SlideShare uma empresa Scribd logo
1 de 12
Solving access for Hybrid IT
Jeff Green SVP Products
Solving Access for Hybrid IT
Securing access is a challenge
Solving Access for Hybrid IT
97%
ENTERPRISES
SUFFERED A
BREACH
134
BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1%
55%
PC
Mobile
How we are connecting
2011
2015
Hacking 38%
(up 8%)
Employee
Negligence
15% (doubled)
Insider Theft
10%
Physical Theft
10%
Subcontractors
9%
Primary sources of breaches
Accidental
Exposure
13%
Data on the Move
7%
Old NAC:
PC and Datacenter
NetworkAccess
Access
PC Datacenter, Campus
VS
New Access:
Hybrid IT
SecureAccess
Visibility
Compliance
Authentication
Access Control
Datacenter,
Cloud, SaaS, Campus
BYOD
Solving Access for Hybrid IT
How we connect is more complex
All Major OSs
On-the-go
Home network
Untrusted LAN
Guest Wi-Fi
Corporate Network
• Enterprise applications
• VDI, terminal services
Datacenter
Cloud SaaS
• Apps
Cloud IaaS
• AWS, Azure
Mobile Apps
• Apps
Mobility Hybrid IT,
Cloudification
VDI
Datacenter
Consolidation
The new reality and challenges of Hybrid IT
Solving Access for Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFA
Authentication
Identity
Federation
Contextual
Access Control
Device
Compliance
Data Protection
Secure Data
Center Access
Secure Cloud
Access
Visibility
Puzzle pieces needed for secure access
Secure Access Architecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Protected
Resources
Secure the Endpoint
Solving Access for Hybrid IT
MDMRemote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on
• Transparent strong authentication
• Device compliance check
• Conditional Access Policies
• Improved user experience
• Integration with mobility
management
Protected
Resources
Secure Mobile and Cloud
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for
laptops, smartphones and tablets
• Contextual Access control
• Compliance policy for access
• Identity tied back to the enterprise
• Device & Identity tie
Protected
Resources
Secure Access Architecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check
• Conditional Access Policies
• Enforcement points throughout the
network
• Guest user access
Protected
Resources
Visibility
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Visibility into the network
• Understand compliance
• Understand the what, who, when,
how
• Understand contractors and third
party access
• Understand devices hitting the
network and the risk they may
cause
Protected
Resources
Summary
Solving Access for Hybrid IT
Access is evolving
Hybrid IT
Is/has changed the way we secure data. Hybridity is important.
Endpoint
Becomes important in solving the access problems introduced
with Hybrid IT
Identity and Device
Whilst strong identity and auth is important tying in device and
its compliance is now key
Visibility
Understanding what is going on in your network (inc cloud) is
vital
Questions?
Secure Access For the Next Generation
Solving Access for Hybrid IT

Mais conteúdo relacionado

Mais procurados

Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Joanna Hendricks
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud
 
DNA: an overview
DNA: an overviewDNA: an overview
DNA: an overview
Cisco DevNet
 

Mais procurados (20)

Mobility Trends Impacting Healthcare
Mobility Trends Impacting HealthcareMobility Trends Impacting Healthcare
Mobility Trends Impacting Healthcare
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Nas nie zaatakują!
Nas nie zaatakują!Nas nie zaatakują!
Nas nie zaatakują!
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Shedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
DNA: an overview
DNA: an overviewDNA: an overview
DNA: an overview
 
Preparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoTPreparing healthcare networks for mobility, digitalization and IoT
Preparing healthcare networks for mobility, digitalization and IoT
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Cloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO SuccessfulCloud Security: Make Your CISO Successful
Cloud Security: Make Your CISO Successful
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Q IoT 公私雲- stacy
Q IoT 公私雲- stacyQ IoT 公私雲- stacy
Q IoT 公私雲- stacy
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
4.2.cloud storage
4.2.cloud storage4.2.cloud storage
4.2.cloud storage
 

Destaque

Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44
Jisc
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
Jisc
 

Destaque (20)

Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44Dealing with pervasive monitoring - Networkshop44
Dealing with pervasive monitoring - Networkshop44
 
End to end performance - Networkshop44
End to end performance -  Networkshop44End to end performance -  Networkshop44
End to end performance - Networkshop44
 
Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44Whats new in ict law - Networkshop44
Whats new in ict law - Networkshop44
 
Next gen insight networkshop44
Next gen insight   networkshop44Next gen insight   networkshop44
Next gen insight networkshop44
 
