SlideShare a Scribd company logo
What is NAC?
Why Do We Need NAC ?
 NAC protects the network from
non-compliant or infected systems
 Provides enforcement methods to
protect the network
 Can perform pre- and post-admission
controls
 Pre-admission: scanning for “health”
 Post-admission: monitoring the
network and the traffic continuously
for threats
Three Generations of NAC
In 2004, Cisco launched
Network Admission Control
focused on Authentication
and health
Too complex and
expensive, required
upgrading of switches and
routers.
1
In 2005, Vendors
approached from their
strengths:
Cisco/Juniper introduced
appliances to simplify
deployment
Sophos/Symantec/McAfee
focused on Endpoint
Microsoft announced NAP
infrastructure
Third Generation (2008):
Unification of Compliance,
Security and Access Control
Unification of Network and
Endpoint Elements
2 3
Cisco is appliance oriented; Microsoft: server oriented; McAfee: endpoint & appliance oriented
What is NAC ?
 Network Access Control (NAC) is an
extension to ePO 4.0
 Provides network security by controlling
system access to network resources
 Access is granted according to the
system’s “health” status
 System’s “health” is assessed against a
set of defined compliance rules
NAC And Other Products
 NAC works together with Microsoft NAP
(Network Access Protection) as well as
with McAfee NSP (Network Security
Platform), formerly IntruShield
 In this case, NAC provides the “health”
statement, while enforcement is done
together with the other product
Managed vs. Un-managed Hosts
 Managed Hosts (those having a
running McAfee agent) can be handled
by NAC (enforcing a policy through ePO)
 Un-managed Hosts are detected but
they must be managed either by MS- NAP
or NSP (Network Security Platform,
IntruShield 5.1)
NAC & IntruShield
 MNAC 3.1 combined with IntruShield
5.1 provides complete monitoring of
managed and un-managed system
 McAfee will offer an appliance based
solution (NAC Appliance)
 NAC appliance provides pre-admission
control for un-managed systems
 IntruShield appliance provides
additional post-admission monitoring
06/09/16
ToPS Advanced
Total Protection for Endpoint
Single Integrated Management
Console - ePO
Anti-Spyware
Host Intrusion Prevention
Desktop Firewall
Anti-Virus
Web Security
Policy Auditing
Network Access Control
Anti-Spam (Email server)
McAfee Network Access Control
3.1 Software
• Tightly integrated with Microsoft Network Access Protection (NAP) for
control of unmanaged systems
• Support for ePolicy Orchestrator 4.0
• Standards-based system health checks
– XCCDF and OVAL®
• The industry’s most advanced check library
• Creation of custom checks for system health policies
Key Features
Combined Network
IPS + NAC Solutions
McAfee Unified Secure Access Strategy:
Integrated Across Your Infrastructure
Endpoint
Security Solutions
NAC-only Appliance
Solutions
• Network Enforcement
• Full IPS Functionality
• Post and Pre-admission
Control
Network Security
Platform
• Cost Effective In-Line NAC
• Access Protection for
Unmanaged Endpoints
• Network-Class Platform
NAC Appliance
• Endpoint Health Assessment
• NAP Integrated
• Managed Endpoint Control
ToPS Advanced
11
06/09/16
McAfee Network Security Platform with
NAC Add-on (formerly McAfee IntruShield)
• Combined IPS and NAC on same platform
• NAC software add-on deploys with simple upgrade
• Access Protection for Unmanaged Endpoints
• Built-in Host Quarantine
• Network-Class reliability and availability
• Identity-based access control
– Access based on organizational roles/users
– Integrates with Microsoft Active Directory
• Comprehensive post-admission control through:
– Application protocol
– Source/destination addresses
– Obtains endpoint health from MNAC
– IPS-detected malicious behavior
• NAC monitoring and reporting
– Reports on access logs (who, when, where) and
action taken
• Software Available on all I-Series Platforms
Security AND Performance.
No Compromise.
12
06/09/16
McAfee Network Security Platform –
NAC Appliance*
• NAC functionality on Network-Class Appliance platform
• Access Protection for Unmanaged Endpoints
• Flexible deployment
– Deploying in DHCP-mode
– Inline behind a VPN or LAN
• Identity-based access control
– Access based on organizational roles/users
– Integrates with Microsoft Active Directory
• Comprehensive post-admission control through:
– Application protocol
– Source/destination addresses
– Obtains endpoint health from MNAC
• NAC monitoring and reporting
– Reports on access logs (who, when, where) and
action taken
Security AND Performance.
No Compromise.
*Available end 2008
Unified Secure Access Process
Scan for rogue devices, alert
and report
Step 2: Discover
Pre or Post Admission health
against policy is checked.
Malicious behavior monitored
Step 3: Enforce
Take action based on
outcome of policy check or
behavior
Step 4: Remediate
Monitor endpoint to ensure
ongoing compliance
Step 5: Monitor
Define health, machine/user
identity, application policy
Step 1: Policy

