Mobile device Management mit NAC



Similar documents
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

Embracing Complete BYOD Security with MDM and NAC

How To Improve Your Network Security

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Securing BYOD With Network Access Control, a Case Study

The ForeScout Difference

Technical Note. ForeScout MDM Data Security

ForeScout MDM Enterprise

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Addressing BYOD Challenges with ForeScout and Motorola Solutions

ForeScout Technologies Is A Leader Among Network Access Control Vendors

Chris Boykin VP of Professional Services

AirWatch Solution Overview

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

ForeScout CounterACT. Continuous Monitoring and Mitigation

Strategic Road Map for Network Access Control

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

End User Services. Managed Mobile. Mobile Device Management. Managed Mobile. Copyright 2012 FUJITSU

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Whitepaper. Securing Visitor Access through Network Access Control Technology

Recognition of Websense Leadership. Industry Analysts Validate Websense Market and Technological Leadership

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang

ForeScout CounterACT Endpoint Compliance

Guideline on Safe BYOD Management

SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

ControlFabric Interop Demo Guide

Bitdefender GravityZone Sales Presentation

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Device Strategy

IBM Endpoint Manager for Mobile Devices

DOBUS And SBL Cloud Services Brochure

Symantec Mobile Management Suite

Readiness Assessments: Vital to Secure Mobility

Delivering Control with Context Across the Extended Network

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Mobile device and application management. Speaker Name Date

Sygate Secure Enterprise and Alcatel

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Addressing NIST and DOD Requirements for Mobile Device Management

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Meraki: Introduction to Cloud Networking

Network Access Control in Virtual Environments. Technical Note

Managing and Securing the Mobile Device Invasion IBM Corporation

Technical Note. ForeScout CounterACT: Virtual Firewall

Mobilize your Enterprise in 60 Minutes!

IT Self Service and BYOD Markku A Suistola

Mobility Challenges & Trends The Financial Services Point Of View

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

<Insert Picture Here> Oracle Identity And Access Management

HP FlexNetwork Architecture

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

White Paper. Identifying Network Security and Compliance Challenges in Healthcare Organizations

Next Gen Firewall and UTM Buyers Guide

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Best Practices for Outdoor Wireless Security

WhatWorks in Blocking Network-based Attacks with ForeScout s CounterACT. Automating Network Access, Endpoint Compliance and Threat Management Controls

Data Loss Prevention and Secure Access for Mobile Content. Ojas Rege VP Strategy

Reducing the cost and complexity of endpoint management

Proven LANDesk Solutions

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

How To Manage A Privileged Account Management

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Best Practices for Secure Mobile Access

Kaseya IT Automation Framework

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Cloud, where are we? Mark Potts, HP Fellow, CTO Cloud November 2014

ForeScout Technology Mobile Security Software

ClearPass: Understanding BYOD and today s evolving network access security requirements

The Cisco ASA 5500 as a Superior Firewall Solution

6 Things To Think About Before Implementing BYOD

VDI Security for Better Protection and Performance

BLACK BOX. Do you know who s on your network? Network Access Control. Get the facts. Then get the protection you can t live without.

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce

BYOD: BRING YOUR OWN DEVICE.

Athena Mobile Device Management from Symantec

PULSE SECURE FOR GOOGLE ANDROID

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Total Enterprise Mobility

Gartner Magic Quadrant Sources and Disclaimer

Your Pad or Mine? Enabling Secure Personal and Mobile Device Use On Your Network

Transcription:

Mobile device Management mit NAC fweisel@forescout.com 2012 ForeScout Technologies, Page 1

Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal with consumerization, NAC provides the flexibility that enterprises need in a BYOD environment, while providing the controls that enable network and security managers to retain control over the network. Gartner, Strategic Road Map for Network Access Control, Lawrence Orans and John Pescatore,11 October 2011, ID number G00219087 2012 ForeScout Technologies, Page 2

Produktivitaetversus Sicherheit Mitarbeiter, Gaeste, Externe Smartphones, ios, etc W-Lan, via kabel, VPN Access Agility Security Datenverlust Zero-day attacks Sicherheitsstatus des Geraetes Compliance und Vorschriften Erfordert Echtzeit Sichtbarkeit Erfordert Echtzeit Kontrolle 2012 ForeScout Technologies, Page 3 2011 ForeScout

Limited Visibility Means Security Gaps Corporate Resources Non-Corporate BYOD Endpoints Network Devices Applications Antivirus out of date Firewall installed but turned off Encryption agent not installed Users ForeScout Comprehensive Visibility Protection Visible Possible No Protection Not Visible Possible 2012 ForeScout Technologies, Page 4

Full Device Information User Behavior User Information Applications OS Integrity Device Information Physical Layer Network Policy Violations Audited Responses Self-Remediation Success Username Authentication Status Group Membership Running Applications Installed Applications Registry Values OS Fingerprint Antivirus Update Status Patch Level IP Address/MAC Device Fingerprint Printer, Non-OS Device Switch, Port, VLAN VPN Status Geographic Location Trouble Ticket Requests Simultaneous Connections Email, Phone, Etc. Login History File Size, Version, Date Application Version External Vulnerabilities OS Processes, Services Open Services VoIP Phone Wireless Device/NAT Attached USB Drive Number of Devices on Port Hub, Router 802.1x 2012 ForeScout Technologies, Page 5 5

