ClearPass Policy Manager

Size: px
Start display at page:

Download "ClearPass Policy Manager"

Transcription

1 Manager The most comprehensive network access policy enforcement platform for BYOD Key features Unsurpassed multivendor wireless and wired interoperability Built-in guest, profiling, network access control Onboarding of leading endpoint operating systems Easy-to-use policy creation and troubleshooting interface Proactive policy simulation and testing utilities Real-time user and device access logs track each authentication Convenient dashboards for user and device authentication analysis Published and open API for simple third-party integration MDM interoperability via API connector services Fully-replicated active clustering for high availability, redundancy and load balancing Advanced reporting, analytics, alerts and archiving for compliance and auditing The Manager platform includes ClearPass Guest, ClearPass Onboard and ClearPass OnGuard applications. The Manager platform makes it easy to secure next-generation mobility services, enhance network access security and compliance, and streamline network operations for wired, wireless and VPNs. The industry s most comprehensive policy management system, ClearPass offers role-based policies, detailed endpoint profiling, enterprise-grade RADIUS/TACACS+, BYOD and Apple Bonjourenabled device registration, mobile device management (MDM), and administrative web access. ClearPass is available as an enterprise starter bundle with guest access, device onboarding and posture assessment capabilities for up to 25 endpoints. Additional ClearPass Guest, Onboard and OnGuard licenses are available for a larger number of devices. Whether local or remote, ClearPass makes it effortless to centrally manage and enforce user- and device-based access policies across multivendor campus and distributed network infrastructures, regardless of device ownership or connection method. The ClearPass advantage ClearPass satisfies the demand for secure and efficient network access, policy enforcement and BYOD deployment. From one easy-to-manage platform, ClearPass presents a complete and accurate view of who and what has connected to wireless and wired network. Simplicity An intuitive web interface for administration and userdriven service portals ensures that mandated security measures are easy to implement and maintain, without requiring additional IT resources, management applications or appliances. Operational efficiency A complete out-of-the-box platform, ClearPass includes differentiated role-based access, enterprisegrade AAA, BYOD provisioning, device profiling, advanced reporting, and MDM capabilities across wireless, wired and VPNs. Innovation ClearPass includes many innovative BYOD capabilities, including uncommonly simple policy management, customizable guest access features, the ability to onboard hundreds of thousands of mobile device, and certificate management applications. The result is consistent, automated and secure network access that meets today s evolving BYOD and IT-managed mobile device requirements delivered from a single, extensible platform with capabilities that grow and adapt to changing business needs.

