Solving	access	for	Hybrid	IT
Jeff	Green	SVP	Products
Solving Access for Hybrid IT
Securing accessis a challenge
Solving Access for Hybrid IT
97%
ENTERPRISES
SUFFERED A
BREACH
134
BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1%
55%
PC
Mobile
How we are connecting
2011
2015
Hacking 38%
(up 8%)
Employee
Negligence
15% (doubled)
Insider Theft
10%
PhysicalTheft
10%
Subcontractors
9%
Primary sourcesofbreaches
Accidental
Exposure
13%
Data on the Move
7%
Old NAC:
PC and Datacenter
NetworkAccess
Access
PC Datacenter, Campus
VS
New Access:
Hybrid IT
SecureAccess
Visibility
Compliance
Authentication
Access Control
Datacenter,
Cloud, SaaS, Campus
BYOD
Solving Access for Hybrid IT
How we connect is more complex
All Major OSs
On-the-go
Homenetwork
Untrusted LAN
Guest Wi-Fi
CorporateNetwork
• Enterpriseapplications
• VDI, terminalservices
Datacenter
Cloud SaaS
• Apps
Cloud IaaS
• AWS, Azure
Mobile Apps
• Apps
Mobility HybridIT,
Cloudification
VDI
Datacenter
Consolidation
The new reality and challenges of Hybrid IT
Solving Access for Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFA
Authentication
Identity
Federation
Contextual
AccessControl
Device
Compliance
DataProtection
SecureData
Center Access
SecureCloud
Access
Visibility
Puzzle pieces needed for secureaccess
Secure AccessArchitecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Protected
Resources
Secure the Endpoint
Solving Access for Hybrid IT
MDMRemote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on
• Transparent strong authentication
• Device compliance check
• Contextual Access Policies
• Improved user experience
• Integration with mobility
management
Protected
Resources
Secure Mobile andCloud
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for
laptops, smartphones and tablets
• Contextual Access control
• Compliance policy for access
• Identity tied back to the enterprise
• Device & Identity tie
Protected
Resources
Secure AccessArchitecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check
• Contextual Access Policies
• Enforcement points throughout the
network
• Guest user access
Protected
Resources
Visibility
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Visibility into the network
• Understand compliance
• Understand the what, who, when,
how
• Understand contractors and third
party access
• Understand devices hitting the
network and the risk they may
cause
Protected
Resources
Summary
Solving Access for Hybrid IT
Accessis evolving
Hybrid IT
Is/has changedthe way wesecuredata. Hybridity is important.
Endpoint
Becomes important insolvingtheaccess problems introduced
withHybrid IT
Identityand Device
Whilst strongidentity and authis important tyingindevice and
its complianceis now key
Visibility
Understandingwhat is going on in your network (inccloud) is
vital
Questions?
SecureAccess For the Next Generation
Solving Access for Hybrid IT

More Related Content

PPTX
CIO's Guide to Enterprise Cloud Adoption
PPTX
Shadow IT: The CISO Perspective on Regaining Control
PPTX
Benefits of IT Outsourcing
PPTX
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
PDF
MISA Cloud Workshop_ ipc privacy in the cloud
PPTX
Wireless Mobility
PPTX
Understanding Global Data Protection Laws: Webinar
PDF
Cloud security
CIO's Guide to Enterprise Cloud Adoption
Shadow IT: The CISO Perspective on Regaining Control
Benefits of IT Outsourcing
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
MISA Cloud Workshop_ ipc privacy in the cloud
Wireless Mobility
Understanding Global Data Protection Laws: Webinar
Cloud security

What's hot (20)

