1 / 16

Network Access Control 101 Securing the Critical Edge of Your Network

Discover the changing landscape of network access control amidst expanding BYOD and IoT trends. Learn how to safeguard critical endpoints from cyber threats with real-time enforcement, dynamic provisioning, and extensible policy management. Embrace flexibility while maintaining compliance and protecting sensitive data. Access comprehensive network inventory, analytics, and historical reports to enhance security posture.

mendozah
Download Presentation

Network Access Control 101 Securing the Critical Edge of Your Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Network Access Control 101Securing the Critical Edge of Your Network

  2. Notice your network changing? • # of devices on your network growing? • % of devices are corporate issued? • # of devices / user? • % of devices that are mobile? • # of guests and/or contractors?

  3. Your Network is Changing Guests Parent Company Users Suppliers Your Business BYOD Internet Of Things Consultants Partners

  4. Endpoints are Easy Targets for Hackers

  5. Greater Attack Surface = Greater Risk Internet Of Things Drop in % Managed Endpoints BYOD Exposure Risk Corporate 4 x Attack Surface Less Managed Less Context Even Less Managed Even Less Context 100% Managed 100% Context

  6. Bradford Networks Live Inventory of Network Connections Leverage Indicators of Trust/risk Network Access Policies Analytics / Planning / Forensics Real-Time Enforcement Appliance / Virtual / Cloud Delivery

  7. NAC 101:Live Inventory of Network Connections Connect Point User & Group Device Type OS/ Apps Connect Times Site 1 VPN Inventory of Live Network Connections Site 2 …. Site N

  8. NAC 101:Flexible Network Access Policies Network Access To Information Users & Groups Device Types OS/ Apps Connect Point Connect time Financial Assets VPN Credit Cards Critical infrastructure Healthcare Records Legal Information Intellectual Property Student Information

  9. NAC 101: Dynamic Network Provisioning Who What Indicator of Trust Where When Healthcare Records Onboarding Portal Guest Access No Access

  10. NAC 101:Endpoint Compliance Assign Network Access Assess Risk Unrestricted Access Identify Device Restricted Access Guest Access Identify User No Access

  11. NAC 101:Extensible Policy Engine Live / Historical Inventory of Network Access Policies Network Connections Trust? Grant Network Access Risk? Restrict Network Access

  12. NAC 101:LeveragingIndicators of Trust/Risk Live / Historical Inventory of Network Network Access Policies Connections Indicators Of Trust Indicators Of Risk

  13. NAC 101:Self-Service Registration

  14. NAC 101Historical Inventory of Network Connections “Black Box” of Network Connections Network & Device Inventory Planning Forensics Historical Analytics Inventory of Network Connections Device Trend reports Network & Endpoint Risk Report Distribution

  15. NAC 101: Secure the Critical Edge of Your Network IT Management Users CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance • Safe Devices/Apps • Trusted Users • Safe Access • Access They Need • Flexibility They Want • Privacy They Deserve

  16. Taking Action … Questions/Request Slides NAC/BYOD Whitepaper NAC Checklist

More Related