The most advanced policy management platform available
|
|
|
- Earl Mosley
- 10 years ago
- Views:
Transcription
1 Aruba Policy Manager The most advanced policy management platform available The platform provides role- and device-based network access control for employees, contractors and guests across any wired, wireless and VPN infrastructure. With built-in RADIUS, TACACS+, device profiling and posture assessment, onboarding, guest access, and a comprehensive context-based policy engine, is unrivaled as a foundation for network security in any organization. can be extended to third-party security and IT systems using REST-based APIs to automate workflows that previously required manual IT intervention. It integrates with mobile device management to leverage device inventory and posture information, which enables better-informed policy decisions. In addition to automating mobility services, supports self-service capabilities for end users. Users can securely configure their own devices for enterprise use and register AirPlay-, AirPrint-, DLNA-, and UPnP-enabled devices for sharing. The result is a comprehensive and scalable access management platform that goes beyond traditional AAA solutions to deliver consistent policies for IT-owned and bring-your-own-device (BYOD) security requirements. Key features Role-based network access enforcement for multivendor Wi-Fi, wired and VPN networks. Industry-leading performance, scalability, high availability and load balancing. Web-based interface simplifies policy configuration and troubleshooting. Supports NAC, Microsoft NAP posture and health checks, and MDM integration for mobile device posture checks. Auto Sign-On and single sign-on (SSO) support via SAML v2.0. Advanced reporting of all user authentications and failures. HTTP/RESTful APIs for integration with third party systems such as SIEM, Internet security and MDM. Device profiling and self-service onboarding. Guest access with extensive branding and customization and sponsor-based approvals. IPv6 administration support THE CLEARPASS DIFFERENCE The Policy Manager is the only NAC solution that centrally enforces all aspects of enterprise mobility from a single platform. Granular network access privileges are granted based on a user s role, device type, MDM attributes, device health, location, and time-of-day. Offering unsurpassed interoperability, supports an extensive collection of multivendor wireless, wired and VPN networking equipment which enables IT to easily rollout secure mobility policies across any infrastructure. With flexible deployment options, IT can start by providing sponsored guest access and let employees self-configure their own devices, and later add MDM. scales to support tens of thousands of devices and users. UNPRECEDENTED SIMPLICITY Centrally-defined policies and enforcement eliminates the need for multiple AAA and policy management systems, which strengthens an organization s overall security architecture. A host of built-in capabilities lets IT quickly adapt to changing network access challenges.
2 An easy-to-use template-based interface provides an efficient way to create network access and authentication services, regardless of current identity stores, authentication methods or enforcement models. Policy Manager is also a valuable security operations and troubleshooting infrastructure that delivers unprecedented visibility to quickly identify network issues, and policy and security vulnerabilities. ADVANCED POLICY MANAGEMENT Employee access Policy Manager offers user and device authentication based on 802.1X, non-802.1x and web portal access methods. Multiple authentication protocols like PEAP, EAP-FAST, EAP-TLS, EAP-TTLS, and EAP-PEAP-Public can be used concurrently to strengthen security in any environment. Attributes from multiple identity stores such as Microsoft Active Directory, LDAP-compliant directory, ODBC-compliant SQL database, token servers and internal databases across domains can be used within a single policy for finegrained control. Additionally, posture assessments and remediation can be added to existing policies at any time. Built-in device profiling has the only built-in profiling service that discovers and classifies all endpoints, regardless of device type. A variety of contextual data MAC OUIs, DHCP fingerprinting and other identity-centric device data can be obtained and used within policies. Stored profiling data is used to identify device profile changes and to dynamically modify authorization privileges. For example, if a printer appears as a Windows laptop, Policy Manager