SlideShare a Scribd company logo
#ATM16
Enhance Network Security with Multi-Factor
Authentication for BYOD and Guest Access
Garth Benedict
Randy Garcia
Michael A. Tarinelli
March 31, 2016 @ArubaNetworks |
2
Setting the stage
3#ATM16
Mobility Changing the Security Dynamic
Distributed and mobile
work force
Demand for simplicity
Security requirements
remain
 Strong authentication
 Encryption
 End point protection etc.
4#ATM16
Security vs. Simplicity
- Customer demand for the
“coffeehouse” experience
- Industry forced to drive
security solutions at every
level
- Failure to act could result
in data breach and identity
theft
5#ATM16
A Perfect Match
- Simplicity and Security – not mutually
exclusive
- 2FA/MFA Reboot – new and innovative
players in the multi-factor authentication
space
- Enhance MFA with ClearPass Policy
Manager
- Explore Adaptive Trust
- Use policy to provide “defense in depth”
overlay to MFA solution
6#ATM16
Benefits of Policy Based MFA
–Reduce Breaches and save $$$
–Increase credibility among your peers and customers with new and innovative
approaches to MFA implementation.
7
Multifactor Authentication Overview
8#ATM16
What is 2FA? What is MFA?
- Two-factor authentication (2FA)
provides a second layer of security
to any type of login, requiring extra
information or a physical device to
log in, in addition to your password
- Multi-factor authentication is the
same but >2
- Something you have…
- E.g. The dreaded token
- Something you are…
- - e.g. Thumbprint
- Something you know
- E.g. username and password
9#ATM16
Not your grandma’s MFA
Current Trends of MFA (Cloud + Mobile)
- New companies launching innovative solutions
(DUO, Authy, Yubico, etc.)
- Leverages mobile device for additional factors
- OTP, Click, swipe, proximity, biometric options,
USB key, SDKs, etc.
Legacy Providers
- Hardware tokens from RSA, Safenet, Vasco,
McAffee, etc.
- Hated by end users and IT departments alike
- Move to soft tokens and mobile well underway
10#ATM16
New Players vs. Legacy Establishment
Cloud + Mobile is the trend
Leveraging smart device + App
Making huge strides
Incumbents still have market share
Supported for years on CPPM
Pivoting to Cloud + Mobile strategy
11#ATM16
Security Concerns
- 95 percent of breaches involve the exploitation of stolen
credentials.
- The misuse of administrative privileges is a primary
method for attackers to spread inside a target enterprise
- elevation of privileges by guessing or cracking a
password for an administrative user
- Sharing passwords
- Attackers take advantage of network devices becoming
less securely configured over time
12#ATM16
Wait! Its hard to use!
Importance of MFA
- Yes. It does introduce an extra step
- But, it’s a key element of any “defense in depth”
strategy
- Innovate with new tools that are more user friendly
- Reduce the burden and leverage Policy to force MFA
and times and places of your choosing.
- Attackers take advantage of network devices becoming
less securely configured over time
13#ATM16
Where is MFA Headed?
3rd Party Integrations
- Many new and existing companies providing services
- Cloud and mobile application based
- Combination of clicks, gestures, proximity, puzzles and biometric methods
- All have their challenges (just as the old tokens did)
- SaaS, Guest/BYOD, network admin and network access use cases
User Behavior
- The biggest barrier to adoption (on both the IT and user side)
- Mobile adoption and addiction presents opportunity
- Take a broader approach to authorization
- Leverage context to trigger mobile based MFA on demand
- Leverage Microsoft InTune or MDM for Windows Laptops
14
ClearPass and Adaptive Trust
Introducing a new approach to MFA
15#ATM16
Users that work from anywhere
and devices that roam
Access privileges and authentication
based on user- and device-roles
Mobility – The New Fight
16#ATM16
HOME OFFICE/ROAD
WARRIORS
Access on VPNs, mostly open SSIDs
Same privileges and authentication
as when in the office
The Extended Enterprise
17#ATM16
ClearPass at a Glance
AAA
• RADIUS
• TACACS
Context
Based Policy
• Directory
• Profiling
• Location
• Application
ClearPass
Exchange
• Modern style
RESTful API
• Context Rich
• Partner
Ecosystem
Mobility
Use Cases
• Guest
• OnBoard
(BYOD, CA)
• OnGuard
(Posture)
Adaptive Trust
18#ATM16
Static Perimeter Defense
IDS/IPS
Firewalls
Adaptive Trust Defense
Perimeter
Defense
Auth and
Automation
Physical
Components
A/V
Security and Policy
for each user or
group
Web
gateways
Time for a New Defense Model
19#ATM16
Benefits of Adaptive Trust
Complete End-to-End Protection
ClearPass
Policies
Perimeter
Defense
MDM/EMM
Aruba verified integration workflows✔
ClearPass as policy and
context store
✔
Accurate rules enforcement✔
All infrastructure and security
components work together
✔
20
User and Device
Security policy adapts to
need
Context sharedEmployee access
• Thomas
• Mac OS 10.9.3
• Marketing
• 10.0.1.12
Works with AD, LDAP, ClearPass dB, SQL dB
No agents/clients required
Adaptive Trust Context Sharing
21#ATM16
Using Policy to drive on demand MFA
– Based on Time
– Once a day or week
– If you have not logged on from this device in the past 14 days
– If your device was unhealthy in the past 30 days
– Based on Posture
– If your device posture changes to unhealthy
– If any of your other devices posture changes to unhealthy
– If a company alert or security check is issued
– Based on other Context
– User has never logged on from this location
– User has failed user authentication 3 times
– 3rd Party application or system triggers MFA
22
Putting it all together
MFA and Policy in Action - Demos
23#ATM16
Demo 1 – Place Holder - Explanation and Workflow
24#ATM16
Demo 1 – Place Holder - Screen Shots
25#ATM16
Demo 2 – Place Holder - Explanation and Workflow
26#ATM16
Demo 2 – Place Holder - Screen Shots
27#ATM16
Demo 3 – Place Holder - Explanation and Workflow
28#ATM16
Demo 3 – Place Holder - Screen Shots
29#ATM16
Close
Includes slides, color spots speaker remarks
30#ATM16
Join Aruba’s Titans of Tomorrow
force in the fight against network
mayhem. Find out what your
IT superpower is.
Share your results with friends
and receive a free superpower
t-shirt.
www.arubatitans.com
Month day, year