2 Advanced enforcement capabilities Broad multivendor support ClearPass includes a full complement of enforcement options for the largest possible mix of use-cases and does not require a forklift upgrade to the network infrastructure. Using any 802.1X or non-802.1x-enabled APs or switches, ClearPass enforces a wide range of context-aware policies, including dynamic role-based access, VLAN and ACL assignments, and application-aware quality of service (QoS). With ClearPass, a single policy can leverage multiple identity stores, including Microsoft Active Directory, LDAP-compliant directories, ODBC-compliant SQL databases, token servers and internal databases. This enables IT to manage and enforce network access at multiple levels and across domains when merging organizations or departments. Identity stores also can be used for authentication and ongoing authorization of users and devices. Integrated device profiling Built-in profiling discovers, categorizes and maintains a real-time database of endpoints, regardless of device type and IP address. The collected data MAC OUIs, DHCP fingerprinting, CDP/LLDP and onboarding inventory is then used to enforce context-aware access policies. Profiling offers the visibility to determine mobile device adoption and ownership. It also modifies authorization privileges when device profile changes are detected. So, if a printer appears as a smartphone, ClearPass automatically denies access and quarantines the device. Built-in BYOD enablement A fully functional captive portal supports wired and wireless user authentication from a single Manager web page, which enhances the BYOD user experience and reduces administrative overhead. It also includes Aruba AirGroup services, which let users register and share Bonjour-enabled ipads, Apple TVs and printers across VLANs. It optionally supports device registration to enforce policies based on the MAC address of gaming devices, printers and wireless IP cameras. In BYOD environments with mobile device management, ClearPass can probe MDM databases for jailbroken status, password strength and other device information, and apply it to access policies. This safeguard can be used for any device that connects based on MDM status. Unmanaged endpoint access Unmanaged non-802.1x devices printers, IP phones and IP cameras can be identified as known or unknown when they connect to the network and their MAC addresses are verified through profiling or against an external or internal database. After this verification process, Manager will create policies that enforce differentiated access for these devices whenever they connect to the network and regardless of their location. Scalable BYOD applications Built-in endpoint capacity enables IT to fully leverage all ClearPass Policy Manager features and rightsize BYOD deployments to accommodate the number of employees, devices and guests that connect via wireless, wired and VPNs at no additional cost. Secure device onboarding To ensure secure access for BYOD, ClearPass Onboard automatically provisions employee-owned Windows, Mac OS X, ios and Android devices for 802.1X authentication and issues a unique device credential that can be revoked if a device is lost or stolen. Additional information collected by ClearPass during the onboarding process such as device serial number, operating system version and model number is applied to wireless and wired network access policies. Customizable guest access and management ClearPass Guest makes it easy to implement self-registration and sponsor-based registration for guest Wi-Fi access. Sponsor roles let receptionists and non-it personnel create differentiated and group guest accounts and distribute credentials before visitors arrive. Self-registration and automated credential delivery streamlines IT operations and efficiency. Accounts can be set to automatically expire after a specific number of hours or days without IT involvement, and login credentials can be dispatched via , SMS or label printers. A customizable guest portal simplifies the creation of branded login screens, posting of code-of-conduct messaging, and placement of advertisements and relevant organizational updates based on user role, location, department and venue. Real-time posture assessments ClearPass OnGuard runs operating system, anti-virus, antispyware and firewall health checks to ensure compliance and network integrity before guest and employee-owned devices connect. OnGuard enforce policies for Windows, Mac OS X and Linux via persistent or dissolvable agents. ClearPass OnGuard advanced posture checks also allow peerto-peer apps, bridged network interfaces, VM instances, USB storage devices and specific registry key entries. For a seamless user experience, automatic remediation services are available for non-compliant devices. Manager appliances Manager is available as hardware or a virtual appliance. Both have identical functionality and capacity to support 500, 5,000 and 25,000 unique authenticating devices. It can be configured in publisher/subscriber mode for active clustering of multiple appliances. The Manager virtual appliance is optimized to run on 64-bit VMware ESX and ESXi platforms, versions 4.0 (minimum), 5.0 and 5.1.

3 SPECIFICATIONS Aruba Manager Comprehensive identity-based policy engine Built-in AAA services RADIUS, TACACS+, Kerberos Web, 802.1X, non-802.1x authentication and authorization File- and directory-based encryption OnGuard agents for Windows, Mac OS X, Linux operating systems Support for multiple Active Directory domains Built-in advanced reporting, analytics and troubleshooting tools External captive portal redirect for multivendor networks Interactive policy simulation and monitor mode utilities Deployment templates for any network, identity store and endpoint Framework and Protocol Support Microsoft NAP, NAC RADIUS, RADIUS CoA, TACACS+, web authentication, Kerberos PEAP (EAP-MSCHAPv2, EAP-GTC, EAP-TLS) EAP-TLS EAP-FAST (EAP-MSCHAPv2, EAP-GTC, EAP-TLS) TTLS (EAP-MSCHAPv2, EAP-GTC, EAP- TLS, EAP-MD5, PAP, CHAP) PAP, CHAP, MSCHAPv1 and 2, EAP-MD5 Wireless, wired and VPN 802.1X Windows machine authentication MAC auth (non-802.1x devices) Audit (rules based on port and vulnerability scans) Supported Identity Stores Microsoft Active Directory Kerberos Server Any LDAP compliant directory Any ODBC-compliant SQL server Token servers Built-in identity store Built-in static hosts list RFC Standards 2246, 2248, 2548, 2759, 2865, 2866, 2869, 2882, 3079, 3579, 3580, 3748, 4017, 4137, 4849, 4851, 5019, 5216, 5280 Internet Drafts Protected EAP Versions 0 and 1, Microsoft CHAP extensions, dynamic provisioning using EAP-FAST, TACACS+.