More Related Content

What's hot

Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancerxKinAnx
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
AlonzoJames2
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
JoAnna Cheshire
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overviewBelsoft
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
Information Technology
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
Cisco Canada
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
Aruba, a Hewlett Packard Enterprise company
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
Aruba, a Hewlett Packard Enterprise company
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
Nick Straughan
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
Alberto Rivai
 

What's hot (20)

Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
Fortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdfFortinet_ProductGuide_NOV2021_R127.pdf
Fortinet_ProductGuide_NOV2021_R127.pdf
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Palo alto networks product overview
Palo alto networks product overviewPalo alto networks product overview
Palo alto networks product overview
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Aruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_finalAruba clearpass ebook_chpt1_final
Aruba clearpass ebook_chpt1_final
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
Large scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear passLarge scale, distributed access management deployment with aruba clear pass
Large scale, distributed access management deployment with aruba clear pass
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Dmz
Dmz Dmz
Dmz
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Fortinet sandboxing
Fortinet sandboxingFortinet sandboxing
Fortinet sandboxing
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Palo Alto Networks authentication
Palo Alto Networks authenticationPalo Alto Networks authentication
Palo Alto Networks authentication
 

Viewers also liked

Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
Forescout Technologies Inc
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
digitallibrary
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
Forescout Technologies Inc
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
Forescout Technologies Inc
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
Gionni Lúcio
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
Kyunghee Univ
 

Viewers also liked (7)

Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
Shining a Light on Shadow Devices
Shining a Light on Shadow DevicesShining a Light on Shadow Devices
Shining a Light on Shadow Devices
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
 

Similar to What is NAC

Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
Skybox Security
 
VPN
VPNVPN
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
ICT PRISTINE
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
ImamBahrudin5
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
Cisco Canada
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
Cisco Canada
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
Amazon Web Services
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
Khoa Nguyen Hong Nguyen
 
Openstack security presentation 2013
Openstack security presentation 2013Openstack security presentation 2013
Openstack security presentation 2013
brian_chong
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
Ali Kapucu
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
DeServ - Tecnologia e Servços
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
PROIDEA
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 

Similar to What is NAC (20)

Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Pristine rina-security-icc-2016
Pristine rina-security-icc-2016Pristine rina-security-icc-2016
Pristine rina-security-icc-2016
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
 
Cisco NGFW AMP
Cisco NGFW AMPCisco NGFW AMP
Cisco NGFW AMP
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Chapter08
Chapter08Chapter08
Chapter08
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Openstack security presentation 2013
Openstack security presentation 2013Openstack security presentation 2013
Openstack security presentation 2013
 
Why Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation FirewallWhy Its time to Upgrade a Next-Generation Firewall
Why Its time to Upgrade a Next-Generation Firewall
 
Sophos XG Firewall
Sophos XG FirewallSophos XG Firewall
Sophos XG Firewall
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 

More from Israel Marcus

2013 Glossary of Financial Terms
2013 Glossary of Financial Terms2013 Glossary of Financial Terms
2013 Glossary of Financial TermsIsrael Marcus
 
Data Base Fundamentals
Data Base FundamentalsData Base Fundamentals
Data Base FundamentalsIsrael Marcus
 
Climate and the built environment
Climate and the built environmentClimate and the built environment
Climate and the built environmentIsrael Marcus
 
ארבע ידיעות
ארבע ידיעותארבע ידיעות
ארבע ידיעותIsrael Marcus
 
Value at Risk Mapping
Value at Risk MappingValue at Risk Mapping
Value at Risk MappingIsrael Marcus
 
cours_machines_fluide_compressible
cours_machines_fluide_compressiblecours_machines_fluide_compressible
cours_machines_fluide_compressibleIsrael Marcus
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is VirtualizationIsrael Marcus
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)Israel Marcus
 

More from Israel Marcus (20)

BIM
BIMBIM
BIM
 
2013 Glossary of Financial Terms
2013 Glossary of Financial Terms2013 Glossary of Financial Terms
2013 Glossary of Financial Terms
 
Data Base Fundamentals
Data Base FundamentalsData Base Fundamentals
Data Base Fundamentals
 
security
securitysecurity
security
 
Firewalls
FirewallsFirewalls
Firewalls
 
Climate and the built environment
Climate and the built environmentClimate and the built environment
Climate and the built environment
 