can automatically deny access. Access for unmanaged endpoints Unmanaged non-802.1x devices printers, IP phones and IP cameras can be identified as known or unknown upon connecting to the network. The identity of these devices is based on the presence of their MAC address in an external or internal database. Secure device configuration of personal devices Onboard fully automates the provisioning of any Windows, Mac OS X, ios, Android, Chromebook, and Ubuntu devices via a built-in captive portal. Valid users are redirected to a template-based interface to configure required SSIDs, 802.1X settings, and download unique device credentials. Additional capabilities include the ability for IT to revoke and delete credentials for lost or stolen devices, and the ability to configure mobile settings for Exchange ActiveSync and VPN clients on some device types. Customizable visitor management Guest simplifies workflow processes so that receptionists, employees and other non-it staff to create temporary guest accounts for secure Wi-Fi and wired network access. Self-registration allows guests to create their credentials. Customizable captive portal capabilities let IT and marketing organizations create a branded guest login experience with targeted advertising and user code-of-conduct messaging. Self-registration and automated credential delivery also streamlines IT operations. Device health checks OnGuard, as well as separate OnGuard persistent or dissolvable agents, perform advanced endpoint posture assessments. Traditional NAC health-check capabilities ensure compliance and network safeguards before devices connect. Information about endpoint integrity such as status of anti-virus, anti-spyware, firewall, and peer-to-peer applications can be used to enhance authorization policies. Automatic remediation services are also available for non-compliant devices. ADDITIONAL POLICY MANAGEMENT CAPABILITIES Integrate with security and workflow systems Exchange offers a set of syslog data flows and RESTbased APIs that can be used to facility interoperability with MDM, SIEM like Splunk, PMS, call centers, admission systems and more. Built-in integration with MobileIron, AirWatch, SAP Afaria, Citrix, JAMF, SOTI and IBM/MaaS360 makes it easy to use attributes collected by an MDM agent to enforce network policies. A device can be denied Wi-Fi access if it s jailbroken, running blacklisted apps or the owner isn t in an authorization database.
3 Connect and work apps are good to go Auto Sign-On capabilities make it infinitely easy to access work apps on mobile devices. Instead of a single signon, which requires everyone to manually login to the network and apps, Auto Sign-On leverages the network login and automatically authenticates users to enterprise mobile apps so they can get right to work. can be configured as an Identity Provider (IdP) to work with Ping, Okta and other identity management tools so that users can access SAML-based applications for an improved and secure mobility experience. Extensive captive portal support provides a central captive portal for authentication that works on Aruba and any other multivendor wired and wireless network. This eliminates the need for separate Wi-Fi and wired captive portals. Policy Manager appliances The Policy Manager is available as hardware or a virtual appliance that supports 500, 5,000 and 25,000 authenticating devices. Virtual appliances are supported on VMware ESX and ESXi platforms, versions ESX 4.0, ESXi 4.0, 5.0 and 5.5. Virtual appliances, as well as the hardware appliances, can be deployed within a cluster to increase scalability and redundancy. SPECIFICATIONS Aruba Clearpass Policy Manager Comprehensive identity-based policy engine. Posture agents for Windows, Mac OS X, Linux operating systems. Built-in AAA services RADIUS, TACACS+ and Kerberos. Web, 802.1X, non-802.1x authentication and authorization. Reporting, analytics and troubleshooting tools. External captive portal redirect to multivendor equipment. Interactive policy simulation and monitor mode utilities. Deployment templates for any network type, identity store and endpoint. User-initiated device registration Aruba AirGroup and unmanaged devices. Framework and protocol support RADIUS, RADIUS CoA, TACACS+, web authentication, SAML v2.0 EAP-FAST (EAP-MSCHAPv2, EAP-GTC, EAP-TLS) PEAP (EAP-MSCHAPv2, EAP-GTC, EAP-TLS, EAP-PEAP-Public) TTLS (EAP-MSCHAPv2, EAP-GTC, EAP- TLS, EAP-MD5, PAP, CHAP) EAP-TLS PAP, CHAP, MSCHAPv1 and 2, EAP-MD5 Wireless and wired 802.1X and VPN Microsoft NAP, NAC Windows machine authentication MAC auth (non-802.1x devices) Audit (rules based on port and vulnerability scans) Supported identity stores Microsoft Active Directory Kerberos Any LDAP compliant directory Any ODBC-compliant SQL server Token servers Built-in SQL store Built-in static hosts list RFC standards 2246, 2248, 2548, 2759, 2865, 2866, 2869, 2882, 3079, 3576, 3579, 3580, 3748, 4017, 4137, 4849, 4851, 5216, 528, Internet drafts Protected EAP Versions 0 and 1, Microsoft CHAP extensions, dynamic provisioning using EAP-FAST, TACACS+. Information assurance validations FIPS compliant Certificate #1747
