InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009

Size: px
Start display at page:

Download "InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009"

Transcription

1 InfoExpress Cyber Gatekeeper How to quote? Günter Neuleitner März 2009

2 Agenda 1. Introduction 2. Components 3. Quoting CyberGatekeeper 4. AGENTLESS AND AGENT-BASED 5. Examples

3 1 Introduction 3 Presentation Title Month 2008

4 Network User Aware Security OmniSwitch OmniAccess Wireless OmniAccess Safeguard BRICK Authentication Cybergatekeeper Host Integrity Check OmniAccess Safeguard Role Based Access Comprehensive Pre and Post Admission Control Quarantine and remediation OmniSwitch OmniAccess Safeguard Fortigate Anomaly detection IPS/IDS OmniVista Quarantine OmniAccess Safeguard Monitoring/ compliance 4 Presentation Title Month 2008

5 Alcatel-Lucent Layered Security Strategy, InfoExpress Product Mapping CyberGatekeeper Capability Audit Remediate Quarantine IPS/IDS Role Based Access Host Integrity Authentication 5 Presentation Enterprise Forum Title March Month 2008

6 Benefits of HIC Keeps rogue devices off your network Ensures 100% of endpoints on your network are compliant or quarantined until they are remediated. Prevents vulnerabilities Security solutions are assured to be running and up-todate. OS and patches assured to be current. Lowers help desk costs Automatic remediation of non-compliant PC s HIC for Guest Access mitigates Security risks of Guest/Unmanaged Devices. 6 Presentation Title Month 2008

7 CyberGatekeeper Key Features The CyberGatekeeper solution is positioned as a vital building block in an Enterprise s Security Framework providing the following features: Host integrity check capability to address 802.1x users, non-802.1x regular users, and remote/vpn users Powerful policy management for end-point compliance Automated remediation and interoperability with patch management solutions Compliance reporting audits Fully interoperable with Alcatel-Lucent network infrastructure products Support Windows, Linux, MAC users 7 Presentation Title Month 2008

8 CyberGatekeeper Hardware Architektur 8 Presentation Title Month 2008

9 2 Components 9 Presentation Title Month 2008

10 Overview of CyberGatekeeper Host Integrity Solution Always consists of 4 components CyberGatekeeper Server Purchased by customer Comes in both an appliance and Windows software based on the implementation CyberGatekeeper Agent Purchased by customer CyberGatekeeper Policy Manager Software, comes with the product and is not in the pricing catalog CyberGatekeeper Reporting Server Software, comes with the product and is not in the pricing catalog 10 Presentation Title Month 2008

11 CyberGatekeeper Server Component CyberGatekeeper Remote Server CyberGatekeeper Remote Server Redundant CyberGatekeeper Remote Fail Open Server CyberGatekeeper DNAC Server Dynamic NAC Windows Server 11 Presentation Title Month 2008

12 CyberGatekeeper Server Component CyberGatekeeper Remote Server - Part Number:CGSR1P Acts as a Layer2 bridge between networks. It was designed for VPNs but also is being used directly behind wireless concentrators as the 1GB interface should not create a bottleneck. This is a dedicated device for Layer2 bridging and cannot run any of the other enforcement options of the CyberGatekeeper solution. CyberGatekeeper Remote Server Redundant - Part Number: CGSR1R Uses Spanning Tree Protocol as an active hardware standby. Must be purchased with a primary server CyberGatekeeper Remote Fail Open Server - Part Number: CGSR1F For customers who do not need a hardware redundancy and can tolerate the lack of host integrity during an outage, this is an option. A Fail Open NIC card is used that acts as a network pass-through in case something happens to the server. As an example, if you unplug the server traffic will still pass through this device, but no host integrity checking will occur. 12 Presentation Title Month 2008

13 CyberGatekeeper Server Component CyberGatekeeper DNAC Server - Part Number: CGSL1P Can perform 2 forms of CG implementations simultaneously. The DNAC Server can run on this appliance and needs to be able to communicate to the agents throughout the network. It can also run the 802.1x module, which acts as a radius proxy from the switch to the radius DB. A host integrity attribute is continuously added and based on this attribute an associated VLAN can be enabled. This server does NOT work in-line. Dynamic NAC Windows Server - Part Number: CGSDS A Windows software version of the server for DNAC deployments only. For customers who prefer Windows environments this is an option for them x or in-line is not an option for this server 13 Presentation Title Month 2008

14 CyberGatekeeper Server Hardware appliance or Windows software (DNAC) Assesses endpoint compliance with customer policies Manages network access Sends remediation actions to endpoints Performs authentication 14 Presentation Title Month 2008

15 CyberGatekeeper Policy Manager Design, develop and deploy policy Obtain regular policy updates Configure and build Agent 15 Presentation Title Month 2008

