solving access for hybrid it

12
Solving access for Hybrid IT Jeff Green SVP Products Solving Access for Hybrid IT

Upload: jeff-green

Post on 16-Jan-2017

40 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Solving access for Hybrid IT

SolvingaccessforHybridITJeffGreenSVPProducts

Solving Access for Hybrid IT

Page 2: Solving access for Hybrid IT

Securing access is a challenge

Solving Access for Hybrid IT

97%ENTERPRISES SUFFERED A

BREACH

134BEFORE BREACHES WERE

DISCOVERED

DAYS

Gigamon 2015

1%

2010

55%

2015

PCMobile

How we are connecting2011

2015

Hacking 38% (up 8%)

Employee Negligence

15% (doubled)

Insider Theft10%

Physical Theft10%

Subcontractors9%

Primary sources of breaches

Accidental Exposure

13%

Data on the Move7%

Page 3: Solving access for Hybrid IT

Old NAC:PC and Datacenter

Network Access

Access

PC Datacenter, Campus

VSNew Access:

Hybrid IT

Secure Access

Visibility

Compliance

Authentication

Access Control

Datacenter,Cloud, SaaS, Campus

BYOD

Solving Access for Hybrid IT

How we connect is more complex

Page 4: Solving access for Hybrid IT

All Major OSs

On-the-go

Home network

Untrusted LAN

Guest Wi-Fi

Corporate Network

• Enterprise applications

• VDI, terminal services

Datacenter

Cloud SaaS

• Apps

Cloud IaaS

• AWS, Azure

Mobile Apps

• Apps

Mobility Hybrid IT, Cloudification

VDI

Datacenter Consolidation

The new reality and challenges of Hybrid IT

Solving Access for Hybrid IT

MAM/MDM

VPN

Mobile GW

Web GW

Cloud Security GW

NAC

Page 5: Solving access for Hybrid IT

2FA/MFAAuthentication

Identity Federation

Contextual Access Control

Device Compliance

Data Protection

Secure Data Center Access

Secure Cloud Access

Visibility

Puzzle pieces needed for secure access

Page 6: Solving access for Hybrid IT

Secure Access Architecture

Solving Access for Hybrid IT

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud Data Center

Employees

Guests

Protected Resources

Page 7: Solving access for Hybrid IT

Secure the Endpoint

Solving Access for Hybrid IT

MDMRemote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud Data Center

Employees

Guests

Securing the endpoint

• Native app single sign-on

• Transparent strong authentication

• Device compliance check

• Contextual Access Policies

• Improved user experience

• Integration with mobility management

Protected Resources

Page 8: Solving access for Hybrid IT

Secure Mobile and Cloud

Solving Access for Hybrid IT

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud Data Center

Employees

Guests

Mobile and Cloud access

• Easy BYOD on/off-boarding for laptops, smartphones and tablets

• Contextual Access control

• Compliance policy for access

• Identity tied back to the enterprise

• Device & Identity tie

Protected Resources

Page 9: Solving access for Hybrid IT

Secure Access Architecture

Solving Access for Hybrid IT

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud Data Center

Employees

Guests

Network and Datacenter access

• Device compliance check

• Contextual Access Policies

• Enforcement points throughout the network

• Guest user access

Protected Resources

Page 10: Solving access for Hybrid IT

Visibility

Solving Access for Hybrid IT

Remote &Mobile users

Protected Resources

Firewall Switch Wireless LAN

Remote AccessCloud Access

Network AccessDatacenter

Access

Single Management Console

CampusSaaS/Cloud Data Center

Employees

Guests

Visibility into the network

• Understand compliance

• Understand the what, who, when, how

• Understand contractors and third party access

• Understand devices hitting the network and the risk they may cause

Protected Resources

Page 11: Solving access for Hybrid IT

Summary

Solving Access for Hybrid IT

Access is evolving

Hybrid IT

Is/has changed the way we secure data. Hybridity is important.

Endpoint

Becomes important in solving the access problems introduced with Hybrid IT

Identity and Device

Whilst strong identity and auth is important tying in device and its compliance is now key

Visibility

Understanding what is going on in your network (inc cloud) is vital

Page 12: Solving access for Hybrid IT

Questions?Secure Access For the Next Generation

Solving Access for Hybrid IT