Aruba ClearPass Archives - IT Solutions Provider - IT Consulting - Technology Solutions /blog/topic/aruba-clearpass/ IT Solutions Provider - IT Consulting - Technology Solutions Wed, 11 Mar 2026 15:24:39 +0000 en-US hourly 1 /wp-content/uploads/2025/11/cropped-favico-32x32.png Aruba ClearPass Archives - IT Solutions Provider - IT Consulting - Technology Solutions /blog/topic/aruba-clearpass/ 32 32 Unified SASE: A Secure And Streamlined Path To Digital Transformation /blog/unified-sase-a-secure-and-streamlined-path-to-digital-transformation/ /blog/unified-sase-a-secure-and-streamlined-path-to-digital-transformation/#respond Tue, 07 May 2024 12:45:00 +0000 https://dev.wei.com/blog/unified-sase-a-secure-and-streamlined-path-to-digital-transformation/ Cloud adoption is transforming businesses – however, it also introduces new security challenges. Traditional network security practices struggle to adapt to the cloud’s dynamic nature, exposing organizations. A key question...

The post Unified SASE: A Secure And Streamlined Path To Digital Transformation appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
HPE Aruba Networking’s Unified SASE simplifies cloud security by combining their SSE and EdgeConnect platforms to redefine secure access, deliver network speed,

Cloud adoption is transforming businesses – however, it also introduces new security challenges. Traditional network security practices struggle to adapt to the cloud’s dynamic nature, exposing organizations. A key question must be asked: How can an enterprise effectively secure data and applications amid the widespread adoption of the cloud? A unified Secure Access Service Edge (SASE) offers a comprehensive solution. Let’s examine the obstacles organizations encounter when securing their cloud deployments, and how a unified SASE platform can effectively mitigate these challenges.

Challenges In Digital Transformation

The digital era is characterized by two major trends: a surge in Internet of Things (IoT) devices, and various enterprises’ widespread adoption of cloud services. Fundamentally, these trends demand a fundamental shift in how organizations approach security.

A recent study published in the Wall Street Journal revealed a 13% increase in the global average cost of data breaches since 2020. In 2022, it reached a hefty average of $4.35 million. This highlights the increasing sophistication of cyberattacks, which have doubled in recent years, constantly testing an organization’s defenses.

These factors contribute to the following challenges faced by organizations in the digital era:

  • Traditional data center-centric security, built around centralized firewalls, is failing to keep pace as applications migrate to the cloud and users access data from anywhere. This is especially true for organizations with hybrid work models where data and applications are scattered across various locations.
  • Legacy security methods suffer from many limitations including bottlenecks and limited scalability for geographically dispersed users. Additionally, inconsistent security policies across devices and networks increase complexity and leave vulnerabilities. Finally, traditional VPNs, designed for on-premises networks, limit cloud adoption by focusing on user access rather than securing cloud workloads.

To navigate this complexity, organizations need a comprehensive security solution. This solution should provide three key functionalities: secure and reliable user access, robust cloud application protection, and agile security management. Unified SASE stands out as an answer to these challenges, as it offers a cloud-based, integrated security framework that adapts to the changing needs of businesses.

How Unified SASE Simplifies Security

Unified SASE offers a more streamlined solution by combining SD-WAN with comprehensive network security functions like secure web gateways (SWG), cloud access security brokers (CASB), firewalls as a service (FWaaS), and zero trust network access (ZTNA). This integrated approach is designed to meet the evolving security needs of today’s digital businesses, especially those with hybrid workforces and cloud-based applications.

Think of it this way: Instead of a bulky security setup at each branch office, SASE provides a thin WAN edge with the full suite of security features delivered as a convenient cloud service. This approach unlocks a multitude of benefits to enhance your organization’s operations, such as:

  1. Streamlined Security: SASE consolidates networking and security functions into a single, cloud-delivered solution. This simplifies management and eliminates the need for multiple-point products.
  2. Unified Security Posture: IT teams can apply consistent security policies and centralized access controls across all networks, regardless of location. This reduces the attack surface, making it easier to detect and respond to threats.
  3. Reduced Complexity: SASE streamlines network and security deployment and management. Save time and resources by eliminating the need for multiple hardware appliances.
  4. Optimized User Experience: SASE ensures secure, high-performance, and low-latency connections for users accessing applications and resources. This eliminates the need for backhauling traffic through a central data center, improving overall user experience.
  5. Scalability: SASE can easily adapt to changing business needs. It can support initiatives like hybrid work, cloud migration, and the adoption of IoT and OT devices.

Exploring Unified SASE Solutions

understands the challenges businesses face in today’s digital world. To address these concerns, they have partnered with leading cloud security providers to offer a comprehensive SASE solution. This solution seamlessly combines technology with their . By embracing a zero-trust approach, HPE Aruba Networking empowers organizations to secure users and applications everywhere. This unified and powerful solution allows businesses to confidently pursue digital transformation with a robust and secure access strategy.

HPE offers a unified approach to SASE built on three key components:

  1. HPE Aruba Networking SSE: This solution provides both agent-based and agentless ZTNA, granting you deployment flexibility. Additionally, it offers unified policy management for streamlined control and a global network of points of presence (PoPs) for optimal performance.
  2. EdgeConnect SD-WAN: It transcends traditional SD-WAN with multi-cloud support, guaranteeing secure access to any cloud application. By prioritizing user experience, it optimizes application performance for a seamless workday.
  3. HPE Aruba Networking Central NetConductor and ClearPass: This combination offers a unified network access control (NAC) solution. Powered by AI, it delivers deep client insights and enforces granular access through dynamic segmentation. Continuous network monitoring identifies and mitigates threats, fortifying your security posture.

The Benefits Of HPE Aruba Networking SSE

This cloud-based platform provides robust and unified network security through zero-trust access. This minimizes potential attack points and shields your network from modern threats. Administrators benefit from enhanced control and visibility into your IT infrastructure, allowing them to prevent data leaks and unauthorized software usage.

Furthermore, intelligent global routing and centralized management ensure a smooth user experience when accessing applications and data. This translates to increased productivity and effortless scalability to keep pace with your growing business.

A Look At EdgeConnect Secure SD-WAN

The EdgeConnect SD-WAN platform is designed for cloud-first enterprises, providing a secure foundation for zero trust and SASE. It combines a first-class SD-WAN with a next-generation firewall, ensuring both advanced security and an unmatched quality of experience. Whether your applications reside in the cloud or on-premises, EdgeConnect delivers reliable connectivity and protection.

