Network Access Control (NAC) and Network Security Standards
|
|
|
- Scot Riley
- 10 years ago
- Views:
Transcription
1 Network Control (NAC) and Network Security Standards Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #1
2 Agenda Goals of NAC Standards What problems do these standards solve? What is the relationship between TNC and IETF NEA standards? TNC Architecture and Standards TNC Adoption and Certification Advantages of Using Standards for NAC Case Studies Summary For More Information Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #2
3 Trusted Network Connect Open Architecture for Network Security Completely vendor-neutral Strong security through trusted computing Original focus on NAC, now expanded to Network Security Open Standards for Network Security Full set of specifications available to all Products shipping since 2006 TPM Integration is Supported Developed by Trusted Computing Group (TCG) Industry standards group More than 100 member organizations Includes large vendors, small vendors, customers, etc. Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #3
4 Problems Solved Network and Endpoint Visibility Who and what s on my network? Are devices on my network secure? Is user/device behavior appropriate? Network Enforcement Block unauthorized users, devices, or behavior Grant appropriate levels of access to authorized users/devices Device Remediation Quarantine and repair unhealthy or vulnerable devices Security System Integration Share real-time information about users, devices, threats, etc. Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #4
5 Basic NAC Architecture Requestor (AR) Policy Enforcement (PEP) Policy Decision (PDP) VPN Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #5
6 Integrating Other Security Devices Requestor (AR) Policy Enforcement (PEP) Policy Decision (PDP) Metadata (MAP) Sensors, Flow Controllers Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #6
7 Coordinated Security Asset Management System Endpoint Security (via NAC) SIM / SEM MAP IPAM IF-MAP Protocol Physical Security ICS/SCADA Security AAA DLP Server or IDS Switching Wireless Firewalls Cloud Security Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #7
8 Typical Deployments Health Check Behavior Check User-Specific Policies TPM-Based Integrity Check Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #8
9 Health Check Requestor Policy Enforcement Policy Decision Non-compliant System Windows XP SP3 xoshotfix 2499 xoshotfix 9288 AV - McAfee Virus Scan 8.0 Firewall Production Network Compliant System Windows XP SP3 OSHotFix 2499 OSHotFix 9288 AV - Symantec AV 10.1 Firewall NAC Policy Windows XP SP3 OSHotFix 2499 OSHotFix 9288 AV (one of) Symantec AV 10.1 McAfee Virus Scan 8.0 Firewall Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #9
10 Behavior Check Requestor Policy Enforcement Policy Decision Metadata Sensors and Flow Controllers Remediation Network!!!! NAC Policy No P2P file sharing No spamming No attacking others Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #10
11 User-Specific Policies Requestor Policy Enforcement Policy Decision Metadata Sensors and Flow Controllers Guest User Mary R&D Joe Finance Windows XP OS Hotfix 9345 OS Hotfix 8834 AV - Symantec AV 10.1 Firewall NAC Policy Users and Roles Per-Role Rules Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #11
12 TPM-Based Integrity Check Requestor TPM Trusted Platform Module HW module built into most of today s PCs Enables a HW Root of Trust Measures critical components during trusted boot PTS interface allows PDP to verify configuration and remediate as necessary Policy Enforcement Policy Decision Compliant System TPM verified BIOS OS Drivers Anti-Virus SW Production Network NAC Policy TPM enabled BIOS OS Drivers Anti-Virus SW Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #12
13 Enforcement Options Edge Enforcement Inline Enforcement Protocol-Based Enforcement Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #13
14 Edge Enforcement Pros Simple Secure Policy Enforcement Cons Big change Hard for legacy endpoints VPN Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #14
15 Inline Enforcement Pros Gradual or partial deployment Cons Security varies IPsec/TLS vs. IP/MAC authn Policy Enforcement VPN Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #15
16 Protocol-Based Enforcement Pros Easy deployment Cons Low security Nothing inline Problematic Policy Enforcement VPN Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #16
17 Clientless Endpoint Handling Requestor Policy Enforcement Policy Decision Metadata Sensors and Flow Controllers Remediation Network!!!! NAC Policy Place Printers on Printer Network Monitor Behavior Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #17
18 TNC Architecture Requestor Policy Enforcement Policy Decision Metadata Sensors and Flow Controllers t Integrity Measurement Collector Collector Collectors (IMC) IF-IMC TNC Client (TNCC) IF-M IF-TNCCS Integrity Measurement Verifiers Verifiers Verifiers (IMV) IF-IMV TNC Server (TNCS) IF-MAP IF-MAP Metadata IF-MAP Sensor IF-PTS Platform Trust Service (PTS) TSS TPM Network Requestor IF-T Policy Enforcement (PEP) IF-PEP Network Authority IF-MAP IF-MAP IF-MAP Flow Controller Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #18