PPTX
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
PPTX
WatchGuard Firewall & Network Security
PDF
Security & Seamless CX in User Authentication: How to Achieve Both?
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PDF
Cloud Security & Cloud Encryption Explained
PPTX
Security For Business: Are You And Your Customers Safe
PPTX
OpenText Core Customer Presentation Sept 2015
PPTX
The Loss of Intellectual Property in the Digital Age: What Companies can d…
PPTX
Building secure digital services
PDF
Zero Trust Enterprise Network at Adobe
PDF
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
PPTX
Webinar bitglass - complete deck-2
PPTX
Simplifying Security Management in the Virtual Data Center
PPTX
OpenText Secure MFT (Managed File Transfer)
PPTX
Practical IIoT Solutions for Manufacturing
PPTX
Law seminars intl cybersecurity in the power industry
PPTX
Office365 security in depth
PPTX
Getting More Value Out of Your Data
PPT
Risks and Benefits of Cloud Computing
PDF
Microsegmentation for enterprise data centers
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
WatchGuard Firewall & Network Security
Security & Seamless CX in User Authentication: How to Achieve Both?
The Security Policy Management Maturity Model: How to Move Up the Curve
Cloud Security & Cloud Encryption Explained
Security For Business: Are You And Your Customers Safe
OpenText Core Customer Presentation Sept 2015
The Loss of Intellectual Property in the Digital Age: What Companies can d…
Building secure digital services
Zero Trust Enterprise Network at Adobe
Developer Day 2014 - 2 - philippe guillemette - sierra wireless device to clo...
Webinar bitglass - complete deck-2
Simplifying Security Management in the Virtual Data Center
OpenText Secure MFT (Managed File Transfer)
Practical IIoT Solutions for Manufacturing
Law seminars intl cybersecurity in the power industry
Office365 security in depth
Getting More Value Out of Your Data
Risks and Benefits of Cloud Computing
Microsegmentation for enterprise data centers
Ad

Similar to Solving access for Hybrid IT (20)

PPTX
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
PDF
Moving from a Data Center to a Hybrid IT Environment Securely
PDF
PulseSecure_Report_HybridIT_120715
PDF
PulseSecure_Report_HybridIT_120715
PPTX
2017 Predictions: Identity and Security
PDF
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
PPTX
Catalyst 2015: Patrick Harding
DOCX
Hybrid identity by Sandeep Kumar Seeram
PDF
(Ebook) AI Is Ciming for The Class Room by MIT Techonology Review
PPTX
Simplicity in Hybrid IT Environments – A Security Oxymoron?
PPTX
What to Expect in 2016: Top 5 Predictions for Security and Access Control
PPTX
Security Management in the Cloud
DOCX
What is the future of cloud security linked in
PPTX
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
PPTX
TDSi Open Day
PPTX
Optimizing Your Hybrid IT Strategy
PDF
Identity-Native Infrastructure Access Management Ev Kontsevoy
PDF
Identity-Native Infrastructure Access Management Ev Kontsevoy
PPTX
Cover Your Apps! Surviving in the Age of the Hyperscale Public Clouds
PDF
Signs It's Time to Modernize Your Identity Management Software
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Moving from a Data Center to a Hybrid IT Environment Securely
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
2017 Predictions: Identity and Security
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Catalyst 2015: Patrick Harding
Hybrid identity by Sandeep Kumar Seeram
(Ebook) AI Is Ciming for The Class Room by MIT Techonology Review
Simplicity in Hybrid IT Environments – A Security Oxymoron?
What to Expect in 2016: Top 5 Predictions for Security and Access Control
Security Management in the Cloud
What is the future of cloud security linked in
European SharePoint Community - Hybrid Dilemma: Using Infrastructure as Infor...
TDSi Open Day
Optimizing Your Hybrid IT Strategy
Identity-Native Infrastructure Access Management Ev Kontsevoy
Identity-Native Infrastructure Access Management Ev Kontsevoy
Cover Your Apps! Surviving in the Age of the Hyperscale Public Clouds
Signs It's Time to Modernize Your Identity Management Software
Ad

More from Jeff Green (6)

PDF
McAfeeSecJournal-2010
PDF
McAfeeSecJournal-06-2009
PDF
McAfeeSecJournal-09-2008
PDF
McAfeeSecJournal-01-2008
PDF
Building excellence in support
PDF
Implementing Secure Access & Mobile Identity
McAfeeSecJournal-2010
McAfeeSecJournal-06-2009
McAfeeSecJournal-09-2008
McAfeeSecJournal-01-2008
Building excellence in support
Implementing Secure Access & Mobile Identity

