SlideShare una empresa de Scribd logo
1 de 21
Descargar para leer sin conexión
!
Top 3 MAC Spoofing Challenges !
You Cannot Afford to Ignore
Data breaches are increasing
Identity Theft Resource !
Center reports in 2014
•  18.3% increase in data breaches
•  783 data breaches in the U.S.
•  85+ million records were affected

Verizon’s 2014 Data !
Breach Investigations Report
•  Internationally 1,367 confirmed data breaches in 2013
•  Over 10,000 data breaches in the last 10 years
Source:	
  Informa.on	
  is	
  Beau.ful	
  World’s	
  
Biggest	
  Data	
  Breaches	
  
Data breaches are costly
Ponemon’s 2014 report !
Cost of Data Breach: Global Analysis
•  Average data breach costs $3.5 million U.S. dollars
•  15% increase in cost over previous year

The research reveals that reputation and the loss of
customer loyalty does the most damage to the bottom line.
	
  
Data breaches are increasing
Figure from Verizon’s 2014 Data Breach Investigation Report
MAC spoofing
Definition: 

Connecting to the network with a falsified media access!
control (MAC) address
History of MAC spoofing
•  Whitelisting as a form of security
•  Falsifying MAC address was too easy for
hackers
•  Use MAC address as first line of defense,
and combine it with a more contextual
understanding of the device
Top 3 MAC spoofing challenges
Lack of visibility
Unable to keep a complete, real-time inventory of what
is on the network and where each endpoint is located

Internet of Things trend
Increase in headless and non-traditional devices on the
network

Trusting the device
Security that relies on the device being the sole source
of information
Challenge 1: Lack of visibility 
The problem

•  Don’t know where unauthorized access or entry
points into the system might be
•  Don’t know if there is an unauthorized device touching
the network (whether it is misconfigured, etc.)
•  Don’t know if security measures are protecting entire
network
The solution

•  Complete visibility of all endpoints on the network
–  Deeper historical and contextual understanding of
all devices on the network
Challenge 1: Lack of visibility
This is not as simple as it sounds
•  Time intensive task
•  Constantly changing landscape
–  Increased mobility
–  Guest access
•  BYOD initiatives
•  Need for user convenience
Challenge 1: Lack of visibility
To really solve the problem you need:

•  Automated technology to create an inventory
•  Access to contextual data
•  Continuous, real-time monitoring for an ever-changing network

Challenge 1: Lack of visibility
Challenge 2: Internet of Things
The trend
•  Increase in devices that use your network data to do
amazing things!

Fire extinguishers that tell you
when they are in use
Sprinklers that use weather
information to determine how
often to run
Trash cans that alert you
when they are full
The trend
VOIP Phones
HVAC Systems
Security Cameras
Challenge 2: Internet of Things
The problem

•  These devices are outside of the norm, meaning that
current solutions may have limited contextual information
about them
–  If the MAC address is spoofed the lack of context can make it
difficult to identify that a rogue device has been added to the
network
Challenge 2: Internet of Things
The solution

•  Visibility of all devices, including headless devices
•  Agentless or clientless security solution (since these often
have specific operating systems dependencies)
Challenge 2: Internet of Things
The problem

•  Trusting the device by MAC address or MAC OUI !
alone is risky
–  The MAC address is not enough information





MAC spoofing is based on a device being dishonest
Challenge 3: Trusting the device
“Communicating
externally”
	
  
“Running 
Windows apps”
	
  
176.16.232.134	
  
The solution
Warehouse of context
Challenge 3: Trusting the device
What is the
device?
How is 
the device!
behaving?
Where is the
device?
HOW WE CAN HELP?
The Beacon suite of solutions
Identify.
Ensure every endpoint accessing the network
is accounted for to eliminate vulnerable blind
spots.
Monitor.
Know how endpoints are behaving at all
times to easily identify and address potential
threats quickly.
Enforce.
Control access to the network to allow what
should be on the network on, and keep what
shouldn’t off.

