Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
1

NAC - A Solution for
Disappearing Perimeter
December 11, 2013
Rahul Desai

Company Proprietary and Confidential

NAC - ...
Agenda
•
•
•
•

2

Understanding Today's Threat Landscape
BYOD - Bring Your Own Device
NAC - A Solution for BYOD Security ...
Changing Threat Landscape

3

• Conventional Threats and Security Models
• Generic threats for mass disruption
• Multi-tie...
BYOD: Bring Your Own Device

4

• Bring Your Own Device
• Use of personally owned devices like smartphones, tablets and
la...
NAC: A Solution to BYOD Security Threats

5

• BYOD Security Solutions: VDI, MDM and NAC.
• NAC for BYOD works independent...
NAC: A Solution to BYOD Security Threats

6

Employees
Wired/Wireless

Contractors
Network Access

Guests
• User Identity ...
Case Study: Introducing BYOD in a Multinational FMCG

7

• Multinational FMCG organization
• 80+ Countries, 200+ Locations...
Case Study: Introducing BYOD in a Multinational FMCG

8

• Solution: Integrate NAC into existing IT security infrastructur...
Discussion: Q&A

9

Rahul Desai
rahul.desai@risknaut.com
Company Proprietary and Confidential

NAC - A Solution to Disappe...
Upcoming SlideShare
Loading in …5
×

NAC - A Solution for Disappearing Perimeter

589 views

Published on

Use of external portable devices by employees (BYOD) bypass the traditional multi-tier security. A case study on how Network Access Control (NAC) can be used as a solution to the disappearing perimeter.

Presenter: Rahul Desai

Published in: Technology, Business
  • DOWNLOAD FULL eBOOK INTO AVAILABLE FORMAT ......................................................................................................................... ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. PDF eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. EPUB eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... 1.DOWNLOAD FULL. doc eBook here { https://tinyurl.com/y6a5rkg5 } ......................................................................................................................... ......................................................................................................................... ......................................................................................................................... .............. Browse by Genre Available eBooks ......................................................................................................................... Art, Biography, Business, Chick Lit, Children's, Christian, Classics, Comics, Contemporary, CookeBOOK Crime, eeBOOK Fantasy, Fiction, Graphic Novels, Historical Fiction, History, Horror, Humor And Comedy, Manga, Memoir, Music, Mystery, Non Fiction, Paranormal, Philosophy, Poetry, Psychology, Religion, Romance, Science, Science Fiction, Self Help, Suspense, Spirituality, Sports, Thriller, Travel, Young Adult,
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

NAC - A Solution for Disappearing Perimeter

  1. 1. 1 NAC - A Solution for Disappearing Perimeter December 11, 2013 Rahul Desai Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  2. 2. Agenda • • • • 2 Understanding Today's Threat Landscape BYOD - Bring Your Own Device NAC - A Solution for BYOD Security Threats Case Study Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  3. 3. Changing Threat Landscape 3 • Conventional Threats and Security Models • Generic threats for mass disruption • Multi-tier security approach • Reactive by design; mainly address known threats • Emerging Threats • Polymorphic and zero-day • Personalized and targeted • Evolving Threat Vectors • Increasing BYOD culture – more Internal threats • Limited control on non-compliant, with conventional approach • Fear of the unknown! Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  4. 4. BYOD: Bring Your Own Device 4 • Bring Your Own Device • Use of personally owned devices like smartphones, tablets and laptops at workplace • Flexibility to users by allowing non-WinTel platforms • 95% of Enterprises allow BYOD in some form • Security concerns introduced with BYOD • Increased internal threat to data – Customers, I-P, employees’ personal information • Better means for ‘Bad leaver’ to harm • Existing infrastructure security limitations • Lesser control on users, system. Disappearing Perimeters! Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  5. 5. NAC: A Solution to BYOD Security Threats 5 • BYOD Security Solutions: VDI, MDM and NAC. • NAC for BYOD works independently, addresses all platforms, maintains the user experience and protects data at the Network level. • Network Access Control • Unification of network security, endpoint security and user/system authentication • Targeted at Security policy enforcement, identity/access management and mitigation of zero-day threats • NAC for BYOD Security Vs. NAC for Conventional Network • Agentless and inline • Wired and wireless network coverage • Addressing the unknown! Continued Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  6. 6. NAC: A Solution to BYOD Security Threats 6 Employees Wired/Wireless Contractors Network Access Guests • User Identity Management • Security Policy Enforcement and Remediation Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  7. 7. Case Study: Introducing BYOD in a Multinational FMCG 7 • Multinational FMCG organization • 80+ Countries, 200+ Locations worldwide • Mixed IT environment • Unix, Windows Servers; Windows Desktops and Laptops • Official acceptance of BYOD • To additionally allow Smartphones, Tablets (iOS and Android) and MacBooks • Challenges: • Increased IT Infrastructure management cost (time, effort and increased risk) • Inadequate IT Security controls to accommodate mobile devices • Lack of employee awareness of BYOD best practices Continued Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  8. 8. Case Study: Introducing BYOD in a Multinational FMCG 8 • Solution: Integrate NAC into existing IT security infrastructure • Policy based Network access control • Transparent to compliant end-users • Host integrity enforcement through Remediation system • Optional remediation mechanism for Smartphones • NAC Implementation Process • Identify the scope of devices to be allowed • Define and update IT Security policies and controls • Implement and rollout • Use Cases 1. MacBook is running older Mac OS. 2. iPhone is running a restricted application. 3. An employee’s personal Windows laptop does not have Antivirus installed. Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter
  9. 9. Discussion: Q&A 9 Rahul Desai rahul.desai@risknaut.com Company Proprietary and Confidential NAC - A Solution to Disappearing Perimeter

×