家中等职业教育改革发展示范学校bagx.pptx
《家中等职业教育改革发展示范学校bagx.pptx》由会员分享,可在线阅读,更多相关《家中等职业教育改革发展示范学校bagx.pptx(45页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Risk Management using Network Access Control and Endpoint Control for the EnterpriseKurtis E.Minder Mirage Networksi2-CONFIDENTIAL-AgendaDrivers of NACKey Elements of NAC SolutionsIdentifyAssessMonitorMitigateNAC Landscape3-CONFIDENTIAL-Business Needs Drive Security Adoption3 Ubiquitous Security tec
2、hnologiesAnti-virus-Business driver:File sharingFirewalls-Business driver:Interconnecting networks(i.e.Internet)VPNs-Business driver:Remote connectivityTodays top security driver-Mobile PCs and devicesBroadband access is everywhereIncreased percentage of the time devices spend on unprotected network
3、sPerimeter security is rendered less effective because mobile devices bypass it and arent protected by itMobility of IP devices is driving the need for Network Access Control solutionsLeading source of network infectionsMore unmanaged devices on the network than ever-guest and personal devices4-CONF
4、IDENTIAL-The Traditional Approach to Network Security Isnt Enough5-CONFIDENTIAL-The Problem NAC Should AddressToday,endpoint devices represent the greatest risk to network security by propagating threats or being vulnerable to them.Infected DevicesUnknown DevicesOut-of-Policy Devicespropagate threat
5、s,resulting in loss of productivity&hours of cleanuplike home PCs,contractor PCs,&WiFi phones can introduce new threats or compromise data securityare more vulnerable to malware attacks,while running services that could jeopardize security“Because of worms and other threats,you can no longer leave y
6、our networks open to unscreened devices and users.By year-end 2007,80 percent of enterprises will have implemented network access control policies and procedures.”Gartner,Protect Your Resources With a Network Access Control Process6-CONFIDENTIAL-The Cost1 mi2g Intelligence Unit,Malware Damage in 200
7、42 ICSA Labs,9th Annual Computer Virus Prevalence Survey7-CONFIDENTIAL-The Numbers Tell the Story“Protection”is in place98%use firewalls197%of companies protect machines with antivirus software 1 79%use anti-spyware 1 61%use email monitoring software 1 But its not enough!Cost of malware:$14.2B 280%o
8、f companies experienced 1 or more successful attacks,30%had more than 10 3Average net loss for malware incidents in US companies is nearly$168,000 per year1Worldwide,32%of companies experience attacks involving business partners43%of those were infections,while 27%were unauthorized access475%of ente
9、rprises will be infected with malware that evaded traditional defenses5 1 Computer Security Institute/FBIs 2006 Computer Crime and Security Survey2 Computer Economics,20063 ICSA Labs,9th Annual Computer Virus Prevalence Survey4 Cybertrust,Risky Business,September 20065 Gartner,Gartners Top Predictio
10、ns for IT Organizations and Users,2007&Beyond,December 20068-CONFIDENTIAL-The Problem is Expected to Get Worse2006 StatisticsSteep increase in the number of software security vulnerabilities discovered by researchers and actively exploited by criminals Microsoft Corp issued fixes for 97(versus 37 in
11、 2005)security holes assigned critical label14 of of the critical became zero day threats.Experts worry that businesses will be slow to switch to Vista.Pre-Vista MS Office is expected to remain in widespread use for the next 5-10 years.Source:Washington Post,Dec 2006,Cyber Crime Hits the Big Time in
12、 20069-CONFIDENTIAL-NAC Market ExpectationsNAC Appliance vendors will sell$660m worldwide in 2008NAC Appliances will gain 17%worldwide share of the NAC market by 2008,up from 6%in 2005Research reveals World Network Access Control(NAC)Products and Architectures Markets earned revenues of over$85 mill