Eduroam workshop nic mitev probes - networkshop44
Eduroam workshop  nic mitev probes - networkshop44Eduroam workshop  nic mitev probes - networkshop44
Eduroam workshop nic mitev probes - networkshop44
 
Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016Find out about Jisc - Networkshop44 2016
Find out about Jisc - Networkshop44 2016
 
Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44Edupert best practices in supporting end users - Networkshop44
Edupert best practices in supporting end users - Networkshop44
 
Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44Managing and monitoring large scale data transfers - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
 
Jisc update janet6 upgrade networkshop44
Jisc update janet6 upgrade   networkshop44Jisc update janet6 upgrade   networkshop44
Jisc update janet6 upgrade networkshop44
 
Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44Eduroam in portsmouth's wireless city - Networkshop44
Eduroam in portsmouth's wireless city - Networkshop44
 
Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...Jisc and janet network updates from network operations, operational services ...
Jisc and janet network updates from network operations, operational services ...
 
End to end performance networkshop44
End to end performance   networkshop44End to end performance   networkshop44
End to end performance networkshop44
 
Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44Network performance lessons from the coal face - Networkshop44
Network performance lessons from the coal face - Networkshop44
 
Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44Welcome to Networkshop44 - Networkshop44
Welcome to Networkshop44 - Networkshop44
 
Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016Eduroam seminar - Networkshop44 2016
Eduroam seminar - Networkshop44 2016
 
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev proactive learning - networkshop44
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
 
Multiprotocol label switching (mpls) - Networkshop44
Multiprotocol label switching (mpls)  - Networkshop44Multiprotocol label switching (mpls)  - Networkshop44
Multiprotocol label switching (mpls) - Networkshop44
 
Hyper efficient data centres – key ingredient intelligence networkshop44
Hyper efficient data centres – key ingredient intelligence   networkshop44Hyper efficient data centres – key ingredient intelligence   networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44
 
Dev ops, noops or hypeops - Networkshop44
Dev ops, noops or hypeops -  Networkshop44Dev ops, noops or hypeops -  Networkshop44
Dev ops, noops or hypeops - Networkshop44
 

Semelhante a Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44

Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Miriade Spa
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
Mark Interrante
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digital
Burhan Kamal
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
Yaakub Idris
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 

Semelhante a Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44 (20)

Solving access for Hybrid IT
Solving access for Hybrid ITSolving access for Hybrid IT
Solving access for Hybrid IT
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)3 Steps to Safely Bringing Your Own Devices (BYOD)
3 Steps to Safely Bringing Your Own Devices (BYOD)
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Corporate Mobility Insights
Corporate Mobility InsightsCorporate Mobility Insights
Corporate Mobility Insights
 
Bring Your Own Device - DesktopDirect by Array Networks
 Bring Your Own Device - DesktopDirect by Array Networks Bring Your Own Device - DesktopDirect by Array Networks
Bring Your Own Device - DesktopDirect by Array Networks
 
Optimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT StrategyOptimizing Your Hybrid IT Strategy
Optimizing Your Hybrid IT Strategy
 
vtec-company-profile-final-digital
vtec-company-profile-final-digitalvtec-company-profile-final-digital
vtec-company-profile-final-digital
 
Big data in term of security measure
Big data in term of security measureBig data in term of security measure
Big data in term of security measure
 
Information Security
Information SecurityInformation Security
Information Security
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
 
Wp byod
Wp byodWp byod
Wp byod
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
 
Mobile secure workplace briefing presentation
Mobile secure workplace briefing presentationMobile secure workplace briefing presentation
Mobile secure workplace briefing presentation
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Authentication in cloud computing
Authentication in cloud computingAuthentication in cloud computing
Authentication in cloud computing
 
Alpha & Omega's Managed Security
Alpha & Omega's Managed SecurityAlpha & Omega's Managed Security
Alpha & Omega's Managed Security
 

Mais de Jisc

Mais de Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Último

Último (20)

NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44

  • 1. Solving access for Hybrid IT Jeff Green SVP Products Solving Access for Hybrid IT
  • 2. Securing access is a challenge Solving Access for Hybrid IT 97% ENTERPRISES SUFFERED A BREACH 134 BEFORE BREACHES WERE DISCOVERED DAYS Gigamon 2015 1% 55% PC Mobile How we are connecting 2011 2015 Hacking 38% (up 8%) Employee Negligence 15% (doubled) Insider Theft 10% Physical Theft 10% Subcontractors 9% Primary sources of breaches Accidental Exposure 13% Data on the Move 7%
  • 3. Old NAC: PC and Datacenter NetworkAccess Access PC Datacenter, Campus VS New Access: Hybrid IT SecureAccess Visibility Compliance Authentication Access Control Datacenter, Cloud, SaaS, Campus BYOD Solving Access for Hybrid IT How we connect is more complex
  • 4. All Major OSs On-the-go Home network Untrusted LAN Guest Wi-Fi Corporate Network • Enterprise applications • VDI, terminal services Datacenter Cloud SaaS • Apps Cloud IaaS • AWS, Azure Mobile Apps • Apps Mobility Hybrid IT, Cloudification VDI Datacenter Consolidation The new reality and challenges of Hybrid IT Solving Access for Hybrid IT MAM/MDM VPN Mobile GW Web GW Cloud Security GW NAC
  • 5. 2FA/MFA Authentication Identity Federation Contextual Access Control Device Compliance Data Protection Secure Data Center Access Secure Cloud Access Visibility Puzzle pieces needed for secure access
  • 6. Secure Access Architecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Protected Resources
  • 7. Secure the Endpoint Solving Access for Hybrid IT MDMRemote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Securing the endpoint • Native app single sign-on • Transparent strong authentication • Device compliance check • Conditional Access Policies • Improved user experience • Integration with mobility management Protected Resources
  • 8. Secure Mobile and Cloud Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Mobile and Cloud access • Easy BYOD on/off-boarding for laptops, smartphones and tablets • Contextual Access control • Compliance policy for access • Identity tied back to the enterprise • Device & Identity tie Protected Resources
  • 9. Secure Access Architecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Network and Datacenter access • Device compliance check • Conditional Access Policies • Enforcement points throughout the network • Guest user access Protected Resources
  • 10. Visibility Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Visibility into the network • Understand compliance • Understand the what, who, when, how • Understand contractors and third party access • Understand devices hitting the network and the risk they may cause Protected Resources
  • 11. Summary Solving Access for Hybrid IT Access is evolving Hybrid IT Is/has changed the way we secure data. Hybridity is important. Endpoint Becomes important in solving the access problems introduced with Hybrid IT Identity and Device Whilst strong identity and auth is important tying in device and its compliance is now key Visibility Understanding what is going on in your network (inc cloud) is vital
  • 12. Questions? Secure Access For the Next Generation Solving Access for Hybrid IT