More Related Content

PDF
Clear pass policy manager advanced_ashwath murthy
PPTX
ClearPass design scenarios that solve the toughest security policy requirements
PPTX
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
PDF
Cisco switch setup with cppm v1.2
PPTX
Advanced ClearPass Workshop
PPTX
EMEA Airheads - AP Discovery Logic and AP Deployment
PPTX
Advanced RF Design & Troubleshooting
PDF
ClearPass Overview
Clear pass policy manager advanced_ashwath murthy
ClearPass design scenarios that solve the toughest security policy requirements
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Cisco switch setup with cppm v1.2
Advanced ClearPass Workshop
EMEA Airheads - AP Discovery Logic and AP Deployment
Advanced RF Design & Troubleshooting
ClearPass Overview

What's hot (20)

PPTX
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
PDF
Aruba ClearPass Guest 6.3 User Guide
PDF
Optimizing Aruba WLANs for Roaming Devices
PDF
EMEA Airheads- ArubaOS - Understanding Control-Plane-Security
PPTX
Access Management with Aruba ClearPass
PPTX
Airheads Tech Talks: Advanced Clustering in AOS 8.x
PPTX
Large scale, distributed access management deployment with aruba clear pass
PDF
Managing and Optimizing RF Spectrum for Aruba WLANs
PDF
PPTX
Wireless LAN Design Fundamentals in the Campus
PPTX
EMEA Airheads- Aruba Central with Instant AP
PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
PPTX
Roaming behavior and Client Troubleshooting
PDF
PDF
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
PDF
Meraki Solution Overview
PPTX
Adapting to evolving user, security, and business needs with aruba clear pass
PDF
Aruba Networks - Overview ClearPass
PDF
Aruba Remote Access Point (RAP) Networks Validated Reference Design
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Aruba ClearPass Guest 6.3 User Guide
Optimizing Aruba WLANs for Roaming Devices
EMEA Airheads- ArubaOS - Understanding Control-Plane-Security
Access Management with Aruba ClearPass
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Large scale, distributed access management deployment with aruba clear pass
Managing and Optimizing RF Spectrum for Aruba WLANs
Wireless LAN Design Fundamentals in the Campus
EMEA Airheads- Aruba Central with Instant AP
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Roaming behavior and Client Troubleshooting
Aruba Instant 6.4.0.2-4.1 Command Line Interface Reference Guide
Meraki Solution Overview
Adapting to evolving user, security, and business needs with aruba clear pass
Aruba Networks - Overview ClearPass
Aruba Remote Access Point (RAP) Networks Validated Reference Design
Ad

