IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable &...

29
1 IOT Devices & BYOD changing what is on your network -How to Gain Visibility and Protection David Ryan Regional Sales Manager [email protected] Jeffrey Reed- FortiNAC Sales Engineer [email protected]

Transcript of IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable &...

Page 1: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

1

IOT Devices & BYOD changing what is on your network -How to Gain Visibility and Protection

David Ryan – Regional Sales Manager

[email protected]

Jeffrey Reed- FortiNAC Sales Engineer

[email protected]

Page 2: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

2

Architecture, Deployment, & Configuration

FortiNACNetwork Access Control

Visibility

Control

Automated Response

Watching every node on the Network

Page 3: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

3

Architecture and Deployment

School District

Data Center

School #1

School #2

School #3

Security DevicesFortiNAC

Switch FirewallAccess

Point

Router SIEM IDS/IPS

FortiNAC

Data Collection:SNMP CLI Radius Syslog API DHCP

Page 4: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

4

Visibility

• Discover all endpoints, IoT devices, users, and applications

• Inputs from RADIUS, CLI, SNMP, syslog, MDM, DHCP, LDAP

• Can interact more than 2,300 network devices

• Multi-vendor wired and wireless Connectivity

• Inputs from virtually all vendors and models

• Identify and profile every endpoint

• Enables policy rules created by granular device type

• Extends vulnerability and patch management to non FortiClient users

• Leverages FortiGate for passive identification via traffic scanning

• Self-registration to simplify guest management

FortiNAC ConfigurationComprehensive Network Security

Page 5: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

5

Visibility: Agentless Data CollectionInformation Gathered from Multiple Sources

Switch

FirewallAccess PointRouter

SIEM IDS/IPS

FortiNAC

Protocols:

SNMP CLI RADIUS Syslog API

MDM

Database

Page 6: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

6

Providing Endpoint Visibility

• Who: User• Current logged on user

• Owner: BYOD, guest, contractor

• What: Host/device• Network adapter

• Physical and IP address

• Media type

• Vendor

• Host name

• Operating system

• Applications

• Where: Location

• When: Connection times

DEVICE ID

IP Address: 192.168.5.95

Physical Address: 00:1D:09:11:21:DA

Vendor Name: Dell Inc.

Status: Disconnected

Location: Concord AP Secure

Connect Time: 10/23/16 07:57 AM EDT

Disconnect Time: 10/23/16 04:55 PM EDT

Page 7: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

7

Enhanced VisibilityEndpoint Identification

Device

Classification

Automatic or manual

> Sponsor notification

Device type

Confirm on connect

Disable if confirmation

fails

18 Profiling Methods

More methods = Higher

Trust

Page 8: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

8

MDM Integration

• Synchronize FortiNAC with an MDM

• Retrieve MDM known hosts

• Receive MDM host updates

• Mobile device and user association

• Apply security policies

• MDM host view data columns

Page 9: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

9

Control

• Automated authentication and authorization

• Detailed user and device profiles enable automated entry to network

• Evaluate role, location, time of day, and device metrics for decisions

• Dynamic network access control

• Adjust device access to assets based on changes in activity or profile

• Enable network micro-segmentation

• Granular device identification enables thinly sliced networks

• Devices have limited access to prevent east-west infection

FortiNACComprehensive Network Security

Page 10: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

10

Control: Dynamic Network Access

Identify

User

Assign

Network Access

Assess

Risk

Identify

Device

No

Access

Guest

Access

Restricted

Access

Unrestricted

Access

Page 11: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

11

• Device isolation

• Unknown devices can be isolated

• Devices that fail posture evaluation can be isolated

• Devices that are administratively denied access can be isolated

• Onboarding

• User authentication

• Posture evaluation

• Customized portal

Pre-Connect Host Evaluation and Onboarding

Policy

Engine

Isolated

Access

Granted

Access

Connecting

Endpoint

ContractorPersonal / Guest

Page 12: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

12

• The FortiNAC policy engine continuously evaluates endpoints

• Security policies can:

• Use who, what, where, and when information to dynamically provision the appropriate access