4 Policy Manager-500 Policy Manager-5K Policy Manager-25K APPLIANCE SPECIFICATIONS CPU (1) Dual Core Pentium (1) Quad Core Xeon (2) Six Core Xeon Memory 4 GB 8 GB 64 GB Hard drive storage (1) 3.5 SATA (7K RPM) 500GB hard drive (2) 3.5 SATA (7.2K RPM) 500GB hard drives, RAID-1 controller (6) 2.5 SAS (10K RPM) 600GB Hot-Plug hard drives, RAID-10 controller APPLIANCE SCALABILITY Maximum devices 500 5,000 25,000 FORM FACTOR Dimensions (WxHxD) 16.8 x 1.7 x x 1.7 x x 1.7 x 27.8 Weight (Max Config) 14 Lbs 18 Lbs Up to 39 Lbs POWER Power consumption (maximum) 260 watts max 250 watts max 750 watts max Power supply Single Single Dual hot-swappable (optional) AC input voltage 100/240 VAC auto-selecting 100/240 VAC auto-selecting 100/240 VAC auto-selecting AC input frequency 50/60 Hz auto-selecting 50/60 Hz auto-selecting 50/60 Hz auto-selecting ENVIRONMENTAL Operating temperature 10º C to 35º C (50º F to 95º F) 10º C to 35º C (50º F to 95º F) 10º C to 35º C (50º F to 95º F) Operating vibration Operating shock Operating altitude
5 ORDERING GUIDANCE Ordering the Policy Manager involves the following steps: 1. Determine the number of authenticated endpoints/devices in your environment. Additionally, select optional functionality, such as guests per day, total BYO devices being configured for enterprise use, and total number of computers requiring health checks. 2. Choose the appropriate platform (either virtual or hardware appliance) sized to accommodate the total number of devices and guests that will require authentication for your deployment. Ordering Information Part Number Description CP-HW-500 or CP-VA-500 Aruba Policy Manager 500 hardware platform supporting a maximum of 500 authenticated devices CP-HW-5K or CP-VA-5K Aruba Policy Manager 5K hardware platform supporting a maximum of 5,000 authenticated devices CP-HW-25K or CP-VA-25K Aruba Policy Manager 25K hardware platform supporting a maximum of 25,000 authenticated devices Expandable application software* Onboard device configuration and certificate management OnGuard endpoint device health Guest visitor access management Warranty Hardware 1 year parts/labor** Software 90 days** * Expandable application software is available in the following increments: 100, 500, 1,000, 2,500, 5,000, 10,000, 25,000, 50,000 and 100,000. ** Extended with support contract 1344 Crossman Ave Sunnyvale, CA ARUBA T: FAX: [email protected] Aruba Networks, Inc. Aruba Networks, Aruba The Mobile Edge Company (stylized), Aruba Mobilty Management System, People Move. Networks Must Follow., Mobile Edge Architecture, RFProtect, Green Island, ETIPS, ClientMatch, Bluescanner and The All Wireless Workspace Is Open For Business are all Marks of Aruba Networks, Inc. in the United States and certain other countries. The preceding list may not necessarily be complete and the absence of any mark from this list does not mean that it is not an Aruba Networks, Inc. mark. All rights reserved. Aruba Networks, Inc. reserves the right to change, modify, transfer, or otherwise revise this publication and the product specifications without notice. While Aruba Networks, Inc. uses commercially reasonable efforts to ensure the accuracy of the specifications contained in this document, Aruba Networks, Inc. will assume no responsibility for any errors or omissions. DS_PolicyManager_101314
ARUBA CLEARPASS POLICY MANAGER
ARUBA CLEARPASS POLICY MANAGER The most advanced policy management platform available The Aruba Policy Manager platform provides role- and device-based network access control for employees, contractors
ClearPass Policy Manager
Manager The most comprehensive network access policy enforcement platform for BYOD Key features Unsurpassed multivendor wireless and wired interoperability Built-in guest, profiling, network access control
THE CLEARPASS ACCESS MANAGEMENT SYSTEM
SOLUTION OVERVIEW Remember when IT was the gatekeeper of everything enterprise and it ruled the network with a combination of strict policies, purpose-built devices, and a fully-contained technology ecosystem.