4 Appliance Specifications CPU Manager-500 (1) Dual Core Pentium 2.9-GHz G850 Manager-5000 (1) Quad Core Xeon 2.66-GHz X3450 Manager (2) Quad Core Xeon 2.66-GHz X5650 Memory 4 GB 8 GB 48 GB Hard drive storage (1) 3.5 SATA (7K RPM) 500-GB hard drive (2) 3.5 SATA (7.2K RPM) 500-GB hard drive PERC H200 RAID-1 controller (4) 2.5 SAS (10K RPM) 300-GB HotPlug hard drives PERC 6/I SAS RAID controller Network ports (2) Gigabit Ethernet (2) Gigabit Ethernet (2) Gigabit Ethernet Appliance Scalability Maximum devices 500 5,000 25,000 Form Factor Dimensions (w x h x d) 16.8 x 1.7 x x 1.7 x x 1.7 x Weight (max config) 14 Lbs 39 Lbs 39 Lbs Power Power consumption (maximum) 260 watts max 250 watts max 717 watts max Power supply Single Single Dual hot-swappable (optional) AC input voltage 110/220 VAC auto-selecting 110/220 VAC auto-selecting 110/220 VAC auto-selecting AC input frequency 50/60 Hz auto-selecting 50/60 Hz auto-selecting 50/60 Hz auto-selecting Environmental Operating temperature 10º C to 35º C (50º F to 95º F) 10º C to 35º C (50º F to 95º F) 10º C to 35º C (50º F to 95º F) Storage temperature -40º C to 65º C (-40º F to 149º F) -40º C to 65º C (-40º F to 149º F) -40º C to 65º C (-40º F to 149º F) Operating relative humidity 20% to 80% non-condensing 20% to 80% non-condensing 20% to 80% non-condensing Maximum humidity gradient Storage relative humidity Operating vibration Storage vibration Operating shock Storage shock Operating altitude Storage altitude

5 ORDERING GUIDANCE Ordering the Manager involves the following steps: 1. Determine the number of unique authenticating devices within your environment. This total includes printers, smartphones, computers, etc. 2. Choose the appropriate hardware or virtual appliance to accommodate the total number from above. 3. Select any additional licenses Onboard, OnGuard and Guest to accommodate the total number of devices for each of these applications. Anything over 5,000 total application licenses will require the purchase of a second Manager appliance. Example For secure BYOD provisioning of 2,000 mobile devices, ensure that the Manager platform is sized to accommodate the 2,000 mobile devices and anything else that will authenticate, such as via 802.1X and MAC auth. Purchase ClearPass Onboard licenses for 2,000 total devices to support the provisioning requirement. Additional Onboard licenses can be purchased as required. ClearPass Virtual Appliance CP-VA-5K ClearPass Onboard 2 X LIC-CP-OB-1K Ordering Information Part Number Description CP-HW-500 or Aruba Manager 500 hardware platform supporting a maximum of 500 authenticated devices CP-VA-500 CP-HW-5K or Aruba Manager 5K hardware platform supporting a maximum of 5,000 authenticated devices CP-VA-5K CP-HW-25K or Aruba Manager 25K hardware platform supporting a maximum of 25,000 authenticated devices CP-VA-25K Optional software (available as perpetual and 1-, 3- and 5-year subscriptions) LIC-CP-OB-XXX* ClearPass Onboard provisioning (includes ArubaCare support) LIC-CP-OG-XXX* ClearPass OnGuard device posture (includes ArubaCare support) LIC-CP-GM-XXX* ClearPass Guest (includes ArubaCare support) Inclusive License LIC-CP-EN-XXX* ClearPass Enterprise bundle that includes option to selectively use Onboard, OnGuard, or Guest licenses Warranty Hardware 1-year parts/labor** Software 90 days** * Software module licenses are available in the following increments, where XXX indicates the number of authenticated devices: 100, 500, 1,000, 2,500, 5,000, 10,000, 25,000 and 50,000. ** Extended with support contract Crossman Avenue. Sunnyvale, CA ARUBA Tel Fax [email protected] 2012 Aruba Networks, Inc. Aruba Networks trademarks include AirWave, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo, Aruba Mobility Management System, Mobile Edge Architecture, People Move. Networks Must Follow, RFProtect, and Green Island. All rights reserved. All other trademarks are the property of their respective owners. DS_ClearPass_PolicyManager_121312

The most advanced policy management platform available

The most advanced policy management platform available Aruba Policy Manager The most advanced policy management platform available The platform provides role- and device-based network access control for employees, contractors and guests across any wired, wireless

More information

ARUBA CLEARPASS POLICY MANAGER

ARUBA CLEARPASS POLICY MANAGER ARUBA CLEARPASS POLICY MANAGER The most advanced policy management platform available The Aruba Policy Manager platform provides role- and device-based network access control for employees, contractors

More information

ClearPass: Understanding BYOD and today s evolving network access security requirements

ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements ClearPass: Understanding BYOD and today s evolving network access security requirements Chapter 1: Introduction............................

