SlideShare a Scribd company logo
1 of 62
UAC Overview Slide Show Instructions ,[object Object],[object Object],[object Object],[object Object]
Creating your own Custom Show ,[object Object],[object Object],[object Object],[object Object]
Access Control Solutions Unified Access Control
Access Control Solutions Unified Access Control
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Market Trends and Needs Worldwide economic crisis Layoffs and RIFs abound Financial institutions failing Market values falling Decreased budgets Severe credit crunch Proliferation of network threats Insider threat incidences rise Escalation in outsourcing and off-shoring Build-up of mergers and acquisitions Increased emphasis on regulatory compliance … However, need to do more, but with less Networks now more strategic than ever to corporate growth…
Fully Coordinated Security Infrastructure UAC  “Nerve Center” Management/ Visibility 802.1X NAC Identity-Aware Security Enterprise-Wide Access Control Device Control Coordinated Threat Control
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Use Case – Insider Threat Mitigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],%  of Participants Who  Experienced an Insider Incident 2007 e-Crime Watch Survey 671 respondents 41 39 55 49
Use Case – Addressing Compliance  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Use Case – Secure Guest Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mike Fratto | InformationWeek Analytics | 2008 NAC Survey 58% 57% 47% 44% 42% 30% Guests Employee, remote access Employee, connected wireless to LAN Contractors/outsourced labor Unmanageable devices such as printers, VoIP phones, card readers, cameras Employee, connected via wired LAN Note: Percentages based on a rating of 4 to 5 on a five-point scale where 1 is  “low” and 5 is “High” Note: Percentages based on a rating of 4 to 5 on a five-point scale where 1 is  “low” and 5 is “High” LAN Threat by Users Rate the following types of users by their degree of threat for your LAN.
Use Case – Secure Outsourcing/Off-shoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Estimated Number of U.S. Jobs Moving Offshore, 2003-2015 2003 2004 2005 2006 2007 2008 2010 2015 Management 3,500 15,000 34,000 42,000 48,000 64,000 106,000 259,000 Business 30,000 55,000 91,000 105,000 120,000 136,000 176,000 356,000 Computer 102,000 143,000 181,000 203,000 228,000 247,000 322,000 542,000 Architecture 14,000 27,000 46,000 54,000 61,000 70,000 93,000 191,000 Life Sciences 300 2,000 4,000 5,500 6,500 9,000 16,000 39,000 Legal 6,000 12,000 20,000 23,000 26,000 29,000 39,000 79,000 Art, Design 2,500 4,500 8,000 9,000 10,000 11,000 15,000 30,000 Sales 11,000 22,000 38,000 47,000 55,000 67,000 97,000 218,000 Office 146,000 256,000 410,000 475,000 541,000 616,000 815,000 1,600,000 Total 315,000 540,000 830,000 960,000 1,100,000 1,200,000 1,700,000 3,400,000
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
UAC – NAC Market Leader The Forrester Wave™: Network Access Control, Q3 2008
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Central Policy Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],UAC  “Nerve Center” IC Series IDP Series SA Series Firewall STRM Series 802.1X Switches & APs EX Series SRX Series
Complete 802.1X NAC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IC Series EX Series Any 802.1X Switch/AP 802.1X NAC
Identity-Aware Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],SSG Series SRX Series IDP IC Series Corporate Data Center Identity-Aware Security Apps Data Finance Video
Proven Endpoint Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Endpoint Control
Enterprise-Wide Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],Corporate Data Center Apps Finance Video Local User SA-Series Internet IC Series IF-MAP UAC Enforcer NSM Policies Policies Enterprise-Wide Access Control
Management and Visibility ,[object Object],[object Object],[object Object],Management/ Visibility
[object Object],[object Object],[object Object],[object Object],[object Object],Coordinated Threat Control IDP Series EX Series IC Series Application  Servers Firewalls UAC Enforcement Points 802.1X Switches/APs Coordinated Threat Control
Odyssey Access Client (OAC) STRM Series UAC Agent UAC Agent-less Mode Policies NSM Policies Cross-Portfolio, Integrated Access Control   EX3200 EX4200 IDP Series Firewall SSG Series ISG Series SRX Series Application  Servers IC Series UAC Appliance SBR Series SA Series SA Series
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basic NAC Enforcement Local User Patch Remediation SRX Series IDP Series IC Series Corporate Data Center 1 2 EX Series 3 3 4 4 1.  “Sales” user logs in from unpatched machine 2. EX quarantines user – access patch server only – automatically remediated 3. Remediation success; full access granted  IC-EX establish VLAN, ACLs, and QoS for Session UAC pushes role-based FW policies to SRX UAC pushes application-layer policies to IDP 4. User attempt to access  “Finance” data blocked Apps Data Finance Video