Its key features include:

  • App Performance Enhancement: Utilizing SaaS and WAN optimization techniques, and path conditioning, to optimize application performance.
  • Next-Generation Firewall: This offers end-to-end security, including deep packet inspection (DPI), intrusion detection/prevention systems (IDS/IPS), and role-based segmentation.
  • Multi-Cloud Networking: EdgeConnect seamlessly integrates with multiple cloud providers (such as Azure and AWS) to support cloud-first organizations.
  • Dynamic Routing: BGP and OSPF support ensure efficient traffic routing across the WAN.
  • Visibility And Reporting: Gain insights into application and network performance.
  • Automation And Zero-Touch Provisioning: Simplify deployment and management.
  • Unified SASE: EdgeConnect operates within the framework of the SASE model. This means it intelligently directs traffic to the cloud, eliminating the need for unnecessary backhauling of data. By strategically processing information at the edge of the network, EdgeConnect offers a more efficient and secure approach to cloud connectivity.
  • Branch Network Consolidation: Replace branch firewalls and routers, streamlining network and security functions.
  • Quality Of Experience: Prioritize mission-critical applications, including high-quality voice and video over broadband.
  • Secure IoT Segmentation: Implement zero-trust network segmentation for IoT devices, going beyond SASE-defined boundaries.
  • Integration with Multiple SSE Vendors: Tight integration with various cloud-security vendors

EdgeConnect SD-WAN Platform combines robust security, performance optimization, and cloud integration to empower modern enterprises.

An Overview On HPE Aruba Networking Central NetConductor and ClearPass

HPE Aruba Networking offers sophisticated AI-powered client identification and profiling through Client Insights, a feature built directly into HPE Aruba Networking Central. This eliminates the need for additional physical collectors or VM-based agents typically required by competitor solutions.

Client Insights delivers highly accurate AI/ML profiling, reaching . This enhanced visibility empowers customers to experience immediate IT efficiency gains. Automated policy enforcement based on these insights further streamlines network management. Additionally, Client Insights’ always-on AI/ML behavioral monitoring provides superior protection against security breaches.

Client Insights within HPE Aruba Networking Central NetConductor and ClearPass offer a cost-effective and user-friendly solution for comprehensive network visibility, automated policy enforcement, and enhanced security through AI-powered client identification and profiling.

Additionally, HPE Aruba Networking Central offers the following components as well for organizations:

  • Cloud Authentication

As HPE Aruba Networking’s built-in cloud-based NAC solution within HPE Aruba Networking Central, Cloud Auth assigns roles to users and devices for secure network access. This ensures only authorized users and devices can connect, with clearly defined access privileges. Cloud Auth integrates with common identity stores (like Google Workspace and Azure AD) for seamless user and device identification and authentication. It also simplifies management with time-saving workflows for policy configuration and user onboarding with Multi Pre-Shared Keys (MPSK).

  • HPE Aruba Networking Central NetConductor

HPE Aruba Networking Central NetConductor automates tasks like configuration and policy enforcement across geographically dispersed networks, simplifying management of wired, wireless, and WAN infrastructure. This streamlines setup, optimizes performance, and enforces granular access controls – the foundation of secure network architectures.

Final Thoughts

The digital landscape has fostered exponential business growth through widespread cloud adoption. While moving to the cloud creates new security challenges, SASE offers a comprehensive solution to consolidating critical network and security functionalities into a single, cloud-based platform. This streamlined approach simplifies security management while ensuring reliable data protection across all locations within your organization.

WEI’s cloud security specialists can guide you through securing your cloud environment. We combine our expertise with personalized security assessments and custom-built SASE solutions, featuring advanced technologies like HPE Aruba Networking. This empowers your business to confidently navigate your digital transformation while protecting your critical assets. Contact us today to get started.

Next steps: The acceleration of migrating applications to the cloud in addition to leveraging cheaper and flexible internet alternatives such as 5G/LTE connections drove the need for SD-WAN technology. Greater visibility and better security tools are needed to ensure the zero-trust network environment that companies desire. Additionally, hybrid networks have evolved far beyond the basic composition of a public cloud and on-prem environment. Today’s SD-WAN solutions must accommodate multiple clouds in a dynamic fashion.

WEI’s free tech brief identifies the three main components of Aruba Network’s powerful EdgeConnect Enterprise platform:

  • Physical or Virtual SD-WAN Appliance
  • Aruba Orchestrator
  • Aruba Boost

to access your free copy of the tech brief, SD-WAN: 3 Components To Efficiently Connect Users To Applications.

The post Unified SASE: A Secure And Streamlined Path To Digital Transformation appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/unified-sase-a-secure-and-streamlined-path-to-digital-transformation/feed/ 0
How to Connect & Protect for Zero Trust Security /blog/how-to-connect-protect-for-zero-trust-security/ /blog/how-to-connect-protect-for-zero-trust-security/#respond Thu, 25 May 2023 12:45:00 +0000 https://dev.wei.com/blog/how-to-connect-protect-for-zero-trust-security/ Do you trust your network? Performance may be in an optimal place, and workplace operations are thankful for that. But what about security? “Zero Trust” is a practice every IT...

The post How to Connect & Protect for Zero Trust Security appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
How to Connect & Protect for Zero Trust Security

Do you trust your network? Performance may be in an optimal place, and workplace operations are thankful for that. But what about security? “Zero Trust” is a practice every IT leader and decision maker should be educated on as more and more organizations have realized that all attacks don’t originate from the other side of the firewall. Attacks can be launched from anywhere, including within the network itself. Network administrators must always operate under the assumption that their network has already been breached. And sadly, for some reading this article, that may be the case.

Security Starts With Visibility

Think of the visibility that security teams require from fans entering a major sports arena. Attendees must successfully pass through a security detector while large purses, handbags or backpacks are not permitted. Usually, only fully transparent bags are allowed in. These transparent bags give security teams greater visibility into what fans are bringing into the arena, and that greater visibility is necessary when a small/limited team of security personnel is responsible for ensuring the safety of tens of thousands of fans. It may seem like a small detail to the average event goer, but it is a major guideline for security teams to leverage.

Similarly, IT security and networking leaders who are responsible for safeguarding campus networks require greater visibility, too. At all times, they must know the identities of all connected devices and the types of workloads and traffic that are traversing the network. They need to know who is accessing what and if access privileges are being respected or abused. Ideally, what campus network teams need is a way to authenticate every client that requests a connection and to continuously compare its configuration and status to a defined set of acceptable security states to ensure it will not introduce vulnerabilities or participate in an attack. As a bonus, the solution could be provided by a single vendor so the tools could operate as a united front.

Here is the good news: Such a solution is already available within the HPE Aruba Networking Edge Services Platform (ESP) security solutions portfolio. Let’s explore.

Identity Is Critical

According to a survey conducted by the Ponemon Institute that involved a cross section of more than 2,000 IT professionals, 45% of respondents believe Zero Trust is a theoretical framework that cannot be implemented. Additionally, only 27% of respondents are confident or very confident in their ability to know all users and devices connected to their networks at all times. These two findings correlate with one another because Zero Trust is completely unobtainable if you don’t know the identity of all devices on your network. Without identity, there is no trust.

No Identity – no access.

And we aren’t just talking about BYOD laptops, tablets, and phones. This applies to cameras, sensors, medical equipment and other undetected IoT devices. Zero Trust means having the visibility to know the identity of every device requesting a connection. Not most devices – all devices.