Viewers also liked (20)

PPTX
Aruba ClearPass Exchange Deep Dive
PPTX
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
PPTX
Securing the LAN Best practices to secure the wired access network
PPTX
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
PPTX
Data center network reference architecture with hpe flex fabric
PPTX
Take a Walk on the Wired Side
PPTX
Multi-Vendor Access Network Management with Aruba Airwave
PPTX
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
PPTX
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
PPTX
A-to-Z design guide for the all-wireless workplace
PPTX
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
PPTX
Hpe Intelligent Management Center
PPTX
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
PPTX
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
PPTX
Extending mobility to remote networks with aruba instant, remote APs, and clo...
PPTX
Mobile Experience Management and Network Services Health Check with Aruba Air...
PPTX
Connect and protect building a trust based internet of things for business cr...
PPTX
Integrating Unified Communications and Collaboration on an Aruba Access Network
PPTX
Deep visibility to secure network access with aruba ClearPass Insight
Aruba ClearPass Exchange Deep Dive
Very High Density (vhd) 802.11ac Wireless Network Design and Deployment Basics
Securing the LAN Best practices to secure the wired access network
Simplifying Wired Network Deployments with Software-Defined Networking (SDN)
Data center network reference architecture with hpe flex fabric
Take a Walk on the Wired Side
Multi-Vendor Access Network Management with Aruba Airwave
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
A-to-Z design guide for the all-wireless workplace
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
Hpe Intelligent Management Center
EMEA Airheads- ArubaOS - Rogue AP troubleshooting
Fast tracking network configuration with Aruba Solution Exchange (ASE) config...
Extending mobility to remote networks with aruba instant, remote APs, and clo...
Mobile Experience Management and Network Services Health Check with Aruba Air...
Connect and protect building a trust based internet of things for business cr...
Integrating Unified Communications and Collaboration on an Aruba Access Network
Deep visibility to secure network access with aruba ClearPass Insight
Ad

Similar to Enhance network security with Multi-Factor Authentication for BYOD and guest access (20)

PDF
Aruba clearpass ebook_chpt1_final
PPTX
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
Defining Advanced AAA Policies for Access Networks
PPTX
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
PPTX
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
PDF
Cloud expo 2016 kevin presentation
PDF
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
PPTX
Exploring Multi-Factor Authentication in Privileged Access Management
PPTX
Access Management with Aruba ClearPass #AirheadsConf Italy
PPT
Adaptive Trust for Strong Network Security
PPTX
PDF
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
PDF
New Opportunities with Two Factor Authentication (2FA) - A How To
PPTX
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
PPTX
PPTX
New Opportunities with Two Factor Authentication (2FA) - A How To
PPTX
Financial services 20150503
PPTX
Evolution of MFA.pptx
Aruba clearpass ebook_chpt1_final
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Defining Advanced AAA Policies for Access Networks
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Cloud expo 2016 kevin presentation
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Exploring Multi-Factor Authentication in Privileged Access Management
Access Management with Aruba ClearPass #AirheadsConf Italy
Adaptive Trust for Strong Network Security
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
New Opportunities with Two Factor Authentication (2FA) - A How To
Breakout - Airheads Macau 2013 - BYOD, MDM, and MAM
New Opportunities with Two Factor Authentication (2FA) - A How To
Financial services 20150503
Evolution of MFA.pptx

More from Aruba, a Hewlett Packard Enterprise company (20)

