Secure BYOD © 2012 Bradford Networks. All rights reserved. The Enterprise Before – Total Control © 2012 Bradford Networks.
Download ReportTranscript Secure BYOD © 2012 Bradford Networks. All rights reserved. The Enterprise Before – Total Control © 2012 Bradford Networks.
Secure BYOD © 2012 Bradford Networks. All rights reserved. The Enterprise Before – Total Control © 2012 Bradford Networks. All rights reserved. The Mobile Enterprise Today Constantly Changing Threats Increased Risk ? Threats ? © 2012 Bradford Networks. All rights reserved. Exponential Volume of Devices Profile of a Threat Phishing Email on Device Device Compromised Internal Network Scan Data Consolidation Data Exfiltration Attack Surface is Multiplying With Every New Device © 2012 Bradford Networks. All rights reserved. Challenge With Employee-Owned Devices Devices / User Less More Device Types Less More # of Apps Less More Risk Personal/Business Use Less More Corporate Data Less More © 2012 Bradford Networks. All rights reserved. Managing Change, Risk, and Volume Control Awareness Ignorance Network Visibility © 2012 Bradford Networks. All rights reserved. Network Access Policies Security Automation About Bradford Networks Know Your Network Know The Devices On Your Network Inspired by EDU (BYOD) Network Access Control Most Scalable and Secure NAC Solution © 2012 Bradford Networks. All rights reserved. NETWORK ACCESS POLICIES Network Sentry Key Features SmartEdge Platform Integrations Visibility / Policies / Automation Security Intelligence SIEM & IDS/IPS Network Visibility Device Profiling Easy Onboarding Endpoint Compliance Network Provisioning Discover All Wired & Wireless Infrastructure Detect and Classify Every Endpoint Device Simple and Powerful Device and User Onboarding Pre-Connect Risk Assessment of Endpoint Devices Safe Network Access Assignment MDM Endpoint Protection Analytics Wired,Wireless& VPN Historical Event Correlation and Trending © 2012 Bradford Networks. All rights reserved. Network Sentry SmartEdge Platform MDM Bring Your Own Device Endpoint Protection & Patch Mgmt SIEM & IDS/IPS NETWORK SENTRY Security Intelligence & Next-Gen Firewalls Wired / Wireless Networks WHO © 2012 Bradford Networks. All rights reserved. WHAT WHERE WHEN Network Sentry SmartEdge Platform MDM Endpoint Protection & Patch Mgmt SIEM & IDS/IPS NETWORK SENTRY Security Intelligence & Next-Gen Firewalls Wired / Wireless Networks WHO © 2012 Bradford Networks. All rights reserved. WHAT WHERE WHEN Network Visibility WHERE LOCATION 1 Real-Time Visibility LOCATION 2 …. LOCATION N © 2012 Bradford Networks. All rights reserved. VPN WHO WHAT WHEN Network Access Policies WHO WHAT WHERE WHEN TRUSTED LOCATIONS TRUSTED USERS TRUSTED TIME TRUSTED DEVICES © 2012 Bradford Networks. All rights reserved. Security Automation Safe Network Provisioning Assign Network Access Assess Risk Sensitive Data Identify Device Identify User Unrestricted Data Guest Access No Access © 2012 Bradford Networks. All rights reserved. BYOD Visual Policy g Grade K-6 g Guests © 2012 Bradford Networks. All rights reserved. g Desktop Grade 7-8 iPad g Smart Phone g hhhh hhh hh h h Laptop Grade 9-12 Home g Devices Library g Faculty/Staff Classroom Internet g Roles School Intranet Locations Sensitive Information a a a a a a a a a a a a a Endpoint Compliance Device Risk Assessment Safe Configuration Required OS Patch Levels Endpoint Protection Mandatory Applications Minimum Application Version © 2012 Bradford Networks. All rights reserved. VLAN Assignment BYOD Blueprint: NAC and MDM Corp-IT Smartphone Corp Tablet Employee’s Smartphone Executive’s Tablet MDM Agent Installed or Not Guest © 2012 Bradford Networks. All rights reserved. Temp Emp Exec R&D IT Security Automation Rapid Threat Response Real-time Remediation Threat Response © 2012 Bradford Networks. All rights reserved. Bradford Networks IT Management CxO Users • Manage Change • Embrace BYOD • Flexibility • Manage Risk • Balance Risk/Cost • Productivity • Manage Volume • Maintain Compliance • Access They Need © 2012 Bradford Networks. All rights reserved.