solving access for hybrid it
TRANSCRIPT
SolvingaccessforHybridITJeffGreenSVPProducts
Solving Access for Hybrid IT
Securing access is a challenge
Solving Access for Hybrid IT
97%ENTERPRISES SUFFERED A
BREACH
134BEFORE BREACHES WERE
DISCOVERED
DAYS
Gigamon 2015
1%
2010
55%
2015
PCMobile
How we are connecting2011
2015
Hacking 38% (up 8%)
Employee Negligence
15% (doubled)
Insider Theft10%
Physical Theft10%
Subcontractors9%
Primary sources of breaches
Accidental Exposure
13%
Data on the Move7%
Old NAC:PC and Datacenter
Network Access
Access
PC Datacenter, Campus
VSNew Access:
Hybrid IT
Secure Access
Visibility
Compliance
Authentication
Access Control
Datacenter,Cloud, SaaS, Campus
BYOD
Solving Access for Hybrid IT
How we connect is more complex
All Major OSs
On-the-go
Home network
Untrusted LAN
Guest Wi-Fi
Corporate Network
• Enterprise applications
• VDI, terminal services
Datacenter
Cloud SaaS
• Apps
Cloud IaaS
• AWS, Azure
Mobile Apps
• Apps
Mobility Hybrid IT, Cloudification
VDI
Datacenter Consolidation
The new reality and challenges of Hybrid IT
Solving Access for Hybrid IT
MAM/MDM
VPN
Mobile GW
Web GW
Cloud Security GW
NAC
2FA/MFAAuthentication
Identity Federation
Contextual Access Control
Device Compliance
Data Protection
Secure Data Center Access
Secure Cloud Access
Visibility
Puzzle pieces needed for secure access
Secure Access Architecture
Solving Access for Hybrid IT
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud Data Center
Employees
Guests
Protected Resources
Secure the Endpoint
Solving Access for Hybrid IT
MDMRemote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud Data Center
Employees
Guests
Securing the endpoint
• Native app single sign-on
• Transparent strong authentication
• Device compliance check
• Contextual Access Policies
• Improved user experience
• Integration with mobility management
Protected Resources
Secure Mobile and Cloud
Solving Access for Hybrid IT
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud Data Center
Employees
Guests
Mobile and Cloud access
• Easy BYOD on/off-boarding for laptops, smartphones and tablets
• Contextual Access control
• Compliance policy for access
• Identity tied back to the enterprise
• Device & Identity tie
Protected Resources
Secure Access Architecture
Solving Access for Hybrid IT
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud Data Center
Employees
Guests
Network and Datacenter access
• Device compliance check
• Contextual Access Policies
• Enforcement points throughout the network
• Guest user access
Protected Resources
Visibility
Solving Access for Hybrid IT
Remote &Mobile users
Protected Resources
Firewall Switch Wireless LAN
Remote AccessCloud Access
Network AccessDatacenter
Access
Single Management Console
CampusSaaS/Cloud Data Center
Employees
Guests
Visibility into the network
• Understand compliance
• Understand the what, who, when, how
• Understand contractors and third party access
• Understand devices hitting the network and the risk they may cause
Protected Resources
Summary
Solving Access for Hybrid IT
Access is evolving
Hybrid IT
Is/has changed the way we secure data. Hybridity is important.
Endpoint
Becomes important in solving the access problems introduced with Hybrid IT
Identity and Device
Whilst strong identity and auth is important tying in device and its compliance is now key
Visibility
Understanding what is going on in your network (inc cloud) is vital
Questions?Secure Access For the Next Generation
Solving Access for Hybrid IT