More information

THE CLEARPASS ACCESS MANAGEMENT SYSTEM

THE CLEARPASS ACCESS MANAGEMENT SYSTEM SOLUTION OVERVIEW Remember when IT was the gatekeeper of everything enterprise and it ruled the network with a combination of strict policies, purpose-built devices, and a fully-contained technology ecosystem.

More information

Conquering today s bring-your-own-device challenges

Conquering today s bring-your-own-device challenges Conquering today s bring-your-own-device challenges Table of Contents A framework for deploying successful BYOD initiatives 3 Shortcomings of current solutions 4 The vision for BYOD access management 5

More information

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support

More information

CLEARPASS ONGUARD CONFIGURATION GUIDE

CLEARPASS ONGUARD CONFIGURATION GUIDE CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...

More information

Cisco Secure Control Access System 5.8

Cisco Secure Control Access System 5.8 Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

Conquering Today s Bring Your Own Device Challenges. A framework for successful BYOD initiatives

Conquering Today s Bring Your Own Device Challenges. A framework for successful BYOD initiatives Conquering Today s Bring Your Own Device Challenges A framework for successful BYOD initiatives Table of Contents Introduction 3 BYOD drivers 3 Consumer choice 3 IT considerations 3 Device and information

More information

Aruba ClearPass Access Management System FREQUENTLY ASKED QUESTIONS

Aruba ClearPass Access Management System FREQUENTLY ASKED QUESTIONS Aruba ClearPass Access Management System FREQUENTLY ASKED QUESTIONS Table of Contents General Product Questions... 5 1. What is ClearPass?... 5 2. How does ClearPass compare with what enterprises are doing

More information

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Addressing BYOD Challenges with ForeScout and Motorola Solutions Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless

More information

Cisco Identity Services Engine

Cisco Identity Services Engine Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent

More information

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Paul Cochran - Account Manager. Chris Czerwinski System Engineer Paul Cochran - Account Manager Chris Czerwinski System Engineer Next-Generation NAC Fast and easy deployment No infrastructure changes or network upgrades No need for endpoint agents 802.1X is optional

More information

HP Intelligent Management Center User Access Management Software

HP Intelligent Management Center User Access Management Software Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral

More information

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement Comprehensive Endpoint Enforcement Overview is a complete, end-to-end network access control solution that enables organizations to efficiently and securely control access to corporate networks through

More information

Avaya Identity Engines Portfolio

Avaya Identity Engines Portfolio Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs:

More information

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect [email protected]

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect Nate.Isaacson@cdw.com SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect [email protected] Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

Systems Manager Cloud-Based Enterprise Mobility Management

Systems Manager Cloud-Based Enterprise Mobility Management Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and

More information

Cisco Secure Access Control System 5.5

Cisco Secure Access Control System 5.5 Data Sheet Cisco Secure Access Control System 5.5 Cisco Secure Access Control System (ACS) ties together an enterprise s network access policy and identity strategy. Cisco Secure ACS is the world s most

More information

Cisco Secure Network Server

Cisco Secure Network Server Data Sheet Cisco Secure Network Server Product Overview Granting and denying network access has evolved beyond simple user name and password verifications. Today, additional attributes related to users

More information

HP IMC Smart Connect w/wlan Manager Virtual Appliance Software

HP IMC Smart Connect w/wlan Manager Virtual Appliance Software Data sheet HP IMC Smart Connect w/wlan Manager Virtual Appliance Software Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support with

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the

More information

ClearPass Policy Manager

ClearPass Policy Manager ClearPass Policy Manager V2 October 2013 Introduction With the release of ClearPass Policy Manager 6.2.0 in July 2013 we have continued to build on our previous industry leading functionality, now with

More information

Cisco Secure Access Control Server 4.2 for Windows

Cisco Secure Access Control Server 4.2 for Windows Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates

More information

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda

More information

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD

BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf

More information

Secure IP Address Management Layer 2 Network Access Control Solution

Secure IP Address Management Layer 2 Network Access Control Solution Secure IP Address Management Layer 2 Network Access Control Solution Integrated DHCP & IP Address Management Solution Providing Superior Layer 2 Network Access Control Solution Overview Layer 2 Network

More information

Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless

Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy Eric Stresen- Reuter Technical Director Ruckus Wireless Bring Your Own Design SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY

More information

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network

More information

ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM

ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency

More information

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency

More information

Palo Alto Networks User-ID Services. Unified Visitor Management

Palo Alto Networks User-ID Services. Unified Visitor Management Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba

More information

Bring Your Own ipad to Work

Bring Your Own ipad to Work Bring Your Own ipad to Work Table of Contents Introduction 3 Challenges for IT 3 Device Identification 4 Device Enrollment 5 Device Authentication and Authorization 6 Device Visibility 7 Summary 7 Conclusion

More information

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Security It's Broke, Now What? June 15, 2010 Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's

More information

Deploying iphone and ipad Virtual Private Networks

Deploying iphone and ipad Virtual Private Networks Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.