ClearPass: Understanding BYOD and today s evolving network access security requirements
ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements Chapter 1: Introduction............................
CLEARPASS EXCHANGE: SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE
: SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, IT is struggling to gain visibility
Conquering today s bring-your-own-device challenges
Conquering today s bring-your-own-device challenges Table of Contents A framework for deploying successful BYOD initiatives 3 Shortcomings of current solutions 4 The vision for BYOD access management 5
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
CLEARPASS ONGUARD CONFIGURATION GUIDE
CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...
Cisco Secure Control Access System 5.8
Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based
Aruba ClearPass Access Management System FREQUENTLY ASKED QUESTIONS
Aruba ClearPass Access Management System FREQUENTLY ASKED QUESTIONS Table of Contents General Product Questions... 5 1. What is ClearPass?... 5 2. How does ClearPass compare with what enterprises are doing
THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY
THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY LEVERAGING REAL-TIME CONTEXT TO MITIGATE TODAY S NEW RISKS TABLE OF CONTENTS THE NEW ENTERPRISE PERIMETER THE MOBILE RISK SPECTRUM INTRODUCING
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Conquering Today s Bring Your Own Device Challenges. A framework for successful BYOD initiatives
Conquering Today s Bring Your Own Device Challenges A framework for successful BYOD initiatives Table of Contents Introduction 3 BYOD drivers 3 Consumer choice 3 IT considerations 3 Device and information
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Cisco Secure Access Control System 5.5
Data Sheet Cisco Secure Access Control System 5.5 Cisco Secure Access Control System (ACS) ties together an enterprise s network access policy and identity strategy. Cisco Secure ACS is the world s most
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Paul Cochran - Account Manager. Chris Czerwinski System Engineer
Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
ClearPass Policy Manager
ClearPass Policy Manager V2 October 2013 Introduction With the release of ClearPass Policy Manager 6.2.0 in July 2013 we have continued to build on our previous industry leading functionality, now with
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
solution guide DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS
DLNA, AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS Table of Contents Warning and Disclaimer Introduction What is Zero Configuration Networking (zeroconf)? What is DLNA? Making DLNA and Bonjour work over WLANs
HP Intelligent Management Center User Access Management Software
Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached
Avaya Identity Engines Portfolio
Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs:
WHITE PAPER COMBATANT COMMAND (COCOM) NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B
COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B TABLE OF CONTENTS COMBATANT COMMAND () NEXT-GENERATION SECURITY ARCHITECTURE USING NSA SUITE B NSA COMMERCIAL SOLUTION FOR CLASSIFIED
Cisco Identity Services Engine
Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Extreme Access Control For Healthcare
DATA SHEET Extreme Access Control For Healthcare (Formerly Network Access Control) End-to-end security and superior user experience. HIGHLIGHTS BUSINESS ALIGNMENT Protect patient data by proactively preventing
Aruba-Certified Design Expert (ACDX) Study Guide
Aruba-Certified Design Expert (ACDX) Study Guide Table of Contents Introduction Prerequisites for the ACDX Exam Format Software Versions Exam Deliverables Exam Equipment Scheduling and Paying for an Exam
Network Access Control (NAC) for Healthcare
DATA SHEET Network Access Control (NAC) for Healthcare End-to-end security and a simplified user experience NAC HIGHLIGHTS BUSINESS ALIGNMENT Protect patient data by proactively preventing unauthorized
Authentication. Authentication in FortiOS. Single Sign-On (SSO)
Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication
SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect [email protected]
SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect [email protected] Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What
Systems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com
» WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
HP IMC Smart Connect w/wlan Manager Virtual Appliance Software
