Solving access for Hybrid IT
Jeff Green SVP Products
Solving Access for Hybrid IT
Securing access is a challenge
Solving Access for Hybrid IT
97%
ENTERPRISES
SUFFERED A
BREACH
134
BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1%
55%
PC
Mobile
How we are connecting
2011
2015
Hacking 38%
(up 8%)
Employee
Negligence
15% (doubled)
Insider Theft
10%
Physical Theft
10%
Subcontractors
9%
Primary sources of breaches
Accidental
Exposure
13%
Data on the Move
7%
Old NAC:
PC and Datacenter
NetworkAccess
Access
PC Datacenter, Campus
VS
New Access:
Hybrid IT
SecureAccess
Visibility
Compliance
Authentication
Access Control
Datacenter,
Cloud, SaaS, Campus
BYOD
Solving Access for Hybrid IT
How we connect is more complex
All Major OSs
On-the-go
Home network
Untrusted LAN
Guest Wi-Fi
Corporate Network
• Enterprise applications
• VDI, terminal services
Datacenter
Cloud SaaS
• Apps
Cloud IaaS
• AWS, Azure
Mobile Apps
• Apps
Mobility Hybrid IT,
Cloudification
VDI
Datacenter
Consolidation
The new reality and challenges of Hybrid IT
Solving Access for Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFA
Authentication
Identity
Federation
Contextual
Access Control
Device
Compliance
Data Protection
Secure Data
Center Access
Secure Cloud
Access
Visibility
Puzzle pieces needed for secure access
Secure Access Architecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Protected
Resources
Secure the Endpoint
Solving Access for Hybrid IT
MDMRemote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on
• Transparent strong authentication
• Device compliance check
• Conditional Access Policies
• Improved user experience
• Integration with mobility
management
Protected
Resources
Secure Mobile and Cloud
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for
laptops, smartphones and tablets
• Contextual Access control
• Compliance policy for access
• Identity tied back to the enterprise
• Device & Identity tie
Protected
Resources
Secure Access Architecture
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check
• Conditional Access Policies
• Enforcement points throughout the
network
• Guest user access
Protected
Resources
Visibility
Solving Access for Hybrid IT
Remote &
Mobile
users
Protected
Resources
Firewall Switch
Wireless
LAN
Remote Access
Cloud Access
Network Access
Datacenter
Access
Single
Management
Console
CampusSaaS/Cloud Data Center
Employees
Guests
Visibility into the network
• Understand compliance
• Understand the what, who, when,
how
• Understand contractors and third
party access
• Understand devices hitting the
network and the risk they may
cause
Protected
Resources
Summary
Solving Access for Hybrid IT
Access is evolving
Hybrid IT
Is/has changed the way we secure data. Hybridity is important.
Endpoint
Becomes important in solving the access problems introduced
with Hybrid IT
Identity and Device
Whilst strong identity and auth is important tying in device and
its compliance is now key
Visibility
Understanding what is going on in your network (inc cloud) is
vital
Questions?
Secure Access For the Next Generation
Solving Access for Hybrid IT

More Related Content

PPTX
Exhibitor session: Cisco Meraki
PPTX
Using sdn to secure the campus - Networkshop44
PPTX
Exhibitor session: Efficient IP
PDF
Palo Alto Networks - Magnifier
PDF
Cloud security: Accelerating cloud adoption
PDF
Introduction to Operational Technology 0.1
PDF
PANDI Meeting 12: Supporting resilience and security in Internet routing
PPTX
Xaas infotech (2)
Exhibitor session: Cisco Meraki
Using sdn to secure the campus - Networkshop44
Exhibitor session: Efficient IP
Palo Alto Networks - Magnifier
Cloud security: Accelerating cloud adoption
Introduction to Operational Technology 0.1
PANDI Meeting 12: Supporting resilience and security in Internet routing
Xaas infotech (2)

What's hot (19)

