Produkt Update: Aruba 360 Secure Fabric ClearPass 6.7 neues Lizenzmodell & IntroSpect. Reinhard Lichte, Consulting Systems Engineer
|
|
- Abigail Lawson
- 5 years ago
- Views:
Transcription
1 Produkt Update: Aruba 360 Secure Fabric ClearPass 6.7 neues Lizenzmodell & IntroSpect Reinhard Lichte, Consulting Systems Engineer
2 ClearPass
3 What s New in ClearPass 6.7? New license methodology for AAA, Guest and Onboard. Endpoint profiling improvements Client support improvements for OnGuard Insight custom reporting and alerting options ClearPass Extensions and API enhancements Enhanced support for IPv6 Improved internalization support for Guest workflows 3
4 ClearPass 6.7
5 Challenges With Existing Licensing Difficult to count or explain license usage Customers feel we over license them (e.g. HW/VM + AAA) and lack granularity (500, 5K, 25K) Some competitors include Guest features in the base product Competitors position Onboard on a per-user basis versus per-device 5
6 What is Changing? Decouple AAA licensing from Hardware and Virtual Machine Appliances Creation of a new license type (Access) which includes 802.1X, MAC Auth, TACACS, Guest, OnConnect, Security Exchange and Endpoint Profiling Move to concurrent authenticated/authorized endpoint counting methodology for Access license with blocks as small as 100 Shift Onboard licensing from per device to per user counting 6
7 What is Going Away? Replacement of the Subscription ID for access to software downloads HPE Passport credentials will be used instead for authorization to ClearPass web services platform Will reduce customer issues due to mismatch of Subscription ID expiration date with support contract Elimination of 25K, 50K, 100K license bands Software still supports high volume license SKUs but are infrequently purchased so they are removed from the generally available pricelist to reduce SKU count. Elimination of High Capacity Guest Mode With the move to concurrent authenticated/authorized Access counting and the bundling of Guest into the Access license, this mode is no longer needed. Elimination of the Enterprise licensing offering With the bundling of Guest into the Access license, the Enterprise offering had limited value going forward to just cover Onboard and OnGuard. Migration will be available for existing customers. Elimination of 5 Year Subscription offering for OnGuard Aligns our offering with the 3 rd party we license technology from for use in OnGuard. 7
8 ClearPass 6.7 Licensing Subscription Or Perpetual OnGuard (Endpoint Health/Posture) Onboard (BYOD/CA) Sold as 100, 500, 1K, 2500, 5K, 10K Perpetual and 1/3/5* year Subscription based offerings Subscription Or Perpetual Access (802.1X, MAC-Auth, Guest, TACACS+, OnConnect, Endpoint Profiling & Security Exchange) Sold as 100, 500, 1K, 2500, 5K, 10K Perpetual and 1/3/5 year Subscription based offerings Perpetual VM Appliance / Hardware Appliances Sold as Small, Medium, Large Sizes (HW) Perpetual VM license * OnGuard will no longer be offered as a 5 year subscription 8
9 What is Concurrency? Method Session Begins Session Ends 802.1X RADIUS Accounting START RADIUS Accounting STOP MAC-Auth RADIUS Accounting START RADIUS Accounting STOP Guest (anonymous, self-reg, social, etc) RADIUS Accounting START RADIUS Accounting STOP VPN RADIUS Accounting START RADIUS Accounting STOP TACACS TACACS Accounting START TACACS Accounting STOP OnConnect MAC Learned (mac-notify or switch link-up) MAC Removed/Aged (mac-notify or switch link-down) Under the concurrency model, a user/device authenticating/authorizing on the network consumes an Access license during an active session. If the session end cannot be identified (e.g. no accounting), the license will be removed from the pool for a period of 24 hours from the time it was consumed. NOTE: Interim-accounting (more chatty) is NOT required to determine start/stop 9