“As far as seeing what’s "
on the network, it’s "
all about visibility and
troubleshooting. When you’re
trying to figure out, ‘what’s
plugged into this port?’ and
you can go and see that in
Beacon, it saves you time.” "
"
–Patrick Printz, "

current Beacon user
	
  
•  Comprehensive. !
Our software provides you with complete visibility. We detect and profile all device
types touching your network, including headless devices. 
•  Contextual. !
Our technology provides you with historical and real-time detailed context. 
–  What is the endpoint
–  Where is it located 
–  Is it behaving uncharacteristically
•  Scalable. !
Great Bay Software’s technology!
has been proven to scale to satisfy !
the largest of enterprise customers. 
•  Simple. !
Our technology is a sophisticated application that is actually easy to deploy and
manage. !

Why Beacon?
Contact Us
1.800.503.1715
info@greatbaysoftware.com

Find more resources and information at
www.greatbaysoftware.com 
QUESTIONS?

Más contenido relacionado

La actualidad más candente

Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 
It security training
It security trainingIt security training
It security training
gethumamaravi
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

La actualidad más candente (20)

Internet Security
Internet SecurityInternet Security
Internet Security
 
How to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentationHow to make yourself hard to hack! slide share presentation
How to make yourself hard to hack! slide share presentation
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Information security awareness training
Information security awareness trainingInformation security awareness training
Information security awareness training
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Malware
MalwareMalware
Malware
 
It security training
It security trainingIt security training
It security training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Covid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber ThreatsCovid 19, How A Pandemic Situation Shapes Cyber Threats
Covid 19, How A Pandemic Situation Shapes Cyber Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
To see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoSTo see things others can't - APTs, Incident Response, DDoS
To see things others can't - APTs, Incident Response, DDoS
 
Basic Internet Security
Basic Internet SecurityBasic Internet Security
Basic Internet Security
 
internet security
internet securityinternet security
internet security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Destacado (10)

Mac spoof avoider
Mac spoof avoiderMac spoof avoider
Mac spoof avoider
 
Countermeasures to GPS Spoofing
Countermeasures to GPS SpoofingCountermeasures to GPS Spoofing
Countermeasures to GPS Spoofing
 
1unit2ndpart
1unit2ndpart1unit2ndpart
1unit2ndpart
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
RSA - WLAN Hacking
RSA - WLAN HackingRSA - WLAN Hacking
RSA - WLAN Hacking
 
Seminariode Seguridad L2
Seminariode Seguridad L2Seminariode Seguridad L2
Seminariode Seguridad L2
 
Dynamic Port Scanning
Dynamic Port ScanningDynamic Port Scanning
Dynamic Port Scanning
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Neighbor discovery in wireless networks with multipacket reception
Neighbor discovery in wireless networks with multipacket receptionNeighbor discovery in wireless networks with multipacket reception
Neighbor discovery in wireless networks with multipacket reception
 
Network Attack Counter
Network Attack CounterNetwork Attack Counter
Network Attack Counter
 

Similar a Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore

GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
Kristin Helgeson
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 

Similar a Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore (20)

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Web security
Web securityWeb security
Web security
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Network security
Network securityNetwork security
Network security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
need for NS.ppt
need for NS.pptneed for NS.ppt
need for NS.ppt
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
CLASS 2022 - Marty Edwards (Tenable) - O perigo crescente de ransomware crimi...
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Lecture5
Lecture5Lecture5
Lecture5
 
Computer safety
Computer safetyComputer safety
Computer safety
 
hacker culture
hacker culturehacker culture
hacker culture
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 

Más de Great Bay Software

Más de Great Bay Software (6)

How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
Decrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community BankDecrease Cyber Risk at your Community Bank
Decrease Cyber Risk at your Community Bank
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016 IoT Slam Healthcare 12-02-2016
IoT Slam Healthcare 12-02-2016
 
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
OnDemand Webinar: Key Considerations to Securing the Internet of Things (IoT)...
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
 

Último

Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 

Último (20)

Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 

Top 3 MAC Spoofing Challenges You Cannot Afford to Ignore

  • 1. ! Top 3 MAC Spoofing Challenges ! You Cannot Afford to Ignore
  • 2. Data breaches are increasing Identity Theft Resource ! Center reports in 2014 •  18.3% increase in data breaches •  783 data breaches in the U.S. •  85+ million records were affected Verizon’s 2014 Data ! Breach Investigations Report •  Internationally 1,367 confirmed data breaches in 2013 •  Over 10,000 data breaches in the last 10 years Source:  Informa.on  is  Beau.ful  World’s   Biggest  Data  Breaches  
  • 3. Data breaches are costly Ponemon’s 2014 report ! Cost of Data Breach: Global Analysis •  Average data breach costs $3.5 million U.S. dollars •  15% increase in cost over previous year The research reveals that reputation and the loss of customer loyalty does the most damage to the bottom line.  
  • 4. Data breaches are increasing Figure from Verizon’s 2014 Data Breach Investigation Report
  • 5. MAC spoofing Definition: Connecting to the network with a falsified media access! control (MAC) address
  • 6. History of MAC spoofing •  Whitelisting as a form of security •  Falsifying MAC address was too easy for hackers •  Use MAC address as first line of defense, and combine it with a more contextual understanding of the device
  • 7. Top 3 MAC spoofing challenges Lack of visibility Unable to keep a complete, real-time inventory of what is on the network and where each endpoint is located Internet of Things trend Increase in headless and non-traditional devices on the network Trusting the device Security that relies on the device being the sole source of information
  • 8. Challenge 1: Lack of visibility The problem •  Don’t know where unauthorized access or entry points into the system might be •  Don’t know if there is an unauthorized device touching the network (whether it is misconfigured, etc.) •  Don’t know if security measures are protecting entire network
  • 9. The solution •  Complete visibility of all endpoints on the network –  Deeper historical and contextual understanding of all devices on the network Challenge 1: Lack of visibility
  • 10. This is not as simple as it sounds •  Time intensive task •  Constantly changing landscape –  Increased mobility –  Guest access •  BYOD initiatives •  Need for user convenience Challenge 1: Lack of visibility
  • 11. To really solve the problem you need: •  Automated technology to create an inventory •  Access to contextual data •  Continuous, real-time monitoring for an ever-changing network Challenge 1: Lack of visibility
  • 12. Challenge 2: Internet of Things The trend •  Increase in devices that use your network data to do amazing things! Fire extinguishers that tell you when they are in use Sprinklers that use weather information to determine how often to run Trash cans that alert you when they are full
  • 13. The trend VOIP Phones HVAC Systems Security Cameras Challenge 2: Internet of Things
  • 14. The problem •  These devices are outside of the norm, meaning that current solutions may have limited contextual information about them –  If the MAC address is spoofed the lack of context can make it difficult to identify that a rogue device has been added to the network Challenge 2: Internet of Things
  • 15. The solution •  Visibility of all devices, including headless devices •  Agentless or clientless security solution (since these often have specific operating systems dependencies) Challenge 2: Internet of Things
  • 16. The problem •  Trusting the device by MAC address or MAC OUI ! alone is risky –  The MAC address is not enough information MAC spoofing is based on a device being dishonest Challenge 3: Trusting the device “Communicating externally”   “Running Windows apps”   176.16.232.134  
  • 17. The solution Warehouse of context Challenge 3: Trusting the device What is the device? How is the device! behaving? Where is the device?
  • 18. HOW WE CAN HELP?
  • 19. The Beacon suite of solutions Identify. Ensure every endpoint accessing the network is accounted for to eliminate vulnerable blind spots. Monitor. Know how endpoints are behaving at all times to easily identify and address potential threats quickly. Enforce. Control access to the network to allow what should be on the network on, and keep what shouldn’t off. “As far as seeing what’s " on the network, it’s " all about visibility and troubleshooting. When you’re trying to figure out, ‘what’s plugged into this port?’ and you can go and see that in Beacon, it saves you time.” " " –Patrick Printz, " current Beacon user  
  • 20. •  Comprehensive. ! Our software provides you with complete visibility. We detect and profile all device types touching your network, including headless devices. •  Contextual. ! Our technology provides you with historical and real-time detailed context. –  What is the endpoint –  Where is it located –  Is it behaving uncharacteristically •  Scalable. ! Great Bay Software’s technology! has been proven to scale to satisfy ! the largest of enterprise customers. •  Simple. ! Our technology is a sophisticated application that is actually easy to deploy and manage. ! Why Beacon?
  • 21. Contact Us 1.800.503.1715 info@greatbaysoftware.com Find more resources and information at www.greatbaysoftware.com QUESTIONS?