PPTX
EMEA Airheads_ Advance Aruba Central
PPTX
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
PPTX
EMEA Airheads- Switch stacking_ ArubaOS Switch
PPTX
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
PPTX
PPTX
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
PPTX
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
PPTX
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
PPTX
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
PPTX
EMEA Airheads- Manage Devices at Branch Office (BOC)
PPTX
EMEA Airheads - What does AirMatch do differently?v2
PPTX
Airheads Meetups: 8400 Presentation
PPTX
Airheads Meetups: Ekahau Presentation
PPTX
Airheads Meetups- High density WLAN
PPTX
Airheads Meetups- Avans Hogeschool goes Aruba
PPTX
EMEA Airheads - Configuring different APIs in Aruba 8.x
PPTX
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
PPTX
EMEA Airheads - Multi zone ap and centralized image upgrade
PPT
Bringing up Aruba Mobility Master, Managed Device & Access Point
PPTX
EMEA Airheads How licensing works in Aruba OS 8.x
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads - What does AirMatch do differently?v2
Airheads Meetups: 8400 Presentation
Airheads Meetups: Ekahau Presentation
Airheads Meetups- High density WLAN
Airheads Meetups- Avans Hogeschool goes Aruba
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Aruba Remote Access Point (RAP) Troubleshooting
EMEA Airheads - Multi zone ap and centralized image upgrade
Bringing up Aruba Mobility Master, Managed Device & Access Point
EMEA Airheads How licensing works in Aruba OS 8.x

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Spectroscopy.pptx food analysis technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Programs and apps: productivity, graphics, security and other tools
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Review of recent advances in non-invasive hemoglobin estimation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Spectroscopy.pptx food analysis technology
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Programs and apps: productivity, graphics, security and other tools

Enhance network security with Multi-Factor Authentication for BYOD and guest access

