• Share
  • Email
  • Embed
  • Like
  • Private Content
Secure Enterprise Mobility
 

Secure Enterprise Mobility

on

  • 596 views

Securing BYOD with Palo Alto & Aruba: BYOD is driving an extensive change in the way that organizations design their networks and deploy security. With BYOD, the organization faces the task of ...

Securing BYOD with Palo Alto & Aruba: BYOD is driving an extensive change in the way that organizations design their networks and deploy security. With BYOD, the organization faces the task of securing devices that may not even be owned or managed by the company. As a result, the organization must secure the network and apply policy based on who is accessing their applications and what device they’re using. In this session, learn about how to build a more secure wireless environment through the adoption of “Zero Trust” principles at the access layer.

In this session, join Brian Tokuyoshi, senior product manager from Palo Alto Networks, to learn about how to integrate Aruba wireless infrastructure and Palo Alto's next-generation security platform. Please comment on what you think about the session and anything specific you would like us to cover. For more please visit http://community.arubanetworks.com

Statistics

Views

Total Views
596
Views on SlideShare
426
Embed Views
170

Actions

Likes
2
Downloads
38
Comments
0

4 Embeds 170

http://community.arubanetworks.com 161
http://www.airheads.eu 5
http://plus.url.google.com 3
http://www.slideee.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Mitigating risk in allowed traffic
  • Aruba believes IT should think about building the all-wireless office for GenMobile. The all-wireless office has “4 S’s”:Stable Air – Companies can’t have Wi-Fi that slows down as the network experiences high density, especially as users move around to different areas of a building and introduce bursts of trafficSecure Air – Personal devices that GenMobile guests, employees, contractors bring in should be able to be secured without involving IT. The time it takes for IT to enable simple tasks like getting online, checking email, etc is just not worth the timeSimple Air – Logging in to the cloud apps, screen-projecting, or printing needs to be hassle-free. For GenMobile, having single-sign on, or automated authentication on mobile devices will dramatically simplify the login experience.Smart Air – Mobile apps should be able to learn their indoor location, get priority for work use, and get less priority for personal use.
  • All of the features just described are delivered as hardware or virtual appliances that can authenticate up to 500, 5000 and 25000 unique devices per week. ClearPass is also unique in that the base appliance includes our entire feature set – RADIUS and TACACS services, policy engine, identity broker features, as well as each of the add-on modules in the form of a starter bundle for Guest, Onboard, OnGuard and WorkSpace. The add-on modules are expandable per use case which means that customers with 100 guests per week only need to license for that amount. The same goes for onboarding personal or BYO devices. They’re not required to purchase advanced licenses or features they won’t use.Other customer benefits include the ability to create policies that query multiple identity stores, connect multiple active directory domains, leverage external MDM solutions and work in Wi-Fi, wired and VPN environments. Again without purchasing special licensing.
  • To eliminate silos Aruba ClearPass is designed to deliver user and device visibility, automated workflow services and policy management enforcement all from a single platform. Built-in device profiling provides a comprehensive picture of what’s connecting to the network which makes it simple to differentiate access for BYOD and IT managed devices. Real-time troubleshooting tools help IT create policies that work and also solve connectivity issues. For example, an access dashboard and per session logs allow IT to easily see why a user had a problem without having to peruse lengthy log databases. To help off-load IT, ClearPass includes automated features that allow users to self-provision personal devices and register media sharing devices like an Apple TV or just a printer. ClearPass Guest lets visitors self-register or sponsors can create credentials that automatically expire. Device management services extend MDM capabilities with network control and enforcement. A built-in CA can be used to distribute and manage device specific certificates. User can even re-install or revoke certificates for lost or stolen devices.The policy component brings it all together by allowing organizations to create granular policies for Aruba and multivendor Wi-Fi, wired and VPN networks. A role-based model allows you to assign and differentiate access by user, device and other contextual attributes like location, job function and device ownership. All this from a single pane of glass.