10 Appliance Transition Existing Appliances (Short Descriptions) Aruba ClearPass 500 HW v2 Appliance Aruba ClearPass 5K DL20 HW Appliance Aruba ClearPass 25K DL360 HW Appliance Aruba ClearPass 500 Virtual App E-LTU Aruba ClearPass 5K Virtual App E-LTU Aruba ClearPass 25K Virtual App E-LTU Replacement Appliance (Short Descriptions) Aruba ClearPass C1000 S-1200 R4 HW Appl Aruba ClearPass C2000 DL20 Gen9 HW Appl Aruba ClearPass C3000 DL360 Gen9 HW Appl Aruba ClearPass Cx000V VM Appl E-LTU Performance numbers (Concurrency & Burst) will be available in a NEW Scaling & Ordering Guide. An ASE based sizing tool is under investigation to assist with ordering. Previous generation hardware will also map to the Cx000 numbering scheme upon upgrade. 10
11 Sample BoM #1 - University EXAMPLES Requirements Redundancy required 30,000 concurrent/active/connected devices (max at any given point in time) 100 are guests 8,000 total users (all of which will Onboard their devices, ~3 EAP-TLS devices) Dedicated reporting node due to size 6.7 Licenses 3 Cx000V (2 VMs used for AAA, 1 VM used for Insight)* 30,000 Access licenses 8,000 Onboard license 6.6 Licenses 3 CP-VA-25K (2 VMs used for AAA, 1 VM used for Insight)* Includes 75,000 Policy Manager licenses 100 Guest licenses 24,000 Onboard license * These are NOT hard coded functions like in Cisco ISE (personas). Any node can perform any function. 11
12 Sample BoM #2 - Corporate EXAMPLES Requirements Redundancy required (2 VMs) 10,000 concurrent/active/connected devices (max at any given point in time) 100 are guests 2,000 users will Onboard (~2 devices each) 100 active contractors who require posture assessment on their laptops Inbound events from other solutions 6.7 Licenses 3 Cx000V (2 VMs used for AAA, 1 VM used for IEE)* 10,000 Access licenses 2,000 Onboard licenses 100 OnGuard licenses 6.6 Licenses 3 CP-VA-5K (2 VMs used for AAA, 1 VM used for IEE)* Includes 15,000 Policy Manager licenses 100 Guest licenses 4,000 Onboard license 100 OnGuard licenses * These are NOT hard coded functions like in Cisco ISE (personas). Any node can perform any function. 12
13 Sample BoM #3 LPV: Airport EXAMPLES Requirements Redundancy required (2 HW) 30,000 concurrent/active/connected guest devices (max at any given point in time) 100,000 unique guest devices per day High Capacity Guest Mode (HCG) 6.7 Licenses 2 C ,000 access licenses 6.6 Licenses 2 CP-HW-25K Calculated as 100K Policy Manager license (HCG) 100,000 guest licenses 13
14 Conversion HOW IT WORKS During the upgrade, ClearPass will take the original Policy Manager license (500, 5K, 25K) and use it as a pre-activated, Platform Activation Key (PAK) ClearPass will also pre-install 6 month license keys for Access, Onboard and OnGuard MNP will be the first method to convert licenses Due to the complexity of Enterprise and Subscription-based licenses, the Support Welcome Center (TAC) will need to assist in converting them IN SUMMARY With the six month licensing buffer, customers do not need to worry about converting their licenses the day of upgrade. There is plenty of time to convert them without alarm. 14
15 Conversion Plan (cont.) HOW IT WORKS Existing customers will get a 1:1 license exchange Legacy ClearPass 25K (e.g. CP-VA-25K) = 25,000 Access Licenses Also includes one set of 25 licenses for each feature (Access, Onboard, OnGuard) Legacy ClearPass Guest 500 = 500 Access Licenses Legacy ClearPass Onboard 10K = 10K Onboard Licenses (new key) Legacy ClearPass OnGuard 5K = 5K OnGuard Licenses (new key) Legacy ClearPass Enterprise 100 = New xaccess/yonboard/zonguard Licenses in multiples of 25 For example, 25 Access + 50 Onboard + 25 OnGuard = 100 Enterprise license conversion is a one-time, one-time way process per license key Existing customers will continue to pay support on the original product purchased. 15
