Вы находитесь на странице: 1из 26

Enabling Inside-Out Network Security

BYOD and Your Business

Learn about the BYOD trend, the risks associated with this trend, and how to successfully adopt BYOD while securing your network.

Agenda
Enabling Inside-Out Network Security

The rise of BYOD Security risks associated with BYOD A BYOD strategy NetClaritys Internal Security Solution

The Rise of BYOD


Enabling Inside-Out Network Security

Gartner projects a 9-40% savings using employee PCs


1 in 10 use personal computers for primary work device today 50% use personal computers for work at some time 43% of companies have a written policy, with specific rules

BYOD: A fast-growing Dilemma


Enabling Inside-Out Network Security

The challenge: seamless and secure management of ALL devices


Personal AND Professional Wired AND Wireless ANY operating system

By 2016 at least 50% of enterprise email users will rely primarily on a browser, tablet or mobile client instead of a desktop client. Gartner - AND Today, 80% of attacks occur inside the network - SANS

The Security dilemma of BYOD


Enabling Inside-Out Network Security

1. People 2. Processes 3. Policy 4. Technology

Breach Statistics
Enabling Inside-Out Network Security

174 million compromised records last year

and their firewall didnt stop them!


Verizon 2012 Data Breach Investigations Report

Enabling Inside-Out Network Security

And you thought a firewall was all you needed?

BYOD: How is security breached?


Enabling Inside-Out Network Security

1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. Data gets transferred to a hacker without you even knowing it!

Data

Whats the real internal security problem?


Enabling Inside-Out Network Security

All Networks and IP Devices have Holes that are known as:

Common Vulnerabilities and Exposures (CVE)

https://nvd.nist.gov/

BYOD Risk: New Malware Outbreaks


Enabling Inside-Out Network Security

Your favorite anti-virus program catches no more than 70-90% of malware! Whats running on everyones personal device? Who knows?

BYOD Risk: New Malware Outbreaks


Enabling Inside-Out Network Security

Here's a video of my Droid cell phone that was hacked after I loaded the new "Mobile Skype" program. It's as if the phone has been possessed. Had to get a new cell.
http://www.youtube.com/watch?v=mpZgw5Db2ok

Noticed this crazy messaging happening on my iPad2 earlier this evening. You can see that there are messages being sent (blue background) and the keypad is not being used at the time. Secondly, I don't have a Romanian number or contact. Thirdly, I don't speak Romanian.

Weird I tells ye! and it's still messaging back and forth as I type here.
http://www.youtube.com/watch?v=wa9H-8Q1FeA

BYOD Risk: CVEs (iPhone sample)


Enabling Inside-Out Network Security

The current value of credit cards on the black market Look, you can even buy in bulk!

See: http://nvd.nist.gov

BYOD Risk: Lost or Stolen?


Enabling Inside-Out Network Security

More than a third of consumers have had cell phones lost or stolen

BYOD Risks: Control and Compliance


Enabling Inside-Out Network Security

Behind every firewall, you need to manage BYOD.

The businesses in each of these vertical markets are all very different, but they are all faced with similar challenges:

Ensuring Business Continuity. Controlling Network Access. Ensuring Regulatory Compliance.

BYOD Strategy
Enabling Inside-Out Network Security

People Awareness, training, culture

Process Assessments, real-time monitoring, onboarding/departing employees, quarantining devices Policy Acceptable use, email security, access control, password policy, patch mgmt., incident response, business continuity Technology NAC, MDM, firewalls, A/V, IPS/WIPS, etc.

Multi-faceted Internal Security


Enabling Inside-Out Network Security

IPS/IDS

Firewall

End Point Protection

Asset Management and Access Control. Vulnerability management, compliance reporting and Auditing Zero-Day Defense

Internal Security

Internal UTM: Critical technology


Enabling Inside-Out Network Security

Remember, while firewalls protect networks from the outside-in, over 80% of successful attacks come from the inside. There is a major need for internal UTM to secure networks from the inside-out.

Inside-Out Network Security Appliances


Enabling Inside-Out Network Security

Scalable from 25 devices to thousands


Immediately control access by any and all types of devices if you dont want them on the network, they dont get on the network. Identify network holes (CVEs) on the inside of your network and guide proactive remediation process
Defend against malware through automated detection and blocking

Enabling Inside-Out Network Security

Enabling Inside-Out Network Security

Enabling Inside-Out Network Security

How NetClarity stops a breach


Enabling Inside-Out Network Security

1. Accidentally download malware onto your device. 2. Bring that device into work and bypass the firewall. 3. A Trojan gets onto the network. 4. NetClarity quarantines the device that has a Trojan installs 5. NetClarity stops the hacker from receiving the data he was hoping to obtain!

Data

The BYOD NACwall Appliance Awards


Enabling Inside-Out Network Security

NetClarity Picks Up Where Firewalls, Anti-virus, Intrusion Detection Systems and Intrusion Prevention Systems Leave Off

John Gallant, President, Network World


The only Next Gen. NAC solution to be integrated with RSA enVision for enterprise-wide internal risk management
Apurva More, RSA Secured Program Manager

The Most Innovative NAC Vendor in the World


Network Products Guide, Hot Companies, 2009, 2010, 2011

Next Generation NAC, Manages BYOD!


Enabling Inside-Out Network Security

When evaluating NAC solutions, look for vendors that understand the consumerization trend and support, or have plans to support, policies for
managing the non-Microsoft endpoints that will inevitably attempt to connect to your network.

Convenient to install Universal in application All devices, OS, wired/wireless


Gartner NAC Report, 12/2010

In Summary: Managing BYOD


Enabling Inside-Out Network Security

1. Personal devices are pervasive but the BYOD trend isnt going anywhere.

2. They add a new level of risk management to the organization.


3. There are technologies to mitigate the risk, like NetClaritys NACwalls!

Questions?
Enabling Inside-Out Network Security

www.netclarity.net

Вам также может понравиться