EnergyPlus
EnergyPlusEnergyPlus
EnergyPlus
 
sod ha-ibur
sod ha-ibursod ha-ibur
sod ha-ibur
 
ארבע ידיעות
ארבע ידיעותארבע ידיעות
ארבע ידיעות
 
Talmud
TalmudTalmud
Talmud
 
Flight Basics
Flight BasicsFlight Basics
Flight Basics
 
VAROPS
VAROPSVAROPS
VAROPS
 
Value at Risk Mapping
Value at Risk MappingValue at Risk Mapping
Value at Risk Mapping
 
cours_machines_fluide_compressible
cours_machines_fluide_compressiblecours_machines_fluide_compressible
cours_machines_fluide_compressible
 
Capital_adequacy_6
Capital_adequacy_6Capital_adequacy_6
Capital_adequacy_6
 
DeltaPlus
DeltaPlusDeltaPlus
DeltaPlus
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)The AJDC and North African Jewry (2)
The AJDC and North African Jewry (2)
 
What is Encryption
What is EncryptionWhat is Encryption
What is Encryption
 

What is NAC

  • 2. Why Do We Need NAC ?  NAC protects the network from non-compliant or infected systems  Provides enforcement methods to protect the network  Can perform pre- and post-admission controls  Pre-admission: scanning for “health”  Post-admission: monitoring the network and the traffic continuously for threats
  • 3. Three Generations of NAC In 2004, Cisco launched Network Admission Control focused on Authentication and health Too complex and expensive, required upgrading of switches and routers. 1 In 2005, Vendors approached from their strengths: Cisco/Juniper introduced appliances to simplify deployment Sophos/Symantec/McAfee focused on Endpoint Microsoft announced NAP infrastructure Third Generation (2008): Unification of Compliance, Security and Access Control Unification of Network and Endpoint Elements 2 3 Cisco is appliance oriented; Microsoft: server oriented; McAfee: endpoint & appliance oriented
  • 4. What is NAC ?  Network Access Control (NAC) is an extension to ePO 4.0  Provides network security by controlling system access to network resources  Access is granted according to the system’s “health” status  System’s “health” is assessed against a set of defined compliance rules
  • 5. NAC And Other Products  NAC works together with Microsoft NAP (Network Access Protection) as well as with McAfee NSP (Network Security Platform), formerly IntruShield  In this case, NAC provides the “health” statement, while enforcement is done together with the other product
  • 6. Managed vs. Un-managed Hosts  Managed Hosts (those having a running McAfee agent) can be handled by NAC (enforcing a policy through ePO)  Un-managed Hosts are detected but they must be managed either by MS- NAP or NSP (Network Security Platform, IntruShield 5.1)
  • 7. NAC & IntruShield  MNAC 3.1 combined with IntruShield 5.1 provides complete monitoring of managed and un-managed system  McAfee will offer an appliance based solution (NAC Appliance)  NAC appliance provides pre-admission control for un-managed systems  IntruShield appliance provides additional post-admission monitoring
  • 8. 06/09/16 ToPS Advanced Total Protection for Endpoint Single Integrated Management Console - ePO Anti-Spyware Host Intrusion Prevention Desktop Firewall Anti-Virus Web Security Policy Auditing Network Access Control Anti-Spam (Email server)
  • 9. McAfee Network Access Control 3.1 Software • Tightly integrated with Microsoft Network Access Protection (NAP) for control of unmanaged systems • Support for ePolicy Orchestrator 4.0 • Standards-based system health checks – XCCDF and OVAL® • The industry’s most advanced check library • Creation of custom checks for system health policies Key Features
  • 10. Combined Network IPS + NAC Solutions McAfee Unified Secure Access Strategy: Integrated Across Your Infrastructure Endpoint Security Solutions NAC-only Appliance Solutions • Network Enforcement • Full IPS Functionality • Post and Pre-admission Control Network Security Platform • Cost Effective In-Line NAC • Access Protection for Unmanaged Endpoints • Network-Class Platform NAC Appliance • Endpoint Health Assessment • NAP Integrated • Managed Endpoint Control ToPS Advanced
  • 11. 11 06/09/16 McAfee Network Security Platform with NAC Add-on (formerly McAfee IntruShield) • Combined IPS and NAC on same platform • NAC software add-on deploys with simple upgrade • Access Protection for Unmanaged Endpoints • Built-in Host Quarantine • Network-Class reliability and availability • Identity-based access control – Access based on organizational roles/users – Integrates with Microsoft Active Directory • Comprehensive post-admission control through: – Application protocol – Source/destination addresses – Obtains endpoint health from MNAC – IPS-detected malicious behavior • NAC monitoring and reporting – Reports on access logs (who, when, where) and action taken • Software Available on all I-Series Platforms Security AND Performance. No Compromise.
  • 12. 12 06/09/16 McAfee Network Security Platform – NAC Appliance* • NAC functionality on Network-Class Appliance platform • Access Protection for Unmanaged Endpoints • Flexible deployment – Deploying in DHCP-mode – Inline behind a VPN or LAN • Identity-based access control – Access based on organizational roles/users – Integrates with Microsoft Active Directory • Comprehensive post-admission control through: – Application protocol – Source/destination addresses – Obtains endpoint health from MNAC • NAC monitoring and reporting – Reports on access logs (who, when, where) and action taken Security AND Performance. No Compromise. *Available end 2008
  • 13. Unified Secure Access Process Scan for rogue devices, alert and report Step 2: Discover Pre or Post Admission health against policy is checked. Malicious behavior monitored Step 3: Enforce Take action based on outcome of policy check or behavior Step 4: Remediate Monitor endpoint to ensure ongoing compliance Step 5: Monitor Define health, machine/user identity, application policy Step 1: Policy

