NAC Solution Taarak


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

NAC Solution Taarak

  1. 1. CounterACT Security Platform Knowledge. Access Control. Compliance
  2. 2. Securing Your Business <ul><li>Are you able to SEE ALL DEVICES on your network? </li></ul><ul><ul><li>Guest/Contractor </li></ul></ul><ul><ul><li>WiFi Enabled Mobile Phones </li></ul></ul><ul><ul><li>VoIP Phones </li></ul></ul><ul><ul><li>WAP Devices </li></ul></ul><ul><ul><li>Printers/Fax Machines </li></ul></ul><ul><ul><li>Manufacturing Equipment </li></ul></ul><ul><ul><li>Healthcare Devices </li></ul></ul>Knowledge Slide © 2009 ForeScout Technologies
  3. 3. Securing Your Business <ul><li>Are you able to CONTROL ACCESS of all devices </li></ul><ul><li>on or entering your network? </li></ul><ul><ul><li>Guest </li></ul></ul><ul><ul><li>Contractors </li></ul></ul><ul><ul><li>Field Employees </li></ul></ul><ul><ul><li>Remote Workers </li></ul></ul><ul><ul><li>Peripherals </li></ul></ul><ul><ul><li>Infected Devices </li></ul></ul>Access Control Slide © 2009 ForeScout Technologies
  4. 4. Securing Your Business <ul><li>Are you able to MAINTAIN COMPLIANCE ? </li></ul><ul><ul><li>Corporate Security Policies </li></ul></ul><ul><ul><ul><li>Enforce compliance baseline </li></ul></ul></ul><ul><ul><li>Regulatory Compliance </li></ul></ul><ul><ul><ul><li>PCI - Data Security Standard </li></ul></ul></ul><ul><ul><ul><li>SOX - Sarbanes Oxley </li></ul></ul></ul><ul><ul><ul><li>HIPAA - Health Insurance Portability and Accountability Act </li></ul></ul></ul><ul><ul><ul><li>GLBA - Gramm-Leach-Bliley Act </li></ul></ul></ul><ul><ul><ul><li>FISMA - Federal Information Security Management Act </li></ul></ul></ul>Slide Compliance © 2009 ForeScout Technologies
  5. 5. CounterACT Security Platform <ul><li>Complete Network Visibility </li></ul><ul><ul><li>Detect any connected device </li></ul></ul><ul><li>Complete Access Control </li></ul><ul><ul><li>Enforce access control policies </li></ul></ul><ul><ul><li>Identify and fix non-compliant devices </li></ul></ul><ul><li>Compliance Coverage </li></ul><ul><ul><li>Enforce corporate compliance policies </li></ul></ul><ul><ul><li>Pass regulatory compliance audits </li></ul></ul>Slide The Right Tool To Secure Your Business © 2009 ForeScout Technologies
  6. 6. CounterACT: Knowledge Know Who and What Is On Your Network
  7. 7. CounterACT: Knowledge <ul><li>Complete Network Visibility </li></ul><ul><ul><li>Out-of-Band/Clientless architecture </li></ul></ul><ul><ul><ul><li>CounterACT leverages existing infrastructure for complete view of network connections </li></ul></ul></ul><ul><ul><li>Detection and classification of any device connected to the network </li></ul></ul><ul><li>Broad Detection Capabilities </li></ul><ul><ul><li>Actively monitor network for any new devices </li></ul></ul><ul><ul><ul><li>Detect DHCP request, IP/MAC address, user name, connecting port, etc. </li></ul></ul></ul><ul><ul><li>Passively monitor all switch traffic </li></ul></ul><ul><ul><ul><li>802.1x authentication, ARP traffic, service authentication attempts, NetBIOS over TCP/IP(NBT) scan, etc. </li></ul></ul></ul>Slide Real-Time Information About Your Network © 2009 ForeScout Technologies
  8. 8. CounterACT: Knowledge <ul><li>Searchable Index of Devices </li></ul><ul><ul><li>Audit network for number/type/status of devices currently attached to the corporate network </li></ul></ul><ul><ul><li>Map logical connection to physical location </li></ul></ul><ul><li>Ability To Create Security Baseline </li></ul><ul><ul><li>Gain knowledge of current level of security compliance </li></ul></ul><ul><ul><li>Build informed policies to increase level of user/device compliance </li></ul></ul><ul><ul><li>Eliminate rogue/unauthorized devices </li></ul></ul>Slide Real-Time Information About Your Network © 2009 ForeScout Technologies
  9. 9. CounterACT: Network Access Control Enforce Policies Without Disrupting Business
  10. 10. CounterACT: Access Control Basics of a Complete Solution Slide © 2009 ForeScout Technologies