More information

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...

More information

Evolving Network Security with the Alcatel-Lucent Access Guardian

Evolving Network Security with the Alcatel-Lucent Access Guardian T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing

More information

HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet

HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet Data sheet HP Intelligent Management Center Enterprise Software Platform Key features Highly flexible and scalable deployment options Powerful administration control Rich resource management Detailed performance

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY

THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY THE ARUBA ADAPTIVE TRUST DEFENSE FOR SECURE ENTERPRISE MOBILITY LEVERAGING REAL-TIME CONTEXT TO MITIGATE TODAY S NEW RISKS TABLE OF CONTENTS THE NEW ENTERPRISE PERIMETER THE MOBILE RISK SPECTRUM INTRODUCING

More information

TrustSec How-To Guide: On-boarding and Provisioning

TrustSec How-To Guide: On-boarding and Provisioning TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments

The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management

More information

The Aruba MOVE Architecture: Integrating Access Management, Network Infrastructure and Mobility Applications

The Aruba MOVE Architecture: Integrating Access Management, Network Infrastructure and Mobility Applications The Aruba MOVE Architecture: Integrating Access Management, Network Infrastructure and Mobility Applications Table of Contents User freedom has become IT s burden 3 The MOVE architecture 4 Access management

More information

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

Cisco Mobile Collaboration Management Service

Cisco Mobile Collaboration Management Service Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are

More information

Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i

Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Control ProCurve and Microsoft NAP Integration HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Securing BYOD With Network Access Control, a Case Study

Securing BYOD With Network Access Control, a Case Study Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the

More information

» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com

» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com » WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of

More information

Technical Note. CounterACT: 802.1X and Network Access Control

Technical Note. CounterACT: 802.1X and Network Access Control CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation

ForeScout CounterACT. Continuous Monitoring and Mitigation Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time

More information

HP Intelligent Management Center Standard Software Platform

HP Intelligent Management Center Standard Software Platform Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance

More information

Centralized Orchestration and Performance Monitoring

Centralized Orchestration and Performance Monitoring DATASHEET NetScaler Command Center Centralized Orchestration and Performance Monitoring Key Benefits Performance Management High Availability (HA) Support Seamless VPX management Enables Extensible architecture

More information

HP E-PCM Plus Network Management Software Series

HP E-PCM Plus Network Management Software Series Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security

More information

ForeScout Technologies Is A Leader Among Network Access Control Vendors

ForeScout Technologies Is A Leader Among Network Access Control Vendors For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

HP Intelligent Management Center Standard Software Platform

HP Intelligent Management Center Standard Software Platform Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance

More information

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Deploy and Manage a Highly Scalable, Worry-Free WLAN Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

802.1x in the Enterprise Network

802.1x in the Enterprise Network 802.1x in the Enterprise Network Harrison Forest ICTN 6823 Abstract: This paper aims to provide a general over view of 802.1x authentication and its growing importance on enterprise networks today. It

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT DATA SHEET OneFabric Connect Extend the OneFabric architecture to 3rd party applications BUSINESS ALIGNMENT Embrace BYOD by mixing and matching managed and unmanaged devices on the same infrastructure

More information

CLEARPASS EXCHANGE: SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE

CLEARPASS EXCHANGE: SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE : SHARE RICH, CONTEXTUAL DATA TO BUILD A COORDINATED AND ADAPTIVE MOBILITY DEFENSE While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, IT is struggling to gain visibility

More information

1 1. EXECUTIVE SUMMARY...

1 1. EXECUTIVE SUMMARY... WI-FI FOR BUSINESS Wi-Fi for Business... 1 1. EXECUTIVE SUMMARY... 2 2. Monitoring and Management... 2 3. Verizon Service Desk... 3 4. Features and Benefits... 3 5. Recommended Markets and use Cases...

More information

Extreme Access Control For Healthcare

Extreme Access Control For Healthcare DATA SHEET Extreme Access Control For Healthcare (Formerly Network Access Control) End-to-end security and superior user experience. HIGHLIGHTS BUSINESS ALIGNMENT Protect patient data by proactively preventing

More information

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides

More information