  • 1. #ATM16 Enhance Network Security with Multi-Factor Authentication for BYOD and Guest Access Garth Benedict Randy Garcia Michael A. Tarinelli March 31, 2016 @ArubaNetworks |
  • 3. 3#ATM16 Mobility Changing the Security Dynamic Distributed and mobile work force Demand for simplicity Security requirements remain  Strong authentication  Encryption  End point protection etc.
  • 4. 4#ATM16 Security vs. Simplicity - Customer demand for the “coffeehouse” experience - Industry forced to drive security solutions at every level - Failure to act could result in data breach and identity theft
  • 5. 5#ATM16 A Perfect Match - Simplicity and Security – not mutually exclusive - 2FA/MFA Reboot – new and innovative players in the multi-factor authentication space - Enhance MFA with ClearPass Policy Manager - Explore Adaptive Trust - Use policy to provide “defense in depth” overlay to MFA solution
  • 6. 6#ATM16 Benefits of Policy Based MFA –Reduce Breaches and save $$$ –Increase credibility among your peers and customers with new and innovative approaches to MFA implementation.
  • 8. 8#ATM16 What is 2FA? What is MFA? - Two-factor authentication (2FA) provides a second layer of security to any type of login, requiring extra information or a physical device to log in, in addition to your password - Multi-factor authentication is the same but >2 - Something you have… - E.g. The dreaded token - Something you are… - - e.g. Thumbprint - Something you know - E.g. username and password
  • 9. 9#ATM16 Not your grandma’s MFA Current Trends of MFA (Cloud + Mobile) - New companies launching innovative solutions (DUO, Authy, Yubico, etc.) - Leverages mobile device for additional factors - OTP, Click, swipe, proximity, biometric options, USB key, SDKs, etc. Legacy Providers - Hardware tokens from RSA, Safenet, Vasco, McAffee, etc. - Hated by end users and IT departments alike - Move to soft tokens and mobile well underway
  • 10. 10#ATM16 New Players vs. Legacy Establishment Cloud + Mobile is the trend Leveraging smart device + App Making huge strides Incumbents still have market share Supported for years on CPPM Pivoting to Cloud + Mobile strategy
  • 11. 11#ATM16 Security Concerns - 95 percent of breaches involve the exploitation of stolen credentials. - The misuse of administrative privileges is a primary method for attackers to spread inside a target enterprise - elevation of privileges by guessing or cracking a password for an administrative user - Sharing passwords - Attackers take advantage of network devices becoming less securely configured over time
  • 12. 12#ATM16 Wait! Its hard to use! Importance of MFA - Yes. It does introduce an extra step - But, it’s a key element of any “defense in depth” strategy - Innovate with new tools that are more user friendly - Reduce the burden and leverage Policy to force MFA and times and places of your choosing. - Attackers take advantage of network devices becoming less securely configured over time
  • 13. 13#ATM16 Where is MFA Headed? 3rd Party Integrations - Many new and existing companies providing services - Cloud and mobile application based - Combination of clicks, gestures, proximity, puzzles and biometric methods - All have their challenges (just as the old tokens did) - SaaS, Guest/BYOD, network admin and network access use cases User Behavior - The biggest barrier to adoption (on both the IT and user side) - Mobile adoption and addiction presents opportunity - Take a broader approach to authorization - Leverage context to trigger mobile based MFA on demand - Leverage Microsoft InTune or MDM for Windows Laptops
  • 14. 14 ClearPass and Adaptive Trust Introducing a new approach to MFA
  • 15. 15#ATM16 Users that work from anywhere and devices that roam Access privileges and authentication based on user- and device-roles Mobility – The New Fight
  • 16. 16#ATM16 HOME OFFICE/ROAD WARRIORS Access on VPNs, mostly open SSIDs Same privileges and authentication as when in the office The Extended Enterprise
  • 17. 17#ATM16 ClearPass at a Glance AAA • RADIUS • TACACS Context Based Policy • Directory • Profiling • Location • Application ClearPass Exchange • Modern style RESTful API • Context Rich • Partner Ecosystem Mobility Use Cases • Guest • OnBoard (BYOD, CA) • OnGuard (Posture) Adaptive Trust
  • 18. 18#ATM16 Static Perimeter Defense IDS/IPS Firewalls Adaptive Trust Defense Perimeter Defense Auth and Automation Physical Components A/V Security and Policy for each user or group Web gateways Time for a New Defense Model
  • 19. 19#ATM16 Benefits of Adaptive Trust Complete End-to-End Protection ClearPass Policies Perimeter Defense MDM/EMM Aruba verified integration workflows✔ ClearPass as policy and context store ✔ Accurate rules enforcement✔ All infrastructure and security components work together ✔
  • 20. 20 User and Device Security policy adapts to need Context sharedEmployee access • Thomas • Mac OS 10.9.3 • Marketing • 10.0.1.12 Works with AD, LDAP, ClearPass dB, SQL dB No agents/clients required Adaptive Trust Context Sharing
  • 21. 21#ATM16 Using Policy to drive on demand MFA – Based on Time – Once a day or week – If you have not logged on from this device in the past 14 days – If your device was unhealthy in the past 30 days – Based on Posture – If your device posture changes to unhealthy – If any of your other devices posture changes to unhealthy – If a company alert or security check is issued – Based on other Context – User has never logged on from this location – User has failed user authentication 3 times – 3rd Party application or system triggers MFA
  • 22. 22 Putting it all together MFA and Policy in Action - Demos
  • 23. 23#ATM16 Demo 1 – Place Holder - Explanation and Workflow
  • 24. 24#ATM16 Demo 1 – Place Holder - Screen Shots
  • 25. 25#ATM16 Demo 2 – Place Holder - Explanation and Workflow
  • 26. 26#ATM16 Demo 2 – Place Holder - Screen Shots
  • 27. 27#ATM16 Demo 3 – Place Holder - Explanation and Workflow
  • 28. 28#ATM16 Demo 3 – Place Holder - Screen Shots
  • 29. 29#ATM16 Close Includes slides, color spots speaker remarks
  • 30. 30#ATM16 Join Aruba’s Titans of Tomorrow force in the fight against network mayhem. Find out what your IT superpower is. Share your results with friends and receive a free superpower t-shirt. www.arubatitans.com

