Putting Trust Into The Network Securing Your Network Through Trusted Access Control

Similar documents
Standardizing Network Access Control: TNC and Microsoft NAP to Interoperate

Trusted Network Connect (TNC) 3rd European Trusted Infrastructure Summer School September 2008

IFIP World Computer Congress (WCC2010)

4 Network Access Control 4.1 IPsec Network Security Encapsulated security payload (ESP) 4.2 Internet Key Exchange (IKE)

TNC EVERYWHERE. Pervasive Security

Applications of Attestation:

Trusted Network Access Control Experiences from Adoption

Interop Labs Network Access Control

Automate to Win: The Business Case for Standards-based Security. An InformationWeek Webcast Sponsored by

Understanding Network Access Control: What it means for your enterprise

Teleworking and Security: IT All Begins with Endpoints. Jim Jessup Solutions Manager, Information Risk Management June 19, 2007

Trusted Computing Today: Benefits and Solutions

Symantec Network Access Control Starter Edition

Cisco Systems Korea

Changing face of endpoint security

Security Automation Connecting Your Silos

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Implementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc.

White Paper February McAfee Policy Enforcer. Securing your endpoints for network access with McAfee Policy Enforcer.

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Cisco Self Defending Network

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

Networks with Cisco NAC Appliance primarily benefit from:

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge

GSE/Belux Enterprise Systems Security Meeting

What It Takes to be a CISO in 2017

Network Access Control Whitepaper

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Introducing Next Generation Symantec AntiVirus: Symantec Endpoint Protection. Bernard Laroche Endpoint security Product marketing

Cisco Network Admission Control (NAC) Solution

Service Provider Security Architecture

A Unified Threat Defense: The Need for Security Convergence

Security Threats & Trends Arvind Sahay, Enterprise Manager India, McAfee

August knac! 10 (or more) ways to bypass a NAC solution. Ofir Arkin, CTO

Cracked BitDefender Client Security 2 Years 20 PCs lowest price software ]

Free antivirus software download

Kaspersky Open Space Security

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Windows Server Network Access Protection. Richard Chiu

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Stopping Advanced Persistent Threats In Cloud and DataCenters

Trusted Computing As a Solution!

Symantec Endpoint Protection 14

Cisco NAC Network Module for Integrated Services Routers

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

A Secure Foundation for Your Business. Lauren Duda - Product Marketing Manager March 13th, 2007

Comprehensive Endpoint Security. Chris Quinn Systems Engineer March 24, 2009

Hazardous Endpoints Protecting Your Network From Its Own Devices

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Symantec Client Security. Integrated protection for network and remote clients.

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

Verizon Software Defined Perimeter (SDP).

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead

SSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

Is Your Information Safe? Presented by: Jake Gibson IT Director, Eurofins

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

Lessons from the Lab: NAC Framework Testing

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Network Access Control: A Whirlwind Tour Through The Basics. Joel M Snyder Senior Partner Opus One

Executive Summery. Siddharta Saha. Downloaded from

Comparative Study of Network Access Control Technologies. Hasham Ud-Din Qazi

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Novell ZENworks Network Access Control

Why ESET. We help more than 100,000,000 users worldwide to Enjoy Safer Technology. The only vendor with record-breaking protection

End Point Security, Securing the final three feet 1. Running Head: END POINT SECURITY, SECURING THE FINAL THREE FEET

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Herd Intelligence: true protection from targeted attacks. Ryan Sherstobitoff, Chief Corporate Evangelist

for businesses with more than 25 seats

Secure wired and wireless networks with smart access control

CYBER SECURITY MALAYSIA AWARDS, CONFERENCE & EXHIBITION (CSM-ACE) Securing Virtual Environments

ANATOMY OF AN ATTACK!

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Symantec Endpoint Protection 11.0

Get BitDefender Client Security 2 Years 30 PCs software suite ]

IBM Endpoint Manager. Francesco Censi WW ATG IEM consultant. Optimizing the World s Infrastructure Moscow, Oct 24 th, 2012

KASPERSKY ENDPOINT SECURITY FOR BUSINESS

Module Overview. works Identify NAP enforcement options Identify scenarios for NAP usage

Wireless and Network Security Integration Solution Overview

Client Health Key Features Datasheet. Client Health Key Features Datasheet

QuickSpecs. Aruba ClearPass OnGuard Software. Overview. Product overview. Key Features

Security Architect Northeast US Enterprise CISSP, GCIA, GCFA Cisco Systems. BRKSEC-2052_c Cisco Systems, Inc. All rights reserved.

Cyber Criminal Methods & Prevention Techniques. By

ICS Dissolvable Agent for SafeGuard

Network. Arcstar Universal One

IBM BigFix Compliance

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Bromium: Virtualization-Based Security

SonicWALL UTM Overview. Jon Piro NA Channel SE

Juniper Sky Advanced Threat Prevention

Secure Virtualization

Transcription:

Putting Trust Into The Network Securing Your Network Through Trusted Access Control Steve Hanna, Juniper Networks Co-Chair, Trusted Network Connect Sub Group of Trusted Computing Group ACSAC December 2006

Talk Outline Problem Statement Various Solutions Trusted Access Control Q& A

Problem: Reduce Endpoint Attacks Motivated Attackers Extortion, Identity Theft, Bank Fraud, Corporate Espionage Increasingly Sophisticated and Serious Attacks Viruses, Worms, Spyware, Rootkits, Back Doors, Botnets Zero-Day Exploits, Targeted Attacks, Rapid Infection Speed Exponential Growth in Malware >40,000,000 Infected Machines, >35,000 Malware Varieties Dissolving Network Boundaries Mobile workforce, partners, contractors, outsourcing Regulatory Requirements

Various Solutions More Secure Endpoints AV, Personal Firewall, Patch Management Better Coding Practices, Anti-Spyware, HIPS Stronger Network Protection Firewalls, IDS, IPS, Vulnerability Scanners Network Access Control (NAC) But Endpoints Still Get Compromised And then what?

Trusted Access Control = Trusted Platform Module + Network Access Control

Trusted Platform Module Hardware Security Component Key storage Signing and encryption Secure and Trusted Boot Remote attestation Open Standards for Features and APIs Developed by Trusted Computing Group Included on all new commercial laptops, increasing number of desktops and servers

Network Access Control Check Endpoint Health against Policy At or After Network Connection If Unhealthy, Quarantine and Remediate But what about lying endpoints? Need Trusted Boot and Remote Attestation

Trusted Network Connect (TNC) Open Architecture for Network Access Control (NAC) Suite of Standards Developed by Trusted Computing Group Supports Trusted Access Control

TNC Architecture VPN

TNC Standards Access Requestor t Integrity Measurement Collector Collector Collectors (IMC) (IF-IMC) TNC Client (TNCC) Policy Enforcement (IF-M) Peer Relationship (IF-TNCCS) Peer Relationship Policy Decision Integrity Measurement Verifiers Verifiers Verifiers (IMV) (IF-IMV) TNC Server (TNCS) (IF-PTS) (IF-T) Platform Trust Service (PTS) TSS Network Access Requestor Policy Enforcement (PEP) (IF-PEP) Network Access Authority TPM

Network Access Control Use Case Access Requestor Policy Enforcement Policy Decision Non-compliant System Windows XP SP2 xoshotfix 2499 xoshotfix 9288 AV - McAfee Virus Scan 8.0 Firewall Remediation Network Corporate Network Compliant System Windows XP SP2 OSHotFix 2499 OSHotFix 9288 AV - Symantec AV 10.1 Firewall Client Rules Windows XP SP2 OSHotFix 2499 OSHotFix 9288 AV (one of) Symantec AV 10.1 McAfee Virus Scan 8.0 Firewall

Trusted Access Control Use Case Access Requestor TPM measures critical components during trusted boot TPM attests to measurements during Trusted Network Connect handshake Policy Decision compares measurements against good configurations Policy Enforcement Policy Decision Corp LAN Compliant System TPM verified BIOS OS Drivers Anti-Virus SW Client Rules TPM enabled BIOS OS Drivers Anti-Virus SW

Trusted Network Connect (TNC) Advantages Open standards Non-proprietary Supports multi-vendor compatibility Enables customer choice Allows thorough and open technical review Leverages existing network infrastructure Excellent Return-on-Investment (ROI) Strong security Trusted Platform Module (TPM) Solves lying endpoint problem Products supporting TNC standards shipping today Including open source implementations

TNC Vendor Support Access Requestor Endpoint Supplicant/VPN Client, etc. Policy Enforcement Network Device FW, Switch, Router, Gateway Policy Decision AAA Server, Radius, Diameter, IIS, etc

Q & A