19 Foiling Root Kits Solves the critical lying endpoint problem TPM Measures Software in Boot Sequence Hash software into PCR before running it PCR value cannot be reset except via hard reboot During TNC Handshake... PDP engages in crypto handshake with TPM TPM securely sends PCR value to PDP PDP compares to good configurations If not listed, endpoint is quarantined and remediated Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #19
20 Federated TNC Conveys TNC results between security domains Consortia, coalitions, partnerships, outsourcing, and alliances Large organizations Supports Web SSO with health info Roaming with health check Asserting Security Domain (ASD) How? SAML profiles for TNC Applications Network roaming Coalitions, consortia Large organizations Role=Executive Device=Healthy Requestor Relying Security Domain (RSD) Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #20
21 TNC and SCAP Together Requestor (AR) Policy Enforcement (PEP) Policy Decision (PDP) Metadata (MAP) Sensors, Flow Controllers SCAP Client Software SCAP Analysis Software SCAP External Scanner Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #21
22 Flexible Solutions Assessment Options Identity, health, behavior, and/or location Optional hardware-based assessment with TPM Pre-admission, post-admission, or both Enforcement Options 802.1X, firewalls, VPN gateways, DHCP, host software Clientless endpoints No NAC capabilities built in Printers, phones, robots, guest laptops Information sharing IF-MAP lets security devices share info on user identity, endpoint health, behavior, etc. Federated TNC supports federated environments Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #22
23 Microsoft NAP Interoperability IF-TNCCS-SOH NAP or TNC Client Switches, APs, Appliances, Servers, etc. NAP or TNC Server IF-TNCCS-SOH Standard Developed by Microsoft as Statement of Health (SoH) protocol Donated to TCG by Microsoft Adopted by TCG and published as a new TNC standard, IF-TNCCS-SOH Availability Built into Windows Vista, Windows 7, Windows Server 2008, and Windows XP SP 3 Also built into products from other TNC vendors Implications NAP servers can health check TNC clients without extra software NAP clients can be health checked by TNC servers without extra software As long as all parties implement the open IF-TNCCS-SOH standard Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #23
24 IETF Network Endpoint Assessment IETF NEA WG Goal: Universal Agreement on NAC Client-Server Protocols Co-Chaired by Cisco employee and TNC-WG Chair Published several TNC protocols as IETF RFCs PA-TNC (RFC 5792) and PB-TNC (RFC 5793) Equivalent to TCG s IF-M 1.0 and IF-TNCCS 2.0 Co-Editors from Cisco, Intel, Juniper, Microsoft, Symantec Now working on getting IETF approval for IF-T Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #24
25 Comparison of IETF NEA and TNC IETF Network Endpoint Assessment (NEA) Standards are Equivalent to two Existing TNC Standards: IETF RFC 5792 = TNC IF-M 1.0 IETF RFC 5793 = TNC IF-TNCCS 2.0 TNC Standards Add: Support for TPM-based health checks Enforcement standards APIs for adding health checks Support for behavior monitoring Support for federation Security integration (IF-MAP) SCAP integration Overarching architecture Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #25
26 NEA Standards Requestor Policy Decision t Integrity Measurement Collector Collector Collectors (IMC) IF-M Integrity Measurement Verifiers Verifiers Verifiers (IMV) TNC Client (TNCC) IF-TNCCS TNC Server (TNCS) Network Requestor IF-T Network Authority Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #26
27 TNC Architecture Requestor Policy Enforcement Policy Decision Metadata Sensors and Flow Controllers t Integrity Measurement Collector Collector Collectors (IMC) IF-IMC TNC Client (TNCC) IF-M IF-TNCCS Integrity Measurement Verifiers Verifiers Verifiers (IMV) IF-IMV TNC Server (TNCS) IF-MAP IF-MAP Metadata IF-MAP Sensor IF-PTS Platform Trust Service (PTS) TSS TPM Network Requestor IF-T Policy Enforcement (PEP) IF-PEP Network Authority IF-MAP IF-MAP IF-MAP Flow Controller Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #27
28 What About Open Source? Lots of open source TNC support: University of Applied Arts and Sciences in Hannover, Germany (FHH) libtnc OpenSEA 802.1X supplicant FreeRADIUS omapd IF-MAP Server strongswan IPsec Open Source TNC SDK (IF-IMV and IF-IMC) TCG support for these efforts Liaison Memberships Open source licensing of TNC header files Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #28
29 TNC Certification Program Certifies Products that Properly Implement TNC Standards Certification Process Compliance testing using automated test suite from TCG Interoperability testing at Plugfest Add to list of certified products on TCG web site Customer Benefits Confidence that products interoperate Easy to cite in procurement documents Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #29