16 1 One year parts warranty and can be extended with a support contract. TechNote support.arubanetworks.com ClearPass 6.7 License Conversion TechNote SCALING & ORDERING GUIDE ClearPass Policy Manager INTRODUCTION ClearPass 6.7 introduces a new licensing methodology that aims to simplify ordering, offer customers an easier to understand model and ultimately provide more value and flexibility. This new methodology includes the following high-level changes: Ability to order appliances (hardware or virtual) independent of capacity licenses. Bundling of guest licensing into a new license type called Access. The Access license includes 802.1X, MAC Authentication, TACACS+, Guest, OnConnect, Security Exchange (previously ClearPass Exchange) and Endpoint Profiling functionality. Access licenses are consumed based upon concurrent authenticated/authorized endpoints. Onboard licenses are now consumed based upon the number of users and not per device. ClearPass 6.7 License Conversion APPLIANCE & APPLICATION LICENSE SKUS Appliances ClearPass appliances (hardware or virtual) are available for purchase using the following SKUs. Hardware specifications and scaling details are provided later in this document. Hardware Appliances 1 Part Number JZ508A JZ509A JZ510A Description Aruba ClearPass C1000 S-1200 R4 HW-Based Appliance Aruba ClearPass C2000 DL20 Gen9 HW-Based Appliance Aruba ClearPass C3000 DL360 Gen9 HW-Based Appliance Virtual Appliances 2 Part Number Description JZ399AAE Aruba ClearPass Cx000V VM-Based Appliance E-LTU 2 This single SKU is used to order a Virtual Appliance irrespective of model type, e.g. C1000V ClearPass Application Licenses ClearPass application licenses are available in three types, Access, Onboard and OnGuard. They are available as perpetual and subscription-based licenses ACCESS LICENSES The Access license is used to enable 802.1X, MAC Authentication, TACACS+, Guest, OnConnect, Security Exchange (previously ClearPass Exchange) and Endpoint Profiling. Access license consumption is based upon a concurrent session per-endpoint model. Security Exchange and Endpoint Profiling are enabled when any Access license is installed but not restricted to any ClearPass 6.7 License Conversion - TechNote
17 Introspect User and Entity Behavior
18 Aruba Security Portfolio Continuous Security Monitoring Niara Per user/device/iot Security Analytics for advanced threat detection ClearPass OnGuard Ecosystem Integration API Access Control Identity Wired/Wireless Infrastructure Per user/device/iot App aware firewall SDN Per user tunnel mode Via VPN ClearPass Policy Manager 802.1X / OnConnect Onboard BYOD CA Profiler Trusted Infrastructure Wired/Wireless Infrastructure Encryption Trusted Boot process Embedded TPM FIPS & Common Criteria 18
19 THE SECURITY GAP SECURITY SPEND DATA BREACHES 146 days median time from compromise to discovery PREVENTION & DETECTION (US $B) # BREACHES % DISCOVERED INTERNALLY SOURCES Mandiant M-Trends 2016, Verizon Data Breach Investigations 2016, IDC
20 THE PROBLEM + PREVENTION & DETECTION NOT ENOUGH INCREASINGLY POROUS MONITORING SYSTEMS FALLING SHORT CANNOT DETECT UNKNOWN THREATS AND UNABLE TO SCALE 20
21 Attacks involving legitimate credentials COMPROMISED 40 million credit cards were stolen from Target s severs STOLEN CREDENTIALS MALICIOUS Edward Snowden stole more than 1.7 million classified documents INTENDED TO LEAK INFORMATION NEGLIGENT Employees uploading sensitive information to personal Dropbox for easy access DATA LEAKAGE 21