Editor's Notes

  • #4: The Situation and the Challenge MOBILITY AND THE DEMAND FOR SIMPLICITY ARE HERE TO STAY BUT SECURITY REQUIREMENTS REMAIN
  • #5: The Implication – specifically bullet 3 EVERYONE EXPECTS TO BE CONNECRTED AND CONDUCT BUISINESS IN THE SAME WAS WE ARE CONNECTED AND CONDUCT OUR PERSONAL BUSINESS. ANYWHERE ANYTIME. IT SECURITY IS CHALLENED TO TO COME UP WITH INNOVATIVE SOLUTIONS TO MATCH THE NEW WORLD
  • #6: THE ARUBA POSTION – THIS IS WHAT WE WANT THE AUDIENCE TO BELIEVE CONSIDER NEW TOOLS THAT HAVE DRIVEN INNOVATION TO LEGACY SECURTY SOLUTIONS (E.G. MFA) MARRY THESE TOOLS WITH CLEARPASS POLICY ENGINE TO MAKE THE SOLUTION MORE ELEGANT. ENFORCE MFA WHEN AND WHERE YOU WANT VIA POLICY
  • #7: The Benefit THIS IS WHY OUR POSITION MATTERS. IT WILL HAVE BENEFITS. THIS SLIDE NEEDS WORK OBVIOUSLY Poll audience Assess established customer vs. newbie ratio Benefits MFA could reduce risk thus save money Innovative MFA solutions could elevate credibility among peers and customers
  • #8: TRANSITION. BLANK SCREEN. CHECK IN WITH AUDIENCE. GET THEIR ATTENTION BACK ON US. WHAT FOLLOW IS NOT SPECIFIC TO ARUBA. IT’S A BIT OF AN OVERVIEW AND INDUSTRY UPDATE.
  • #9: SOMETHING YOU HAVE, SOMETHIG YOU KNOW, SOMETHING YOU ARE
  • #10: INDUSTRY SHIFT TOWARDS NEW APPROACHES DRIVEN BY MOBILITY AND PREVALANCE OF SMART DEVICES
  • #11: OF COURSE THE ESTABLISHED VENDORS ARE GOING NO WHERE AND HAVE MARKET SHARE. THEY ARE ALSO PIVOTING BUT MOVING SLOWLY. THIS SLOW SHIF HAS ALLOWED NEW INNOVATORS TO GAIN SIGNIFCANT FOOT HOLD
  • #12: FROM SANS.ORG: USE MFA FOR ALL ADMIN ACCESS TO PROTECT NETWORK FROM ATTACH. SANS NOTES MANY MFA TECHNIQUES. NOTE: CONSIDER AN FOLLOWUP SLIDE WITH MORE EDUCATION AND TERMINOLOGY Use multi-factor authentication for all administrative access, including domain administrative access. Multi-factor authentication can include a variety of techniques, to include the use of smart cards, certificates, One Time Password (OTP) tokens, biometrics, or other similar authentication methods.
  • #13: AS ELEGANT AS THE NEW SOLUTIONS ARE ITS STILL AN UNDENIABLE NEXT STEP SO THE IMPORTANCE OF INNOVATION AND USING POLICY TO LIMIT THE FREQUENCY OF THE NEXT STEP MIGHT BE NICE
  • #14: WE’VE ALREADY TALKED ABOUT THE NEW PLAYERS NOW TALK ABOUT THE ELEMENTS – FINGER PRINTS, TAP A BUTTON, SWIPE, SHAKE, ALSO TALK ABOUT AND SHOW EXAMPLES OF WHERE WE SEE THIS TODAY IN THE CONSUMER SPACE. THIS SLIDE NEEDS WORK.
  • #15: TRANSITION SLIDE. WE WILL GIVE AN ARUBA CLEARPASS OVERVIEW IN THIS SECTION. ONE SLIDE TO EXPLAIN THE CLEARPASS PLATFORM. WE CAN’T ASSUME WHOLE AUDIENCE KNOWS OUR STUFF. REST OF SLIDES EXPLAIN ADAPATIVE TRUST, CP EXCHANGE AND THIS IS IMPORTANT FOR THE TAKE HOME POINT OF USING POLICY TO ENHANCE MFA
  • #16: MOBILITY – USERS ARE EVERYWHERE AND SO IS YOUR SECURITY PERIMITER. Even though wired connections still exist, faster and more reliable wireless and cellular networks have increased a users ability to work from anywhere, at any time. While increasing productivity and user satisfaction, IT must plan for and tackle new security concerns that comes with mobile users and mobile devices as they roam a campus or travel to a remote site. Stress that each location, device type and access method used can pose new challenges. The key is to deploy a solution that leverages identity information for users and devices. If a laptop is connected to wired at a desk, they have to expect that the same user may connect a tablet to the network on another floor or in the next building. IT needs a way to enforce policies that do not put limits on how people actually work today. We’re mobile…
  • #17: MANY COMPANIES ARE SHIFTING HOTEL MODEL, WFH ETC. ROAD WARRIOR CULTURE IS GROWING. NEED TO CONSIDER LOCATION AS A KEY ELEMENT OF SECURITY POLICY. The same is true for home offices and when connecting to guest networks. IT should have a common way of authenticating users even when connecting over VPNs. You can mention that ClearPass works when users connect over popular VPN solutions, as well as when using our VIA client or RAPs. While IT can assign the same privileges to users when on the road, they can also alter access too. They may not want to let users get to extremely confidential data while a user is using something other than an IT-issued laptop from a public venue, like a coffee shop or airport terminal. This is also a good time to ask if MDM/EMM is being used or is being considered. This will let IT force the use of pin codes on smart phones and tablets, create secure containers for enterprise data and perform wipes when users are off-net. It ties in well with network access services like those provided by ClearPass. Now lets look at IT concerns.