Data sheet HP IMC Smart Connect w/wlan Manager Virtual Appliance Software Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support with
solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management
solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management Several trends have recently emerged to ignite the requirement for enterprise guest management. One is
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Technical Note. CounterACT: 802.1X and Network Access Control
CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
AAA & Captive Portal Cloud Service TM and Virtual Appliance
AAA & Captive Portal Cloud Service TM and Virtual Appliance Administrator Manual Revision 28 August, 2013 Copyright, Cloudessa, Inc. All rights reserved To receive technical assistance with your Cloudessa
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
Deploying iphone and ipad Virtual Private Networks
Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
FortiAuthenticator. User Authentication and Identity Management. Last Updated: 17 th April 2015. Copyright Fortinet Inc. All rights reserved.
FortiAuthenticator User Authentication and Identity Management Last Updated: 17 th April 2015 Copyright Fortinet Inc. All rights reserved. FortiAuthenticator Overview Answering your authentication challenges
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless
Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy Eric Stresen- Reuter Technical Director Ruckus Wireless Bring Your Own Design SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
The Aruba MOVE Architecture: Integrating Access Management, Network Infrastructure and Mobility Applications
The Aruba MOVE Architecture: Integrating Access Management, Network Infrastructure and Mobility Applications Table of Contents User freedom has become IT s burden 3 The MOVE architecture 4 Access management
ClearPass 6.3.0. Release Notes
ClearPass 6.3.0 Release Notes Copyright 2014 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba Mobility
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
The User is Evolving. July 12, 2011
McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT
DATA SHEET OneFabric Connect Extend the OneFabric architecture to 3rd party applications BUSINESS ALIGNMENT Embrace BYOD by mixing and matching managed and unmanaged devices on the same infrastructure
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
How To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
What We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs
CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency
ARUBA RAP-3 REMOTE ACCESS POINT
ARUBA RAP-3 REMOTE ACCESS POINT High-performance wireless and wired networking for branch offices and teleworkers The multifunctional Aruba RAP-3 delivers secure 802.11n wireless and wired network access
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Bring Your Own ipad to Work
Bring Your Own ipad to Work Table of Contents Introduction 3 Challenges for IT 3 Device Identification 4 Device Enrollment 5 Device Authentication and Authorization 6 Device Visibility 7 Summary 7 Conclusion
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
ClearPass Policy Manager 6.1
ClearPass Policy Manager 6.1 User Guide Copyright Information Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include the Aruba Networks logo, Aruba Networks, Aruba Wireless Networks, the
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS
CORPORATE OVERVIEW ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS who rely on their mobile devices for every aspect of work and personal
Meru Connect. Easy to use, flexible guest access. Simplified BYOD on-boarding and policy management. For any user on any network with any device
Meru Connect Easy to use, flexible guest access. Simplified BYOD on-boarding and policy management. For any user on any network with any device With the increased pervasiveness and user reliance on mobile
Meru Connect. Easy to use, flexible guest access. Simplified BYOD on-boarding and policy management.
Meru Connect DATA SHEET Easy to use, flexible guest access. Simplified BYOD on-boarding and policy management. For any user on any network with any device Easy to use, flexible guest access. Simplified
McAfee Enterprise Mobility Management 12.0. Performance and Scalability Guide
McAfee Enterprise Mobility Management 12.0 Performance and Scalability Guide Contents Purpose... 1 Executive Summary... 1 Testing Process... 1 Test Scenarios... 2 Scenario 1 Basic Provisioning and Email
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01
Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM
ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency
