Avaya Identity Engines Portfolio



Similar documents
Avaya Identity Engines Portfolio

Avaya Identity Engines Portfolio

Secure network guest access with the Avaya Identity Engines portfolio

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

When SDN meets Mobility

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

Cisco TrustSec Solution Overview

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

SA Series SSL VPN Virtual Appliances

ForeScout CounterACT. Continuous Monitoring and Mitigation

Cisco Mobile Collaboration Management Service

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Sygate Secure Enterprise and Alcatel

solution brief ID Manager Leverage the Cloud to Simplify and Automate Enterprise Guest Management

Zone Labs Integrity Smarter Enterprise Security

Best Practices for Secure Remote Access. Aventail Technical White Paper

Ensuring the security of your mobile business intelligence

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Provide access control with innovative solutions from IBM.

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Securing BYOD With Network Access Control, a Case Study

Palo Alto Networks User-ID Services. Unified Visitor Management

Secure Your Mobile Device Access with Cisco BYOD Solutions

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Beyond the Firewall No. 71 February, 2012 Network Access Control Edition

SECURE ACCESS TO THE VIRTUAL DATA CENTER

Whitepaper. Securing Visitor Access through Network Access Control Technology

Secure, Remote Access for IT Infrastructure Management

Avaya Contact Center Control Manager (ACCCM)

Strengthen security with intelligent identity and access management

The ForeScout Difference

DYNAMIC SECURE MOBILE ACCESS

Addressing BYOD Challenges with ForeScout and Motorola Solutions

Network Access Control in Virtual Environments. Technical Note

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Best Practices for Outdoor Wireless Security

Kaseya IT Automation Framework

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

POLICY SECURE FOR UNIFIED ACCESS CONTROL

» WHITE PAPER X and NAC: Best Practices for Effective Network Access Control.

ForeScout MDM Enterprise

Policy Management: The Avenda Approach To An Essential Network Service

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Secure Networks for Process Control

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

On-boarding and Provisioning with Cisco Identity Services Engine

Network Virtualization Network Admission Control Deployment Guide

Alcatel-Lucent Services

Evolving Network Security with the Alcatel-Lucent Access Guardian

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Conquering today s bring-your-own-device challenges

Introduction to Endpoint Security

BYOD: BRING YOUR OWN DEVICE.

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Microsoft Windows Server System White Paper

Speeding Office 365 Implementation Using Identity-as-a-Service

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Ryerson University Embraces BYOD with a High-Performance Avaya Networking Solution

The Essential Security Checklist. for Enterprise Endpoint Backup

Network Access Control ProCurve and Microsoft NAP Integration

Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

RSA SecurID Two-factor Authentication

ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Real-World Scale for Mobile IT: Nine Core Performance Requirements

Endpoint Virtualization for Healthcare Providers

Mobile Device Management

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Avaya Aura. The communications infrastructure for people-centric collaboration. avaya.com 1

Building A Secure Microsoft Exchange Continuity Appliance

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Your Location Instant NOC using Kaseya. Administrator at Remote Location Secure access to Management Console from anywhere using only a browser

ADDING STRONGER AUTHENTICATION for VPN Access Control

ClearPass: Understanding BYOD and today s evolving network access security requirements

Best Practices for Enterprise Mobile Printing

Leveraging Bring Your Own Device Programs Network Services Engineered to Enable Employee Choice, Mobility and Security.

PCI v2.0 Compliance for Wireless LAN

Pluribus Netvisor Solution Brief

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Avaya Visualization Performance and Fault Manager

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Enterprise Mobility as a Service

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

White Paper: Managing Security on Mobile Phones

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

NCSU SSO. Case Study

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Avaya plus Skype for Business: The Best of Both Worlds

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

VDI Security for Better Protection and Performance

Active Directory and DirectControl

Copyright Giritech A/S. Secure Mobile Access

Achieving PCI-Compliance through Cyberoam

THE BLUENOSE SECURITY FRAMEWORK

Transcription:

Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs: Supports current network infrastructures and identity stores and offers investment protection via a standards-based solution and a VMware virtual appliance Simplicity: A centralized policy decision (breaking down silos), policy expression in plain language (not tied to technology) and simplified policy creation through virtual groups Regulatory compliance: Full network visibility and comprehensive reporting and analytics Avaya Identity Engines Portfolio Avaya Identity Engines Portfolio solutions enable businesses to control who accesses a network, when, where, and how the network is accessed, and which devices will be allowed on the network. IT departments today are faced with a growing challenge: to maintain network security while facilitating access via wired, wireless and networks for employees, contractors, guests and others who may be on or off premise. They re being asked to provide only as much access as each user requires, to ensure that user devices are healthy and in compliance with the chosen security policy, and to provide that access in real time. With an increasing number of users bringing personal devices into work as a result of the Bring Your Own Device (BYOD) trend, it is essential that IT departments have control and visibility over network access without limiting the flexibility and value these devices deliver for anytime, anywhere productivity and collaboration. An analogy to the use of network access control (NAC) is your experience at an airport. Prior to boarding, you must show your ID to prove that you are indeed who you say you are. Next, you must walk through a metal detector to ensure that you re not bringing anything harmful onto the plane. And finally, based on the ticket you purchased, you ll be allowed access to a particular area of the aircraft. In much the same way, Avaya Identity Engines manages access to the network. It checks your identity against an identity store (Microsoft Active Directory, for example), performs a device health check to make sure your PC is compliant, and then, based on your predetermined role, gives you access to only a certain portion of the network. Offering a standards-based solution that integrates with your existing network infrastructure, Identity Engines provides the central policy decision needed to enforce role-based access. The portfolio combines the best elements of a next-generation RADIUS/AAA server, the deep directory integration found in application identity offerings with one of the industry s most advanced policy engines to create a NAC solution that provides unprecedented access flexibility without compromising network security. The Avaya Identity Engines portfolio is standards-based, vendor-agnostic, scalable, easy to use and cost effective. It integrates into your current infrastructure no need to upgrade, no matter your vendor supporting heterogeneous networks and delivering investment protection. It offers a comprehensive set of software products designed to interwork and simplify network identity and access management, including Bring Your Own Device (BYOD) and guest access policies. The portfolio includes: avaya.com 1

Avaya Identity Engines authenticated network architecture BENEFITS The Avaya Identity Engines portfolio helps enterprises: Comply with regulatory requirements Control who enters the network Deliver differentiated access based on user roles Provide data privacy and restricted access to applications Provide true network protection, mitigating the risk of data loss and the exposure to vulnerabilities 2 avaya.com Identity Engines Ignition Server: The main component of the portfolio, providing a centralized policy-decision point across all access methods while also supporting multiple directory stores. Identity Engines Ignition Guest Manager: A quick, safer and easy way to let front-desk staff create guest user accounts for access to specific resources for a designated time period. Identity Engines Ignition Access portal: A portal that intercepts traffic from employees and guests, simplifying how devices authenticate and connect to the network. Identity Engines Ignition CASE Wizard: Automates the configuration of Windows-based devices, delivering more secure access to both wired and wireless networks without installing software on the device itself. Identity Engines Ignition Posture: Endpoint health checking for employee/managed devices that is flexible and integrated with the Identity Engines Ignition Server. Identity Engines Ignition Analytics: A powerful reporting application with over 25 preconfigured audit, compliance and usage reports. Identity Engines Ignition Single Sign On: Allows network administrators to centrally set, assign, store more securely, and change access credentials to eliminate multiple IDs and password per user. Avaya Identity Engines portfolio products are robust and easy to use. There s no need to write different policies for each directory; user groups can be taken from multiple active directories and combined to create virtual groups the tools are provided to make top-notch NAC a breeze. But what makes the Avaya Identity Engines solution outstanding is its ability to express policies in plain language. Table 1 shows that if a user is in the Employee user group and connects over wireless or wired, the policy engine can identify it thus providing more flexibility and the device s posture will be checked. If the device is compliant, the user is granted employee access; if it s non-compliant or if posture information isn t available, the user receives quarantined access. Similar policies can easily be written for remote employees and guests and can include additional attributes like time of day or day of week. In addition to its powerful security benefits, the Identity Engines portfolio can improve operational effectiveness by eliminating the need to pre-assign each switch port to specific VLANs, filters, etc., and then, when devices move, manually re-configuring these ports. Because the Identity Engines Ignition Server knows the identity of users and the types of devices attempting to connect to the network, VLANs are dynamically assigned at the time of access. No IT resources are needed to move a device from port to port or VLAN to VLAN. Process simplification like this can significantly reduce operational costs. Centralized security Easy to deploy, the portfolio s policy engine, called the Identity Engines Ignition Server, resides in the data center, providing centralized authentication and authorization for wired, wireless and network devices. It delivers centralized integrated security services for Avaya and third-party Ethernet switching, WLAN and products.

