12
Solving access for Hybrid IT Jeff Green SVP Products Solving Access for Hybrid IT

Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44

  • Upload
    jisc

  • View
    1.438

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving access for Hybrid ITJeff Green SVP Products

Solving Access for Hybrid IT

Page 2: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Securing access is a challenge

97%ENTERPRISES

SUFFERED A BREACH

134BEFORE BREACHES WERE

DISCOVERED

DAYS

Gigamon 2015

1% 55%PCMobile

How we are connecting

2011

2015eMarketer 4/15

Hacking 38% (up 8%)

Employee Negligence

15% (doubled)

Insider Theft10%

Physical Theft10%

Subcontractors9%

Primary sources of breaches

Accidental Exposure

13%

Data on the Move7%

ITRC

Page 3: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Old NAC:PC and Datacenter

Network Access

Access

PC Datacenter, Campus

VS

New Access:Hybrid IT

Secure Access

Visibility

Compliance

Authentication

Access ControlDatacenter,

Cloud, SaaS, CampusBYOD

How we connect is more complex

Page 4: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

All Major OSs

On-the-go

Home network

Untrusted LAN

Guest Wi-Fi

Corporate Network

• Enterprise applications

• VDI, terminal services

Datacenter

Cloud SaaS• Apps

Cloud IaaS• AWS, Azure

Mobile Apps• Apps

MobilityHybrid IT,

Cloudification

VDI

Datacenter Consolidati

on

The new reality and challenges of Hybrid IT

MAM/MDM

VPN

Mobile GW

Web GW

Cloud Security GW

NAC

Page 5: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

2FA/MFAAuthenticatio

n

Identity Federation

Contextual Access Control

Device Compliance

Data Protection

Secure Data Center Access

Secure Cloud Access

Visibility

Puzzle pieces needed for secure access

Page 6: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Secure Access Architecture

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud

Data Center

Employees

Guests

Protected Resources

Page 7: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Secure the Endpoint

MDMRemote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud

Data Center

Employees

Guests

Securing the endpoint

• Native app single sign-on• Transparent strong

authentication• Device compliance check• Conditional Access Policies• Improved user experience• Integration with mobility

management

Protected Resources

Page 8: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Secure Mobile and Cloud

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud

Data Center

Employees

Guests

Mobile and Cloud access

• Easy BYOD on/off-boarding for laptops, smartphones and tablets

• Contextual Access control• Compliance policy for access• Identity tied back to the

enterprise• Device & Identity tie

Protected Resources

Page 9: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Secure Access Architecture

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud

Data Center

Employees

Guests

Network and Datacenter access

• Device compliance check• Conditional Access Policies• Enforcement points throughout

the network• Guest user access

Protected Resources

Page 10: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Visibility

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud

Data Center

Employees

Guests

Visibility into the network

• Understand compliance• Understand the what, who,

when, how• Understand contractors and

third party access• Understand devices hitting

the network and the risk they may cause

Protected Resources

Page 11: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

SummaryAccess is evolving Hybrid ITIs/has changed the way we secure data. Hybridity is

important.

Endpoint Becomes important in solving the access problems

introduced with Hybrid IT

Identity and DeviceWhilst strong identity and auth is important tying in

device and its compliance is now key

VisibilityUnderstanding what is going on in your network (inc

cloud) is vital

Page 12: Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44

Solving Access for Hybrid IT

Questions?Secure Access For the Next Generation