HPE Aruba Networking ClearPass Device Insight

There have been 802.1X solutions on the market for some time now. These solutions only allow authorized devices to connect to the network. However, their implementation process is labor intensive and time consuming. That’s not the case with ClearPass Device Insight. This cloud application performs a wide range of Zero Trust architecture techniques as it discovers and profiles all devices connected to the network in automated fashion.

This solution allows network administrators to discover, monitor, and automatically classify new and existing devices that connect to a network, thus eliminating the costly guesswork of what a device is in a DHCP address list. ClearPass gives you granular visibility into the attributes of every device including its type, vendor, hardware version, and behavior. This collective information helps your team create granular access policies to control these devices and reduce risk exposure introduced to the network. Once a device’s identity is confirmed, it is then authenticated every time it connects to the network.

Additional Components Of Zero Trust Security

Visibility, identity, and authentication are only part of the Zero Trust security equation. Here’s some additional elements to factor in:

  • Role-based Access Control (RBAC): Helps enforce the principle of least privilege so users are only granted the minimum level of access required to perform their duties. RBAC also allows organizations to segment their network and applications based on roles.
  • Conditional Monitoring: Continuously evaluates the trustworthiness of users and devices based on factors such as user behavior and device profile. It also uses advanced analytics and machine learning algorithms to identify anomalies and deviations from normal behavior patterns. Anything abnormal is deemed a potential risk and treated as such.
  • Enforcement and Response: Ensure that a detected anomaly or possible threat is acted upon and, if necessary, remediated before it has the chance to disrupt network and business operations.

Similar to ClearPass, the HPE Aruba Networking ESP solution suite provides components that achieve all these capabilities in a single packaged solution. The ESP solution suite includes:

  • Client Insights
  • ClearPass
  • Dynamic Segmentation
  • Policy Enforcement Firewall
  • Central NetConductor
  • 360 Security Exchange

Final Thoughts

Zero Trust security is not a theoretical framework or exercise. It is an achievable state that every campus network should strive for because it can, thanks to HPE Aruba Networking and its potent lineup of Zero Trust security solutions. Talk to a WEI Zero Trust security specialist to learn more.

Next Steps: Just about every business we talk with has long-term remote workforce initiatives, and security has become a larger focal point of each conversation because devices are no longer protected by the traditional enterprise perimeter. Don’t leave security to chance with your remote workforce. See how HPE Aruba Networking is solving the challenge with Remote Access Points, and find out just how easy their RAPs are to implement and manage in our tech brief below.

The post How to Connect & Protect for Zero Trust Security appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/how-to-connect-protect-for-zero-trust-security/feed/ 0
Six Ways to Achieve Edge-To-Cloud Security With Aruba /blog/six-ways-to-achieve-edge-to-cloud-security-with-aruba/ /blog/six-ways-to-achieve-edge-to-cloud-security-with-aruba/#respond Tue, 21 Sep 2021 12:45:00 +0000 https://dev.wei.com/blog/six-ways-to-achieve-edge-to-cloud-security-with-aruba/ In today’s rapidly changing work environments, enterprises can no longer mix and match solutions in an attempt to provide security for on-premises and remote employees. Instead, enterprises need one solution...

The post Six Ways to Achieve Edge-To-Cloud Security With Aruba appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
edge-to-cloud, cloud security, Aruba Networks, Aruba ClearPass, Aruba Central

In today’s rapidly changing work environments, enterprises can no longer mix and match solutions in an attempt to provide security for on-premises and remote employees. Instead, enterprises need one solution that can provide comprehensive, holistic security from edge-to-cloud.

This is a critical time in cybersecurity. Over the last 18 months we’ve seen new security challenges arise as a direct result of the pandemic, including:

  • A rise in shadow IT-related incidents fueled by the exodus to remote working.
  • Increased cyberattacks, especially ransomware attacks.
  • Massive growth of the attack surface as enterprises prioritized performance and productivity over security.

Mix in the proliferation of Internet of Things (IoT) technologies and the inherent security challenges associated with cloud computing and it seems impossible that one platform can secure your on-site users, your remote employees, and the multitude of other devices used across your enterprise every single day.

, begs to differ. Keep reading to find out how Aruba Networks’ built-in security solutions can protect against advanced threats.

1. Aruba For Device Discovery And Profiling

Regardless of the industry, enterprises have huge numbers of devices to manage, whether they’re known and are IoT devices, are utilized by employees, or are unknown and belong to vendors, customers, or other visitors. To stay ahead of the security challenge presented by these devices, enterprises need a solution that can bring visibility and control. Through Aruba ClearPass Device Insight, IT can address the risk associated with these devices and block security holes before bad actors find them.

2. Network Access Control For Wired, Wireless, And WAN

With Aruba ClearPass Policy Manager, IT can rest assured that vulnerable data is protected through centralized user and device authentication, role-based access policies, and continuous attack response.

Through this dynamic, real-time device management system, access for authorized users is simplified, improving employee productivity and reducing risk. ClearPass also supports BYOD initiatives, further improving user experience.

3. Unified Threat Management For SD-WAN

Unlike other security solutions, doesn’t sacrifice performance for security. Through built in edge- and cloud-based security controls, enterprises can reap the full benefits of their cloud and broadband investments.

Despite the attention devoted to performance, enterprises can be confident that the network is secured from edge-to-cloud. Through firewalls placed at the edge, to dynamic segmentation and advanced threat response, Aruba prevents and contains threats, regardless of how distributed your environment is.

4. Secure Remote Access VPN Solutions

These days, you can never be sure where your employees are going to be working from. While many enterprises made plans to go back to the office this fall, those plans have been put on hold due to the ongoing health crisis. Instead, many users continue to work from home, from the road, from hotels, and basically anywhere with an internet connection.

As a result, enterprises need to be ready with secure remote access virtual private network (VPN) solutions. This same technology can also be applied for micro and macro branch locations, reducing the need for multiple, often incompatible solutions or complicated integration scenarios.

5. Policy Enforcement Firewall

With Aruba Networks, enterprises can take security right to the source of data with a policy enforcement firewall (PEF), which provides automated dynamic segmentation for wireless and wired access security in any Aruba Networks environment.

By placing a firewall at the point of connectivity, Aruba Networks is giving enterprises a simple way to control access to the network without creating additional cost or complexity.

6. Integrated Protection For Aruba WLAN

Last but not least, software prevents denial-of-service and man-in-the-middle attacks, while also reducing the risk of over-the-air security threats. As a result, enterprises no longer need to install separate RF sensors or security sensors if they’re using Aruba wireless LAN.

Securing the future of ‘work’ looks different than yesterday, but WEI and Aruba can help.

The edge will only grow and become more complex if you don’t start taking an active approach to integrating security at the endpoints of your business. If you’re interested in any of the security strategies discussed above, WEI can help. offers the holistic security and architectural simplicity needed to stay competitive in today’s rapidly evolving digital landscape. By taking advantage of Aruba’s full portfolio of security solutions and out-of-the-box integrations, enterprises can fully secure their remote, hybrid, or on-premises workforces.