  11. 11. CounterACT: Access Control <ul><li>Discover ALL Devices On or Entering the Network </li></ul><ul><ul><li>Interrogates user devices for policy compliance </li></ul></ul><ul><li>Grant Appropriate Access </li></ul><ul><ul><li>Based upon device, compliance, user, status, etc </li></ul></ul><ul><li>Transparently Remediates </li></ul><ul><ul><li>Only isolate as last resort </li></ul></ul><ul><li>Continuously Monitors Network </li></ul><ul><ul><li>For malicious traffic & continued compliance </li></ul></ul><ul><li>Complete Reporting (real-time/scheduled) </li></ul><ul><ul><li>On all activity including assets </li></ul></ul>Slide A Complete Access Control Solution © 2009 ForeScout Technologies
  12. 12. CounterACT: Access Control <ul><li>Customizable Policy Creation Engine </li></ul><ul><ul><li>Wizard based process simplifies policy creation </li></ul></ul><ul><ul><li>Policies granularity ranges from single device to entire network </li></ul></ul><ul><li>Created Policies Reinforce Business Processes </li></ul><ul><ul><li>Role based access policies control “who” has access to “what” on the network </li></ul></ul><ul><ul><li>Access control policies ensure users/devices are compliant without unnecessary impact to productivity </li></ul></ul>Slide Flexible Policy Creation © 2009 ForeScout Technologies
  13. 13. CounterACT: Access Control Full Spectrum of Enforcement/Remediation Actions Slide © 2009 ForeScout Technologies
  14. 14. CounterACT: Access Control Full Spectrum of Enforcement Actions Automatically move device to a pre configured guest network SMS, Lumension Integrations Self-Remediation Auditable End-user Acknowledgement Syslog SNMP Traps Block access with device authentication Alter login credentials to restrict or block access Block access with 802.1X Reassign device from production VLAN to quarantine VLAN Update access lists on switches, firewalls and routers to restrict access ** Customer-preferred enforcement options Slide © 2009 ForeScout Technologies MOVE AND DISABLE HTTP Browser Hijack/Redirect ** Open Trouble Ticket ** Turn off physical switch port ** Reassign the device into a VLAN with restricted access to resources and services ** Deploy a Virtual Firewall around an infected or non-compliant device ** Terminate unauthorized applications ** RESTRICTIVE ACCESS ALERT AND INFORM Send Email **
  15. 15. CounterACT: Access Control <ul><li>CounterACT Logs Security Data for Complete Reporting </li></ul><ul><ul><li>Complete View of All Relevant Access Control Data </li></ul></ul><ul><ul><ul><li>All access information is captured and is available in both standard and customizable reports (up to 8 filters can be applied to parse data) </li></ul></ul></ul><ul><ul><ul><li>Standard SYSLOG export available to offload data to storage or SIM </li></ul></ul></ul><ul><ul><ul><li>Out-of-box compliance reporting </li></ul></ul></ul><ul><li>Scheduled or On-Demand Reporting </li></ul><ul><ul><li>Scheduled reports can be sent via email in HTML or PDF format at user determined intervals </li></ul></ul><ul><ul><li>On demand reporting allows for real-time checks of current security policy compliance </li></ul></ul>Report on Security Events and Remediation Slide © 2009 ForeScout Technologies
  16. 16. CounterACT: Compliance Implement Controls to Stop Unauthorized Access
  17. 17. CounterACT: Compliance <ul><li>Corporate Compliance </li></ul><ul><ul><li>Policy based access control ensures all devices meet corporate security initiatives </li></ul></ul><ul><ul><ul><li>Allows IT staff to translate written security policies into enforceable access control actions </li></ul></ul></ul><ul><li>Regulatory Compliance </li></ul><ul><ul><li>Network knowledge and access control are central elements to all regulations </li></ul></ul><ul><ul><li>CounterACT’s plug-in framework provides regulation specific policy kits with custom reporting (i.e., PCI) </li></ul></ul>Visibility and Access Control Foundation For Compliance Slide © 2009 ForeScout Technologies
