Top Banner
8

Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Jan 14, 2016

Download

Documents

Noah Waters
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
Page 2: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Take back control: taming rogue device, user and application exposuresMark Blake, Capita Secure Managed ServicesChris Gothard, Colt Technology ServicesFran Howarth, Bloor Research30/04/14

Page 3: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

What is Next-generation NAC?

NAC has traditionally been used to control access and reduce malware threats via user and device authentication

Growing need for real-time visibility across the network and endpoints, users and applications and need for more efficient remediation of threats/violations

NAC morphing into a platform that combines traditional NAC capabilities with mobile security, endpoint compliance and threat management

Next-gen NAC - providing actionable insight regarding endpoint health, user identities and applications, combined with security intelligence, interoperability and response

Continuously monitor and mitigate security exposures and cyber attacks yielding more pervasive network security

Page 4: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

Question 1: Key Drivers

Top drivers / rationale for network visibility and endpoint control?

Page 5: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

Question 2: Considerations and Requisites

Top 2-3 technology considerations and selection criteria?

Page 6: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

Question 3: Set-up and Realisations

Ease to engage technical controls and interesting results once active?

Page 7: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

Question 4: Lessons Learned

Share some advice?

Page 8: Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.

Company logo

Thank You & Questions

www.forescout.com