To make the transition easy, talk to WEI. Our team of network security experts know Aruba’s portfolio inside and out an have implemented it for customer across several different industries. While the details of each project may be different, the goal is always the same, secure my business and the way people interact with it, at the edge.

NEXT STEPS: Just about every business we talk with has long-term remote workforce initiatives, and security has become a larger focal point of each conversation because devices are no longer protected by the traditional enterprise perimeter. Don’t leave security to chance with your remote workforce. See how Aruba is solving the challenge with Aruba Remote Access Points, and find out just how easy Aruba RAPs are to implement and manage in our tech brief below.

The post Six Ways to Achieve Edge-To-Cloud Security With Aruba appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/six-ways-to-achieve-edge-to-cloud-security-with-aruba/feed/ 0
Network Security Trends: SASE, Zero Trust and SD-WAN /blog/network-security-trends-sase-zero-trust-and-sd-wan/ /blog/network-security-trends-sase-zero-trust-and-sd-wan/#respond Tue, 10 Aug 2021 12:45:00 +0000 https://dev.wei.com/blog/network-security-trends-sase-zero-trust-and-sd-wan/ In the past year and a half, securely facilitating remote working has become a priority for a majority of enterprises. It’s also become clear that remote working is going to...

The post Network Security Trends: SASE, Zero Trust and SD-WAN appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>

In the past year and a half, securely facilitating remote working has become a priority for a majority of enterprises. It’s also become clear that remote working is going to be a longer-term or permanent working model enterprises will need to support.

In the early days of the pandemic, ensuring uninterrupted access took priority over security, but as time has gone on, enterprises have started the process to replace emergency patchwork measures with secure, long-term solutions.

Thankfully, there are a variety of strategies available to secure both off- and on-premises infrastructure. In this blog, we’ll be discussing the current state of secure access service edge (SASE), zero trust architectures, and software-defined wide-area networks (SD-WAN), as shared in a recent report by Ponemon Institute and sponsored by .

Simplifying Through SD-WAN

At its core, SD-WAN is a simplified approach to managing the wide-area network (WAN) architecture. This is achieved by decoupling the network hardware from the control mechanism, allowing enterprises to build WAN infrastructure at lower cost and with better performance.

In terms of security, architecture utilizes encryption and VPNs to secure traffic, offering significant benefit for enterprises with a remote or hybrid workforce.

In the course of their research, Ponemon found that 44% of the 598 North American IT professionals surveyed as part of the study considered themselves “familiar” with SD-WAN technology, compared to 64% who expressed familiarity with zero trust and 45% that were familiar with SASE.

In terms of implementation, 35% of respondents indicated that they had already deployed or will deploy SD-WAN within the next 12 months.

Ponemon also found that when it comes to implementation, a majority of respondents found that, “the network team has the most influence in the deployment of SD-WAN solutions with advice from the security team.”

Take Control With Zero Trust

Zero trust describes both an IT solution and a security philosophy. When utilizing zero trust as part of a networking strategy, enterprises take the approach that no device can be trusted by default and that mutual authentication provides enhanced protection compared to other methods.

As previously identified, Ponemon found that respondents were overall more familiar with zero trust strategies than SASE and SD-WAN. That also translates to implementation, with 43% of North American respondents indicating they had deployed or will deploy zero trust within the next 12 months.

It was also found that enterprises that self-reported as “highly confident” in their security architecture were more likely to have implemented at least one of these security strategies, with a majority of organizations within that group having implemented zero trust (48%) compared to SASE (43% ) and SD-WAN (33%).

Utilize The Cloud For Security With SASE

For many enterprises, architecture is an attractive networking solution because it simplifies both WAN and security by delivering both as a cloud service directly to the source of the connection. This is particularly helpful for organizations with remote or highly mobile workforces that frequently utilize cloud applications.

Of the three strategies covered by Ponemon in their study, SASE was the least utilized, with only 30% of North American respondents having already deployed or planning to deploy SASE in the next 12 months.

In terms of implementation, a majority of respondents indicated that when it comes to SASE, they would select a “best-in-breed” vendor when, “deploying both SD-WAN and cloud delivered security for a SASE architecture.”

It was also found in the course of the study that a majority of respondents said they would “use leading vendors who focus on cloud-delivered security services” when implementing cloud-delivered security services.

Take Your Network Security To The Next Level With Aruba

If your enterprise is interested in any of the security strategies discussed above, WEI and Aruba can help. offers the holistic security and architectural simplicity needed to stay competitive in today’s rapidly evolving digital landscape. By taking advantage of Aruba’s full portfolio of security solutions and out-of-the-box integrations, enterprises can fully secure their remote, hybrid, or on-premises workforces. What’s more, you don’t have to go it alone. Our team of Aruba experts are ready to answer your toughest questions. We have extensive knowledge across Aruba’s entire network security portfolio and can architect and deploy custom solutions unique to your business needs. .

NEXT STEPS: See how Aruba is helping enterprise companies secure their remote workforce with Aruba Remote Access Points in our tech brief below. And ask us about our experience with Aruba RAPs!

The post Network Security Trends: SASE, Zero Trust and SD-WAN appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/network-security-trends-sase-zero-trust-and-sd-wan/feed/ 0
Fulfill Your NAC Solution Needs With Aruba ClearPass /blog/fulfill-your-nac-solution-needs-with-aruba-clearpass/ /blog/fulfill-your-nac-solution-needs-with-aruba-clearpass/#respond Tue, 24 Mar 2020 12:45:00 +0000 https://dev.wei.com/blog/fulfill-your-nac-solution-needs-with-aruba-clearpass/ To reliably ensure continued network security, IT professionals know the importance of complete visibility, and governance of all connected devices. A single vulnerability or just one device with unrestricted access...

The post Fulfill Your NAC Solution Needs With Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>

To reliably ensure continued network security, IT professionals know the importance of complete visibility, and governance of all connected devices. A single vulnerability or just one device with unrestricted access can be enough for a hacker to find their way into your network.

Their goal, of finding that one weak point, is much simpler than IT’s job of protecting every single device on the network, at least the ones you can see. By implementing a network access control solution, your network security team can identify, assess, and enforce access control on any and all devices before they connect to your network.

is an NAC solution to highly consider. Offering agentless policy control, and automated response, ClearPass will keep your enterprise secure without impeding operations.

A three step plan for complete access control

Aruba’s philosophy for network access control begins with a .

  1. First, identify the devices that are connected to the network, how many there are, from where they are connecting, and what operating system they are using. These important pieces are the foundation of visibility.
  2. Next, enforce policies that provide user and device access, across all users, , and locations. Consistency throughout the enterprise creates an expected user experience, which is an important piece to ensuring efficient workflow.
  3. Finally, protect resources through dynamic policy controls, and real-time threat remediation, which extends to third-party systems. Being prepared for unexpected network behavior requires a unified approach that can block traffic, and adjust a device’s connection status.

Aruba ClearPass offers Agentless Policy Control and Response

In an age where the makes use of three devices, NAC solutions must deliver profiling, policy performance, guest access, and more.

