Angelbeat Seattle
WiFi
Agenda
• Accelops: Network Security
• Bradford: Endpoint Security/Network Access Ctrl:
• AVI: Load-Balancing/Application Performance
• Tegile: Flash Primary Storage
• Aerohive: WiFi/Mobility
• Netbeez: Network Analysis/Monitoring
• Google: Enterprise Cloud Services
• Microsoft: Cloud/Azure/Windows 10
• VMware: Software Defined Data Center/Enterprise
• No sales pitches
• “Tell Me Something New”
• No “We” or “I” – end user focus, not vendor
• Speaker evaluations very important
• Target: 50-60% highly-rated presentations
• Rate speakers based on how well they follow
presentation guidelines (available on website)
Speaker Guidelines/Evaluation
• Include Twitter hashtag #angelbeat in all Tweets
• Cell phones on vibrate
• Vendor discussions during break or outside
• Presentations downloadable
• Agenda will be followed to the minute
• Contact Angelbeat staff if you have any questions on
food, room temperature, room layout, audio-visual, etc.
Event Details
• Each vendor raffle must be entered separately
• All done at the end of day
• Must be present to win
• Each individual can win only twice
• Gift Cards and other great prizes
• All attendees receive $25 Amazon gift card from
Angelbeat, just stay til end of regular Microsoft talk
Raffle Prize Drawings
• Speakers receive attendee data post-seminar
• Contact Angelbeat to opt-out
• Reply back to post-event thank you email
• Whether you continue to opt-in or opt-out…
Please give sponsors fair consideration in future IT
spending decisions
Post Event Vendor Followup
• Follow us
• www.twitter.com/angelbeat
• www.youtube.com/angelbeat
• www.instagram.com/angelbeat
• www.facebook.com/angelbeat
• www.linkedin.com/groups/Angelbeat-
970047
Social Media #angelbeat
Network Access Control 101
Securing the Critical Edge of Your Network
Devices / Person
Internet of Things
Attack Surface is Growing and Changing
YOUR
BUSINESS
SUPPLIERS
PARENT
COMPANY
GUESTS
PARTNERS
CONSULTANTS
BYOD
INTERNET
OF THINGS
NO
AGENTS
USERS
Endpoints are Easy Targets for Hackers
Continually Assess Risk of Every Endpoint
About Bradford Networks
Live Inventory of Network Connections
Appliance / Virtual / Cloud
Analytics & Forensics
Network Access Policy Engine
1,000+ Customers
5 Star Rating from SC Magazine
30+ Countries
Gartner MQ Visionary
Consistent Mission for 15 Years
Firewall VPN IDS/IPS SIEM RouterSwitch Wireless
Access
Point
Visibility Control
Leverages the Network Infrastructure
SNMP
CLI
SNMP
CLI
Radius
SNMP
Syslog
API
SNMP
Syslog
API
RadiusSNMP
Syslog
API
SNMP
CLI
Radius
NAC 101:
Extensible Policy Engine
RISK?
RESTRICT NETWORK ACCESS
TRUST?
GRANT NETWORK ACCESS
INDICATORS OF
TRUST
NAC 101:
Leveraging Indicators of Trust/Risk
INDICATORS OF
RISK
NAC 101:
Live Inventory of Network Connections
WHEN
….
SITE 2
SITE N
SITE 1
WHERE
VPN
WHO WHAT
NAC 101:
Dynamic Network Provisioning
HEALTHCARE
RECORDS
ONBOARDING
PORTAL
GUEST
ACCESS
NO
ACCESS
WHO WHAT WHERE WHENINDICATOR OF
TRUST
NAC 101:
Endpoint Compliance / Network Segmentation
Identify
User
Assign
Network Access
Assess
Risk
Identify
Device
No
Access
Guest
Access
Restricted
Access
Unrestricted
Access
NAC 101:
Self-Service Registration
NAC 101:
Secure the Critical Edge of Your Network
CxO
• Embrace BYOD
• Balance Risk/Cost
• Maintain Compliance
Users
• Access They Need
• Flexibility They Want
• Privacy They Deserve
IT Management
• Safe Devices/Apps
• Trusted Users
• Safe Access
Taking Action …
Questions/Request Slides
NAC/BYOD Whitepaper
Network Security Best Practices
23 Proprietary and Confidential 2015
Avi and Modern SSL Security
24 Proprietary and Confidential 2015
IS CAUSING
HOW
TO MOVETO
25 Proprietary and Confidential 2015
Market Drivers for SSL Security
Google, Apple, others pushing PFS
• SSL is no longer good enough.