Enterprise-wide Access Control Internet Mobile User Patch Remediation SRX Series IDP Series IC Series Corporate Data Center 1.  “Sales” user logs in from unpatched machine 1 2. Quarantined for automatic patch remediation 2 SA Series 3. Remediation success; full access granted  SA Session pushed to IC via IF-MAP UAC pushes role-based FW policies to SRX UAC pushes application-later policies to IDP 3 3 4. User attempt to access  “Finance” data blocked 4 4 5. IDP Senses attack, informs IC SA terminates user session IC removes SRX/IDP access 5 Apps Data Finance Video
Coordinated Threat Control UAC and IDP Series ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Corporate Data Center 1 2 3 4 5 6 7 Local User Apps Data Finance Video EX Series Firewalls UAC Enforcement Points 802.1X Switches/APs IC Series IDP Series
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study – Bangchak Petroleum Public Co. Ltd. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.juniper.net/company/presscenter/pr/2008/pr_2008_09_10-12_47.html Who 1 Challenges 2 Why Juniper 3 Juniper Products 4
Case Study – Portland Community College ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.juniper.net/solutions/customer_profiles/352262.pdf Who 1 Challenges 2 Why Juniper 3 Juniper Products 4
Case Study –  Equifax  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],“ Equifax Bolsters Border Security”, Network World, 7/3/08 http://www.juniper.net/solutions/literature/misc/equifax_on_uac.pdf   Who 1 Challenges 2 Why Juniper 3 Juniper Products 4
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object]
UAC: Identity-Aware Security and Access Control Data Center Campus HQ Wired/Wireless BRANCH OFFICE INTERNET Dynamically handles guests, partners, contractors, unmanageable devices Mitigate threats by controlling access across wired/wireless networks Leverage IDP for correlating network threat information to dynamically protect the network Control access to applications Gain visibility and control for user/device access to network, resources and applications Flexible solution to support access control in distributed networks Centralized policy management across remote and local access CORPORATE OFFICES DATA CENTER ,[object Object],[object Object],[object Object],[object Object],Applications IC Series UAC Appliance HQ User EX Series ISG Series SRX Series IDP Series ISG Series with IDP Branch User SSG Series SA Series NSM Policies
THANK   YOU |  Copyright © 2009 Juniper Networks, Inc.  |  www.juniper.net
Additional Slides |  Copyright © 2009 Juniper Networks, Inc.  |  www.juniper.net
IC/IC + SA/IC Federation (IF-MAP) UAC Enforcer Corporate Data Center Apps Data Finance Video IC/IC Federation IC 1 Local User UAC Enforcer IDP Enforcer IC 2 IF-MAP EMEA HQ US HQ SA/IC Federation Local User SA-Series Internet IC-Series IF-MAP UAC Enforcer
UAC and IF-MAP – Open Access Control ,[object Object],[object Object],[object Object],[object Object],[object Object],IC Series IDP Series SA Series DLP IDS Third-Party  Appliance Firewall Third-Party  Firewall STRM Series 802.1X Switches & APs SIEM/SEM EX Series SRX Series
Additional, New UAC 3.0 Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IC Series UAC Appliance Family  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Juniper UAC and EX Series Ethernet Switches: Seamless Network Access Control 802.1X PROTECTED RESOURCES ,[object Object],[object Object],[object Object],Dynamic role provisioning AAA/Identity Stores AAA User, endpoint, location-based policies 1 2 2 3 1 UAC Agent EX Series IC Series UAC Appliance Firewall Apps  Server
UAC and EX Series Features Identity-based QoS Guest User Internet Gateway Router Bandwidth-limit guest traffic; mark with low-priority DSCP ERP Servers QoS policies stored on IC Series appliance and sent to the EX Series switch, implementing dynamic QoS policies per user session Marketing User Place ERP traffic in high-priority queue; mark with  high- priority DSCP  Place e-mail traffic  in best-effort queue; mark with medium-priority DSCP  Email Servers Finance User EX Series CORPORATE NETWORK IC Series UAC Appliance INTERNET
Customer Profile – Australian Unity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Standards-based Architecture ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Access  Requester (AR) Policy Enforcement Point (PEP) Policy Decision Point (PDP) Wired Network Perimeter UAC Agent Metadata Access Point (MAP) Wireless IF-MAP Server IF-MAP Clients EX Series Firewall SRX Series SA Series DLP IDS Third-Party  Appliances Third-Party  Firewalls SIEM/SEM IC Series IC Series
Windows Statement of Health (SOH) and Embedded NAP Agent Support UAC Agent OR NAP Client 802.1X Switches & Access Points Juniper Firewall Platforms Policy Server Identity Stores Applications and Data UAC Enforcement Points Microsoft NPS 1 Authenticate user,  Profile endpoint, Determine location 2 2 Dynamically provision policy enforcement 1 3 External enforcement/ validation of SOH, transmits info back for use in policy decisions  4 Control access to protected resources IF-TNCCS-SOH SRX Series ISG Series ISG Series with IDP SSG Series IC Series EX Series
St. Mary ’s County (MD) Public Schools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.juniper.net/solutions/customer_profiles/352264.pdf Who 1 Challenges 2 Why Juniper 3 Juniper Products 4
St. Monica ’s College (Australia)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://www.juniper.net/solutions/customer_profiles/352267.pdf   Who 1 Challenges 2 Why Juniper 3 Juniper Products 4
 

