SlideShare a Scribd company logo
2016
Network Access Control
for SMEs
(Small and Medium sized Enterprises)
Security for unauthorized access with Genian NAC
Inchun Park
BYO
D
(Bring Your Own Device)
Enterprises are only aware of 80% of the
devices on their networks. -Gartner
BYOD (Bring Your Own Disaster)
“How will the SMEs
protect their resources
from unauthorized users?”
NAC is the only approach that provides network visibility and
control to protect your company in the age of BYOD.
Network Visibility
Device Profile
Flexible Policy
Enforcement
Solution : NAC as we now know of ?
With Genian NAC…
Is there any unchecked network access?
Do network devices comply with company regulation?
Is the recent security patch applied?
Is someone using tethering?
Are there any malware-infected devices?
With Genian NAC..
Maintain updated network inventory
Block devices or limit their network access
Impose internal security regulation on every connected devices
Apply Role Base Access Control
● Problem : NAC is difficult to install and too expensive
- Dedicate Servers
- On-premise installation by experts
● Our solution : Genian NAC Business Edition
- For SMEs with the size of less than 2,000 employees
- All-in-One type (Policy server + Network sensor)
- Easy to start and operate
- Subscription-based charging
Still there are problems..
Easy to install and start
Easy to install and start
Easy to install and start
Easy to install and start
Comparing to Competitors
Price H/W Installation
Genian NAC Subscription based
(e.g. 5$ per person per month)
- Normal PC
- No H/W dependency
DIY
Competitors Conventional
(need big budget)
- Dedicated Server
- H/W dependency
On premise
Global Preparation - Genian Inc.
Doseok Kim
Director of Business Development
10 years of marketing experience at Bradford Networks
Kyeyeon Kim
CEO / CTO
20+ years of IT security development and
engineering experience
4 High Street #304 North Andover, MA 01845 USA
Global Preparation - Technical Partners
More targeted automated
responses
Powerful access control
with network visibility
Sharing information to isolate
compromised endpoints from
the network more effectively
More detailed network visibility
reinforcing more effective
network access
Geninetworks Snapshot
CEO
Established
Business
Dongbum Lee
January 2005
IT Security Solution and Hardware
Development & Supply
Pyongchon, Korea
Boston, United States
Headquarters
Global Operations
96 total, 35 R&D (June of 2016)
800+ companies incl. Samsung, LG & Hyundai
13.2 / 2.7 M USD
Employees
Major Customers
Sales/Operating income
(CY 2015)
Geninetworks Growth
0
5
10
15
20
2010 2011 2012 2013 2014 2015 2016 (Est.)
Operating Income Revenue Clients
Sales revenue Operating Income Clients
2010 5.2 1.5 250
2011 6.9 1.2 300
2012 7.7 0.4 450
2013 7.7 0.4 550
2014 10.8 1.8 700
2015 13.2 2.7 800
2016 15.6
$ / Mil.
Clients (800+)
Contact Details
Incheon Park
Deputy General Manager
Global Sales Team
Phone
Email
Website
+82 10 9564 0719
incheon@geninetworks.com
www.geninetworks.com

More Related Content

What's hot

NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
Mohit8780
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
Mir Mustafa Ali
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
Ahmed Banafa
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
Zoe Gilbert
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
YouAttestSlideshare
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
Data#3 Limited
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
Andris Soroka
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
Anthony Daniel
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
ForeScout Technologies
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
Solarwinds N-able
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
Andris Soroka
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
Ahmed Banafa
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
ColorTokens Inc
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
Forescout Technologies Inc
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security
 

What's hot (20)

NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (Forescout)
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
DSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGADSS ITSEC 2012 ForeScout Technical RIGA
DSS ITSEC 2012 ForeScout Technical RIGA
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 

Similar to Network Control Access for Non-IT Professionals

Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
QOS Networks
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021
PhilSmith165
 
offerings managed services NOC : network operations center
offerings managed services NOC : network operations centerofferings managed services NOC : network operations center
offerings managed services NOC : network operations center
Arjun Kumar Marya
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
SaraPia5
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
Juniper Networks
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
CIPL Corporate Infotech
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
Pixel
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
ssuser41d278
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
Enterprise Management Associates
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
SolarWinds
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
A. Phillip Smith
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
lynotts
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
Redington Value Distribution
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
Mike Rizzo
 
Make Money, Save Money & Avoid Risk with The Network. Intuitive
Make Money, Save Money & Avoid Risk with The Network. IntuitiveMake Money, Save Money & Avoid Risk with The Network. Intuitive
Make Money, Save Money & Avoid Risk with The Network. Intuitive
hugopprad
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
GENIANS, INC.
 