Recently uploaded (20)

PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Human Computer Interaction Miterm Lesson
PDF
The AI Revolution in Customer Service - 2025
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Altius execution marketplace concept.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Decision Optimization - From Theory to Practice
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Advancing precision in air quality forecasting through machine learning integ...
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Human Computer Interaction Miterm Lesson
The AI Revolution in Customer Service - 2025
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Altius execution marketplace concept.pdf
Internet of Everything -Basic concepts details
Ensemble model-based arrhythmia classification with local interpretable model...
SGT Report The Beast Plan and Cyberphysical Systems of Control
A symptom-driven medical diagnosis support model based on machine learning te...
Co-training pseudo-labeling for text classification with support vector machi...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Electrocardiogram sequences data analytics and classification using unsupervi...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Decision Optimization - From Theory to Practice
Connector Corner: Transform Unstructured Documents with Agentic Automation
Build Real-Time ML Apps with Python, Feast & NoSQL
Build automations faster and more reliably with UiPath ScreenPlay

Solving access for Hybrid IT

  • 2. Securing accessis a challenge Solving Access for Hybrid IT 97% ENTERPRISES SUFFERED A BREACH 134 BEFORE BREACHES WERE DISCOVERED DAYS Gigamon 2015 1% 55% PC Mobile How we are connecting 2011 2015 Hacking 38% (up 8%) Employee Negligence 15% (doubled) Insider Theft 10% PhysicalTheft 10% Subcontractors 9% Primary sourcesofbreaches Accidental Exposure 13% Data on the Move 7%
  • 3. Old NAC: PC and Datacenter NetworkAccess Access PC Datacenter, Campus VS New Access: Hybrid IT SecureAccess Visibility Compliance Authentication Access Control Datacenter, Cloud, SaaS, Campus BYOD Solving Access for Hybrid IT How we connect is more complex
  • 4. All Major OSs On-the-go Homenetwork Untrusted LAN Guest Wi-Fi CorporateNetwork • Enterpriseapplications • VDI, terminalservices Datacenter Cloud SaaS • Apps Cloud IaaS • AWS, Azure Mobile Apps • Apps Mobility HybridIT, Cloudification VDI Datacenter Consolidation The new reality and challenges of Hybrid IT Solving Access for Hybrid IT MAM/MDM VPN Mobile GW Web GW Cloud Security GW NAC
  • 6. Secure AccessArchitecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Protected Resources
  • 7. Secure the Endpoint Solving Access for Hybrid IT MDMRemote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Securing the endpoint • Native app single sign-on • Transparent strong authentication • Device compliance check • Contextual Access Policies • Improved user experience • Integration with mobility management Protected Resources
  • 8. Secure Mobile andCloud Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Mobile and Cloud access • Easy BYOD on/off-boarding for laptops, smartphones and tablets • Contextual Access control • Compliance policy for access • Identity tied back to the enterprise • Device & Identity tie Protected Resources
  • 9. Secure AccessArchitecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Network and Datacenter access • Device compliance check • Contextual Access Policies • Enforcement points throughout the network • Guest user access Protected Resources
  • 10. Visibility Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Visibility into the network • Understand compliance • Understand the what, who, when, how • Understand contractors and third party access • Understand devices hitting the network and the risk they may cause Protected Resources
  • 11. Summary Solving Access for Hybrid IT Accessis evolving Hybrid IT Is/has changedthe way wesecuredata. Hybridity is important. Endpoint Becomes important insolvingtheaccess problems introduced withHybrid IT Identityand Device Whilst strongidentity and authis important tyingindevice and its complianceis now key Visibility Understandingwhat is going on in your network (inccloud) is vital
  • 12. Questions? SecureAccess For the Next Generation Solving Access for Hybrid IT