Notas do Editor

  1. Gigamon survey 97% of enterprises breached, total cost around 2B – average enterprise breach costs $2-3M These breaches go undetected for 134 days. The survey suggests that deploying NAC reduces the breach cost by 20% eMarketer Use of mobile phones has grown from an average of 40 minutes to 3 hours Use of laptops has stayed flat in the same period ITRC - US Businesses – 71 breaches - 40% of breaches publically reported and some 5m records Educational – 58 breaches – 700k records 7.4% of overall breaches e.g. Boston Uni Emails sent to wrong recipients, websites hacked, ftp sites publically expose, laptops with data stolen
  2. Access whether on the network or remote has changed over the years we only used to worry about controlling access. Authorization was really about the user and a password (maybe 2FA) Today we want to understand the device, the user and the compliance level of the device. All of this becomes part of the authorization decision Visibility into users, device and applications becomes more important in policy than resources, ports and IPs in Hybrid IT
  3. How we are connecting has changed – no longer just a corporate port The devices we use has changed from 1 laptop to multiple devices From one heterogeneous OS to many proprietary to closed/opensource The different types of networks we connect to bring different types of risk The types of devices have different risk profiles Mobilizing Access and Applications is demanding We have a number of access gateways for cloud security (CASB), Data-center (VPN/Firewall/NAC) We have created a number of management technologies for the endpoint MDM, SMS, Tivoli We have tried to mobilize PC applications and infrastructure with VDI which doesn’t work on tablets and phones well On the hosting front we are moving applications to the data center to cloud without a solid plan for security We are deploying SaaS based services for ease and cost being driven out of the business side more than IT Creating consistent access policy across many of these environments becomes challenging Multiple consoles, Multiple policies hard to rationalize Security posture becomes impossible to assess yet attest
  4. Securing access to application, data and services is infinitely more challenging than the old world of DC only. Finding one vendor that ticks all the boxes to provide security across this hybrid environment is hard. We are often left stitching disparate solutions together. Sometimes ones that were not necessarily designed to work together It is important to find a vendor or series of vendors that are open and can create the glue in the solution Securing data in motion is almost pointless when the data rests unencrypted on a device. Authenticating a user without checking the posture of the device could mean that malware steels the information/IP Accessing info without adequate authentication and identity capability means anyone with a lost device could access IP Allowing employees to access information without device compliance could mean an apt or malware could be stealing data. According to Impima 35% of data loss is due to malware and 72% that suffer major losses shutdown in 24 months. Having visibility into what is happening in the environment from the data centers and cloud apps being used to the devices and users connecting to them. Getting this visibility is hard and being able to manage multiple solutions is tough. Finding the glue will help lessen complexity of reporting and configuration
  5. A secure access architecture include dealing with Cloud, DC and Campus It includes dealing with Mobile, Laptop and desktop Needs to enable access not restrict it Hybrid IT includes cloud, DC and campus Need a VPN to allow remote access to the DC Need Cloud GW manage access to the cloud or SaaS based services Need a network access control service to manage access to the DC and campus for employees in the office Above all of this an identity management system such Active Directory with 2/MFA Ideally one management console to manage this. Policies should be central around users and not resources Vendor who has independence and can work well within an eco-system of products such that you can protect your existing investments and adapt to new demands
  6. Securing the endpoint becomes very important Outside to outside the organization Single sign on on the endpoint become important for native and html apps Create consistent password and user management policies across the hybrid environment Authentication is important an many companies delivering MFA. Authentication becomes around data not access. Give example Understanding the compliance of device becomes important to protecting your data. Is it encrypted, protected or vulnerable Conditional access is all about making decisions and conditioning access based on the user, auth level and device compliance/trust User experience is also key for user adoption to prevent users working around the system and controls. Today access can be clumsy and cumbersome for the end user If you need to create security on the endpoint this can be achieved by using a MDM or MAM solution for mobile users. This should them be integrated into your access policy. You can make conditional access policy through integrations with MDM solutions to determine compliance with policies or to assign access roles. Give examples
  7. Enabling mobile access to resources within the DC and the cloud requires you to think about new ways to manage device lifecycle for managed and unmanaged devices. Simplifying access to the network. An onboarding of a device should be simple and provision access to the VPN, Wi-Fi networks install all appropriate software and provision certificates for stronger identity and authentication. Contextual access control can be extended to cloud services allowing you to control access to a service based on a devices compliance or authentication level The identity can be tied back to the enterprise by use a cloud / mobile GW as an identity provider using SAML. This can work for native and HTML based apps. Thus SAML based assertions can be based on the authenticated user back to the AD or LDAP server using 2/MFA You can also tie the identity to the device using auth chaining with device cert and the user credentials
  8. Conditional access that lets you roam from outside the network to inside without re-authentication Enforcement point throughout the network that allow you to provide consistent user policy across access gateways, Wi-Fi Aps, VPN or Firewalls. This gives you the ability to enforce access through multiple entry/access points Create a secured access environment for visitors and guests that allows self service and easy provisioning of users. Creating a segmented environment for users to safely access the internet without a burden being placed on an IT team
  9. Visibility become key to securing access. You have challenges of dealing with managed and unmanaged devices (BYOD) understanding what is hitting your network and accessing resources when often many resources are protected with a basic authentication. Integration with management platforms such as MDM and inventory management systems show your corporate or organizational devices that are under management. But there are many devices that may not be under management such as printers and IP phones. These unmanaged devices are usually discovered using profiler technologies. However the endpoint is important in providing total visibility when Cloud based services and mobility come into play. Once mobile devices are outside the corporate network access cloud services all visibility is lost unless you force it through the infrastructure which often places unnecessary load on gateway boxes. The endpoint can provide vital information on applications use, and the risk the device might pose such as unpatched vulnerabilities. Understanding the 5W’s of visibility Who – the user that is authenticating Which – the device they are using What – what application and data are they accessing When – the time at which they access and patterns of behavior Where – what location are they accessing things from
  10. Hybrid IT is changing the way we fundamentally think about security. The perimeter and protecting data is not longer inside our four walls. The advent of mobility has changes the way in which we access data and when we access it. Endpoint becomes important around solving access to cloud technologies. This includes providing single sign on and password policy across multiple app in the datacenter and/or cloud. It also provides visibility into cloud apps being used outside of the organizations four walls. Identity of the user and tying the device to that identity become important it makes it harder for a hacked device or hacked user to be exploited. Your banks does this when you log in on a new machine Visibility of what is going on in your network is key and allows you to react and adjust controls appropriately