ClearPass offers all of the above. Not only does it make network access for guests simple, it offers an alternative to manual intervention whenever a user works remotely or brings their own smartphone.

With , configuration of mobile devices is done automatically, enabling them to connect to enterprise networks without compromising security. This not only supports guest access, but also facilitates BYOD initiatives as well.

Additionally, the enterprise security team will have complete visibility, and centralized policy management capabilities, through , part of the Aruba 360 Secure Fabric. As the most advanced secure NAC platform available, ClearPass is unrivaled as the foundation for network security for organizations at any size.

Beyond automated capabilities, and the full visibility and control offered to enterprise security teams, ClearPass supports secure self-service capabilities, allowing end users to access the network and securely configure their own devices, reducing the burden on IT.

Reduce risk throughout the network

The Aruba Policy Enforcement Firewall (PEF), which acts as the policy enforcement mechanism for ClearPass, is a comprehensive access control solution, which provides a “zero trust” boundary at the point of access.

While traditional firewalls that leverage IP-based VLANs only become active after a user or device is admitted to the network, Aruba’s PEF uses identity, traffic attributes, and other context to centrally enforce access privileges at the time of initial connection. This important difference ensures that a hacker, who can unleash thousands of malware packets in just a few seconds, has the least amount of time possible to do damage should they gain access to the enterprise network.

When using Aruba’s infrastructure, the identity of each user or device is verified before access is granted to the network or its resources. Following this, a role is assigned, and permissions are granted, based on pre-defined rules. This system limits what applications and data a user can reach or who they can communicate with, an important part of reducing security risks.

Additionally, the Aruba PEF has been designated a by . This designation certifies that the Aruba PEF is effective in reducing cyber risk. Additionally, participating insurers may offer organizations that adopt Cyber Catalyst-designated solutions enhanced terms and conditions on cyber insurance policies.

Ready for a secure NAC solution?

Aruba ClearPass offers enterprises agentless visibility, and dynamic role-based access control, for seamless security enforcement and response across your networks. If you’re ready to make the change now, contact WEI to find out how Aruba Clearpass can work in your network environment.

The post Fulfill Your NAC Solution Needs With Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/fulfill-your-nac-solution-needs-with-aruba-clearpass/feed/ 0
Ensure Network Security With Aruba ClearPass Network Access Control /blog/ensure-network-security-with-aruba-clearpass-network-access-control/ /blog/ensure-network-security-with-aruba-clearpass-network-access-control/#respond Tue, 23 Jul 2019 12:45:00 +0000 https://dev.wei.com/blog/ensure-network-security-with-aruba-clearpass-network-access-control/ As the demand for mobility at work increases, laptops, smartphones, tablets and Internet of Things (IoT) devices are pouring into the workplace. On average, employees utilize three different devices at...

The post Ensure Network Security With Aruba ClearPass Network Access Control appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
network security_lock

As the demand for mobility at work increases, laptops, smartphones, tablets and Internet of Things (IoT) devices are pouring into the workplace. On average, employees utilize three different devices at a time – and all of them increase vulnerabilities inside your enterprise.

Identifying who and what is connecting is the first step towards network security and protecting your enterprise. The automated application of wired and wireless policy enforcement ensures that only authorized and authenticated users and devices are allowed to connect. At the same time. real-time attack response and threat protection is required to secure and meet audit and compliance requirements.

Ensuring network security means changing priorities for IT

The boundaries of IT’s domain now extend beyond the four walls of the business’ physical location. With the need to connect anywhere, anytime, how does IT maintain visibility and control without sacrificing security? It starts with a three-step plan.

  1. Identify what devices are being used, how many, where they’re connecting from and which operating systems are supported. These insights give IT the visibility required over time.
  2. Enforce accurate policies that provide proper user and device access, regardless of user, device type, or location.
  3. Protect resources via dynamic policy controls and real-time threat remediation that extends to third-party systems.

Aruba ClearPass provides full-spectrum visibility across the network

Network security starts with visibility of all devices, because you can’t secure what you can’t see. Here’s a look at the tools being rolled out to increase visibility:

  • ClearPass Device Insight greatly enhances core discovery and profiling capabilities to identify the wide range of IoT devices in many environments.
  • ClearPass OnConnect is a built-in feature that enables organizations to lock down those thousands of wired ports using non-AAA enforcement.
  • ClearPass Onboard lets users safely configure devices for use on secure networks on their own, while allowing IT to define which users have that privilege, the type of device they can use, and how many devices per person.
  • ClearPass Guest makes it easy and efficient for employees, receptionists, event coordinators, and other non-IT staff to create temporary network access accounts for any number of guests per day, which can be set to expire automatically.
  • ClearPass OnGuard features built-in capabilities that perform posture-based health checks to eliminate vulnerabilities across a wide range of computer operating systems and versions.

The final element of network security is response: the ability to respond to attack event data presented by other security vendors. lets you automate security threat remediation or enhance a service using popular third-party solutions like firewalls, MDM/EMM, MFA, visitor registration, and SIEM tools. Leveraging the context intelligence included in Aruba ClearPass allows organizations to ensure that security and visibility is provided at a , network access, traffic inspection, and level.

Using a common-language (REST) API, syslog messaging, and a built-in repository called ClearPass Exchange, automated workflows and decisions help simplify tasks and secure the enterprise – no more complex scripting languages and tedious manual configuration. And for faster integration, ClearPass Extensions allows partners to upload an extension, for real time delivery of new services to joint customers.

With ClearPass Exchange, networks can automatically take action:

  • MDM/EMM data like jailbreak status of a device can determine if it can connect to a network
  • Firewalls can accurately enforce policies based on user, group, and specific device attributes, and leverage ClearPass to remediate a device exhibiting poor behavior
  • SIEM tools can be set-up to store authentication data for all connected devices
  • Users can be asked to use multi-factor authentication to verify their identity when connecting to networks and resources

Network events can also prompt firewalls, SIEM, and other tools to inform ClearPass to take action on a device by triggering actions in a bidirectional manner. For example, if a user fails network authentication multiple times, ClearPass can trigger a notification message directly to the device or blacklist the device from accessing the network.

Protect network security by detecting threats before they do damage

Modern threats to network security are now evolving from inside organizations. They may involve malicious, compromised, or negligent users, systems, and devices. An enterprise can no longer look at security the same way. Machine learning and behavior analysis are the next steps to solving the dual crisis of better resourced threats and undervalued security operations.

Aruba’s IntroSpect UEBA plugs the gap between device visibility and control, and the secondary threat of malicious behavior. It detects small changes in behavior that, when put into context over a period of time, become indicative of attacks that have evaded traditional security defenses.

With the integration of IntroSpect and ClearPass, the prevision alerts generated by one mean that the other can respond with pre-determined policy-based actions and cut off the threat before it does damage.

Contact WEI for a custom network security solution with Aruba ClearPass today

Over 7,000 customers in 100 countries have secured their network and their enterprise with for better visibility, control, and response. To start the conversation about how you can better protect your organization, contact WEI today.