PPTX
Mobility Trends Impacting Healthcare
PDF
Evolving Infrastructure and Management for Business Agility
PDF
Nas nie zaatakują!
PDF
Standards for Autonomous and Secure Microgrids
PPTX
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
PPTX
Build Safe and Secure Distributed Systems
PPTX
Next Generation Infrastructure for Internet of Things
PDF
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
PPTX
Gitex journey to the cloud
PPT
Cloud computing web 2.0 By Joanna Hendricks BMT 580
PPTX
Shedding Light on Shadow IT for File Sharing
PDF
DNA: an overview
PPTX
Preparing healthcare networks for mobility, digitalization and IoT
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PPT
Cloud Security: Make Your CISO Successful
PPTX
45 Minutes to PCI Compliance in the Cloud
PDF
Q IoT 公私雲- stacy
PPTX
Kyle Taylor – increasing your security posture using mc afee epo
PPTX
4.2.cloud storage
Mobility Trends Impacting Healthcare
Evolving Infrastructure and Management for Business Agility
Nas nie zaatakują!
Standards for Autonomous and Secure Microgrids
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Build Safe and Secure Distributed Systems
Next Generation Infrastructure for Internet of Things
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
Gitex journey to the cloud
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Shedding Light on Shadow IT for File Sharing
DNA: an overview
Preparing healthcare networks for mobility, digitalization and IoT
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security: Make Your CISO Successful
45 Minutes to PCI Compliance in the Cloud
Q IoT 公私雲- stacy
Kyle Taylor – increasing your security posture using mc afee epo
4.2.cloud storage
Ad

Viewers also liked (20)

PPTX
Dealing with pervasive monitoring - Networkshop44
PPTX
End to end performance - Networkshop44
PPTX
Whats new in ict law - Networkshop44
PPTX
Next gen insight networkshop44
PPTX
Eduroam workshop nic mitev probes - networkshop44
PPTX
Find out about Jisc - Networkshop44 2016
PPTX
Edupert best practices in supporting end users - Networkshop44
PPTX
Managing and monitoring large scale data transfers - Networkshop44
PPTX
Jisc update janet6 upgrade networkshop44
PPTX
Eduroam in portsmouth's wireless city - Networkshop44
PPTX
Jisc and janet network updates from network operations, operational services ...
PPTX
End to end performance networkshop44
PPTX
Network performance lessons from the coal face - Networkshop44
PPTX
Welcome to Networkshop44 - Networkshop44
PPTX
Eduroam seminar - Networkshop44 2016
PPTX
Eduroam workshop nic mitev proactive learning - networkshop44
PPTX
Eduroam workshop nic mitev loughborough uni - networkshop44
PPTX
Multiprotocol label switching (mpls) - Networkshop44
PPTX
Hyper efficient data centres – key ingredient intelligence networkshop44
PPTX
Dev ops, noops or hypeops - Networkshop44
Dealing with pervasive monitoring - Networkshop44
End to end performance - Networkshop44
Whats new in ict law - Networkshop44
Next gen insight networkshop44
Eduroam workshop nic mitev probes - networkshop44
Find out about Jisc - Networkshop44 2016
Edupert best practices in supporting end users - Networkshop44
Managing and monitoring large scale data transfers - Networkshop44
Jisc update janet6 upgrade networkshop44
Eduroam in portsmouth's wireless city - Networkshop44
Jisc and janet network updates from network operations, operational services ...
End to end performance networkshop44
Network performance lessons from the coal face - Networkshop44
Welcome to Networkshop44 - Networkshop44
Eduroam seminar - Networkshop44 2016
Eduroam workshop nic mitev proactive learning - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
Multiprotocol label switching (mpls) - Networkshop44
Hyper efficient data centres – key ingredient intelligence networkshop44
Dev ops, noops or hypeops - Networkshop44
Ad

Similar to Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44 (20)

PDF
Solving access for Hybrid IT
PPTX
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
PDF
EMEA10: Trepidation in Moving to the Cloud
PPTX
3 Steps to Safely Bringing Your Own Devices (BYOD)
PPTX
HP2065_TieCon_Presentation_V7
PPTX
Presentation of Hyperloop Cloud Space Datacenter
PPTX
Corporate Mobility Insights
PPTX
Optimizing Your Hybrid IT Strategy
PDF
vtec-company-profile-final-digital
PPTX
Big data in term of security measure
PPT
Information Security
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PDF
Rethinking Data Availability and Governance in a Mobile World
PDF
Rethinking Data Availability and Governance in a Mobile World
PDF
Wp byod
 
PDF
Security - A Digital Transformation Enabler
PPTX
Mobile secure workplace briefing presentation
PPTX
Authentication cloud
PPTX
Authentication in cloud computing
PPTX
Alpha & Omega's Managed Security
Solving access for Hybrid IT
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
EMEA10: Trepidation in Moving to the Cloud
3 Steps to Safely Bringing Your Own Devices (BYOD)
HP2065_TieCon_Presentation_V7
Presentation of Hyperloop Cloud Space Datacenter
Corporate Mobility Insights
Optimizing Your Hybrid IT Strategy
vtec-company-profile-final-digital
Big data in term of security measure
Information Security
Best practices for mobile enterprise security and the importance of endpoint ...
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Wp byod
 