22 TECHNOLOGY + MACHINE LEARNING CAN DETECT UNKNOWN THREATS BIG DATA CAN SCALE 22
23 SOLUTION - AT A GLANCE IDENTITY INFASTRUCTURE Consoles / Workflows SaaS laas CASB SIEM ANALYZER ENTITY360 ANALYTICS FORENSICS PACKET BROKER NETWORK TRAFFIC PACKETS FLOWS ALERTS DATA FUSION BIG DATA THREAT INTELLIGENCE 23
24 Basics of Behavioral Analytics MACHINE LEARNING UNSUPERVISED + SUPERVISED Behavioral Analytics BASELINES HISTORICAL + PEER GROUP 24
25 Behavior Many different dimensions Authentication AD logins Internal Resource Access Finance servers Remote Access VPN logins External Activity C&C, personal Behavioral Analytics SaaS Activity Office 365, Box Cloud IaaS AWS, Azure Exfiltration DLP, Physical Access badge logs 25
26 The Platform Behavioral Analytics 26
27 Customer Examples Ransomware Indicators UEBA C&C Communication DGA Detection e.g. iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.], xxlvbrloxvriy2c5[.]onion, sqjolphimrr7jqw6[.]onion, 76jdd2ir2embyv47[.]onion SMB based bot scanning Behavioral Analytics on baseline behavior of systems and detecting anomalous communication patterns Stateful Risk Score for Compromised System 27
28 Customer Examples Data Exfiltration Indicators UEBA Access to internal sensitive information Abnormal access to internal data Moving sensitive data offshore Abnormal USB writes Abnormal Uploads to Box, Dropbox High Risk Score for user Michele 28
29 Customer Examples Abnormal Privileged Insider Activity Indicators UEBA Privilege Escalation Escalation of privileges for user not entitled to admin role Abnormal Data access Excessive Service Ticket requests Abnormal data access patterns High Risk Score for user Bob 29
30 Typical Solution Deployment Native or SIEM AD Logs ANALYZER DNS Packet metadata DHCP VPN Firewall Web Proxy Packet metadata PACKET PROCESSOR PACKET PROCESSOR Packets Packets Server farm Campus Data Center Minimum set of recommended data sources AD, DNS, DHCP, VPN logs native or from SIEM Network Activity ingress / egress - packets or firewall or web proxy logs Network Activity high-value targets(file shares, collaboration servers, etc.) packets or firewall logs [Optional] NetFlow, Threat feeds, logs, FireEye alerts 30
31 Licensing LICENSED BY MONITORED OPTIONS FORM FACTORS USERS SERVERS/IOT 1 YEAR SUBSCRIPTION 3 YEAR SUBSCRIPTION SOFTWARE ONLY APPLIANCE 31
32 Solution - Analyzer Deployment Options 2RU Appliance Customer Hadoop Cluster 1RU Scale Out Public/Hybrid Cloud (AWS / Azure) 32
33 ClearPass + IntroSpect = Protection Wired/Wireless Device Authentication 1. Detect and Authorize ClearPass Policy Manager User/Device Context Actionable Alerts IntroSpect UEBA Entity360 Profile with Risk Scoring 2. Monitor and Alert 3. Decide and Act ClearPass Real-time Policy-based Actions Real-time quarantine, Re-authentication Bandwidth Control Blacklist 33
34 Notable Customer Wins F50 Financial CHALLENGE Monitoring privileged user activity Improve SOC efficiency INTROSPECT SOLUTION Behavioral analytics on AD, , VPN, network FireEye alert context for investigations Legal Concerned about IP theft Lacking user-level visibility and profiling Behavioral analytics User-level visibility High Tech Security analytics initiative to supplement existing SIEM and detection systems User Behavior Analytics Splunk integration F50 Insurance F50 High Tech Alert white noise and overwhelmed SOC Splunk not delivering value High Value asset protection DLP and DNS Analytics SOC efficiency through machine intelligence Behavioral analytics for insider activity to high value assets User activity association with key assets 34