The post Ensure Network Security With Aruba ClearPass Network Access Control appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/ensure-network-security-with-aruba-clearpass-network-access-control/feed/ 0
An Overview of the Top 4 SD-WAN Solutions /blog/an-overview-of-the-top-4-sd-wan-solutions/ /blog/an-overview-of-the-top-4-sd-wan-solutions/#respond Thu, 17 Jan 2019 13:45:00 +0000 https://dev.wei.com/blog/an-overview-of-the-top-4-sd-wan-solutions/ SD-WAN (Software-Defined Wide Area Network) is about recognizing the importance of the entire forest that is your network. It is about ensuring that all of your sites enjoy the same...

The post An Overview of the Top 4 SD-WAN Solutions appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
SD-WAN (Software-Defined Wide Area Network) is about recognizing the importance of the entire forest that is your network. It is about ensuring that all of your sites enjoy the same level of performance, automation, load optimization, and security that your central operations office does. This is the pretext for SD-WAN. SD-WAN is about applying software defined technology to your WAN connections regardless of distance and complexity. The goal is to optimize the experience of all of your users, regardless of enterprise location. This blog outlines four of the leading SD-WAN solutions in the market today.

VMware NSX SD-WAN with VeloCloud

VMware CEO, , compares the current vibe about their SD-WAN solution to that of the early days of virtualization when VMware changed how servers are managed and deployed with its ESXI virtual technology. He describes its VeloCloud product as, “the hottest element of the company’s product portfolio.” Gelsinger added, “VeloCloud is quickly becoming a key element of VMware’s edge strategy.”

VeloCloud is incorporated into VMware’s -SD-WAN. The premise behind the product is simple – bring the same level of agility and flexibility to branch offices in order to deploy, manage, and secure application traffic remotely using a transport independent architecture. VMware accomplishes by substituting rigid inflexible network hardware for the nimbleness and flexibility of software. By separating the control plane and data plane layers, intelligence is moved from the data plane to the programmable control plane, substituting labor intensive tasks with automated policies. Some of the specific abilities of VeloCloud include:

  • Increase bandwidth economically by aggregating WAN circuits of any type, while at the same time, providing faster application response
  • Deploy a branch in minutes with NSX SD-WAN Edge activation from the cloud
  • Enable direct cloud access for all users
  • Provide standard based encryption to secure connectivity over any type of transport
  • Compact multiple virtualized network functions to eliminate single-function appliances and reduce branch IT complexity.

With VeloCloud, VMware is developing a framework that extends its hybrid and multi-cloud environments to the edge for both applications and IoT devices alike. The result is a branch architecture that is agile, automated, and secure.

Cisco Viptela

Cisco has been a leader in WAN infrastructure technology for decades and their SD-WAN product is one of the most widely deployed enterprise solutions of its kind. With Cisco SD-WAN, the company sets out to ensure that every organization can become an “always connected workplace” whether work takes place at corporate headquarters, or district offices thousands of miles away. With deployment cycles growing every shorter and growing branch complexity throughout the network enterprise, Cisco identified the need to create to create a carrier agnostic overlay for any WAN, centralized management and increased visibility and versatility. Formerly , Cisco acquired this leading software defined technology to serve as a natural extension of their dominant product line. By software defining their branch network gateways, companies can reduce their WAN costs as much as 50%.

There are three main facets to Cisco’s software defined WAN solutions.

  • Segmentation – Cisco SD-WAN takes the concept of the traditional VLAN even further to provide end-to-end segmentation that is policy driven in order to ensure that WAN traffic is protected.
  • Zero-touch provisioning – Cisco SD-WAN gives central IT the ability to perform centralized control deployments and upgrades in order to scale out deployments fast enough to react to changing dynamics.
  • Cloud Integration – If everyone is turning to the cloud for its many benefits, then it only makes sense to bring the power of the cloud to the WAN as well. Cisco SD-WAN is cloud based and integrates a cloud first philosophy directly into your WAN infrastructure that simplifies security and improves application performance.

Fortinet and SD-WAN

According to Gartner, 90 percent of SD-WAN vendors are not traditional security vendors and thus there are serious gaps within many of their solutions. Fortinet now integrates their Next Generation Firewall solutions with SD-WAN capabilities. The result is increased scalability, greater flexibility, improved simplicity, and cost savings. All of this without any compromise to security.

erases geographic boundaries, forming a mess like network that connects network and security paths to all of your locations across the world using multiple types of connectivity links that create a borderless infrastructure. It also does away with the need for multiple network devices residing at each branch gateway as all security, routing and management functions are conducted within a single appliance.

When it comes to security, Fortinet offers the full gamut of tools including application control, web filtering, antivirus, intrusion detection and advanced threat detection. Perhaps this is why Fortinet is the only vendor with security capabilities to receive the SD-WAN recommended rating in the First NSS Labs Software-Defined WAN Test Report. Because cost savings is a primary motivation for companies to explore SD-WAN opportunities, FortiGate SD-WAN shows that you can have your cake and eat it too.

Aruba Branch

Aruba is the same company that improved the visibility, security, and management capabilities of your wireless network and now wants to apply those same standards of visibility, control, simplicity, and security to the WAN. In the same way that their enterprise wireless platform solutions can control and react to your highly dynamic wireless environments, Aruba’s SD-WAN solution uses contextual data and awareness to dynamically route traffic across the WAN based on user, device, or group affiliation. Whether it is data, video, voice, or IoT, Aruba can protect and optimize all of your traffic patterns, LAN and WAN alike. Traffic segmentation, isolation and path selection are enforced for not just the last mile of connectivity, but the entire route from device to WAN exit point.

Like the previous vendors, Aruba’s solution is centered around software defined architecture that combines multiple virtual network functions into their SD-Branch appliance. Aruba’s branch gateway appliance connects to all WAN uplinks and provides an SD-WAN overlay fabric that makes application management and deployment a snap. Gateway functions include stateful firewall capabilities, IPsec encryption, VPN, QoS and WAN path monitoring. SD-Branch integrates with Aruba Central that provides single pane of glass visibility and manageability for all of your locations. But integration isn’t just about Aruba. The company’s security partner program has more than 140 technology partners, all of whom provide added functionality and innovation to an already powerful and proven platform.

Conclusion

Every mile of connectivity for your application traffic is important. The last mile is no less important than the first. Each of these vendors have proven solutions to optimize and secure the total connectivity arteries of your WAN. Each of these solutions brings agility and security to any WAN environment, making your WAN, a fully controlled and optimal environment. Talking to a trusted technology partner like WEI can help you see which SD-WAN strategy would be the best fit for your organization.

Next Steps: Sign up for a hat covers RF coverage maps, RF analysis, capacity plans, channel plans, access point installation recommendations, and more!

The post An Overview of the Top 4 SD-WAN Solutions appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/an-overview-of-the-top-4-sd-wan-solutions/feed/ 0
3 Reasons Why NAC Should be Part of your Networking Strategy /blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/ /blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/#respond Thu, 10 Jan 2019 13:45:00 +0000 https://dev.wei.com/blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/ Securing the enterprise is an evolving challenge today. In order to effectively manage today’s enterprise, you must be able to draw a complete picture of everything connected to your network....