Security - A Digital Transformation Enabler
Mobile secure workplace briefing presentation
Authentication cloud
Authentication in cloud computing
Alpha & Omega's Managed Security

More from Jisc (20)

PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
Andrew-Brown-JUSP-showcase-20240730.pptx
PPTX
JUSP Showcase - Rebuilding Data presentation
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
FE Accessibility training matrix partnership - information session
PPTX
Procuring a research management system: why is it so hard?
PPTX
Adobe Express Engagement Webinar (Delegate).pptx
PPTX
How libraries can support authors with open access requirements for UKRI fund...
PPTX
Supporting (UKRI) OA monographs at Salford.pptx
PPTX
The approach at University of Liverpool.pptx
PPTX
Jisc's value to HE: the University of Sheffield
PPTX
Towards a code of practice for AI in AT.pptx
PPTX
Jamworks pilot and AI at Jisc (20/03/2024)
PPTX
Wellbeing inclusion and digital dystopias.pptx
PPTX
Accessible Digital Futures project (20/03/2024)
PPTX
Procuring digital preservation CAN be quick and painless with our new dynamic...
PPTX
International students’ digital experience: understanding and mitigating the ...
PPTX
Digital Storytelling Community Launch!.pptx
PPTX
Open Access book publishing understanding your options (1).pptx
PPTX
Scottish Universities Press supporting authors with requirements for open acc...
Strengthening open access through collaboration: building connections with OP...
Andrew-Brown-JUSP-showcase-20240730.pptx
JUSP Showcase - Rebuilding Data presentation
Adobe Express Engagement Webinar (Delegate).pptx
FE Accessibility training matrix partnership - information session
Procuring a research management system: why is it so hard?
Adobe Express Engagement Webinar (Delegate).pptx
How libraries can support authors with open access requirements for UKRI fund...
Supporting (UKRI) OA monographs at Salford.pptx
The approach at University of Liverpool.pptx
Jisc's value to HE: the University of Sheffield
Towards a code of practice for AI in AT.pptx
Jamworks pilot and AI at Jisc (20/03/2024)
Wellbeing inclusion and digital dystopias.pptx
Accessible Digital Futures project (20/03/2024)
Procuring digital preservation CAN be quick and painless with our new dynamic...
International students’ digital experience: understanding and mitigating the ...
Digital Storytelling Community Launch!.pptx
Open Access book publishing understanding your options (1).pptx
Scottish Universities Press supporting authors with requirements for open acc...

Recently uploaded (20)

PDF
Disorder of Endocrine system (1).pdfyyhyyyy
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PPTX
Reproductive system-Human anatomy and physiology
PPTX
Climate Change and Its Global Impact.pptx
PDF
Nurlina - Urban Planner Portfolio (english ver)
PDF
faiz-khans about Radiotherapy Physics-02.pdf
PDF
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
Farming Based Livelihood Systems English Notes
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PPT
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
PDF
semiconductor packaging in vlsi design fab
PDF
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
PDF
African Communication Research: A review
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
ACFE CERTIFICATION TRAINING ON LAW.pptx
Disorder of Endocrine system (1).pdfyyhyyyy
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
1.Salivary gland disease.pdf 3.Bleeding and Clotting Disorders.pdf important
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
Reproductive system-Human anatomy and physiology
Climate Change and Its Global Impact.pptx
Nurlina - Urban Planner Portfolio (english ver)
faiz-khans about Radiotherapy Physics-02.pdf
Fun with Grammar (Communicative Activities for the Azar Grammar Series)
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
Farming Based Livelihood Systems English Notes
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
REGULATION OF RESPIRATION lecture note 200L [Autosaved]-1-1.ppt
semiconductor packaging in vlsi design fab
LIFE & LIVING TRILOGY- PART (1) WHO ARE WE.pdf
African Communication Research: A review
Journal of Dental Science - UDMY (2021).pdf
ACFE CERTIFICATION TRAINING ON LAW.pptx

Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44

  • 1. Solving access for Hybrid IT Jeff Green SVP Products Solving Access for Hybrid IT
  • 2. Securing access is a challenge Solving Access for Hybrid IT 97% ENTERPRISES SUFFERED A BREACH 134 BEFORE BREACHES WERE DISCOVERED DAYS Gigamon 2015 1% 55% PC Mobile How we are connecting 2011 2015 Hacking 38% (up 8%) Employee Negligence 15% (doubled) Insider Theft 10% Physical Theft 10% Subcontractors 9% Primary sources of breaches Accidental Exposure 13% Data on the Move 7%
  • 3. Old NAC: PC and Datacenter NetworkAccess Access PC Datacenter, Campus VS New Access: Hybrid IT SecureAccess Visibility Compliance Authentication Access Control Datacenter, Cloud, SaaS, Campus BYOD Solving Access for Hybrid IT How we connect is more complex
  • 4. All Major OSs On-the-go Home network Untrusted LAN Guest Wi-Fi Corporate Network • Enterprise applications • VDI, terminal services Datacenter Cloud SaaS • Apps Cloud IaaS • AWS, Azure Mobile Apps • Apps Mobility Hybrid IT, Cloudification VDI Datacenter Consolidation The new reality and challenges of Hybrid IT Solving Access for Hybrid IT MAM/MDM VPN Mobile GW Web GW Cloud Security GW NAC
  • 5. 2FA/MFA Authentication Identity Federation Contextual Access Control Device Compliance Data Protection Secure Data Center Access Secure Cloud Access Visibility Puzzle pieces needed for secure access
  • 6. Secure Access Architecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Protected Resources
  • 7. Secure the Endpoint Solving Access for Hybrid IT MDMRemote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Securing the endpoint • Native app single sign-on • Transparent strong authentication • Device compliance check • Conditional Access Policies • Improved user experience • Integration with mobility management Protected Resources
  • 8. Secure Mobile and Cloud Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Mobile and Cloud access • Easy BYOD on/off-boarding for laptops, smartphones and tablets • Contextual Access control • Compliance policy for access • Identity tied back to the enterprise • Device & Identity tie Protected Resources
  • 9. Secure Access Architecture Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Network and Datacenter access • Device compliance check • Conditional Access Policies • Enforcement points throughout the network • Guest user access Protected Resources
  • 10. Visibility Solving Access for Hybrid IT Remote & Mobile users Protected Resources Firewall Switch Wireless LAN Remote Access Cloud Access Network Access Datacenter Access Single Management Console CampusSaaS/Cloud Data Center Employees Guests Visibility into the network • Understand compliance • Understand the what, who, when, how • Understand contractors and third party access • Understand devices hitting the network and the risk they may cause Protected Resources
  • 11. Summary Solving Access for Hybrid IT Access is evolving Hybrid IT Is/has changed the way we secure data. Hybridity is important. Endpoint Becomes important in solving the access problems introduced with Hybrid IT Identity and Device Whilst strong identity and auth is important tying in device and its compliance is now key Visibility Understanding what is going on in your network (inc cloud) is vital
  • 12. Questions? Secure Access For the Next Generation Solving Access for Hybrid IT

