Network security has changed dramatically in just a few years. The old defense perimeter is now porous at best and all but gone in worst case scenarios. There are now many more users clamoring for access via their personal smartphones and tablets in addition to corporate desktops and laptops, and there’s no assurance that the hundreds or thousands of unmanaged devices in users’ hands are actually secure.
To complicate matters even further, hackers and cyber thieves are targeting the networks’ weakest links: end users and their vulnerable devices to get at your intellectual property and other critical information assets.
This new Whitepaper explains how 3rd generation NAC solutions can assert control before a risky user or device is allowed onto your network.
As BYOD adoption across educational institutions increases, educators at all levels are finding new ways to integrate mobile devices into the educational experience. In both higher education and K-12, the ability to put information technology in students’ hands is revolutionizing the way they learn.
The new ‘Impact of BYOD on Education’ report is based on a survey of more than 500 IT professionals from colleges, universities and K-12 school districts across the US and UK. It examines how BYOD is being used, and highlights security practices and concerns that are impacting wider adoption, and the potential going forward.
If you can’t see what’s on your network, you can’t control it—and that makes your organization vulnerable. It’s the same as someone sneaking into your business, strolling through offices, looking through files for company intellectual property, and benefiting from your unique capabilities. This paper will discuss what “network visibility” really means, why your organization needs it and how to make it work.
To understand and address risk in this growing mobile segment, SANS performed its first annual mobility survey of more than 500 IT professionals. The intent of this nonscientific survey was to determine the type of mobile device usage allowed for enterprise applications and what level of policies and controls enterprises have around this type of usage.
This white paper will explore the two technologies, how they differ, where they overlap, and how they complement each other—ultimately revealing how the use of these technologies together can enable IT departments to effectively oversee devices and the network in this new era of IT consumerization.
This paper describes a secure and flexible way for companies of any size to make a successful transition to BYOD. It uses groundbreaking Network Access Control technology developed by Bradford Networks to balance the device preferences of employees with the security and control requirements of the enterprise. The approach combines granular access policies, automated enforcement and complete visibility into what devices and users are accessing the network. Users are happier and more productive, while the enterprise can move to a BYOD environment with confidence. That’s good news for employees, and good news for the company.
This white paper describes the growing problem and explains how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
The decision of whether to implement 802.1X or NAC, or a combination of the two, comes down to the specific needs of an organization as well as consideration of the challenges and benefits of deploying each within a given network environment. In practice, most organizations will find that 802.1X alone is not enough, and instead a combination of 802.1X and NAC is most beneficial to provide the level of security, control, and visibility needed in today’s networks.
NAC can augment 802.1X to provide additional capabilities, or in many cases (depending on the NAC architecture) it can be a viable substitute for 802.1X altogether. In wireless networks, NAC is commonly used to augment 802.1X in order to provide endpoint compliance validation or for more advanced management of guest access than 802.1X alone allows. In wired networks, NAC is more commonly used as a substitute for 802.1X due to the number of deployment challenges for 802.1X in these environments.
Like many technologies, NAC has evolved over a number of years, and some NAC solutions have evolved to provide advanced capabilities and added value. As noted previously, these advanced NAC solutions can greatly enhance network visibility, in addition to offering other functions such as dynamic profiling of endpoint devices, comprehensive guest management, as well as detailed logging, reporting, and audit trails that are extremely valuable for regulatory compliance.
This whitepaper explores factors driving the need for allowing guests, contractors, and other non-employee users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. Finally, it introduces Bradford Networks’ Secure Guest Access solution set for providing secure access control for all non-employee users.
The Payment Card Industry Data Security Standard (PCI DSS) is a mandatory standard that has a major impact upon retailers and credit card processors. Part of achieving compliance with PCI DSS requires strict — and provable — access control over thousands of varied devices that use your wired and wireless networks to transmit cardholder data, including in-store devices such as POS terminals and ATM machines, as well as the ability to protect the network from access by other corporate or personally owned devices.
This paper explains how Bradford Networks’ Network Sentry network access control (NAC) solution addresses these challenges to greatly enhance the ability of organizations to meet PCI DSS requirements. Network Sentry provides visibility into every user and device on both wired and wireless networks — the Who, What, Where and When of network access. It complements this detailed visibility with automatic enforcement of strict access policies to meet your compliance and security requirements. In addition, Network Sentry keeps a detailed record of every access event, available on demand in PCI specific reports. These are just some of the reasons why more and more retailers and other organizations are relying on Network Sentry to comply with PCI DSS and secure their networks.
Healthcare environments present unique security and management challenges for IT organizations in order to secure access to network resources, to protect confidential patient information, and to ensure the network is available to all who need it. Added to this is the challenge of achieving compliance with regulatory standards such as HIPAA, PCI, and others.
Disparate security systems – or silos of security – in today’s networks do not provide healthcare IT staff with an effective solution for taking on these challenges. A new approach of Adaptive Network Security is needed in order to integrate and leverage various security technologies, correlate information from multiple sources, and automate network control and security policy enforcement.
Bradford’s Network Sentry family is the only Adaptive Network Security platform that allows healthcare IT organizations to effectively secure and manage network access to address critical security and operational challenges.