The post 3 Reasons Why NAC Should be Part of your Networking Strategy appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
network-access-controlSecuring the enterprise is an evolving challenge today. In order to effectively manage today’s enterprise, you must be able to draw a complete picture of everything connected to your network. Enterprises are implementing a Network Access Control solution (NAC) to identify, assess, and enforce access control on any and all devices before they connect to the network. A NAC solution provides the basic necessity of knowing what devices IT is tasked with securing. A NAC solution can identify and profile each subsequent device wanting to connect, as well as:

  • Perform health check assessments
  • Enforce access control policies
  • Conduct remediation tasks in many cases

BYOD

NAC is most commonly perceived as a solution for bring your own device (BYOD) environments. While there are other applications for NAC, there are good reasons why it is used for BYOD. NAC solutions are usually associated today with BYOD environments because users regularly bring external devices into the enterprise, consider a higher educational institution. is the leading NAC solution today that provides a self-service portal that guides users through the process of connecting personal or non-enterprise devices without IT involvement or intervention.

IoT Devices

But the need for NAC solutions such as ClearPass exceed far beyond BYOD environments. It isn’t just mobile that is rapidly increasing the attack surfaces of enterprises today. It’s also those little black box like devices that are cropping up throughout companies and organizations, otherwise known as IoT devices. These non-standardized devices are difficult to identify because there are so many types of devices and they’re manufactured by so many different vendors. And then there is the issue of security, of course! According to Peter Newton, senior director of product marketing at Fortinet, “Many IoT devices are inherently untrustworthy because they weren’t designed with security in mind due to their low cost.” He goes on to refer to them as “headless,” meaning that these devices often lack any authentication or methodology to log on to the device. As a result of companies deploying so many IoT device types throughout their networks at an accelerating pace, companies such as Aruba, Fortinet and Cisco have introduced next generation NAC solutions that are designed to accommodate device conglomerations of all types, IoT being one of them.

There is no doubt that IoT devices are a different breed of device and concern about their inherent vulnerabilities is a legitimate concern in the IT community. According to a survey posted in CSO Magazine in September of 2018, only 10 percent of IT managers reported being fully confident that they knew all of the IoT devices on their networks. An alarming 64 percent responded that they either had no level of confidence or very little. In a recent Ponemon Institute’s report concerning the era of IoT and the security gap it contributes to, 66 percent of respondents say their organizations are unable to or have a low ability to secure their IoT devices and apps. Only 24 percent of respondents say their organization’s IoT devices are appropriately secured with a proper security strategy in place. More than half stated that visibility was essential for detecting attacks and 41 percent said that NAC is important for addressing IoT risks.

Both and ClearPass each have NAC solutions that use “collectors” in order to discover all endpoints on your network rather than relying on a database or endpoint agents. These collectors or data sources include but are not limited to RADIUS, SNMP, DHCP and LDAP. An example of the many data sources that uses is shown below.

Both ClearPass and FortiNAC then create profiles for each device in order to identify, categorize it and even create separate security domains for them. This ability to segment IoT devices increases the security of the network and therefore the confidence in the enterprise. With a NAC solution, the issues of who, when, where and how IoT devices are connect to your network are no longer unanswered questions. NAC goes beyond adding clarity and visibility however. NAC also conducts pre and post connection assessments of all access controlled devices according to policies that enforce security measures in dynamic fashion according to slated criteria.

Traditional Networks

Although mobile and IoT devices get most of the focus when discussing NAC, solutions such as Aruba ClearPass are ideal for securing wired traditional networks as well. Rather than using the cumbersome process of MAC filtering in order to secure switch ports, ClearPass uses a single RADIUS 802.1x authentication solution to ensure that only authorized devices and users can connect to your network drops. Today’s NAC solutions can provide visibility into your VPN connections as well, identifying remote devices to better secure your network.

Conclusion

The concept of access control may seem overly simple and old fashioned, but keeping intruders and unauthorized parties out is at the core of any type of security strategy. The concept of NAC today is the same as it was more than a decade ago, yet the justification and rationalization for implementing a NAC solution is even more relevant today. You could say that NAC is back, a proven technology that is ideally suited for today’s mobile and IoT environments. Talking to a technology partner like WEI can help organizations get started with NAC.

Next Steps: Sign up for a that covers RF coverage maps, RF analysis, capacity plans, channel plans, access point installation recommendations, and more!

The post 3 Reasons Why NAC Should be Part of your Networking Strategy appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/3-reasons-why-nac-should-be-part-of-your-networking-strategy/feed/ 0
Aruba ClearPass – Profiles, Health checks, Segmentation, and more /blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/ /blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/#respond Thu, 15 Nov 2018 13:15:00 +0000 https://dev.wei.com/blog/aruba-clearpass-ae-profiles-health-checks-segmentation-and-more/ Recently I was talking to the network manager of a school district in Georgia. The district had just experienced a large scale malware attack. It started in the transportation department,...

The post Aruba ClearPass – Profiles, Health checks, Segmentation, and more appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
Aruba-ClearPassRecently I was talking to the network manager of a school district in Georgia. The district had just experienced a large scale malware attack. It started in the transportation department, which had refused to let go of some outdated machines that were susceptible to the EternalBlue windows vulnerability, made famous by the WannaCry and NotPetya malware encryption attacks last summer.

Several Trojans then took advantage of the web of shared files, spreading cryptocurrency-mining malware throughout the department. Bank Trojans were then introduced and soon an administrator password was recorded and compromised. The virus began proliferating throughout the school system, taking advantage of devices that were behind in their endpoint protection updates. As the school has a successful one-to-one program that boasts more than 13,000 laptops, the virus had a lot of potential targets. Slowly and methodically, the virus grew, consuming the processing power of servers and client devices, capturing account credentials as users interacted with the machines. By the time the full ramifications of the virus had come to light, the only available option was to bring in additional resources to clean servers and reset or re-image workstations.

The district’s enterprise infrastructure consisted of hundreds of Aruba switches along with Aruba Instant Access Points. It’s just too bad they didn’t have ClearPass to complement and secure the enterprise. Many people associate as a system to onboard and authorize BYOD and guest devices. Others know it as a (NAC) solution. While those are important components of Aruba ClearPass, that sell this multifaceted solution well short. ClearPass is a policy management platform that gives you broad visibility throughout your enterprise and offers a suite of tools to protect your networks and the infrastructure that supports it.

Identifying what is on your network

One problem for the school district was the inability to know what exactly was on its network. While the IT staff was able to discern through SCCM logs where the virus started, often times, organizations simply have no idea. Was the malware introduced through a domain joined device, guest device, or smart phone that was anonymously brought in? Anonymity is a thing of the past with ClearPass because every device is required to check in and identify itself, whether connected via wired, wireless, or VPN. Access control policies then state whether a device can be joined or not. All of this is performed in automated fashion requiring little IT involvement. With Aruba ClearPass, you always know what and who is connected to your network with near little time invested.