16 CyberGatekeeper Agent Desktop Agent for Windows 98, 2000, XP, 2003, Vista, MacOS X, Linux Web Agent for Internet Explorer and Firefox on Windows 16 Presentation Title Month 2008

17 Audit Failure CG Administrator enables pop-up messages and creates the appropriate content Pop-up message is optional, remediation can be transparent to user 17 Presentation Title Month 2008

18 Remediation Planning Should the endpoint be quarantined? Should the user be notified? Should the problem be solved automatically? BUILT-IN REMEDIATION SUPPORT FULLY INTER-OPERABLE WITH PATCH MANAGEMENT SYSTEMS LIKE PATCHLINK, BIGFIX.. 18 Presentation Title Month 2008

19 Report Manager General reports: Compliance monitor, daily logs/statistics, access report DNAC reports: Audit and access status for endpoints by subnet Centralized DNAC configuration 19 Presentation Title Month 2008

20 Overview of CyberGatekeeper Host Integrity Checking Solution 20 Presentation Enterprise Forum Title March Month 2008

21 3 Quoting CyberGatekeeper 21 Presentation Title Month 2008

22 Quoting CyberGatekeeper What Customers Pay for: Agents Support/Maintenance for Agents Servers Support/Maintenance for Servers What they receive Agent license CyberGatekeeper Servers Management Server Software Policy Management Software 22 Presentation Title Month 2008

23 Information Needed for Quotes 1) How many users in the organization For Web agent, how many unique users per month For 1mb static agent, how many will be installed 2) What is the installation: VPN, Wireless, LAN Identify the Use Case to the Server implementation and use the corresponding part number Redundancy is achieved with 2 or more appliances The exception is the CGSR1P, which will have a CGSR2P for active standby capabilities. They are paired together and would be purchased accordingly. 23 Presentation Title Month 2008

24 What to Quote Agents Web or Static does not matter CGAD-xxxxx Actual Agents CGAD-xxxxx-SPM Support/Maintenance Servers CGSxxx Actual Servers CGSxxx-SPM Support/Maintenance Agents can be used across multiple servers, customer only charged once. 24 Presentation Title Month 2008

25 4 AGENTLESS AND AGENT-BASED 25 Presentation Title Month 2008

26 AGENTLESS AND AGENT-BASED 26 Presentation Title Month 2008

27 5 Examples 27 Presentation Title Month 2008

28 Example 1 28 Presentation Title Month 2008

29 Example 1 29 Presentation Title Month 2008

30 Example 2 30 Presentation Title Month 2008

31 Example 2 31 Presentation Title Month 2008

32 Example 3 32 Presentation Title Month 2008

33 Example 3 33 Presentation Title Month 2008

34 Example 4 34 Presentation Title Month 2008

35 Example 4 35 Presentation Title Month 2008

36 Presentation Title Month 2008

Evolving Network Security with the Alcatel-Lucent Access Guardian

Evolving Network Security with the Alcatel-Lucent Access Guardian T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Secure IP Address Management Layer 2 Network Access Control Solution

Secure IP Address Management Layer 2 Network Access Control Solution Secure IP Address Management Layer 2 Network Access Control Solution Integrated DHCP & IP Address Management Solution Providing Superior Layer 2 Network Access Control Solution Overview Layer 2 Network

More information

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Network Access Control in Virtual Environments. Technical Note

Network Access Control in Virtual Environments. Technical Note Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

A comprehensive portfolio of highly available, secure, easy-to-manage network solutions.

A comprehensive portfolio of highly available, secure, easy-to-manage network solutions. IP Networking Solutions for Enterprises A comprehensive portfolio of highly available, secure, easy-to-manage network solutions. 2 Alcatel-Lucent IP Networking Solutions for Enterprises IP networking solutions

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Bypassing Network Access Control Systems

Bypassing Network Access Control Systems 1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 ofir.arkin@insightix.com http://www.insightix.com 2 What this talk is about? Introduction to NAC The components of a NAC solution

More information

Alcatel-Lucent Enterprise Converged Network Solution

Alcatel-Lucent Enterprise Converged Network Solution Alcatel-Lucent Enterprise Converged Network Solution Deliver a quality user experience, streamline operations and reduce costs The New Challenges in Delivering a High-quality User Experience Three key

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Alcatel-Lucent Services

Alcatel-Lucent Services SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or

More information

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need

More information

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Security It's Broke, Now What? June 15, 2010 Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's

More information

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Paul Cochran - Account Manager. Chris Czerwinski System Engineer Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional

More information

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a quality user experience, streamline operations and reduce costs THE NEW CHALLENGES IN DELIVERING A HIGH-QUALITY USER EXPERIENCE Key trends are driving new

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM

ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

Whitepaper. Securing Visitor Access through Network Access Control Technology

Whitepaper. Securing Visitor Access through Network Access Control Technology Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.