See Grant Fix Protect Grant access Register guests Block access Restrict access ForeScout CounterACT ( ( ( ( ( ( ( 2012 ForeScout Technologies, Page 6

Control Automation Advantages Control Costs (OpEx, CapEx) The financial institution selected ForeScout CounterACT [and] was able to save over $1,000,000 per year in endpoint support costs... The automation achieved via ForeScout CounterACT reduces help desk call volume, initiates fewer job tickets for software maintenance workflows, causes fewer image refreshes, and increases user productivity. Continuous Endpoint Compliance: An Ogren Group Special Report April 2011 Control Coverage (risk management) 2012 ForeScout Technologies, Page 7

See Grant Fix Protect Detect unexpected behavior Block insider attack Block worms Block intrusions ForeScout CounterACT 2012 ForeScout Technologies, Page 8

ForeScout Übergreifende Sicherheit Mobile Security Sichtbarkeit Sicherheits Status Konfiguration Network Access Control Gast Registrierung Zugriffs Beschränkung Block von nicht erlaubten Geräten Endpoint Compliance Finden und Beheben von Sicherheitslücken Richtlinien durchsetzen PC, Mac, Linux, ios, Android Threat Management Block von Einbruchsversuchen Block APTs Erkennung infizierter Systeme Agentless Knowledgebase ForeScout Automated Security Control Platform. Scalable Interoperable 2012 ForeScout Technologies, Page 9

ForeScout & the IT-GRC Framework Switches & Routers Endpoint Protection Endpoints Firewall & VPN Wireless IT Network Services Network Devices Smart Phones & Tablets 2012 ForeScout Technologies, Page 10

Deployment Centralized Architecture Out-of-Band Clientless Network-Integration Single Appliance Deploy at the Core ForeScout CounterACT 2012 ForeScout Technologies, Page 11

Deployment Distributed Architecture 2012 ForeScout Technologies, Page 12 12

Mehrstufige Mobile Security Lösung Rightsizing von Mobile Threat Management und Ausgaben Operational Management Provisioning Cost management Inventory Network Security Access control Block threats Network instability Device Security Password Remote wipe Configuration enforcement Detect rooted / jailbroken Sandbox / containerization Unified security management ForeScout CounterACT ForeScout CounterACT + ForeScout Mobile ForeScout CounterACT + ForeScout Mobile + MDM (3 rd party) MDM (3 rd party) User impact Transparent Lightweight Varies Varies Price $ $$ $$$* $$$$ 2012 ForeScout Technologies, Page 13 *Assumes that a portion of the mobile devices are enrolled in a 3 rd party MDM system and the rest are managed by ForeScout Mobile Security Module.

ForeScout Leadership Consistently ranked as a leader Magic Quadrant for Network Access Control, December 2011, Gartner Inc. Forrester Wave Network Access Control, Q2-2011, Forrester Research, Inc. Magic Quadrant for Network Access Control, December 2012, Gartner Inc. Analysis of the NAC Market, February 2012, Frost & Sullivan NAD5-74 2012 ForeScout Technologies, Page 14 63.4 % *This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from ForeScout. Gartner does not endorse any vendor, product or service ]depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. * Forrester Wave NAC Q2-20111The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change.

Reviews and Awards Top rank and highest score for Strategy and Current Offering John Kindervag, Forrester* highly rated by enterprise users for ease of deployment and flexible enforcement Lawrence Orans, Gartner* ForeScout customers do more with their NAC solutions and reap the benefits of their investment quickly relative to competing solutions. Jeff Wilson, Infonetics 2011 2012 ForeScout Technologies, Page 15 * Forrester Wave NAC Q2-20111The Forrester Wave is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave are trademarks of Forrester Research, Inc. The Forrester Wave is a graphical representation of Forrester's call on a market and is plotted using a detailed spreadsheet with exposed scores, weightings, and comments. Forrester does not endorse any vendor, product, or service depicted in the Forrester Wave. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. ** Gartner, Magic Quadrant for Network Access Control, L.Orans and J. Pescatore, 2 July 2010

WebEx Mehr Information Danke Whitepapers Test 2012 ForeScout Technologies, Page 16 2011 ForeScout Technologies, Inc.

Awards Secure Computing Magazine Group Test CounterACT s Interface is intuitive and the reporting/dashboard features are slick... a robust NAC solution with plenty of features and a great price point. It is our Best Buy. - September 2011 CounterACT to be a multi-faceted, extremely powerful, exceptionally flexible and exquisitely configurable system being both integrated and agentless, it offers a significant bang for the buck awarded Editor s Choice. - August 2011 For its power, simplicity and revenue potential, the CRN Test Center recommends ForeScout s CounterACT 6.3.4 network access control system. - June 2011 Judged on the product s capability and application, ForeScout CounterACT surpassed 12 other vendors in this prestigious category. - April 2011 Best Overall Security Company of the Year. - Feb 2011 In terms of network visibility, CounterACT was certainly the most sophisticated product in this test. - June 2010 2012 ForeScout Technologies, Page 17