Description: Frank Andrus, CTO of Bradford Networks, will describe the Top 5 Network Security Threats for 2011, and provide advice for securing your network against them.
Top 5 Network Security Threats for 2011 — Presentation Transcript
1. Top 5 Network Security Threats for 2011 Adaptive Network Security Webinar Series January 13, 2011
2. Speakers Frank Andrus CTO Bradford Networks John Sheedy Technical Marketing Manager Bradford Networks
3. Agenda Top 5 Network Security Threats What It All Means for Your Security Strategy Adaptive Network Security Bradford Network Sentry Q&A
4. Poll Question #1 How confident are you that you know WHO and WHAT is connected to your network at all times? Absolutely confident Fairly confident Not at all confident
5. Top Network Security Threats
6. Managed Users Employees, Staff Managed and unmanaged devices Managed: company-owned laptop Unmanaged: personal laptop, smartphone Unmanaged Users Guests / Visitors Contractors / Consultants Business Partners Almost exclusively unmanaged devices 1. More Users, Managed and Unmanaged Manager Accountant Engineer Consultant Contractor Partner Visitor
7. 2. Mobile Device Proliferation Mobile Devices Everywhere! Laptops Smartphones Tablets eBook Readers More to come…. Mobile Threats a Top Concern for 2011 - SecurityWeek News on Nov 22, 2010 “ Threats targeting the fast growing smartphone and tablet markets top the list of cyber concerns in 2011”
8. 3. “IP Everything” Exponential Growth in IP Devices Surveillance cameras, card readers Wide variety of IP-enabled devices supporting the business Trend Will Continue in 2011+ More and more devices will be added Manufacturing Retail Healthcare Some unique things we’ve seen… Automatic window blinds Clothes washers/dryers (college dorms) Vending machines Milking machines (yes, to milk cows!) Facilities The Business What’s On Your Network?
9. 4. “Consumerization of IT” Gartner Group Predicts that by 2014, 90 percent of organizations will support corporate applications on personal devices http://www.gartner.com/it/page.jsp?id=1480514 Identified consumerization of IT as a major threat to enterprise security from 2007 and beyond http://www.gartner.com/it/page.jsp?id=507423 Most agree it is a “double-edged sword” More convenience & productivity for users; but with security risks Ignore Consumerization of IT at your own Peril - itbusinessedge.com on Jun 30, 2010 “ There’s no doubt that the consumerization of IT will have a profound impact on enterprise IT, especially when it comes to security
10. 5. Virtualization Server Virtualization Growing trend toward centralizing IT services in “private cloud” Not necessarily more or less secure than traditional server farms, just another ‘variable’ to manage and consider in terms of security Virtual Desktops Multiple OS instances per endpoint, different threats per instance Similar “device proliferation” challenges discussed previously But now with multiple virtual devices on one physical device Security Must Evolve as Organizations Move Beyond Virtualization to Private Cloud Infrastructures - Gartner Newsroom Nov 8, 2010
11. What It All Means For Your Security Strategy More Security Challenges as Trends Continue More internal and external users More devices of many different types Limited (if any) enterprise control over what is on those devices Traditional Defenses Are Not Enough Firewalls, IDS/IPS, etc. are needed, but are not enough Security Strategies Must Evolve … Something needs to be the “glue” that holds all network security technology investments together
12. Adaptive Network Security (ANS)
13. Multiple disparate security silos Security feature built into Network infrastructure Endpoint security (e.g. AV/AS) "Security Silos" Dominate Today's Networks
14. Multiple disparate security silos NAC Reduces Some of the Silos Most NAC solutions only validate user Identity and security posture of PCs
15. Adaptive Network Security Adaptive Network Security integrates with and leverages the entire network environment
16. Phased Implementation Monitor Enforce Notify Baseline Identify
17. Poll Question #2 How important is it for you to have complete visibility of every user and device connected to your network? Critical Fairly important Not important at all
18. Customer Use Cases with Bradford’s Network Sentry TM
19. Bradford’s Network Sentry Family Adaptive Network Security Platform Comprehensive Visibility and Control Integration, Correlation, Automation FOUNDATION Network Sentry Foundation SOLUTIONS Access Manager Guest Manager Shared Access Tracker Device Tracker EXTENSIONS Endpoint Compliance Device Profiler Integration Suite
20. A Large Commercial Real Estate Firm Challenges ‘ Smart Building’ initiative introduces new devices onto network E.g., window blinds are on the network and automatically controlled New devices pose security and management challenges for IT Solution Network Sentry Foundation, Access Manager, Device Tracker, Endpoint Compliance, Device Profiler, Integration Suite Benefits Automatic discovery and profiling of endpoint devices on network Secured the network to allow only known/authorized devices on Automated the process of network access and provisioning
21. A Global Manufacturer of Cleaning Products Challenges Allows employees to bring their own computing devices to work (Great example of ‘Consumerization of IT’) Solution Network Sentry Foundation, Access Manager, Device Tracker, Endpoint Compliance, Device Profiler, Integration Suite Benefits Gained visibility of all devices connecting to network Now able to validate identity of all devices and users Now able to validate compliance with endpoint security policies Automated the whole process
22. A College Challenges Lacked tracking and accountability for guest access Lacked ability to enforce anti-virus protection on guest machines Needed to simplify guest management and offload work from IT Solution Network Sentry with Guest Manager, Endpoint Compliance Benefits Implemented a secure and easy-to-use guest management solution Empowered all faculty members as ‘sponsors’ for guests Removed day-to-day burden of managing guest access
23. Wrap Up
24. Additional Information Complimentary Whitepaper The Emergence of Adaptive Network Security Learn how Adaptive Network Security helps you address emerging security threats All webinar participants will receive a follow-up email to download the whitepaper Product & Solution Literature http://www.bradfordnetworks.com/adaptive_network_security http://www.bradfordnetworks.com/network_sentry_family Case Studies http://www.bradfordnetworks.com/case_studies
25. Q&A
26. Thank You
for slides and presentation visit
http://www.slideshare.net/BradfordNetworks/top-5-network-security-threats-for-2011
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
I had never thought, "Managed Users Employees, Staff Managed and unmanaged devices Managed" will be a security threat .
for me all stuffs of this video is new.
thanks