More Related Content

What's hot

5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions Thierry Matusiak
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0Rasmi Swain
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeterS.E. CTS CERT-GOV-MD
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platformsSatya Harish
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMichael Nickle
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture Priyanka Aash
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365SecureAuth
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapDATA SECURITY SOLUTIONS
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. ManufacturingIgnyte Assurance Platform
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safeJens Albrecht
 

What's hot (20)

5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0SIEM enabled risk management , SOC and GRC v1.0
SIEM enabled risk management , SOC and GRC v1.0
 
Solvit identity is the new perimeter
Solvit   identity is the new perimeterSolvit   identity is the new perimeter
Solvit identity is the new perimeter
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
G01.2013 magic quadrant for endpoint protection platforms
G01.2013  magic quadrant for endpoint protection platformsG01.2013  magic quadrant for endpoint protection platforms
G01.2013 magic quadrant for endpoint protection platforms
 
MISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM ImplementationMISTI Infosec 2010- SIEM Implementation
MISTI Infosec 2010- SIEM Implementation
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Soc
SocSoc
Soc
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
ProjectReport_Finalversion
ProjectReport_FinalversionProjectReport_Finalversion
ProjectReport_Finalversion
 
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 Webinar: Beyond Two-Factor: Secure Access Control for Office 365 Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
 
IBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmapIBM Q-radar security intelligence roadmap
IBM Q-radar security intelligence roadmap
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safe
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 

Viewers also liked

User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2wsolomoniv
 
MOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEMMOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEMcool192
 
Mobile Operating Systems
Mobile Operating SystemsMobile Operating Systems
Mobile Operating SystemsBhargav Radia
 
Mobile Operating Systems
Mobile Operating SystemsMobile Operating Systems
Mobile Operating SystemsDasun Hegoda
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Firewall
FirewallFirewall
FirewallApo
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system pptSantosh Kumar
 
Firewall
FirewallFirewall
FirewallApo
 
FireWall
FireWallFireWall
FireWallrubal_9
 

Viewers also liked (12)

User Account Control Prensentation2
User Account Control Prensentation2User Account Control Prensentation2
User Account Control Prensentation2
 
MOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEMMOBILE OPERATING SYSTEM
MOBILE OPERATING SYSTEM
 
mobile Os
mobile Osmobile Os
mobile Os
 
Mobile Operating Systems
Mobile Operating SystemsMobile Operating Systems
Mobile Operating Systems
 
Mobile Operating Systems
Mobile Operating SystemsMobile Operating Systems
Mobile Operating Systems
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
Mobile operating system ppt
Mobile operating system pptMobile operating system ppt
Mobile operating system ppt
 
Firewall
FirewallFirewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
FireWall
FireWallFireWall
FireWall
 

Similar to UAC Overview Slide Show Instructions

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Amazon Web Services
 
Risk Management for Public Cloud Projects
Risk Management for Public Cloud ProjectsRisk Management for Public Cloud Projects
Risk Management for Public Cloud ProjectsAlex Mags
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...AlgoSec
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingAnita D'Amico
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshellHishan Shouketh
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Network security offering
Network  security offeringNetwork  security offering
Network security offeringGss America
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS AmericaGss America
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...NetworkCollaborators
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Serviceswebhostingguy
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 

Similar to UAC Overview Slide Show Instructions (20)

Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Risk Management for Public Cloud Projects
Risk Management for Public Cloud ProjectsRisk Management for Public Cloud Projects
Risk Management for Public Cloud Projects
 