13、ion in 2006 and estimates this to reach over$600 million in 2013Gartner estimates that the NAC market was$100M in 2006 and will grow by over 100%by YE 200710-CONFIDENTIAL-Increasing Number of Targets to ProtectOperating SystemsInternet ExplorerWindows LibrariesMicrosoft OfficeWindows ServicesWindows
14、 Configuration WeaknessesMac OSXLinux Configuration WeaknessesNetwork DevicesVoIP Phones&ServersNetwork&Other Devices Common Configuration Weaknesses*SANS Institute Top 20 Internet Security Attack Targets(2006 Annual Update),v7.0,11.15.06Cross Platform ApplicationsWeb ApplicationsDatabase SoftwareP2
15、P File Sharing ApplicationsInstant MessagingMedia PlayersDNS ServersBackup SoftwareSecurity,Enterprise,and Directory Management ServersSecurity Policy&PersonnelExcessive User Rights&Unauthorized DevicesUsers(Phishing/Spear Phishing)Sans Institute 2006 Top Attack Targets*11-CONFIDENTIAL-Pre-admission
16、(at network connect),30%Post-admission(continuous monitoring),7%Both,60%Dont know,3%What Class of NAC Solutions to Deploy?Aberdeen Research,200612-CONFIDENTIAL-%of Respondents00.20.40.60.8Meet regulatory requirementsReduce IT operations costImprove endpoint visibilityAutomate remediation of policy/c
17、onfiguration violationsReduce time required to recover from malware outbreakImprove network uptimeEnforce security policy complianceEnforce endpoint software configurationsControl network access for staff,partners and contractorsReduce incidents of malware propagation11%12%12%17%22%24%41%42%53%59%Al
18、l RespondentsTop Drivers Influencing NAC SolutionsAberdeen Research,200613-CONFIDENTIAL-Top Features Required in a NAC Solution%of Respondents00.10.20.30.4Visibility to endpoint configurationsThreat propagation detection/IDSScalability/fault toleranceReportingVisibility to endpoint threatsRedirectio
19、n of users to remediation resourcesEndpoint configuration posture check(on admission)Ease of deploymentEndpoint configuration posture check(continuous/ongoing)Network infrastructure independentEase of managementPrevent infection of your endpoints by remote control,spyware and botsIdentity-based cont
20、rolIntegration with current network infrastructureDay zero malware control6%7%11%12%14%14%16%17%19%23%24%28%30%34%37%All RespondentsAberdeen Research,200614-CONFIDENTIAL-Key Elements of NAC SolutionsCommon NAC ElementsNAC is an evolving space with evolving capabilitiesNAC solution elements-some or a
21、llIdentify-Detect&authenticate new devicesAssess-Endpoint integrity checks to determine levels of risk and adherence to security policyMonitor-Watch the devices activity for change of assessed state with respect to policy and threat statusMitigate-Take appropriate action upon any device that is iden
22、tified as a security risk by previous three elements 16-CONFIDENTIAL-Identify-Find/Authenticate New DevicesQuestion-How do you know when a new device comes on the network?Is it a known or unknown device?Is it an authenticated user?Common approachesLeverage 802.1x or network infrastructure OSAuthenti
23、cate through existing EAP infrastructure to pass credentials to authentication serverSpecial purpose DHCP serverAuthentication usually web based and tied to authentication serverAuthentication proxyNAC solution serves as a proxy between device and authentication serverInline security appliances(i.e.
24、security switches)Serve as a proxy between device and authentication serverReal time network awarenessAuthentication usually web based and tied to authentication serverAll approaches trigger off entry on the network by a new IP device17-CONFIDENTIAL-Identify-Pros&Cons of Various Approaches802.1x app
25、roachPros:Device detected and authenticated prior to IP address assignmentCons:Often is a costly and time consuming installationRequires switch upgrade/reconfigurationEndpoints must be 802.1x enabled-requires supplicant softwareMust create guest/remediation VLANsDHCP approachPros:Easier to deploy,in
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 家中 职业教育 改革 发展 示范 学校 bagx
限制150内