• Validate endpoint security posture and isolate if necessary

Post Connect Control

Contractor Guest

Production

Printers

Policy

Engine

Isolated

Access

Granted

Access

Connecting

Endpoint

Page 13: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

13

Profiles

• Connected and connecting hosts are continuously evaluated against user/host profiles keying on:• Where

• Who

• What

• When

• User/host profiles are components of security policies

Page 14: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

14

Logical Networks

• Logical network segmentation for access policies

• Centralized device configurations

• Device-specific network access values per logical network

• Associates configuration to device(s)

• Globalization – Network control manager

Logical Network: Printer

Access

Configuration

Access

Configuration

Access

Configuration

Access

Configuration

Logical networks are an abstraction layer between a user-created name and a defined access value

Each logical network can be defined for each

device

Page 15: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

15

Automated Response

• Bridge the SOC and NOC

• Security events move from detection to remediation immediately

• Rapid security event triage

• Automated rules can respond in seconds to bad behavior

• Anomaly detection of behavioral changes in communication patterns

• Accelerate threat investigations

• Device history compiled from multiple sources is instantly available

• Granular containment options

• For example, quarantine or internet-only connectivity

FortiNACComprehensive Network Security

Page 16: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

16

Security Automation and Orchestration

TRUSTED TRUSTED

Alert

Actio

n

Visibility

Lo

g t

o S

IEM

FortiGate

FortiSIEM

Page 17: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

17

Advance Policies with Trust/Risk Indicators

INDICATORS OF

TRUSTINDICATORS OF

RISK

Page 18: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

18

Alert and Contextual InformationSecurity Alert

Field Value

Vendor Fortinet

Type Threat

Sub Type Virus

Threat ID 32423

Description HTTP non RFC-

compliant

response found

Severity Critical

IP Address 192.168.102.53

Field Value

First Name John

Last Name Doe

Role Contractor

Email jdoe@example.

com

Phone 603 717-XXXX

Role Engineering

Contractor

User Information

Field Value

Host Name Johns PC

Operating

System

Windows 10

Adapter

Physical

Address

00:01:02:04:04:05

IP Address 192.168.102.53

Location Switch-2 Port 8

IP Address 192.168.1.100

+ +

Host Information

TRUSTED TRUSTED

Page 19: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

19

• Ranked security rules process incoming security alerts

• User and end station information is correlated with the security event information

• Workflows including notification and containment actions can be automated

Security Rules

Page 20: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

20

Management, Reporting, & Incident handling

Page 21: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

21

FortiNAC Management

Active Dashboard

Page 22: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

22

FortiNAC Management

Easy to Navigate Settings

Page 23: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

23

FortiNAC Management

Easy Network Access Policy Management

Page 24: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

24

Management, Reporting, & Incident handling

Database Views – Search & Filter & Export

Page 25: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

25

Management, Reporting, & Incident handling

Detailed Customer Reports Using FortiAnalyzer

Page 26: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

26

Management, Reporting, & Incident handling

431 Unique Events – Custom Map Events to Alarm

Page 27: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

27CONFIDENTIAL

FortiNAC Feature Overview

PLUS Features– Lightweight NAC agents (Dissolvable & Persistent)– Endpoint Compliance for Windows, OSX & Linux– Captive Portal for BYOD, Contractor and Guests – Outbound Security Events to SEIM, Syslog or API

Pro Features– Receive trigger event from

IPS/SIEM/Tenable/Qualys

– Intelligent containment and notification options based on Host Profile (device type, user etc. )

– Immediately isolate and contain Indicators of Compromise

BASE Features– Discovery of Enterprise Network Infrastructure

– Active Directory Integration

– Builds Endpoint Database of MAC/IP/Port/Interface

– Rogue Hunting Tools

• MDM Integration (AirWatch, InTune, Chromebook etc.)

• Industrial OT Integration with Nozomi integration

• FortiClient EMS integration

• Agentless Device Profiling – Active & Passive

• Fortigate as a sensor & FSSO Integration

– Control

• Rogue Device Detection and containment

• Network Access Policies (wired 802.1x not required)

Page 28: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,

28

FortiNAC ComponentsFortiNAC Licenses

Page 29: IOT Devices & BYOD changing what is on your …...– Lightweight NAC agents (Dissolvable & Persistent) – Endpoint Compliance for Windows, OSX & Linux – Captive Portal for BYOD,