35 Differentiation Comprehensive visibility Most extensive attack analytics Accelerated Investigations and Response Deployment ease Packets, flows, logs No blind spots 100+ supervised and unsupervised machine learning models Adaptive learning Extensible models (new use cases, data sources) Business context in risk score Integrated forensics Seamless ClearPass integration Flexible: on-premise or cloud Ingest data natively or from SIEM, log management, packet broker solutions Quick Start, Enterprise Scale Standard Edition tuned for Aruba networks Tens of data sources, hundreds of behavioral models across tens of thousands of users 35
36 IntroSpect Summary Diverse Data Sources Analytics FOR + Forensics SUPPORTING Attack Detection + Incident Investigation Self-Contained Solution ALL IN A + Open Platform AVAILABLE Streamlined for Aruba Networks + Scaled for Enterprise UEBA 36
37 Thank You
Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead
Intro to Niara no compromise behavioral analytics Tomas Muliuolis HPE Aruba Baltics Lead THE SECURITY GAP SECURITY SPEND DATA BREACHES 146 days median time from compromise to discovery PREVENTION & DETECTION
More informationUser and Entity Behavior Analytics
User and Entity Behavior Analytics Shankar Subramaniam Co-Founder, Niara Senior Director of Customer Solutions, HPE Aruba Introspect shasubra@hpe.com THE SECURITY GAP SECURITY SPEND DATA BREACHES 146 days
More informationQuickSpecs. Aruba IntroSpect User and Entity Behavior Analytics. Overview. Aruba IntroSpect User and Entity Behavior Analytics Product overview
Overview Product overview Aruba s User and Entity Behavior Analytics (UEBA) solution, Aruba IntroSpect, detects attacks by spotting small changes in behavior that are often indicative of attacks that have
More informationIntelligent Edge Protection
Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices
More informationClearPass Policy Manager
ClearPass Policy Manager INTRODUCTION ClearPass 6.7 introduces a new licensing methodology that aims to simplify ordering, offer customers an easier to understand model and ultimately provide more value
More informationClearPass Policy Manager
ClearPass Policy Manager INTRODUCTION ClearPass 6.7 introduces a new licensing methodology that aims to simplify ordering, offer customers an easier to understand model and ultimately provide more value
More informationSecure wired and wireless networks with smart access control
Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationMEETING ISO STANDARDS
WHITE PAPER MEETING ISO 27002 STANDARDS September 2018 SECURITY GUIDELINE COMPLIANCE Organizations have seen a rapid increase in malicious insider threats, sensitive data exfiltration, and other advanced
More informationARUBA 360 SECURE FABRIC
WHITE PAPER ARUBA 360 SECURE FABRIC A User-centric Approach to Network Security March 2018 Table of Contents Table of Contents Introduction...1 Challenges...1 The Aruba 360 Secure Fabric Approach...3 Solution
More informationCLEARPASS GUEST. A ClearPass Policy Manager Application DATA SHEET KEY FEATURES THE CLEARPASS ADVANTAGES
A ClearPass Policy Manager Application ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors, contractors, partners,
More informationVisibility, control and response
Visibility, control and response Protecting Clients and Unifying Policy Tomas Muliuolis Baltics Lead September 2018 Today s Escalating Customer Challenges Advanced attacks and unforeseen threats continue
More informationQuickSpecs. Aruba ClearPass Guest Software. Overview. Aruba ClearPass Guest Software A ClearPass Policy Manager Application.