  • #18: EXPLAIN THAT CLEARPASS IS A TRIPLE A PLATFORM. MENTION GUEST, OB, OG IF YOU WANT. FOCUS ON EXCHANGE AND POLICY.
  • #19: INTRODUCE ADAPATIVE TRUST CONCEPT. MOST COMPANIES GOING BEST OF BREED. PERIMETER IS WHERE YOUR END USER IS. LEVERAGE CONTEXT AND ENFORCE POLICY. While IT has busily deployed a number of physical and software security mechanisms like Palo Alto, Tipping Point, MobileIron, and others for protecting the perimeter, #GenMobile has completely diluted the notion of a fixed perimeter – it doesn’t exist in a mobile world where users connect and work from anywhere. To head off any risks, many enterprise IT organizations are resorting to extreme measures by adopting a zero-trust approach to security. Unfortunately, zero-trust treats everyone like potential adversaries. What’s needed is a policy solution that leverages user and device data to make smarter decisions based on each user’s mobility needs. ClearPass as the authentication source sits at the heart of this new defense model as each user and device first gets authenticated before being allowed to forward traffic. Because of these first-step we’ve built-in bi-directional APIs and syslog messaging that lets us share and ingest data to either allow devices full connectivity or remove a device from the network Lets look at ClearPass Exchange.
  • #20: TALK ABOUT THE MANY PLAYERS (VENDORS) OUT THERE THAT COMPRISE A SECURITY ARCHITECURE AND HOW WE TAP IN AND GLUE IT ALL TOGETHER. Adaptive Trust offers end-to-end protection needed for today’s GenMobile behavior and risks. Make sure to articulate that by leveraging all of your infrastructure you gain the ability to protect your data inside and outside of the perimeter. And as more organizations opt in for best of breed security solutions, ClearPass provides multivendor interoperability for any network and security solution.
  • #21: EXPLAIN THE CONTEXT AWARE APPROACH. POLICY ADAPTS BASED ON CONTEXT. In this example, a customer with Palo Alto, Fortinet or Check Point firewalls can create accurate traffic specific policies based on user and device specific attributes. Very granular policies can be created for employees, as well as for guests as ClearPass can be used as an identity store and context server. Differentiated access can be granted per device as the firewalls will know each device that is associated with a specific user.
  • #22: BOOM. WE FINALLY START TO PUT IT ALL TOGETHER. WE LEARNED ABOUT THE NEW PLAYERS. WE LEARNED ABOUT THE INNOVATION. WE HAVE OUR CONTEXT ADAPATIVE TRUST FRAME WORK LAID. NOW EXPLAIN HOW YOU CAN USE POLICY TO MAKE DECISIONS ABOUT WHEN AND WHERE TO IMPLEMENT MFA. START TO TEE UP DEMOS.
  • #23: DEMO TIME. WORK FLOW DIAGRAMS AND SCREEN SHOTS PENDING.
  • #31: Contest Overview - Aruba is running a marketing campaign where we ask “What is your IT superpower?” - Go to arubatitans.com to take a quick quiz to discover your superpower. - Share your results with friends and encourage others to play the game - Once you share, go to the Social and Community Hub, Gracia Commons, 3rd fl to pick up your free superpower shirt. FAQ 1. What do I have to do to get a shirt? Share your IT superpower results with friends and encourage them to play the game. Then come to the Social & Community Hub, 3rd Floor Gracia Commons to pick up your shirt. We just need your name and badge for verification. 2. Where do I get my shirt? Come to the #ATM16 Social & Community hub located at Gracia Commons on the 3rd Floor 3. Do I have to be at the event to get the shirt? Yes. You have to be at #ATM16 to get a shirt. 4. Can I get my colleague a shirt? He/she is in a session right now. Unfortunately not. We encourage your colleague to participate so that they can win a shirt for themselves. 5. Can I bring a shirt home for my colleague? Unfortunately not. You have to be at #ATM16 to get a shirt. 6. You don’t have a shirt in my size, can you ship the right size to me later? Unfortunately not. Please select the best size from our inventory on site.