2012 Bradford Networks. All rights reserved. Secure BYOD
Slide 2
2012 Bradford Networks. All rights reserved. The Enterprise
Before Total Control 2 Datacenter Network Trusted Users Manage
Devices Secure
Slide 3
2012 Bradford Networks. All rights reserved. The Mobile
Enterprise Today 3 Datacenter Network Unmanaged Users Unmanaged
Devices Secure ? ConstantlyChanging IncreasedRisk Exponential
Volume of Devices ? Threats
Slide 4
2012 Bradford Networks. All rights reserved. Profile of a
Threat Data Consolidation Data Exfiltration Data Exfiltration
Internal Network Scan Internal Network Scan Phishing Email on
Device Phishing Email on Device Device Compromised Attack Surface
is Multiplying With Every New Device
Slide 5
2012 Bradford Networks. All rights reserved. Challenge With
Employee-Owned Devices Less MoreLess More Less MoreLess Risk
MoreLess Devices / User Personal/Business Use Corporate Data Device
Types # of Apps
Slide 6
2012 Bradford Networks. All rights reserved. Managing Change,
Risk, and Volume IgnoranceIgnorance ControlControl Network
VisibilitySecurity AutomationNetwork Access Policies
Slide 7
2012 Bradford Networks. All rights reserved. Know The Devices
On Your Network Know Your Network Inspired by EDU (BYOD) Network
Access Control Most Scalable and Secure NAC Solution About Bradford
Networks NETWORKACCESSPOLICIES
Slide 8
2012 Bradford Networks. All rights reserved. Network Sentry Key
Features Discover All Wired & Wireless Infrastructure
NetworkVisibility Safe Network Access Assignment
NetworkProvisioning Pre-Connect Risk Assessment of Endpoint Devices
EndpointCompliance Simple and Powerful Device and User Onboarding
EasyOnboarding Historical Event Correlation and Trending Analytics
Visibility / Policies / Automation Detect and Classify Every
Endpoint Device DeviceProfiling SmartEdge Platform Integrations
MDMMDM EndpointProtectionEndpointProtection Wired,Wireless& VPN
SIEM & IDS/IPS SecurityIntelligenceSecurityIntelligence
Slide 9
2012 Bradford Networks. All rights reserved. Network Sentry
SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired /
WirelessNetworks SIEM & IDS/IPS SecurityIntelligence &
Next-Gen Firewalls MDM Registration & On-boarding Endpoint
Compliance Compliance Bring Your Own Device SecurityAutomation
Rapid Threat Response Endpoint Protection & Patch Mgmt
Slide 10
2012 Bradford Networks. All rights reserved. Network Sentry
SmartEdge Platform W HO W HAT W HERE W HEN NETWORKSENTRY Wired /
WirelessNetworks SecurityIntelligence & Next-Gen Firewalls MDM
Endpoint Protection & Patch Mgmt SIEM & IDS/IPS
Slide 11
2012 Bradford Networks. All rights reserved. Network Visibility
W HO W HAT W HEN Real-Time Visibility . L OCATION 2 L OCATION N L
OCATION 1 W HERE VPNVPN
Slide 12
2012 Bradford Networks. All rights reserved. Network Access
Policies W HO W HAT W HERE W HEN T RUSTED U SERS T RUSTED TIME T
RUSTED D EVICES T RUSTED L OCATIONS
Slide 13
2012 Bradford Networks. All rights reserved. Security
Automation Safe Network Provisioning IdentifyUser Assign Network
Access AssessRisk IdentifyDevice No Access Guest Access
Unrestricted Data Sensitive Data
Slide 14
2012 Bradford Networks. All rights reserved. BYOD Visual Policy
Roles InformationLocationsDevices Sensitive IntranetInternet School
Classroom Library Home Laptop Smart Phone iPad Desktop
Faculty/Staff Grade 9-12 Grade 7-8 Grade K-6 Guests
Slide 15
2012 Bradford Networks. All rights reserved. Endpoint
Compliance Safe Configuration Mandatory Applications Required OS
Patch Levels Endpoint Protection Minimum Application Version
VLANAssignment Device Risk Assessment
Slide 16
2012 Bradford Networks. All rights reserved. BYOD Blueprint:
NAC and MDMEmpGuestR&DTempExec IT IT Corp-IT Smartphone Corp
Tablet Employees Smartphone Executives Tablet MDM Agent Installed
or Not
Slide 17
2012 Bradford Networks. All rights reserved. Security
Automation Rapid Threat Response Real-timeRemediation
ThreatResponse
Slide 18
2012 Bradford Networks. All rights reserved. Bradford Networks
CxO Embrace BYOD Balance Risk/Cost Maintain Compliance Users
Flexibility Productivity Access They Need IT Management Manage
Change Manage Risk Manage Volume