More information

» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com

» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com » WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of

More information

Technical Note. CounterACT: 802.1X and Network Access Control

Technical Note. CounterACT: 802.1X and Network Access Control CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

IDM and Endpoint Integrity Technical Overview

IDM and Endpoint Integrity Technical Overview ProCurve ing by HP IDM and Endpoint Integrity Technical Overview The Threats to Today s ing Environments... 2 Endpoint Integrity Defined... 2 Endpoint Integrity Options... 2 The ProCurve Solution: Endpoint

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Internet for Everyone In-Room Instructions January 2011 Version 1.3

Internet for Everyone In-Room Instructions January 2011 Version 1.3 Internet for Everyone In-Room Instructions January 2011 Version 1.3 Everywhere Internet 2006 Page 1 of 17 Connecting your computer to the Everywhere Internet network in your room 1. You need a network

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Leveraging Bring Your Own Device Programs Network Services Engineered to Enable Employee Choice, Mobility and Security.

Leveraging Bring Your Own Device Programs Network Services Engineered to Enable Employee Choice, Mobility and Security. Leveraging Bring Your Own Device Programs Network Services Engineered to Enable Employee Choice, Mobility and Security Application Note Abstract As more enterprises consider how best to leverage Bring

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Cisco Identity Services Engine

Cisco Identity Services Engine Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring a Small Business s Entire Routing, Switching, Wireless, Security, and Voice Network with a Single, Easy-to-Use Tool. Today s businesses depend more than ever on

More information

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 1...1 Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

HP Intelligent Management Center Standard Software Platform

HP Intelligent Management Center Standard Software Platform Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance

More information

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following:

To participate in the hands-on labs in this class, you need to bring a laptop computer with the following: Course: Deploying Cisco ASA VPN Solutions Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Learning Credits: 35 Description: The Deploying Cisco ASA VPN Solutions (VPN) v2.0 course is a

More information

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Endpoint Security 10 for Windows. Deployment guide Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation

ForeScout CounterACT. Continuous Monitoring and Mitigation Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time

More information

How to Prevent a Data Breach and Protect Your Business

How to Prevent a Data Breach and Protect Your Business Enforcing Security Policies Key Differentiator NetVanta Microsoft Desktop Auditing Providing Insight Into Your Network With an increasingly mobile workforce, technology portability, and the increase in

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

Best Practices: Pass-Through w/bypass (Bridge Mode)

Best Practices: Pass-Through w/bypass (Bridge Mode) Best Practices: Pass-Through w/bypass (Bridge Mode) EdgeXOS Deployment Scenario: Bridge Pass-Through This document is designed to provide an example as to how the EdgeXOS appliance is configured based

More information

End Point Security & Network Access Control

End Point Security & Network Access Control End Point Security & Network Access Control Presented by: Jennifer Jabbusch - Carolina Advanced Digital, Inc. Alan Shimel - StillSecure Darwin Socco - Bracewell & Giuliani LLP Let s Talk About What NAC

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

Cisco AnyConnect Secure Mobility Client integration with ISE & SCCM client for patch remediation on windows

Cisco AnyConnect Secure Mobility Client integration with ISE & SCCM client for patch remediation on windows Cisco AnyConnect Secure Mobility Client integration with ISE & SCCM client for patch remediation on windows This document is about how Cisco AnyConnect Secure Mobility client (aka AnyConnect) can be integrated

More information

Internet Content Provider Safeguards Customer Networks and Services

Internet Content Provider Safeguards Customer Networks and Services Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor

More information

Efficient and easy-to-use network access control and dynamic vlan management. Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom

Efficient and easy-to-use network access control and dynamic vlan management. Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom Efficient and easy-to-use network access control and dynamic vlan management Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom 1 Connection to the enterprise LAN is often (too) easy

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Endpoint Security Risk Management: Control Without Compromise

Endpoint Security Risk Management: Control Without Compromise Endpoint Security Risk Management: Control Without Compromise A V 2 R P O R T F O L I O G R O U P C O M P A N Y Contents Introduction 3 The Current Information Security Landscape 4 Red Lambda s Assurity

More information

Key Considerations for Vulnerability Management: Audit and Compliance

Key Considerations for Vulnerability Management: Audit and Compliance Key Considerations for Vulnerability Management: Audit and Compliance October 5, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software

More information

Cisco Configuration Assistant

Cisco Configuration Assistant Cisco Configuration Assistant Configuring Your Business Entire Routing, Switching, Wireless, Security and Voice Network with a Single, Easy-to-Use Tool Today s businesses depend on network-based applications