• iOS9 mandates apps connect via
TLS with Perfect Forward
Secrecy.
26 Proprietary and Confidential 2015
New SSL Requirements
SSL with and without Perfect Forward Secrecy
SSL SSL w/ PFS
27 Proprietary and Confidential 2015
SSL Offload on Load Balancers
Hardware versus software, appliance versus fabric
Proprietary Hardware Appliance Software Defined Network
Custom ASIC X86 CPUs
Fixed capacity, forklift upgrade Instant elastic capacity
ASICs lag years behind tech Easy to be current
= Software load balancing fabric
28 Proprietary and Confidential 2015
Load Balancer Implementation
The SDN Architecture
Internet
Data Center
Network
Appliance
SoftwareController
Management
SoftwareLoad Balancer
Data Plane
Software
29 Proprietary and Confidential 2015
Legacy Hardware versus Avi Load Balancer
Easy to implement modern security immediately.
Legacy hardware load balancer
• Cavium SSLASICs for SSL offload
• ASICs do not support PFS and cannot be used
• SSL must be performed on underpowered CPUs
• $500k load balancer can do 48k SSL PFS TPS
SoftwareAvi
Vantage
Avi load balancer
• Intel CPU for SSL offload
• Infinitely scalable capacity
• $50k servers plus Avi can do 100k SSL PFSTPS
30 Proprietary and Confidential 2015
Check out our booth for full Demonstrations
Self Service Provisioning Troubleshoot App Performance
o 30 Sec Load Balancer o App Health Score
o Scale Apps, not Complexity o One ClickTriage
o 100% REST Managed o Google-like Search vsTCPdump
Application Security VMware Integration
o Config Analyzer o vCenter Integration
o SSL Everywhere o Hybrid Cloud
o DDoS Attack Mitigation o Elastic Scale

SeattleFall1

  • 1.
  • 2.
    Agenda • Accelops: NetworkSecurity • Bradford: Endpoint Security/Network Access Ctrl: • AVI: Load-Balancing/Application Performance • Tegile: Flash Primary Storage • Aerohive: WiFi/Mobility • Netbeez: Network Analysis/Monitoring • Google: Enterprise Cloud Services • Microsoft: Cloud/Azure/Windows 10 • VMware: Software Defined Data Center/Enterprise
  • 3.
    • No salespitches • “Tell Me Something New” • No “We” or “I” – end user focus, not vendor • Speaker evaluations very important • Target: 50-60% highly-rated presentations • Rate speakers based on how well they follow presentation guidelines (available on website) Speaker Guidelines/Evaluation
  • 4.
    • Include Twitterhashtag #angelbeat in all Tweets • Cell phones on vibrate • Vendor discussions during break or outside • Presentations downloadable • Agenda will be followed to the minute • Contact Angelbeat staff if you have any questions on food, room temperature, room layout, audio-visual, etc. Event Details
  • 5.
    • Each vendorraffle must be entered separately • All done at the end of day • Must be present to win • Each individual can win only twice • Gift Cards and other great prizes • All attendees receive $25 Amazon gift card from Angelbeat, just stay til end of regular Microsoft talk Raffle Prize Drawings
  • 6.
    • Speakers receiveattendee data post-seminar • Contact Angelbeat to opt-out • Reply back to post-event thank you email • Whether you continue to opt-in or opt-out… Please give sponsors fair consideration in future IT spending decisions Post Event Vendor Followup
  • 7.
    • Follow us •www.twitter.com/angelbeat • www.youtube.com/angelbeat • www.instagram.com/angelbeat • www.facebook.com/angelbeat • www.linkedin.com/groups/Angelbeat- 970047 Social Media #angelbeat
  • 8.
    Network Access Control101 Securing the Critical Edge of Your Network
  • 9.
  • 10.
  • 11.
    Attack Surface isGrowing and Changing YOUR BUSINESS SUPPLIERS PARENT COMPANY GUESTS PARTNERS CONSULTANTS BYOD INTERNET OF THINGS NO AGENTS USERS
  • 12.