Rule name Employee_ local Employee_ remote Guests The Ignition Server assigns network access rights and permissions based on a user s role or relationship to the organization, where they connect from (conference rooms, labs, lobbies, etc.), and how they connect (wireless, wired, ). For example, an IT director may apply more rigorous posture checking to users who act as system administrators, granting those users access to critical network assets, while applying less rigorous checking to other users and granting them access only to the standard corporate network. Rule summary Guests, on the other hand, can be provisioned with access to particular subnets or VLANS or limited to outbound web access only, IF (User.group-member exactly matches [Employees] AND (Authenticator. Authenticator Type = OR Authenticator. Authenticator Type = Wired)). THEN Check Posture Profile employee_posture_policy. If Compliant Send Outbound Values employee_access If Non-Compliant Remediate Using quarantine_access If Posture Not Available Send Outbound Values quarantine_access IF (User.group-member exactly matches [Employees] AND Authenticator. Authenticator Type = ) THEN Check Posture Profile employee_ posture_policy. If Compliant Send Outbound Values employee_ access If Non-Compliant Remediate Using restricted_access If Posture Not Available Send Outbound Values restricted_access IF (User.group-member does not match [Employees] AND System. Time between 8:00 AM and 5:00 PM AND Week day is between Monday and Friday) THEN Check Posture Profile guest_posture_ policy If Compliant Send Outbound Values guest_access If Non-Compliant Deny If Posture Not Available Deny No_ IF (User.group-member does not match [Employees] AND Authenticator.Authenticator Type = ) THEN Deny depending on their roles and needs. Table 1. Rules The Identity Engines Ignition Guest Manager enables a network administrator to specify which device types are granted access. Identity Engines Ignition Analytics delivers extensive automated reporting enabling IT professionals to be more effective in carrying out compliance, planning and security mandates. The products Identity Engines Ignition Server The Identity Engines Ignition Server is the centerpiece of the Identity Engines portfolio. It is a virtualized standard; no new hardware is required. As most organizations have already invested in VMware environments, the Ignition Server leverages existing investment, saves costs and provides additional deployment flexibility. The Ignition Server breaks down silos. It simplifies network identity management across the enterprise, enables consistent, centralized access policy, and reduces the potential for administrative error. By putting user information and policy in a single location, policies can be created on a full network-wide basis, supporting LAN, WLAN and consistently. Offering a new level of accuracy with identity and policy based control, the Ignition Server enables policies to determine who accesses the network, where, when, how and with what type of device. User identity, device identity, and health of device can be assessed and policies can be created based on a multitude of variables including user-group membership (such as student, teacher, staff, guest), access method (such as, wireless vs. LAN), health of device, time of day, day of the week, and more. The Ignition Server is easy to deploy, connecting with your existing identity system and switching infrastructure. It provides a central policy decision point that streamlines access management, improves security and satisfies reporting requirements. It connects to complex store environments and offers centralized editing of network access policies. With the Ignition Server, access policies can evaluate user data, equipment data and the context of the access request. It handles multiple EAP types and supports network hardware from all major vendors. avaya.com 3

Identity Engines Ignition Guest Manager Administrator The Ignition Guest Manager oversees guest and visitor network access across SSL RSA wired and wireless access points. Accounts can quickly and easily be set Internet Dialup AD up and administered by front-desk personnel or any employee tasked with being a guest sponsor, thereby freeing up valuable IT resources. Wired RADIUS/ AAA Servers LDAP Guest access is managed using an intuitive, web-based interface that can be easily customized to meet the User Accounting Gateway needs of each enterprise. An integrated rules engine guarantees user accounts automatically expire at a scheduled time and date. RADIUS/ AAA Servers TACACS+ Servers For large events or conferences, the Ignition Guest Manager s bulk-loading capability can configure hundreds or thousands of guest accounts. In addition, it can host multiple selfprovisioning kiosks simultaneously, each with different privileges, such as access zones and duration. As a result, guests can create their accounts themselves. Each can have different display characteristics and branding. Identity Engines Ignition Access Portal The Ignition Access Portal establishes a portal that intercepts traffic from employees and guests, simplifying how devices authenticate and connect to the network while providing new tools to monitor, manage and control the level of access that is provided, including detailed visibility into the profiles of individual devices. Instead of imposing arbitrary restrictions on mobile solutions, the Ignition Access Figure 1. Complex architecture with multiple AAA servers and network overlays Internet SSL Dialup Wired Firewall Gateway Avaya Identity Engines Ignition Server Identity information sources: Active Directory Novell edirectory Sun Directory Oracle Internet Directory LDAP Kerberos RSA SecurID RADIUS and other Token-based services Figure 2. Simplified authenticated network architecture with centralized policy decision provided by the Identity Engines Ignition Server 4 avaya.com

Portal enables employees to more safely connect a wide range of smartphones and tablets. It s an ideal solution for on-boarding and enterprise-wide management of Bring Your Own Device (BYOD) policies. With the Access Portal, IT can easily capture information on a wide range of devices personal or enterpriseissued and use the Identity Engines Ignition Server to make policy decisions and enforce appropriate access levels. Identity Engines Ignition CASE Wizard The Ignition CASE Wizard automates and simplifies the process of deploying 802.1x authentication and Microsoft NAP posture assessment throughout your network. It is the ideal choice for a wide range of configuration scenarios: Systematic configuration of employee PCs or ad hoc configuration for business partners bringing a new device into the enterprise. Support for business partners who need access to secure information in specific places on your network. Large scale reconfiguration of existing managed devices for example to bring all employee devices in compliance with a new 802.1x security policy. Identity Engines Ignition Posture The Ignition Posture is a practical, costeffective solution, offering an easy-todeploy, standards-based client supporting all major desktop operating systems, as well as policy options targeted at employee and other managed devices. Like the Ignition Compliance Portal, it interrogates endpoints for security and compliance and, based on health check outcomes, grants appropriate levels of network access to enhance network integrity. Identity Engines Ignition Analytics Ignition Analytics is a powerful reporting application that enables in-depth analysis of network activity including ingress and usage. Report data comes from the Avaya Identity Engines Ignition Server. Ignition Analytics adds reporting to the Ignition Server by enabling automated data retrieval and report generation. An extensive feature set, which is easily customized to comply with policies and requirements, provides precise data that can be delivered automatically to anyone requiring it. Over 25 preconfigured audit, compliance and usage reports are available and custom reports can be easily generated. Sample reports include: Top five users with most usage RADIUS authentication attempts top 20 clients RADIUS authentication attempts failed by authenticators Authentications by user provisioning and date Usage summary Failed authentications by authenticator Authentication by client Identity Engines Ignition Single Sign On Identity Engines Single Sign-on uses the Ignition Server as a Unified Identity Provider that can accept authentication requests from multiple interfaces. By allowing various Web applications to authorize individual access to protected online resources, it helps preserve privacy. Users do not need to log in separately to individual resources. Instead they get consistent, more secure and easy access to critical resources from any location, and they only need to remember one password. Avaya Flare Experience for ipad release 1.2 supports Identity Engines Single Sign-On; other Avaya Aura applications are planned to extend this capability in the future. In addition, Identity Engines is provided with a Service Provider agent that customers may incorporate into their Web-based application server and achieve Single Sign-On against their enterprise directories for the Webbased application via Identity Engines. avaya.com 5

Use case scenarios: Real-world examples Guest access Guest access was once an all-or-nothing proposition: you either locked down your network, preventing guests from entering, or left it wide open, allowing any wireless user to tap in and consume your resources. Now, with an Avaya Identity Engines solution, you can control who enters, where in the network a user is allowed to go and for how long. And, all that s required to accomplish this is filling in a template. No technical expertise and/or resources are required, and it can be done in real time. Guests receive a user ID on the spot and a password is sent to their mobile phone or BlackBerry. You might also set a different policy if an employee is at home as opposed to an airport kiosk, and for different times of day. Bottom line, what matters is who, where, when, how and type of device. With an Identity Engines solution, you have control. Authorized fixed assets An Identity Engines solution enables you to define authorized fixed assets or noninteractive devices such as IP phones, printers and fax machines. You can conduct MAC-level authentication to help ensure that only authorized devices connect to the network and connect only where they re expected to connect. This mitigates the risks of intruders unplugging a printer and accessing the network and employees from bringing in their own wireless access points and sharing network services, compromising network security. About Avaya Avaya is a leading, global provider of customer and team engagement solutions and services available in a variety of flexible on-premise and cloud deployment options. Avaya s fabricbased networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information, please visit www.avaya.com. Conference room access Once guests are inside the building, you can write a policy that says how much access they are given. You may want to give employees unrestricted network access within a conference room and grant restricted access to guests in the same room. You can do this even if they re using the same means of access. Identitybased policies remove the need to manage ports as open or restricted. It doesn t matter what you re plugged into; all that matters is who you are and what you need. Validated remote access The Identity Engines portfolio enables you to perform posture assessments on remote devices to ensure they re equipped with valid antivirus software, updates, a personal firewall, etc. To protect sensitive information you might stipulate that employees cannot access everything in an office. The payoff The Avaya Identity Engines portfolio delivers a wide range of role-based access options without compromising network security. It s a standards-based solution that integrates with your existing network infrastructure, leveraging your investment. It centralized and simplifies policy decision-making throughout your network, expressing policies in simple language thus removing technology from the equation. Learn More To learn more about the Avaya Identity Engines Portfolio, contact your Avaya Account Manager, Avaya Authorized Partner, or visit us at www.avaya.com. 6 avaya.com 2015 Avaya Inc. All Rights Reserved. Avaya and the Avaya logo are trademarks of Avaya Inc. and are registered in the United States and other countries. All other trademarks identified by, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. 04/15 DN5115-04