  • Real cyberattacks are considerably more sophisticated than the attacks that one would expect to see even a few years ago. Most of these attacks will leverage multiple steps, in which each step builds on the previous toward a strategic goal. Multiple techniques are coordinated to work together, and the attackers attempt to hide their traffic and infrastructure whenever possible. This example walks through the very common steps of a modern data breach.Step 1 – Many attacks today begin by using a compromised website to deliver an exploit and malware to an end-user. This process is called a drive-by-download and it often begins with something called an exploit kit. For example, Blackhole is a very well-known exploit kit. An attacker can craft a website that uses the exploit kit or simply find a vulnerable website where the attacker can add his exploit kit code. Either way, once the exploit kit code is running on the target website, the exploit kit will automatically identify vulnerable visitors to the site and exploit the end-user machine.Step 2 – Once the exploit has been delivered to the target, now the user is now compromised, and the attacker can deliver malware to the compromised user. The malware is typically not delivered from the same site hosting the exploit kit, as this would very quickly make it obvious that the site was infected. Instead the attacker will redirect traffic to new or unknown domain to deliver the malware. The attacker can constantly cycle through these domains to keep his operation a secret.Step 3 – Once malware is delivered to the target, it is often the job of the first stage malware to establish persistence and communication on the infected host. In many cases this is done via a root-kit and downloader. Zero Access is very common rootkit that meets this requirement, but there are many others.Step 4- Once the rootkit is installed, it now needs to set up a command-and-control channel with the remote attacker. This link is one of the most important in the attack lifecycle because it provides the attacker with remote control over his attack, and a control point inside the target network. This traffic tends to be highly evasive because the attacker is in control of both ends of the connection (both the malware sending the traffic and server that it is communicating with). This gives the attacker a great deal of freedom in terms of ports, protocols, encryption and tunneling.Step 5 – Once the attacker is inside the network, and communicate back out, he can now download a second wave of malware that is more geared to the actual goal of the attack, such as stealing information. These payloads can be customized to a particular attack and often give a more unique view into the attacker and the ultimate goal of an attack. Step 6 – Often it is the goal of the secondary payload to dig deeper into the network to access protected data. To do this the attacker will attempt to spread to other nodes in the network, and to attempt to escalate his privilege in the network. For example, the attacker may have initially compromised a low level employee with limited rights on the network. The attack may try to use that initial compromise in order to steal credentials for a network administrator in the network, which in turn would provide free reign over the network.Step 7 – As part of digging deeper into the network, attackers will often leverage a variety of hacking tools both to enumerate the internal environment, find weaknesses and steal data. Furthermore, the attackers will use a variety of techniques to quietly communicate from inside the network. This can include custom protocols that have been designed by the attackers or traffic and covert communications that are tunneled within allowed traffic. Step 8 – Of course the ultimate goal of most attacks is to steal data. What this data is will of course vary depending on the target, but can include everything from credit card numbers to personally identifiable information, to trade secrets and intellectual property. This often requires using applications that are effective at transferring large volumes of data such as FTP, peer-to-peer applications or other web-based file transfer applications.
  • In the next 10 minutes, I’m going to walk you through our unique approach to secure your network infrastructure and defeat advanced and targeted threats. It’s basically made of 3 steps:The one where you apply positive controls. It’s typically done the next-generation firewalls and Step 2 and 3 are about
  • 21:44 – 24:16