    Endpoints are EasyTargets for Hackers
  • 13.
    Continually Assess Riskof Every Endpoint About Bradford Networks Live Inventory of Network Connections Appliance / Virtual / Cloud Analytics & Forensics Network Access Policy Engine 1,000+ Customers 5 Star Rating from SC Magazine 30+ Countries Gartner MQ Visionary Consistent Mission for 15 Years
  • 14.
    Firewall VPN IDS/IPSSIEM RouterSwitch Wireless Access Point Visibility Control Leverages the Network Infrastructure SNMP CLI SNMP CLI Radius SNMP Syslog API SNMP Syslog API RadiusSNMP Syslog API SNMP CLI Radius
  • 15.
    NAC 101: Extensible PolicyEngine RISK? RESTRICT NETWORK ACCESS TRUST? GRANT NETWORK ACCESS
  • 16.
    INDICATORS OF TRUST NAC 101: LeveragingIndicators of Trust/Risk INDICATORS OF RISK
  • 17.
    NAC 101: Live Inventoryof Network Connections WHEN …. SITE 2 SITE N SITE 1 WHERE VPN WHO WHAT
  • 18.
    NAC 101: Dynamic NetworkProvisioning HEALTHCARE RECORDS ONBOARDING PORTAL GUEST ACCESS NO ACCESS WHO WHAT WHERE WHENINDICATOR OF TRUST
  • 19.
    NAC 101: Endpoint Compliance/ Network Segmentation Identify User Assign Network Access Assess Risk Identify Device No Access Guest Access Restricted Access Unrestricted Access
  • 20.
  • 21.
    NAC 101: Secure theCritical Edge of Your Network CxO • Embrace BYOD • Balance Risk/Cost • Maintain Compliance Users • Access They Need • Flexibility They Want • Privacy They Deserve IT Management • Safe Devices/Apps • Trusted Users • Safe Access
  • 22.
    Taking Action … Questions/RequestSlides NAC/BYOD Whitepaper Network Security Best Practices
  • 23.
    23 Proprietary andConfidential 2015 Avi and Modern SSL Security
  • 24.
    24 Proprietary andConfidential 2015 IS CAUSING HOW TO MOVETO
  • 25.
    25 Proprietary andConfidential 2015 Market Drivers for SSL Security Google, Apple, others pushing PFS • SSL is no longer good enough. • iOS9 mandates apps connect via TLS with Perfect Forward Secrecy.
  • 26.
    26 Proprietary andConfidential 2015 New SSL Requirements SSL with and without Perfect Forward Secrecy SSL SSL w/ PFS
  • 27.
    27 Proprietary andConfidential 2015 SSL Offload on Load Balancers Hardware versus software, appliance versus fabric Proprietary Hardware Appliance Software Defined Network Custom ASIC X86 CPUs Fixed capacity, forklift upgrade Instant elastic capacity ASICs lag years behind tech Easy to be current = Software load balancing fabric
  • 28.
    28 Proprietary andConfidential 2015 Load Balancer Implementation The SDN Architecture Internet Data Center Network Appliance SoftwareController Management SoftwareLoad Balancer Data Plane Software
  • 29.
    29 Proprietary andConfidential 2015 Legacy Hardware versus Avi Load Balancer Easy to implement modern security immediately. Legacy hardware load balancer • Cavium SSLASICs for SSL offload • ASICs do not support PFS and cannot be used • SSL must be performed on underpowered CPUs • $500k load balancer can do 48k SSL PFS TPS SoftwareAvi Vantage Avi load balancer • Intel CPU for SSL offload • Infinitely scalable capacity • $50k servers plus Avi can do 100k SSL PFSTPS
  • 30.
    30 Proprietary andConfidential 2015 Check out our booth for full Demonstrations Self Service Provisioning Troubleshoot App Performance o 30 Sec Load Balancer o App Health Score o Scale Apps, not Complexity o One ClickTriage o 100% REST Managed o Google-like Search vsTCPdump Application Security VMware Integration o Config Analyzer o vCenter Integration o SSL Everywhere o Hybrid Cloud o DDoS Attack Mitigation o Elastic Scale

Editor's Notes

  • #14 13
  • #25 How apps like Candy Crush are causing enterprises to move to modern architectures such as SDN.