Editor's Notes

  • #3: Gigamon survey 97% of enterprises breached, total cost around 2B – average enterprise breach costs $2-3M These breaches go undetected for 134 days. The survey suggests that deploying NAC reduces the breach cost by 20% eMarketer Use of mobile phones has grown from an average of 40 minutes to 3 hours Use of laptops has stayed flat in the same period ITRC - US Businesses – 71 breaches - 40% of breaches publically reported and some 5m records Educational – 58 breaches – 700k records 7.4% of overall breaches e.g. Boston Uni Emails sent to wrong recipients, websites hacked, ftp sites publically expose, laptops with data stolen
  • #4: Access whether on the network or remote has changed over the years we only used to worry about controlling access. Authorization was really about the user and a password (maybe 2FA) Today we want to understand the device, the user and the compliance level of the device. All of this becomes part of the authorization decision Visibility into users, device and applications becomes more important in policy than resources, ports and IPs in Hybrid IT
  • #5: How we are connecting has changed – no longer just a corporate port The devices we use has changed from 1 laptop to multiple devices From one heterogeneous OS to many proprietary to closed/opensource The different types of networks we connect to bring different types of risk The types of devices have different risk profiles Mobilizing Access and Applications is demanding We have a number of access gateways for cloud security (CASB), Data-center (VPN/Firewall/NAC) We have created a number of management technologies for the endpoint MDM, SMS, Tivoli We have tried to mobilize PC applications and infrastructure with VDI which doesn’t work on tablets and phones well On the hosting front we are moving applications to the data center to cloud without a solid plan for security We are deploying SaaS based services for ease and cost being driven out of the business side more than IT Creating consistent access policy across many of these environments becomes challenging Multiple consoles, Multiple policies hard to rationalize Security posture becomes impossible to assess yet attest
  • #6: Securing access to application, data and services is infinitely more challenging than the old world of DC only. Finding one vendor that ticks all the boxes to provide security across this hybrid environment is hard. We are often left stitching disparate solutions together. Sometimes ones that were not necessarily designed to work together It is important to find a vendor or series of vendors that are open and can create the glue in the solution Securing data in motion is almost pointless when the data rests unencrypted on a device. Authenticating a user without checking the posture of the device could mean that malware steels the information/IP Accessing info without adequate authentication and identity capability means anyone with a lost device could access IP Allowing employees to access information without device compliance could mean an apt or malware could be stealing data. According to Impima 35% of data loss is due to malware and 72% that suffer major losses shutdown in 24 months. Having visibility into what is happening in the environment from the data centers and cloud apps being used to the devices and users connecting to them. Getting this visibility is hard and being able to manage multiple solutions is tough. Finding the glue will help lessen complexity of reporting and configuration
  • #7: A secure access architecture include dealing with Cloud, DC and Campus It includes dealing with Mobile, Laptop and desktop Needs to enable access not restrict it Hybrid IT includes cloud, DC and campus Need a VPN to allow remote access to the DC Need Cloud GW manage access to the cloud or SaaS based services Need a network access control service to manage access to the DC and campus for employees in the office Above all of this an identity management system such Active Directory with 2/MFA Ideally one management console to manage this. Policies should be central around users and not resources Vendor who has independence and can work well within an eco-system of products such that you can protect your existing investments and adapt to new demands
  • #8: Securing the endpoint becomes very important Outside to outside the organization Single sign on on the endpoint become important for native and html apps Create consistent password and user management policies across the hybrid environment Authentication is important an many companies delivering MFA. Authentication becomes around data not access. Give example Understanding the compliance of device becomes important to protecting your data. Is it encrypted, protected or vulnerable Conditional access is all about making decisions and conditioning access based on the user, auth level and device compliance/trust User experience is also key for user adoption to prevent users working around the system and controls. Today access can be clumsy and cumbersome for the end user If you need to create security on the endpoint this can be achieved by using a MDM or MAM solution for mobile users. This should them be integrated into your access policy. You can make conditional access policy through integrations with MDM solutions to determine compliance with policies or to assign access roles. Give examples
  • #9: Enabling mobile access to resources within the DC and the cloud requires you to think about new ways to manage device lifecycle for managed and unmanaged devices. Simplifying access to the network. An onboarding of a device should be simple and provision access to the VPN, Wi-Fi networks install all appropriate software and provision certificates for stronger identity and authentication. Contextual access control can be extended to cloud services allowing you to control access to a service based on a devices compliance or authentication level The identity can be tied back to the enterprise by use a cloud / mobile GW as an identity provider using SAML. This can work for native and HTML based apps. Thus SAML based assertions can be based on the authenticated user back to the AD or LDAP server using 2/MFA You can also tie the identity to the device using auth chaining with device cert and the user credentials
  • #10: Conditional access that lets you roam from outside the network to inside without re-authentication Enforcement point throughout the network that allow you to provide consistent user policy across access gateways, Wi-Fi Aps, VPN or Firewalls. This gives you the ability to enforce access through multiple entry/access points Create a secured access environment for visitors and guests that allows self service and easy provisioning of users. Creating a segmented environment for users to safely access the internet without a burden being placed on an IT team
  • #11: Visibility become key to securing access. You have challenges of dealing with managed and unmanaged devices (BYOD) understanding what is hitting your network and accessing resources when often many resources are protected with a basic authentication. Integration with management platforms such as MDM and inventory management systems show your corporate or organizational devices that are under management. But there are many devices that may not be under management such as printers and IP phones. These unmanaged devices are usually discovered using profiler technologies. However the endpoint is important in providing total visibility when Cloud based services and mobility come into play. Once mobile devices are outside the corporate network access cloud services all visibility is lost unless you force it through the infrastructure which often places unnecessary load on gateway boxes. The endpoint can provide vital information on applications use, and the risk the device might pose such as unpatched vulnerabilities. Understanding the 5W’s of visibility Who – the user that is authenticating Which – the device they are using What – what application and data are they accessing When – the time at which they access and patterns of behavior Where – what location are they accessing things from
  • #13: Hybrid IT is changing the way we fundamentally think about security. The perimeter and protecting data is not longer inside our four walls. The advent of mobility has changes the way in which we access data and when we access it. Endpoint becomes important around solving access to cloud technologies. This includes providing single sign on and password policy across multiple app in the datacenter and/or cloud. It also provides visibility into cloud apps being used outside of the organizations four walls. Identity of the user and tying the device to that identity become important it makes it harder for a hacked device or hacked user to be exploited. Your banks does this when you log in on a new machine Visibility of what is going on in your network is key and allows you to react and adjust controls appropriately