More information

Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture

Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Systems and Microsoft Corporation Published: September 2006 Abstract Cisco Systems, Inc. and

More information

Beyond the Firewall No. 71 February, 2012 Network Access Control Edition

Beyond the Firewall No. 71 February, 2012 Network Access Control Edition The Business Advantages of NAC-as-a-Service Benefits, Requirements and Considerations for the Customer and MSP Best practices for securing enterprise networks and data have traditionally focused on perimeter

More information

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Control ProCurve and Microsoft NAP Integration HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK INTRODUCTION Managing and designing an enterprise network is becoming more complex. Delivering real-time applications is a top priority

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2? TM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access)... of 6 1/12/2013 11:46 PM Question/Title UTM SSL-VPN: How to setup SSL-VPN feature (NetExtender Access) on SonicOS Enhanced (SonicOS 5.6 and

More information

HP Intelligent Management Center Standard Software Platform

HP Intelligent Management Center Standard Software Platform Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance

More information

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support

More information

Extreme Access Control For Healthcare

Extreme Access Control For Healthcare DATA SHEET Extreme Access Control For Healthcare (Formerly Network Access Control) End-to-end security and superior user experience. HIGHLIGHTS BUSINESS ALIGNMENT Protect patient data by proactively preventing

More information

Bypassing Network Access Control Systems

Bypassing Network Access Control Systems Bypassing Network Access Control Systems Ofir Arkin Chief Technology Officer Insightix Ltd. September 2006 United States International 945 Concord Street 13 Hasadna Street Framingham, MA 01701 Ra'anana,

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

1. Installation Overview

1. Installation Overview Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

Junos Pulse Supported Platforms Guide

Junos Pulse Supported Platforms Guide Junos Pulse Platforms Guide 5.0R1 November 2013 Contents Introduction........................................................ 2 Documentation...................................................... 2 Hardware

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

Deploying BitDefender Client Security and BitDefender Windows Server Solutions Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions

More information

HP Intelligent Management Center Basic WLAN Manager Software Platform

HP Intelligent Management Center Basic WLAN Manager Software Platform Data sheet HP Intelligent Management Center Basic WLAN Manager Software Platform Key features Intuitive, easy-to-use interface Unified wired and wireless network management Range of topology management

More information

Network-in-a-Box Solution. Services already integrated in the core switch Ideal concept for branch offices, schools or other small business networks

Network-in-a-Box Solution. Services already integrated in the core switch Ideal concept for branch offices, schools or other small business networks Network in a Box Network-in-a-Box Solution Services already integrated in the core switch Ideal concept for branch offices, schools or other small business networks Network-in-a-Box Solution The switch

More information

Mobile device Management mit NAC

Mobile device Management mit NAC Mobile device Management mit NAC fweisel@forescout.com 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal

More information

Lecture 02b Cloud Computing II

Lecture 02b Cloud Computing II Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,

More information

Configure ISE Version 1.4 Posture with Microsoft WSUS

Configure ISE Version 1.4 Posture with Microsoft WSUS Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used

More information

Mobile Network Access Control

Mobile Network Access Control Mobile Network Access Control Extending Corporate Security Policies to Mobile Devices WHITE PAPER Executive Summary Network Access Control (NAC) systems protect corporate assets from threats posed by devices

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs Beyond Quality of Service (QoS) Cost Savings Unrealized THE

More information

Agenda What can we do now? And 5 years from now we will still be current!

Agenda What can we do now? And 5 years from now we will still be current! Pittsburgh Steelers Alcatel-Lucent OmniPCX Enterprise IP Telephone System Alcatel-Lucent OmniSwitch Network Infrastructure Alcatel-Lucent Collaboration and Fax Server AVST Unified Messaging Wireless Network

More information

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe mkoldov@checkpoint.com

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe mkoldov@checkpoint.com Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe mkoldov@checkpoint.com NAC is Here to Enforce identity-based access policies Control who is accessing what Prevent guests

More information

Complete Patch Management

Complete Patch Management Complete Management Targeted, Reliable and Cost-efficient In- Depth CSI Corporate Software Inspector Empower your IT-Operations and Security Teams with the most reliable Vulnerability & Management solution

More information

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE

CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business

More information

Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1

Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1 The AnyConnect Secure Mobility Client offers an ASA Posture Module and an ISE Posture Module. Both provide the Cisco AnyConnect Secure Mobility Client with the ability to assess an endpoint's compliance

More information

Avaya Identity Engines Portfolio

Avaya Identity Engines Portfolio Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs:

More information

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides

More information

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2

More information

IP Converged Network Application Note

IP Converged Network Application Note Application Note Table of contents Introduction / 1 An Explosion in Service Demands / 2 The Traditional Network Approach and Associated Problems / 2 The Application Fluent Converged Network Solution /

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information