secure access: the world of - home | bkm · –mfa, single sign-on via saml, totp (google auth)...

19
Secure Access: The world of Bram De Blander | SE North Region | Pulse Secure

Upload: others

Post on 02-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Secure Access: The world of

Bram De Blander | SE North Region | Pulse Secure

Page 2: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Old World: PC and Datacenter

New World: Hybrid IT

VS

Secure Access

“Off-premise” “Anywhere”

Remote Access

Evolved…

Page 3: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

BYOD is here for 85% Cloud is an option for 55% IOT is coming for 40%

Dialing Up IT Transformation

IDG Research Services Gartner Gartner

Page 4: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Customers

Partners

Internet Café

Tablets & Smart Phones

Remote Users

WiFi Users

Office UsersConference Rooms

Visitors

Unmanaged Devices

Managed Devices

Corporate Data

The need for Secure AccessOff-premise

On-premise

Climate ControlIoT

Connected TrucksIoT

SaaS

Corporate Data

Page 5: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

?I N S I D E T H E N E T W O R K

TrustedO U T S I D E T H E N E T W O R K

Untrusted

! ! ! !Trust

Page 6: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Inside

Outside

”Outside-Out”

User/Devices/Things“Inside-In”

Resources

“Inside-Out”

Resources

User/Devices/Things”Outside-In”

Outside-In = Remote AccessInside-In = Network SecurityInside-Out = Firewall? Outside-Out = Cloud Security?

VisibilityEnforcementUnified PoliciesEco system

- Fortinet- Palo Alto Networks- Checkpoint- Juniper

Silos!User Experience! Trust

Secure Access Reality in customer networks

A: AuthenticationC: CompliancyR: Role Based Access

Page 7: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Zero Trust Protection Mechanisms§ User Verification

– MFA, Single sign-on via SAML, TOTP (Google Auth)

– Streamline logins & user experience (Office 365)

§ Endpoint Assessments (before & during connection)

– Prevent rooted, jailbroken devices connecting– Quarantine, grant, deny access via device policy

§ Access Control & Data protection– Always-on, on-demand secure connection– Policy-based split tunneling for corp data– Provision, configure, wipe mobile devices

PolicyEnforcement

Page 8: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Secure Access Portfolio

Pulse Connect Secure

VPN, EndpointCompliance

Pulse One

Centralized Management

Pulse Policy Secure

Visibility, NAC

Pulse Workspace

Mobile Device Access & Compliance

Pulse vADC

Application Delivery Control

Page 9: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

User/Devices/Things Resources

User/Devices/Things

”Outside-Out”

“Inside-In”

“Inside-Out”

”Outside-In”

• Evolution – Not Revolution!

• Pulse Secure Solution offers a smooth migration path.

• Existing services can be migrated over time in the pace that suits customers.

Secure Access When ‘Inside’ becomes ‘outside’

Page 10: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Authenticate everything before access

Zero Trust Model

No “inside” or “outside” distinction

Trust established closest to resource

Policy based access (identity & device configuration)

SDP Architecture - Benefits

Simplified User Experience

Centralized Orchestration

Dark/Black Network

1

2

3

Page 11: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

How Pulse Secure’s SDP Helps

§ SDP requires authenticate first, connect second– Establishes trust before the connection is made– Central authority (“Controller”)

§ Bakes access policy into connection– Granular access levels (“micro-segmentation”)– Applies device compliance checks same time

§ Offers per-application connectivity options– By user, device, reputation, privileged access…

Page 12: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

SDP Client

Universal Pulse Client

SDP Controller

Pulse One

Control Plane

Data Plane

SDP Gateway

Pulse Policy Secure

Local / Branch Network

Public Cloud & SaaS

SDP Gateway

Pulse Connect SecurePulse vADC

Private Cloud/Data Center

SDP Gateway

Pulse Connect Secure

Pulse Secure SDP Evolution

Page 13: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Pulse Suites: Essentials Edition

User

App

PulseConnect Secure

REMOTE ACCESS

Page 14: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Pulse Suites: Advanced Edition

User

Pulse Workspace

App

PulseConnect Secure

REMOTE ACCESS

CLOUD ACCESS

MOBILE ACCESS

Page 15: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

Pulse Suites: Enterprise Edition

User

Pulse Workspace

App

PulseConnect Secure

REMOTE ACCESS

CLOUD ACCESS

PulsePolicy Secure

NETWORK ACCESS

MOBILE ACCESS

Page 16: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

User

Consumer

App

Pulse Suites: Secure Access Platform

MOBILE ACCESS

APP ACCESS

REMOTE ACCESS

CLOUD ACCESS

NETWORK ACCESS

Pulse Workspace

Pulse vADC

PulseConnect Secure

PulsePolicy Secure

-

SDP Gateway

SDP Gateway

SDP Gateway

SDP Gateway

SDP Client

Page 17: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

11/12/19

Why Pulse Secure?

§ Best of both worlds• Offer comprehensive Zero Trust today• SDP when you’re ready

§ Leading Secure Access vendor• Unified client for secure, streamlined access• Extensive authentication and device compliance• Centralized, unified policy enforcement &

management

§ Built for Hybrid IT: mobile, data center, cloud

Page 18: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before

ZTNA overview Gartner à https://www.gartner.com/doc/reprints?id=1-6ICK295&ct=190410&st=sb

Page 19: Secure Access: The world of - HOME | BKM · –MFA, Single sign-on via SAML, TOTP (Google Auth) –Streamline logins & user experience (Office 365) §Endpoint Assessments (before