© 2012 Bradford Networks. All rights reserved. Secure BYOD.

18
© 2012 Bradford Networks. All rights reserved. Secure BYOD

Transcript of © 2012 Bradford Networks. All rights reserved. Secure BYOD.

  • Slide 1
  • 2012 Bradford Networks. All rights reserved. Secure BYOD
  • Slide 2
  • 2012 Bradford Networks. All rights reserved. The Enterprise Before Total Control 2 Datacenter Network Trusted Users Manage Devices Secure
  • Slide 3
  • 2012 Bradford Networks. All rights reserved. The Mobile Enterprise Today 3 Datacenter Network Unmanaged Users Unmanaged Devices Secure ? ConstantlyChanging IncreasedRisk Exponential Volume of Devices ? Threats
  • Slide 4
  • 2012 Bradford Networks. All rights reserved. Profile of a Threat Data Consolidation Data Exfiltration Data Exfiltration Internal Network Scan Internal Network Scan Phishing Email on Device Phishing Email on Device Device Compromised Attack Surface is Multiplying With Every New Device
  • Slide 5
  • 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Less MoreLess More Less MoreLess Risk MoreLess Devices / User Personal/Business Use Corporate Data Device Types # of Apps
  • Slide 6
  • 2012 Bradford Networks. All rights reserved. Managing Change, Risk, and Volume IgnoranceIgnorance ControlControl Network VisibilitySecurity AutomationNetwork Access Policies
  • Slide 7
  • 2012 Bradford Networks. All rights reserved. Know The Devices On Your Network Know Your Network Inspired by EDU (BYOD) Network Access Control Most Scalable and Secure NAC Solution About Bradford Networks NETWORKACCESSPOLICIES
  • Slide 8
  • 2012 Bradford Networks. All rights reserved. Network Sentry Key Features Discover All Wired & Wireless Infrastructure NetworkVisibility Safe Network Access Assignment NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices EndpointCompliance Simple and Powerful Device and User Onboarding EasyOnboarding Historical Event Correlation and Trending Analytics Visibility / Policies / Automation Detect and Classify Every Endpoint Device DeviceProfiling SmartEdge Platform Integrations MDMMDM EndpointProtectionEndpointProtection Wired,Wireless& VPN SIEM & IDS/IPS SecurityIntelligenceSecurityIntelligence
  • Slide 9
  • 2012 Bradford Networks. All rights reserved. Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired / WirelessNetworks SIEM & IDS/IPS SecurityIntelligence & Next-Gen Firewalls MDM Registration & On-boarding Endpoint Compliance Compliance Bring Your Own Device SecurityAutomation Rapid Threat Response Endpoint Protection & Patch Mgmt
  • Slide 10
  • 2012 Bradford Networks. All rights reserved. Network Sentry SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired / WirelessNetworks SecurityIntelligence & Next-Gen Firewalls MDM Endpoint Protection & Patch Mgmt SIEM & IDS/IPS
  • Slide 11
  • 2012 Bradford Networks. All rights reserved. Network Visibility W HO W HAT W HEN Real-Time Visibility . L OCATION 2 L OCATION N L OCATION 1 W HERE VPNVPN
  • Slide 12
  • 2012 Bradford Networks. All rights reserved. Network Access Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T RUSTED D EVICES T RUSTED L OCATIONS
  • Slide 13
  • 2012 Bradford Networks. All rights reserved. Security Automation Safe Network Provisioning IdentifyUser Assign Network Access AssessRisk IdentifyDevice No Access Guest Access Unrestricted Data Sensitive Data
  • Slide 14
  • 2012 Bradford Networks. All rights reserved. BYOD Visual Policy Roles InformationLocationsDevices Sensitive IntranetInternet School Classroom Library Home Laptop Smart Phone iPad Desktop Faculty/Staff Grade 9-12 Grade 7-8 Grade K-6 Guests
  • Slide 15
  • 2012 Bradford Networks. All rights reserved. Endpoint Compliance Safe Configuration Mandatory Applications Required OS Patch Levels Endpoint Protection Minimum Application Version VLANAssignment Device Risk Assessment
  • Slide 16
  • 2012 Bradford Networks. All rights reserved. BYOD Blueprint: NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp Tablet Employees Smartphone Executives Tablet MDM Agent Installed or Not
  • Slide 17
  • 2012 Bradford Networks. All rights reserved. Security Automation Rapid Threat Response Real-timeRemediation ThreatResponse
  • Slide 18
  • 2012 Bradford Networks. All rights reserved. Bradford Networks CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users Flexibility Productivity Access They Need IT Management Manage Change Manage Risk Manage Volume