Meta Innovations Inc
Meta Innovations IncMeta Innovations Inc
Meta Innovations Inc
mjoseph4132
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
QOS Networks
 

Similar to Network Control Access for Non-IT Professionals (20)

Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
 
Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021Nvis, inc. 01 01-2021
Nvis, inc. 01 01-2021
 
offerings managed services NOC : network operations center
offerings managed services NOC : network operations centerofferings managed services NOC : network operations center
offerings managed services NOC : network operations center
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Mukesh infoserve
Mukesh infoserveMukesh infoserve
Mukesh infoserve
 
gtipl_profile.pptx
gtipl_profile.pptxgtipl_profile.pptx
gtipl_profile.pptx
 
Democratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet BrokersDemocratize Observability with Software Defined Packet Brokers
Democratize Observability with Software Defined Packet Brokers
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
1901 Group Overview
1901 Group Overview1901 Group Overview
1901 Group Overview
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Make Money, Save Money & Avoid Risk with The Network. Intuitive
Make Money, Save Money & Avoid Risk with The Network. IntuitiveMake Money, Save Money & Avoid Risk with The Network. Intuitive
Make Money, Save Money & Avoid Risk with The Network. Intuitive
 
Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?Is Your Network Ready for the Age of IoT?
Is Your Network Ready for the Age of IoT?
 
Meta Innovations Inc
Meta Innovations IncMeta Innovations Inc
Meta Innovations Inc
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
 

Network Control Access for Non-IT Professionals

  • 1. 2016 Network Access Control for SMEs (Small and Medium sized Enterprises) Security for unauthorized access with Genian NAC Inchun Park
  • 3. Enterprises are only aware of 80% of the devices on their networks. -Gartner BYOD (Bring Your Own Disaster)
  • 4. “How will the SMEs protect their resources from unauthorized users?”
  • 5. NAC is the only approach that provides network visibility and control to protect your company in the age of BYOD. Network Visibility Device Profile Flexible Policy Enforcement Solution : NAC as we now know of ?
  • 6. With Genian NAC… Is there any unchecked network access? Do network devices comply with company regulation? Is the recent security patch applied? Is someone using tethering? Are there any malware-infected devices?
  • 7. With Genian NAC.. Maintain updated network inventory Block devices or limit their network access Impose internal security regulation on every connected devices Apply Role Base Access Control
  • 8. ● Problem : NAC is difficult to install and too expensive - Dedicate Servers - On-premise installation by experts ● Our solution : Genian NAC Business Edition - For SMEs with the size of less than 2,000 employees - All-in-One type (Policy server + Network sensor) - Easy to start and operate - Subscription-based charging Still there are problems..
  • 9. Easy to install and start
  • 10. Easy to install and start
  • 11. Easy to install and start
  • 12. Easy to install and start
  • 13. Comparing to Competitors Price H/W Installation Genian NAC Subscription based (e.g. 5$ per person per month) - Normal PC - No H/W dependency DIY Competitors Conventional (need big budget) - Dedicated Server - H/W dependency On premise
  • 14. Global Preparation - Genian Inc. Doseok Kim Director of Business Development 10 years of marketing experience at Bradford Networks Kyeyeon Kim CEO / CTO 20+ years of IT security development and engineering experience 4 High Street #304 North Andover, MA 01845 USA
  • 15. Global Preparation - Technical Partners More targeted automated responses Powerful access control with network visibility Sharing information to isolate compromised endpoints from the network more effectively More detailed network visibility reinforcing more effective network access
  • 16. Geninetworks Snapshot CEO Established Business Dongbum Lee January 2005 IT Security Solution and Hardware Development & Supply Pyongchon, Korea Boston, United States Headquarters Global Operations 96 total, 35 R&D (June of 2016) 800+ companies incl. Samsung, LG & Hyundai 13.2 / 2.7 M USD Employees Major Customers Sales/Operating income (CY 2015)
  • 17. Geninetworks Growth 0 5 10 15 20 2010 2011 2012 2013 2014 2015 2016 (Est.) Operating Income Revenue Clients Sales revenue Operating Income Clients 2010 5.2 1.5 250 2011 6.9 1.2 300 2012 7.7 0.4 450 2013 7.7 0.4 550 2014 10.8 1.8 700 2015 13.2 2.7 800 2016 15.6 $ / Mil.
  • 19. Contact Details Incheon Park Deputy General Manager Global Sales Team Phone Email Website +82 10 9564 0719 incheon@geninetworks.com www.geninetworks.com

Editor's Notes

  1. However, in reality, this BYOD concept has almost changed to Bring Your Own Disaster...)
  2. The No. 1 driver for deploying NAC is protecting corporate resources from unauthorized users Increased visibility, profiling of devices and Profiling : By profiling we discover and identify all the devices on the enterprise network role-based monitoring with flexible enforcement capabilities are required to secure the new wave of devices. Once the endpoint has been identified, the appropriate NAC policy can be enforced You can Block, quarantine, and redirect end users and endpoints
  3. We build NAC(Network Access Control) system to enable our customers to have network access control via total network visibility. Geninetworks gives small and midsize businesses the easy way of adapting NAC solution at affordable prices