30 Case Study: St. Mary s County Public Schools Who Public school district in Maryland 16,000 students, 2,100 staff 26 schools, Grades K-12 New, intensive STEM academies STEM = Science, Technology, Engineering, and Math Grades 6-12 Problem Received grant for 60 wireless laptops for STEM academies Need strongest security Only STEM laptops can connect User-specific access controls Strong health checks on laptops All wireless traffic encrypted Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #30
31 St. Mary s County Public Schools - Solution Solution NAC appliance with... Permanently resident agent Continuous health checks Wireless access points 802.1X enforcement Integrated via TNC's IF-PEP Lessons Learned Design for the environment Tightly controlled endpoints Strong security requirements Need constant health checking Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #31
32 Summary Standards for NAC such as TNC and the IETF NEA standards solve today s security problems with growth for the future Flexible open architecture to accommodate rapid change Coordinated, automated security for lower costs and better security TCG TNC and IETF standards TCG TNC expands NAC to include TPM, IF-MAP, and other useful things Standards = open network security architecture Enables multi-vendor interoperability Can reuse existing products to reduce costs and improve ROI Avoids vendor lock-in Standards for NAC has strong security Optional support for TPM to defeat rootkits Thorough and open technical review Wide support for these standards Many vendors, open source Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #32
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
Security Orchestration with IF-MAP
Security Orchestration with IF-MAP Gary Holland, Lumeta/IMRI 2 November 2011 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Trusted Network Connect Explanation of IF-MAP
Trusted Network Connect (TNC)
Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
NETWORK ACCESS CONTROL
RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 2, FALL 2007 NETWORK ACCESS CONTROL Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract Computers connected to the Internet
Trusted Network Connect (TNC)
Trusted Network Connect (TNC) Josef von Helden [email protected] Martin Schmiedel Daniel Wuttke First European Summer School on Trusted Infrastructure Technologies September 2006 1
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
TNC Endpoint Compliance and Network Access Control Profiles
TNC Endpoint Compliance and Network Access Control Profiles TCG Members Meeting June 2014 Barcelona Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com
» WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of
Android BYOD Security using Trusted Network Connect Protocol Suite
Android BYOD Security using Trusted Network Connect Protocol Suite Prof. Andreas Steffen HSR University of Applied Sciences Rapperswil [email protected] Where the heck is Rapperswil? 2 HSR Hochschule
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement
Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through
Bypassing Network Access Control Systems
1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 [email protected] http://www.insightix.com 2 What this talk is about? Introduction to NAC The components of a NAC solution
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
IF-MAP Use Cases: Real-Time CMDB, and More
IF-MAP Use Cases: Real-Time CMDB, and More Richard Kagan EVP / General Manager Orchestration Systems Business Unit IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol
SOFTWARE ASSET MANAGEMENT
BUILDING BLOCK WHITE PAPER SOFTWARE ASSET MANAGEMENT Continuous Monitoring V.2 This revision incorporates comments from the public. David Waltermire Information Technology Laboratory [email protected]
IF-MAP Overview. Jan Ursi Technical Director EMEA. 2009 Infoblox Inc. All Rights Reserved.
IF-MAP Overview Jan Ursi Technical Director EMEA IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol standard published (free) by the Trusted Computing Group Available
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge
Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge This paper will present a case study of Lumeta s participation in an open
Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks
Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks Prof. Dr. Kai-Oliver Detken 1, Hervais Simo Fhom 2, Prof. Dr. Richard Sethmann 3, Günther Diederich 3 1
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected]
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected] NAC is Here to Enforce identity-based access policies Control who is accessing what Prevent guests
Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture
Cisco Network Admission Control and Microsoft Network Access Protection Interoperability Architecture Cisco Systems and Microsoft Corporation Published: September 2006 Abstract Cisco Systems, Inc. and
The strongswan IPsec Solution
The strongswan IPsec Solution with TNC Support TCG Members Meeting June 2011 Munich Prof. Dr. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.
Factory-Installed, Standards-Based Hardware Security Steven K. Sprague President & CEO, Wave Systems Corp. The challenge We are having a little problem with identity and data theft. It is time to reduce
On and off premises technologies Which is best for you?