Secure Enterprise Mobility Secure Enterprise Mobility Presentation Transcript

  • Aruba / Palo Alto Networks Secure Enterprise Mobility
  • CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved 2 #AirheadsConf Today’s Agenda • Mobility / BYOD • Threat Landscape & Challenges • Integration Points • Demonstration
  • 3 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Networking Challenges of Mobility Silos increase IT touch points and errors NETWORK NAC, Roles, Policies DEVICES BYOD, Onboarding, MDM APPs Use, Distribution, Control VISIBILITY What’s on the Network? WORKFLOW No automation on unmanaged devices SECURITY Company data on personal devices
  • 4 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Quality of Security Tied to Location malware botnets exploits Exposed to threats, risky apps, and data leakage Enterprise-secured with full protection Headquarters Branch Offices
  • Palo Alto Networks Safe BYOD Application Enablement
  • 6 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Applications Get Through the Firewall Network security policy is enforced at the firewall • Sees all traffic • Defines boundary • Enables access Traditional firewalls don’t work any more
  • 7 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Technology Sprawl and Creep Enterprise Network • “More stuff” doesn’t solve the problem • Firewall “helpers” have limited view of traffic • Complex and costly to buy and maintain • Doesn’t address application control challenges IMDLPIPS ProxyURLAV UTMInternet
  • 8 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Firewall as a Business Enablement Tool Applications: Safe enablement begins with application classification by App-ID. Users: Tying users and devices, regardless of location, to applications with User-ID and GlobalProtect. Content: Scanning content and protecting against all threats – both known and unknown; with Content-ID and WildFire.
  • 9 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Security Enforcement in the Enterprise NetworkPerimeter • App visibility and control in the firewall • All apps, all ports, all the time • Prevent threats • Known threats • Unknown/target ed malware • Simplify security infrastructure DataCenter • Network segmentation • Based on application and user, not port/IP • Simple, flexible network security • Integration into all DC designs • Highly available, high performance • Prevent threats DistributedEnterprise • Consistent network security everywhere • HQ/branch offices/remote and mobile users • Logical perimeter • Policy follows applications and users, not physical location • Centrally managed
  • Enabling Enterprise Mobility & BYOD
  • 12 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf The ClearPass Access Security Platform CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 12 @arubanetworks Policy Services Identity Stores 3rd Party MDM App Servers DIFFERENTIATED ACCESS UNIFIED POLICIES DEVICE VISIBILITY GUEST EMPLOYEE POLICY SERVICES ENTERPRISE-CLASS AAA RADIUS, TACACS+ VPN Onboard Device Provisioning OnGuard Posture & Health Checks Guest Visitor Management ONBOARDING AND ASSESSMENT Multivendor Networks ClearPass Policy Manager AAA Services ProfilingPolicy Engine
  • 13 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf All Things Network, Device and App Management WORKFLOW POLICYVISIBILITY Role-based Enforcement Health/Posture Checks Device Context Device Profiling Troubleshooting Per Session Tracking Onboarding, Registration Guest Management MDM Integration The ClearPass Solution
  • Threat Prevention
  • 15 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf The Basics on Threat Prevention Threat What it is What it does Exploit Bad application input usually in the form of network traffic. Targets a vulnerability to hijack control of the target application or machine. Malware Malicious application or code. Anything – Downloads, hacks, explores, steals… Command and Control (C2) Network traffic generated by malware. Keeps the remote attacker in control ands coordinates the attack.
  • 16 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf The Lifecycle of Network Attacks 16 | ©2012, Palo Bait the end-user 1 End-user lured to a dangerous application or website containing malicious content Exploit 2 Infected content exploits the end- user, often without their knowledge Download Backdoor 3 Secondary payload is downloaded in the background. Malware installed Establish Back-Channel 4 Malware establishes an outbound connection to the attacker for ongoing control Explore & Steal 5 Remote attacker has control inside the network and escalates the attack
  • 17 | ©2012, Palo Alto Networks. Confidential and Proprietary. Secondary Payload Spread Laterally Custom C2 & Hacking Data Stolen Exploit Kit Malware From New Domain ZeroAccess Delivered C2 Established Hidden within SSL New domain has no reputation Payload designed to avoid AV Non-standard port use evades detection Custom malware = no AV signature Internal traffic is not monitored Custom protocol avoids C2 signatures RDP & FTP allowed on the network
  • 18 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Our systematic approach for better security Copyright © 2014, Palo Alto Networks, Inc. All Rights Reserved Provide global visibility & intelligence correlation Discover unknown threats Inspect all traffic across ports, protocols & encryption Prevent known threats 2 3 Apply positive controls 1
  • Aruba / Palo Alto Networks Validated Architecture
  • 20 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Aruba and Palo Alto Networks Mobility Services • Core AAA, NAC • Device Profiling • Guest + BYOD Aruba Wi-Fi & ClearPass Palo Alto Networks Next Generation Firewall • L7+ AppFW • Content Security • Threat Protection • Exchange rich endpoint context and access policies to securely support BYOD • Identify, monitor and control traffic by user, device and application • Map and enforce security of head-less network devices such as printers, faxes and automation systems
  • 21 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Solution Overview Feed User-ID Data – Centralized Username to IP address mapping – No software agents required, support multiple identity stores – Rich visibility and reporting for compliance Endpoint/Device Context – Feed device context to PAN eg. iPad, Android Phone – Enable policy enforcement based on new device context – Extensible schema allows adding more context to endpoint data Centralized Identity Store – FW admin authentication using Radius – Provide services for VPN authentication
  • 22 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Populate the Device Objects
  • 23 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Aruba ClearPass Configuration
  • 24 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved #AirheadsConf Customer Benefits Improved visibility and security – Identify all devices connecting to the network, including headless devices – NAC / access control policies designed for mobility – Protection against a wide variety of threats Granular, context-aware policies – Address emerging trends of BYOD, cloud, SDN, PFE / guest access and more Improved performance – Optimize app performance over wired and wireless – Deliver better end-user experience
  • 25 CONFIDENTIAL © Copyright 2014. Aruba Networks, Inc. All rights reserved Thank You #AirheadsConf
  • 26