  18. 18. CounterACT: Compliance <ul><li>Implement Strong Access Controls </li></ul><ul><ul><li>Know/control who and what are on your network </li></ul></ul><ul><ul><ul><li>Control access to sensitive information/resources blocking unauthorized access </li></ul></ul></ul><ul><ul><li>Segment your network with the CounterACT Virtual Firewall without touching your infrastructure </li></ul></ul><ul><li>Perform Pre-Audit of Device/User Compliance </li></ul><ul><ul><li>Run real-time network scan to accurately identify current level of security policy compliance </li></ul></ul><ul><ul><li>Automatically remediate or remove non-compliant systems </li></ul></ul>Access Control at the Heart of Compliance Initiatives Slide © 2009 ForeScout Technologies
  19. 19. CounterACT: Compliance Example: PCI Data Security Standard Coverage Pre-Packaged Policies Covering 8 of 12 PCI Requirements Slide © 2009 ForeScout Technologies
  20. 20. CounterACT: Compliance <ul><li>Pre-Packaged Reporting Covers Required Information For Compliance Audit </li></ul><ul><ul><li>Information is graphically displayed for quick analysis </li></ul></ul>Example: PCI Data Security Standard Reporting Slide © 2009 ForeScout Technologies
  21. 21. CounterACT: Simple Deployment Non-Disruptive Roll Out of NAC Platform
  22. 22. Deploying CounterACT CounterACT Integration Plug-ins Speed and Ease Deployment Maximizing Existing Network Investments Slide © 2009 ForeScout Technologies Switches/ Routers Remediation Network Services Wireless Access Points Remote Access Non-User Devices Firewall <ul><li>Alcatel </li></ul><ul><li>Cisco </li></ul><ul><li>Enterasys </li></ul><ul><li>Extreme </li></ul><ul><li>Foundry </li></ul><ul><li>NEC </li></ul><ul><li>Nortel </li></ul><ul><li>HP ProCurve </li></ul><ul><li>3COM </li></ul><ul><li>SMS </li></ul><ul><li>Lumension </li></ul><ul><li>WSUS </li></ul><ul><li>Trouble Ticketing </li></ul><ul><li>IdM (Oracle, Sun Micro) </li></ul><ul><li>SIM </li></ul><ul><li>Vulnerability Assessment </li></ul><ul><li>Anti Virus </li></ul><ul><li>Aruba </li></ul><ul><li>Cisco </li></ul><ul><li>Meru </li></ul><ul><li>Cisco </li></ul><ul><li>Juniper </li></ul><ul><li>Nortel </li></ul><ul><li>Cisco ASA </li></ul><ul><li>VoIP Phones </li></ul><ul><li>Printers </li></ul><ul><li>Manufacturing equip. </li></ul><ul><li>Healthcare devices </li></ul><ul><li>Cisco </li></ul><ul><li>Symantec </li></ul><ul><li>Check point </li></ul>CounterACT Works With Your Existing Infrastructure Custom Scripting Any IP Based Device FS Virtual Firewall
  23. 23. CounterACT: Non Disruptive Deployment Steps To Achieving Deployment Without Disruption Slide © 2009 ForeScout Technologies
  24. 24. CounterACT: Non-Disruptive Deployment Informed Users Achieve Compliance Before Sanctions are Imposed Enforcement is Limited to a Small Number of Policy Violators Deployment Timeline Level of Non- Compliance Users To Compliance Without Effecting Productivity Slide © 2009 ForeScout Technologies
  25. 25. CounterACT Scalability CounterACT Product Family All Deployment Scenarios Covered Slide © 2009 ForeScout Technologies CT- R CT- 100 CT- 1000 CT- 2000 CT- 4000 Concurrent Devices 50 250 1000 2500 4000 Bandwidth 100 Mbps 100 Mbps 1 Gbps 2 Gbps 4 Gbps or 10 Gbps VLAN Support Unlimited Unlimited Unlimited Unlimited Unlimited CT- 4000 CT-R CT-100 CT-1000 CT-2000
  26. 26. CounterACT Security Platform <ul><li>Easy to Use, Easy to Deploy, Easy to Manage </li></ul><ul><ul><li>Minimal Impact to IT staff, No infrastructure changes required </li></ul></ul><ul><li>Flexible Policy/Enforcement Tailored to Your Business Needs </li></ul><ul><ul><li>Deploy immediately without fear of network disruption </li></ul></ul><ul><li>Leading Customers from Every Vertical </li></ul><ul><ul><li>Fortune 500 customers from Banking, Education, Energy, Financial Services, Healthcare, Manufacturing, Technology, Transportation, Etc… </li></ul></ul><ul><ul><li>Federal Government departments AND Military installations </li></ul></ul>Slide The Right Tool To Secure Your Business © 2009 ForeScout Technologies
  27. 27. CounterACT Architecture