Inventory of Live Network Connections Site 2 …. Site N
NAC 101:Flexible Network Access Policies Network Access To Information Users & Groups Device Types OS/ Apps Connect Point Connect time Financial Assets VPN Credit Cards Critical infrastructure Healthcare Records Legal Information Intellectual Property Student Information
NAC 101: Dynamic Network Provisioning Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access
NAC 101:Endpoint Compliance Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access
NAC 101:Extensible Policy Engine Live / Historical Inventory of Network Access Policies Network Connections Trust? Grant Network Access Risk? Restrict Network Access
NAC 101:LeveragingIndicators of Trust/Risk Live / Historical Inventory of Network Network Access Policies Connections Indicators Of Trust Indicators Of Risk
NAC 101Historical Inventory of Network Connections “Black Box” of Network Connections Network & Device Inventory Planning Forensics Historical Analytics Inventory of Network Connections Device Trend reports Network & Endpoint Risk Report Distribution
NAC 101: Secure the Critical Edge of Your Network IT Management Users CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • Safe Devices/Apps • Trusted Users • Safe Access • Access They Need • Flexibility They Want • Privacy They Deserve
Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist