If you can’t see what’s on your network, you can’t control it—and that makes your organization vulnerable. It’s the same as someone sneaking into your business, strolling through offices, looking through files for company intellectual property, and benefiting from your unique capabilities. This paper will discuss what “network visibility” really means, why your organization needs it and how to make it work.
To understand and address risk in this growing mobile segment, SANS performed its first annual mobility survey of more than 500 IT professionals. The intent of this nonscientific survey was to determine the type of mobile device usage allowed for enterprise applications and what level of policies and controls enterprises have around this type of usage.
This white paper will explore the two technologies, how they differ, where they overlap, and how they complement each other—ultimately revealing how the use of these technologies together can enable IT departments to effectively oversee devices and the network in this new era of IT consumerization.
This paper describes a secure and flexible way for companies of any size to make a successful transition to BYOD. It uses groundbreaking Network Access Control technology developed by Bradford Networks to balance the device preferences of employees with the security and control requirements of the enterprise. The approach combines granular access policies, automated enforcement and complete visibility into what devices and users are accessing the network. Users are happier and more productive, while the enterprise can move to a BYOD environment with confidence. That’s good news for employees, and good news for the company.
This white paper describes the growing problem and explains how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Today’s networks – and the challenge of securing them – continue to evolve at a fast pace, and disparate silos of security technologies are not sufficient to meet this challenge. With today’s security model, organizations remain at risk and IT staffs are stretched to the limit trying to keep pace in a changing environment.
Existing security solutions must evolve to an Adaptive Network Security model that integrates with numerous security technologies, correlates a vast array of information for complete network visibility, and automates network control and security policy enforcement.
Bradford Networks offers the only Adaptive Network Security platform to meet the challenge and is delivering real-world solutions to its customers today.
The whitepaper provides details on the expanding managed security services market, the factors that are driving this growth and practical advice to help organizations incorporate managed security services into their infrastructure by leveraging a security-as-a-service (SaaS) offering.
The decision of whether to implement 802.1X or NAC, or a combination of the two, comes down to the specific needs of an organization as well as consideration of the challenges and benefits of deploying each within a given network environment. In practice, most organizations will find that 802.1X alone is not enough, and instead a combination of 802.1X and NAC is most beneficial to provide the level of security, control, and visibility needed in today’s networks.
NAC can augment 802.1X to provide additional capabilities, or in many cases (depending on the NAC architecture) it can be a viable substitute for 802.1X altogether. In wireless networks, NAC is commonly used to augment 802.1X in order to provide endpoint compliance validation or for more advanced management of guest access than 802.1X alone allows. In wired networks, NAC is more commonly used as a substitute for 802.1X due to the number of deployment challenges for 802.1X in these environments.
Like many technologies, NAC has evolved over a number of years, and some NAC solutions have evolved to provide advanced capabilities and added value. As noted previously, these advanced NAC solutions can greatly enhance network visibility, in addition to offering other functions such as dynamic profiling of endpoint devices, comprehensive guest management, as well as detailed logging, reporting, and audit trails that are extremely valuable for regulatory compliance.
This whitepaper explores factors driving the need for allowing guests, contractors, and other non-employee users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. Finally, it introduces Bradford Networks’ Secure Guest Access solution set for providing secure access control for all non-employee users.
The PCI Data Security Standard has evolved considerably from version 1.0 to versions 1.1, 1.2, and the most recent 2.0 version. Its requirements cannot be achieved using any single product or technology on the market today, yet a combination of products and technologies can be used very effectively together to satisfy PCI DSS requirements and to keep crucial network systems and data secure.
Bradford’s Network Sentry provides robust network discovery, identity management, endpoint compliance, and security policy enforcement capabilities that are needed by any organization that processes credit card payments to not only comply with PCI, but to more effectively secure their networks. Key areas of PCI DSS objectives and requirements addressed by Network Sentry include:
- Maintaining a vulnerability management system, including ensuring the use of up-to-date anti-virus software on end systems
- Implementing strong access control measures, including restricting network access to authorized users with role-based access privileges
- Regularly monitoring and tracking all access to network resources, including detection of unauthorized users and rogue devices
- Maintaining effective information security policies, including dynamic enforcement of policies for accessing network resources
With its advanced security and policy management capabilities, in addition to detailed logging and reporting functionality, Network Sentry greatly enhances the ability of payment card industry participants to comply with PCI DSS, addressing nine of the twelve high-level PCI DSS requirements.
Healthcare environments present unique security and management challenges for IT organizations in order to secure access to network resources, to protect confidential patient information, and to ensure the network is available to all who need it. Added to this is the challenge of achieving compliance with regulatory standards such as HIPAA, PCI, and others.
Disparate security systems – or silos of security – in today’s networks do not provide healthcare IT staff with an effective solution for taking on these challenges. A new approach of Adaptive Network Security is needed in order to integrate and leverage various security technologies, correlate information from multiple sources, and automate network control and security policy enforcement.
Bradford’s Network Sentry family is the only Adaptive Network Security platform that allows healthcare IT organizations to effectively secure and manage network access to address critical security and operational challenges.
Compliance with HIPAA is mandatory for healthcare provider and payer organizations of all sizes. For healthcare organizations there are obvious drivers to adequately secure networks beyond HIPAA compliance.
These include ensuring the safety and security of patient information, minimizing the impact that security events on IT devices can have on clinical medical equipment (and vice versa), avoiding costly security breaches, and reducing operational costs such as help desk support.