Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Transcript of Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for Hybrid ITJeff Green SVP Products
Solving Access for Hybrid IT
Solving Access for Hybrid IT
Securing access is a challenge
97%ENTERPRISES
SUFFERED A BREACH
134BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1% 55%PCMobile
How we are connecting
2011
2015eMarketer 4/15
Hacking 38% (up 8%)
Employee Negligence
15% (doubled)
Insider Theft10%
Physical Theft10%
Subcontractors9%
Primary sources of breaches
Accidental Exposure
13%
Data on the Move7%
ITRC
Solving Access for Hybrid IT
Old NAC:PC and Datacenter
Network Access
Access
PC Datacenter, Campus
VS
New Access:Hybrid IT
Secure Access
Visibility
Compliance
Authentication
Access ControlDatacenter,
Cloud, SaaS, CampusBYOD
How we connect is more complex
Solving Access for Hybrid IT
All Major OSs
On-the-go
Home network
Untrusted LAN
Guest Wi-Fi
Corporate Network
• Enterprise applications
• VDI, terminal services
Datacenter
Cloud SaaS• Apps
Cloud IaaS• AWS, Azure
Mobile Apps• Apps
MobilityHybrid IT,
Cloudification
VDI
Datacenter Consolidati
on
The new reality and challenges of Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFAAuthenticatio
n
Identity Federation
Contextual Access Control
Device Compliance
Data Protection
Secure Data Center Access
Secure Cloud Access
Visibility
Puzzle pieces needed for secure access
Solving Access for Hybrid IT
Secure Access Architecture
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud
Data Center
Employees
Guests
Protected Resources
Solving Access for Hybrid IT
Secure the Endpoint
MDMRemote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud
Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on• Transparent strong
authentication• Device compliance check• Conditional Access Policies• Improved user experience• Integration with mobility
management
Protected Resources
Solving Access for Hybrid IT
Secure Mobile and Cloud
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud
Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for laptops, smartphones and tablets
• Contextual Access control• Compliance policy for access• Identity tied back to the
enterprise• Device & Identity tie
Protected Resources
Solving Access for Hybrid IT
Secure Access Architecture
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud
Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check• Conditional Access Policies• Enforcement points throughout
the network• Guest user access
Protected Resources
Solving Access for Hybrid IT
Visibility
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud
Data Center
Employees
Guests
Visibility into the network
• Understand compliance• Understand the what, who,
when, how• Understand contractors and
third party access• Understand devices hitting
the network and the risk they may cause
Protected Resources
Solving Access for Hybrid IT
SummaryAccess is evolving Hybrid ITIs/has changed the way we secure data. Hybridity is
important.
Endpoint Becomes important in solving the access problems
introduced with Hybrid IT
Identity and DeviceWhilst strong identity and auth is important tying in
device and its compliance is now key
VisibilityUnderstanding what is going on in your network (inc
cloud) is vital
Solving Access for Hybrid IT
Questions?Secure Access For the Next Generation