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
2021 02-17 v mware-algo-sec securely accelerate your digital transformation w...
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Network security offering
Network  security offeringNetwork  security offering
Network security offering
 
Network Security Offering by GSS America
Network  Security Offering by GSS AmericaNetwork  Security Offering by GSS America
Network Security Offering by GSS America
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
 
Skybox security
Skybox security Skybox security
Skybox security
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

UAC Overview Slide Show Instructions

  • 1.
  • 2.
  • 3. Access Control Solutions Unified Access Control
  • 4. Access Control Solutions Unified Access Control
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Market Trends and Needs Worldwide economic crisis Layoffs and RIFs abound Financial institutions failing Market values falling Decreased budgets Severe credit crunch Proliferation of network threats Insider threat incidences rise Escalation in outsourcing and off-shoring Build-up of mergers and acquisitions Increased emphasis on regulatory compliance … However, need to do more, but with less Networks now more strategic than ever to corporate growth…
  • 13. Fully Coordinated Security Infrastructure UAC “Nerve Center” Management/ Visibility 802.1X NAC Identity-Aware Security Enterprise-Wide Access Control Device Control Coordinated Threat Control
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. UAC – NAC Market Leader The Forrester Wave™: Network Access Control, Q3 2008
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34. Odyssey Access Client (OAC) STRM Series UAC Agent UAC Agent-less Mode Policies NSM Policies Cross-Portfolio, Integrated Access Control EX3200 EX4200 IDP Series Firewall SSG Series ISG Series SRX Series Application Servers IC Series UAC Appliance SBR Series SA Series SA Series
  • 35.
  • 36.
  • 37. Basic NAC Enforcement Local User Patch Remediation SRX Series IDP Series IC Series Corporate Data Center 1 2 EX Series 3 3 4 4 1. “Sales” user logs in from unpatched machine 2. EX quarantines user – access patch server only – automatically remediated 3. Remediation success; full access granted IC-EX establish VLAN, ACLs, and QoS for Session UAC pushes role-based FW policies to SRX UAC pushes application-layer policies to IDP 4. User attempt to access “Finance” data blocked Apps Data Finance Video
  • 38. Enterprise-wide Access Control Internet Mobile User Patch Remediation SRX Series IDP Series IC Series Corporate Data Center 1. “Sales” user logs in from unpatched machine 1 2. Quarantined for automatic patch remediation 2 SA Series 3. Remediation success; full access granted SA Session pushed to IC via IF-MAP UAC pushes role-based FW policies to SRX UAC pushes application-later policies to IDP 3 3 4. User attempt to access “Finance” data blocked 4 4 5. IDP Senses attack, informs IC SA terminates user session IC removes SRX/IDP access 5 Apps Data Finance Video
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. THANK YOU | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 50. Additional Slides | Copyright © 2009 Juniper Networks, Inc. | www.juniper.net
  • 51. IC/IC + SA/IC Federation (IF-MAP) UAC Enforcer Corporate Data Center Apps Data Finance Video IC/IC Federation IC 1 Local User UAC Enforcer IDP Enforcer IC 2 IF-MAP EMEA HQ US HQ SA/IC Federation Local User SA-Series Internet IC-Series IF-MAP UAC Enforcer
  • 52.
  • 53.
  • 54.
  • 55.
  • 56. UAC and EX Series Features Identity-based QoS Guest User Internet Gateway Router Bandwidth-limit guest traffic; mark with low-priority DSCP ERP Servers QoS policies stored on IC Series appliance and sent to the EX Series switch, implementing dynamic QoS policies per user session Marketing User Place ERP traffic in high-priority queue; mark with high- priority DSCP Place e-mail traffic in best-effort queue; mark with medium-priority DSCP Email Servers Finance User EX Series CORPORATE NETWORK IC Series UAC Appliance INTERNET
  • 57.
  • 58.
  • 59. Windows Statement of Health (SOH) and Embedded NAP Agent Support UAC Agent OR NAP Client 802.1X Switches & Access Points Juniper Firewall Platforms Policy Server Identity Stores Applications and Data UAC Enforcement Points Microsoft NPS 1 Authenticate user, Profile endpoint, Determine location 2 2 Dynamically provision policy enforcement 1 3 External enforcement/ validation of SOH, transmits info back for use in policy decisions 4 Control access to protected resources IF-TNCCS-SOH SRX Series ISG Series ISG Series with IDP SSG Series IC Series EX Series
  • 60.
  • 61.
  • 62.