Overview A ClearPass Policy Manager Application Product overview ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors,
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationRSA NetWitness Suite Respond in Minutes, Not Months
RSA NetWitness Suite Respond in Minutes, Not Months Overview One can hardly pick up a newspaper or turn on the news without hearing about the latest security breaches. The Verizon 2015 Data Breach Investigations
More informationNext-Gen CASB. Patrick Koh Bitglass
Next-Gen CASB Patrick Koh Bitglass pkoh@bitglass.com www.cloudsec.com WW Cloud Service Adoption https://www.gartner.com/newsroom/id/3815165 "As of 2016, approximately 17 percent of the total market revenue
More informationClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead
ClearPass Ecosystem Tomas Muliuolis HPE Aruba Baltics lead 2 Changes in the market create paradigm shifts 3 Today s New Behavior and Threats GenMobile Access from anywhere? BYOD Trusted or untrusted? Bad
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationHPE Aruba Focus Areas
HPE Aruba Focus Areas Security Tomas Muliuolis Baltics Country Lead THE PERFECT STORM: MOBILE, IoT and CLOUD Intelligent edge Connectivity Security Management Focus areas IoT Analytics Edge computing Mobile-first
More informationARUBA CLEARPASS POLICY MANAGER
ARUBA CLEARPASS POLICY MANAGER The most advanced Secure NAC platform available Aruba s ClearPass Policy Manager, part of the Aruba 360 Secure Fabric, provides role- and device-based secure network access
More informationQuickSpecs. Aruba ClearPass Policy Manager Platform. Overview. Aruba ClearPass Policy Manager Platform The most advanced Secure NAC platform available
Overview The most advanced Secure NAC platform available Product overview Aruba's ClearPass Policy Manager, part of the Aruba 360 Secure Fabric, provides role- and device-based secure network access control
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationCloudSOC and Security.cloud for Microsoft Office 365
Solution Brief CloudSOC and Email Security.cloud for Microsoft Office 365 DID YOU KNOW? Email is the #1 delivery mechanism for malware. 1 Over 40% of compliance related data in Office 365 is overexposed
More informationCisco Secure Access Control
Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security
More informationTHE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson
THE RSA NETWITNESS SUITE REINVENT YOUR SIEM Presented by: Walter Abeson 1 Reality Goals GOALS VERSUS REALITY OF SIEM 1.0 Single compliance & security interface Analyze & prioritize alerts across various
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationJoe Stocker, CISSP, MCITP, VTSP Patriot Consulting
Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationARUBA CLEARPASS NETWORK ACCESS CONTROL
Device Visibility, Control and Attack Response for the Enterprise Gartner is forecasting 70 billion connected devices by 2020. Laptops, smartphones, tablets and Internet of Things (IoT) devices are pouring
More informationMcAfee Skyhigh Security Cloud for Amazon Web Services
McAfee Skyhigh Security Cloud for Amazon Web Services McAfee Skyhigh Security Cloud for Amazon Web Services (AWS) is a comprehensive monitoring, auditing, and remediation solution for your AWS environment
More informationRUCKUS CLOUD WI-FI Cloud Managed Wi-Fi
TITLE GOES HERE SUB-TITLE GOES HERE RUCKUS CLOUD WI-FI Cloud Managed Wi-Fi SIMPLIFIED MANAGEMENT OF MULTI-SITE WI-FI NETWORKS Ruckus Cloud Wi-Fi simplifies deployment, monitoring and management of your
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationA. Post-Onboarding. the device wit be assigned the BYOQ-Provision firewall role in me Aruba Controller.
Volume: 98 Questions Question: 1 Based on the ClearPass and Aruba Controller configuration settings for On boarding shown, which statement accurate describes an employee's new personal device connecting
More informationAnalytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS
Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS Overview Cyberattacks are increasingly getting more frequent, more sophisticated and more widespread than ever
More informationSUB-TITLE WLAN Management-as-a-Service
TITLE RUCKUS GOES CLOUD HEREWI-FI SUB-TITLE GOES HERE CASE STUDY Ruckus Cloud Wi-Fi is. Wi-Fi coverage and capacity is provided by high-performance APs deployed on site; control and management are delivered
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationSOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM
RSA NETWITNESS EVOLVED SIEM OVERVIEW A SIEM is technology originally intended for compliance and log management. Later, as SIEMs became the aggregation points for security alerts, they began to be more
More informationThreat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ
Threat Containment and Operations Yong Kwang Kek, Director of Presales SE, APJ 2018-07-19 1 1 2017 Infoblox Inc. All Rights 2013 Infoblox Inc. All Reserved. Rights Reserved. Three Aspects of Security #1
More informationDriving more value from your Security Operations Center (SOC) Platform. James Hanlon Director, Splunk Security Markets Specialization, EMEA
Driving more value from your Security Operations Center (SOC) Platform James Hanlon Director, Splunk Security Markets Specialization, EMEA What is the value of the security operations in 2018? 2017 S P
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationSIEM Solutions from McAfee
SIEM Solutions from McAfee Monitor. Prioritize. Investigate. Respond. Today s security information and event management (SIEM) solutions need to be able to identify and defend against attacks within an