Editor's Notes

  1. I am excited to be here with you to share the launch of a product that would reshaped McAfee and security management. If you are an ePO Admin, your work day would be forever changed and if your team own ePO, it would gain a new level of operational efficiency.
  2. Lets talk about the 3 generations of NAC. The first generation started with Cisco in 2004, where they added NAC on switches. This was a method for Cisco to increase revenue by add capability to new switches to coax their customers to upgrade. The solution was very complex and very expensive. The 2nd generation began when companies created NAC offerings based on their points of strength in the marketplace. So Cisco and Juniper created solutions based enforcement at the network, where companies strong at the endpoints like Sophos, Symantec and McAfee created solutions based on their strengths. And Microsoft create NAP which was server oriented. All these solutions solved part of the NAC problem, but the solutions had many holes and didn’t address the entire issue. McAfee is moving to the 3rd generation, where integration and unification of the network and the endpoint solves the issues that the first 2 generations did not. The third generation also covers compliance issues, combining access control and security features.
  3. McAfee Total Protection for Endpoint will provide you strong security that enables you to lower costs and get greater compliance. With this one solution, you can protect all your endpoints, physical and virtual. And manage all endpoints with one integrated, centralized management console. With McAfee Total Protection for Endpoint you can: Protect against advance threats that steal your data with advanced anti-virus protection Get proactive anti-spyware and anti-spam protection to lower threat risk Use host IPS & desktop firewall to protect against zero-day threats and reduce your patching costs Deploy network access control to enforce security policies Educate your end users of the security risks when Internet browsing Protect all desktops, physical and virtual, with the same trusted security Verify and audit which endpoints are out-of-compliance to easily create audit reports to ensure compliance. We have packaged the broadest and most effective end-point security offerings in the market
  4. Unified Secure Access is McAfee’s approach to solving the NAC problem. It allows you to combine enforcement at the endpoint and the network where you can mix and match product offerings (depending upon your specific deployment needs) that are integrated and work together to give the highest enforcement of managed, unmanaged and unmanageable endpoints. McAfee has a strong presence on the endpoint with a strong NAC product with McAfee NAC, or MNAC. This product is integrated with Microsoft’s NAP technology to provide critical health check data to NAP infrastructure. MNAC is also integrated with McAfee Networks Security Platform to cover NAC in the network even more extensively than NAP. We have a strong presence in the network with the leading IPS, our Network Security Platform. Our strategy is to make NAC easy for our customers to deploy, so this year we are providing major leaps in functionality by delivering NAC functionality to our Network IPS. This includes a NAC software add-on module that can create an IPS and NAC combination on one network-class appliance. McAfee is also providing a NAC Appliance (available January 2009) based on the Network Security Platform that focuses on NAC functionality only. This is will be a cost-effective hardware platform that would be deployed in the network where IPS functionality may not make sense.
  5. Security is really not a product, it’s a process. And NAC is no different. NAC needs to be customized to a customers specific needs. So a step of defining what policies you want to track and enforce needs to be created. Once those policies are set, the Unified Secure Access solution needs to discover system and network components that are outside those policies you defined as they are attempting to access your network. You then define if and how you want to enforce any violations of those policies. At that point, you have the option of remediating the problem and letting them onto the network once they are deemed healthy again, or simply quarantining the violator to an area where they can do no harm. Step 5 is monitoring, a key piece of the process for post-admission violations, such as loading an illegal software download. But policies must always be reviewed to ensure the correct level of access is defined.