On and off premises technologies Which is best for you? We don t mind what you buy, as long as it is YELLOW! Warren Sealey and Paul-Christian Garpe On Premises or in the cloud? 1 Agenda Why Symantec? Email
Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco
Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks
Cisco Security Agent (CSA) Network Admission Control (NAC)
Cisco Security Agent (CSA) Network Admission Control (NAC) Pascal Delprat Security Consultant Cisco France Vincent Bieri Marketing Manager, Security EMEA Technology Marketing Organisation 1 Agenda CSA
HP Certified Professional
Securing HP ProCurve Networks Exam HP0-Y24 Exam Preparation Guide Purpose The intent of this guide is to set expectations about the context of the exam and to help candidates prepare for it. Recommended
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
A viable SIEM approach for Android
IDAACS 2015, 24.-26.09.15 A viable SIEM approach for Android Kai-Oliver Detken Evren Eren Markus Schölzel DECOIT GmbH Fahrenheitstraße 9 D-28359 Bremen https://www.decoit.de [email protected] Outline Introduction
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI
1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009 Agenda endpoint compliance with NMCI
MOBILITY BEYOND BYOD. Jonas Gyllenhammar. Consulting Engineer Junos Pulse solutions
MOBILITY BEYOND BYOD Jonas Gyllenhammar Consulting Engineer Junos Pulse solutions BYOD DEFINED Corporate Owned Devices Employee Owned Devices (BYOD) Guest Devices Today's business environment requires
Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations
WHITEPAPER An Adaptive Approach to Network Security Evolve your network security strategy to meet new threats and simplify IT security operations Frank Andrus CTO, Bradford Networks Executive Summary...
Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives
WHITEPAPER The Emergence of Adaptive Network Security Evolve your network strategy to meet new threats and achieve expanded business imperatives Frank Andrus CTO, Bradford Networks Executive Summary...
Network Access Control (NAC)
Solutions Network Access Control (NAC) Allied Telesis provides advanced edge security for Enterprise networks Security Issues The security issues facing Enterprise networks have evolved over the years,
How To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
USER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
End Point Security & Network Access Control
End Point Security & Network Access Control Presented by: Jennifer Jabbusch - Carolina Advanced Digital, Inc. Alan Shimel - StillSecure Darwin Socco - Bracewell & Giuliani LLP Let s Talk About What NAC
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
ForeScout Technologies Is A Leader Among Network Access Control Vendors
For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,
Trust: When Physical and Logical Security Worlds Collide
Trust: When Physical and Logical Security Worlds Collide Bob Beliles VP. Enterprise Business Development Hirsch Electronics Copyright 2009 Trusted Computing Group Copyright 2009 Trusted Computing Group
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4
Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators
How to Get NAC Up-and-Running in One Hour For Check Point Firewall or Endpoint Security Administrators Contents Introduction 3 Defining an Organization s Requirements for NAC 3 Two Paths to NAC Port vs.
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
What s New in Juniper s SSL VPN Version 6.0
What s New in Juniper s SSL VPN Version 6.0 This application note describes the new features available in Version 6.0 of the Secure Access SSL VPN products. This document assumes familiarity with the Juniper
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Security Industry Market Share Analysis
Security Industry Market Share Analysis September 2011 Introduction The Research OPSWAT releases quarterly market share reports for several sectors of the security industry. This quarter s report includes
Windows 7, Enterprise Desktop Support Technician
Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse
UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT
UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT John Stone CTO Cisco Systems Internetworking Ireland [email protected] 2005 Cisco Systems, Inc. All rights reserved.
Juniper Networks Unified Access Control (UAC) and EX-Series Switches
White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment
The Linux Integrity Measurement Architecture and TPM-Based Network Endpoint Assessment Andreas Steffen ITA Institute for Internet Technologies and Applications HSR University of Applied Sciences Rapperswil
Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
General Questions... 1. Requesting Access... 2. Client Support... 3. Downloading Issues... 4. Installation Issues... 4. Connectivity Issues...
Contents General Questions... 1 Requesting Access... 2 Client Support... 3 Downloading Issues... 4 Installation Issues... 4 Connectivity Issues... 5 Performance Issues... 7 Application Issues... 8 General
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
Move over, TMG! Replacing TMG with Sophos UTM
Move over, TMG! Replacing TMG with Sophos UTM Christoph Litzbach, Pre-Sales Engineer NSG 39 Key Features of TMG HTTP Antivirus/spyware URL Filtering HTTPS forward inspection Web Caching Role based access
How To Use Cisco Identity Based Networking Services (Ibns)
. Data Sheet Identity-Based Networking Services Identity-Based Networking Services Overview Cisco Identity-Based Networking Services (IBNS) is an integrated solution that offers authentication, access