More informationTHE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM
THE SIX ESSENTIAL CAPABILITIES OF AN ANALYTICS-DRIVEN SIEM Modern threats demand analytics-driven security and continuous monitoring Legacy SIEMs are Stuck in the Past Finding a mechanism to collect, store
More informationThe Why, What, and How of Cisco Tetration
The Why, What, and How of Cisco Tetration Why Cisco Tetration? With the above trends as a backdrop, Cisco has seen specific changes within the multicloud data center. Infrastructure is changing. It is
More informationProduct Overview Version 1.0. May 2018 Silent Circle Silent Circle. All Rights Reserved
Product Overview Version 1.0 May 2018 Silent Circle The Problem Today s world is mobile. Employees use personal and company owned devices smartphones, laptops, tablets to access corporate data. Businesses
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationAutomated Threat Management - in Real Time. Vectra Networks
Automated Threat Management - in Real Time Security investment has traditionally been in two areas Prevention Phase Active Phase Clean-up Phase Initial Infection Key assets found in the wild $$$$ $$$ $$
More informationSecuring Office 365 with SecureCloud
Securing Office 365 with SecureCloud 1 Introduction Microsoft Office 365 has become incredibly popular because of the mobility and collaboration it enables. With Office 365, companies always have the latest
More informationACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee
ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back
More informationARUBA CLEARPASS POLICY MANAGER
ARUBA CLEARPASS POLICY MANAGER The most advanced access policy platform available Aruba s ClearPass Policy Manager provides role- and device-based network access control for employees, contractors and
More informationQuickSpecs. Aruba ClearPass OnGuard Software. Overview. Product overview. Key Features
Enterprise-class endpoint protection, posture assessments and health checks Product overview ClearPass OnGuard agents perform advanced endpoint posture assessments on leading computer operating systems
More informationSeceon s Open Threat Management software
Seceon s Open Threat Management software Seceon s Open Threat Management software (OTM), is a cyber-security advanced threat management platform that visualizes, detects, and eliminates threats in real
More informationThe Oracle Trust Fabric Securing the Cloud Journey
The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline
More informationMcAfee Skyhigh Security Cloud for Citrix ShareFile
McAfee Skyhigh Security Cloud for Citrix ShareFile McAfee Skyhigh Security Cloud for Citrix ShareFile helps organizations securely accelerate their business by providing industry-best Data Loss Prevention
More informationGo mobile. Stay in control.
Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget
More informationCyberArk Privileged Threat Analytics
CyberArk Privileged Threat Analytics Table of Contents The New Security Battleground: Inside Your Network 3 Privileged account security 3 Collect the right data 4 Detect critical threats 5 Alert on critical
More informationThe Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy
The Next Generation Security Platform Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy The Next Generation Enterprise Security Platform Core Value Proposition An Enterprise Security
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationPopular SIEM vs aisiem
Popular SIEM vs aisiem You cannot flip a page in any Cybersecurity magazine, or scroll through security blogging sites without a mention of Next Gen SIEM. You can understand why traditional SIEM vendors
More informationADC im Cloud - Zeitalter
ADC im Cloud - Zeitalter Applikationsdienste für Hybrid-Cloud- und Microservice-Szenarien Ralf Sydekum, SE Manager DACH, F5 Networks GmbH Some of the Public Cloud Related Questions You May Have.. It s
More informationDiscover threats quickly, remediate immediately, and mitigate the impact of malware and breaches
Discover threats quickly, remediate immediately, and mitigate the impact of malware and breaches Introduction No matter how hard you work to educate your employees about the constant and evolving threats
More informationPartner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014
Partner Webinar AnyConnect 4.0 Rene Straube Cisco Germany December 2014 Agenda Introduction to AnyConnect 4.0 New Licensing Scheme for AnyConnect 4.0 How to migrate to the new Licensing? Ordering & Migration
More informationCLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS
Open third party integration for endpoint controls, policy and threat prevention While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it s a major challenge to ensure
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationForeScout Extended Module for Splunk
Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look
More informationARUBA CLEARPASS NETWORK ACCESS CONTROL
Device Visibility, Control and Attack Response for the Enterprise Gartner is forecasting 70 billion connected devices by 2020. Laptops, smartphones, tablets and Internet of Things (IoT) devices are pouring
More informationIncident Response Agility: Leverage the Past and Present into the Future
SESSION ID: SPO1-W03 Incident Response Agility: Leverage the Past and Present into the Future Torry Campbell CTO, Endpoint and Management Technologies Intel Security The Reality we Face Reconnaissance
More informationIntroducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.
Introducing MVISION Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls Jon Parkes McAfee 1 All information provided here is subject to non-disclosure
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationMcAfee MVISION Cloud. Data Security for the Cloud Era
McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data
More informationSpeed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationChristopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud
Christopher Covert Principal Product Manager Enterprise Solutions Group Copyright 2016 Symantec Endpoint Protection Cloud THE PROMISE OF CLOUD COMPUTING We re all moving from challenges like these Large
More informationCisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1
Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,
More informationOne Hospital s Cybersecurity Journey
MAY 11 12, 2017 SAN FRANCISCO, CA One Hospital s Cybersecurity Journey SanFrancisco.HealthPrivacyForum.com #HITprivacy Introduction Senior Director Information Systems Technology, Children s Mercy Hospital
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationCisco Tetration Analytics
Cisco Tetration Analytics Enhanced security and operations with real time analytics John Joo Tetration Business Unit Cisco Systems Security Challenges in Modern Data Centers Securing applications has become
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationPrecisionAccess Trusted Access Control
Data Sheet PrecisionAccess Trusted Access Control Defeats Cyber Attacks Credential Theft: Integrated MFA defeats credential theft. Server Exploitation: Server isolation defeats server exploitation. Compromised
More informationImperva CounterBreach
Imperva CounterBreach DATASHEET Protect Your Data from Insider Threats The greatest threat to enterprise security is the people already on the payroll. To do their jobs, employees, contractors, consultants
More informationMcAfee Total Protection for Data Loss Prevention
McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure
More information85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges
Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats
More informationCisco ISE Features Cisco ISE Features
Cisco ISE Overview, on page 2 Key Functions, on page 2 Identity-Based Network Access, on page 3 Support for Multiple Deployment Scenarios, on page 3 Support for UCS Hardware, on page 3 Basic User Authentication
More informationWHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX
WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX 1 INTRODUCTION The MITRE Corporation Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK ) Matrix provides a model
More informationSOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE
SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE 1 EXECUTIVE SUMMARY Attackers have repeatedly demonstrated they can bypass an organization s conventional defenses. To remain effective,
More informationEXTENDING BEHAVIORAL INSIGHTS INTO RISK-ADAPTIVE PROTECTION & ENFORCEMENT
SESSION ID: SPO1-T10 EXTENDING BEHAVIORAL INSIGHTS INTO RISK-ADAPTIVE PROTECTION & ENFORCEMENT Guy Filippelli Vice President of User and Data Security Solutions Forcepoint Meerah Rajavel Chief Information
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationThe Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec
The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec James Edwards Product Marketing Manager Dan Watson Senior Systems Engineer Disclaimer This session may contain product
More informationInfrastructure Blind Spots Continue to Fuel Personal Data Breaches. Sanjay Raja Lumeta Corporation Lumeta Corporation
Infrastructure Blind Spots Continue to Fuel Personal Data Breaches Sanjay Raja Lumeta Corporation Why Is Real-Time Network & Cloud Situational Awareness Critical? Today s business drivers enable a greater
More informationInfoblox as Part of the Ecosystem
Infoblox Core Exchange Infoblox Core Exchange is a highly-interconnected set of ecosystem integrations that extend security, increase agility, and provide situational awareness for more efficient operations,
More information