Creating profiles for all of your devices

Once connected, a profile is created within ClearPass for every device. In this case, the IT department would have been reminded every day about the outdated operating systems that were vulnerable to the EternalBlue exploit. They would have known about the operating systems, hostnames and MAC addresses of each and every device on the network. A built-in certificate authority issues certificates to then identify and reconnoiter all devices while connected.

Health Checks and Posture Assessments

Malware only requires a minimal window of vulnerability to infect a network and spread. This is why it is so imperative that all connected devices are up-to-date when it comes to endpoint and operating system updates. In organizations with thousands of devices, how do you know if they are all in compliance or not? With Aruba ClearPass, there is no more uncertainty involving outdated systems. Every time a device attempts to connect, it is checked for all security criteria set forth by your IT department. This includes minimum standards concerning endpoint protection, updates and firewall activation. This is done through the use of persistent or dissolving agents that support both auto and manual remediation. ClearPass then continues to perform health checks and posture assessments in order to identify weak and vulnerable devices because it only takes one exploited device to bring down your entire network.

Segmentation

Although this malware attack infiltrated domain joined devices from the start, it is your guest network that is the most vulnerable. But how do you segment your guest network without a complicated conglomeration of VLAN switch port assignments and AP access control lists? Well, with ClearPass, VLAN segmentation is done dynamically with little configuration. All devices residing in the guest category are automatically sectored into a separate VLAN that is routed straight to the internet without complicated manual configurations. Referred to as “colorless ports,” devices are assigned to VLANs according to enforced policies, not static port placement.

Wired 802.1x Authentication

Although ClearPass is correctly associated with , it provides important management and security features for wired workstations, servers, and IoT devices as well. ClearPass incorporates 802.1x authentication methods so that the only wired computers that can gain access to your network are the ones that have LDAP or similar accounts. Wired devices can then be assigned policies as well.

Protect your dynamic enterprise network of devices

ClearPass is the policy management platform you need to identify, enforce, and protect your network devices. There is nothing static about your network, so why would you continue to depend on static-based configuration tools and methods to manage it? We can never know if ClearPass could have prevented the malware attack mentioned earlier, but it would have given IT the information and reconnaissance about their devices to have at least contained it.

Next Steps: Talk to the Aruba experts at WEI to better understand how a solution like ClearPass can benefit your business. As an award-winning IT solutions provider, WEI can perform a to detect how well your current wireless solution is performing and can help identify any gaps in coverage. Click below to learn more and get started with an assessment.

The post Aruba ClearPass – Profiles, Health checks, Segmentation, and more appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/aruba-clearpass-profiles-health-checks-segmentation-and-more/feed/ 0
Secure the Edge: 5 FAQs About Aruba ClearPass /blog/secure-the-edge-5-faqs-about-aruba-clearpass/ /blog/secure-the-edge-5-faqs-about-aruba-clearpass/#respond Thu, 25 Oct 2018 12:15:00 +0000 https://dev.wei.com/blog/secure-the-edge-5-faqs-about-aruba-clearpass/ Today’s workers are experiencing more freedom thanks to the explosive adoption of mobile devices in the enterprise. However, with an increasing amount of devices connecting to the network, IT administrators...

The post Secure the Edge: 5 FAQs About Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
Aruba-ClearPass-network-securityToday’s workers are experiencing more freedom thanks to the explosive adoption of mobile devices in the enterprise. However, with an increasing amount of devices connecting to the network, IT administrators now have an overwhelming amount of information to monitor, and most of the time there are gaps in visibility to all of the devices trying to connect to the network. Aruba Clearpass offers your IT department a way to protect your data while allowing authorized users the ability to access information on the go or in the office.

Before we dive into some frequently asked questions about ClearPass, it will be beneficial to discuss some of the misconceptions between wired and wireless networking out there. Wired is a very challenging thing to do, given that you have open ports out there. Anybody that walks into your environment can just plug in, making it important to secure the wire. is much easier, because the wireless is just one component controlling the entire wireless. With a wired connection, there are different switches, ports, and they all have to be identified compared to wireless access. With ClearPass, this identification process can be accomplished more easily. We’re able to understand or communicate with most of the major vendors out there, so that makes it easier to really authenticate any devices connecting through any type of switch out there. It isn’t even necessarily authenticating the switches, but ClearPass can also act as a TACACS server. If the user admin’s, or the IT admin’s, trying to get into a switch, we can securely provide access into those switches, either at its full access, or read-only access.

Does Aruba ClearPass integrate well with other solutions?

One of the main benefits of ClearPass is that it plays well with other technologies and systems. Nowadays many environments are not comprised of solutions from just one vendor. You may have a Cisco switch, a Palo Alto firewall, and of course you want to make sure that any product you put in your environment will be able to communicate and exchange information with all the different components. There is no such thing as vendor lock-in, you are essentially future-proofing your investment with ClearPass.

ClearPass is very flexible and it can do a lot. In fact, most customers are not currently using ClearPass to its full potential. IT teams can authenticate devices from a wireless, wired, or even from a remote VPN perspective. With VPN, you can authenticate it against most major vendors out there too, such as Juniper, Avaya, Cisco, Fortinet, etc. Talk to a trusted IT solutions provider and you will realize it is tough finding vendors ClearPass doesn’t cover from an integration perspective.

2. How can I see IoT devices on my network?

Just because you can’t see it doesn’t mean it’s not there! Many companies have no idea what’s out there when it comes to smart devices. ClearPass can identify all those wired and wireless devices, including . Companies have experienced numerous security issues with IoT devices and ClearPass can dynamically profile (with different mechanisms to profile devices) and that profile information can be used to determine what type of policy or access that device should have while connected to your network.

If the appropriate profile information is provided, it becomes quite easy to determine what is out there on the network. Different policies can then be applied to any device, including IoT devices such as a printer. For example, that process would identify the device as an actual printer and then send a VLAN or an access list to segment that particular printer from the network. This device would be segmented differently than a laptop or a phone. The key takeaway with this is that every port can be treated the same way. Aruba refers to this as “dynamic segmentation.” With dynamic segmentation, it doesn’t matter which port is being connected because different access policies can be assigned anywhere in the environment.

3. How can ClearPass provide to guests?

It’s important to understand there are different types of methods for authenticating devices. is able to do this very well. ClearPass is able to authenticate devices using 802.1X certificate-based authentication and is also able to authenticate devices using captive portal. This is a very customizable module where the captive portal page can be made with different fields. For example, if a user gets into the environment and they’re trying to get guest access, a sponsor type of access can be provided. In this instance they will need to provide the email of the person that they’re visiting in order to get access to the network enabling organizations to securely allow visitors to get guest access to the network.

Another method for this can be accomplished by having the front desk create an account for the user that will only be valid for a certain amount of time, whether the guest needs access for a day, week, or longer, depending on how long that user will be onsite.

4. How does Aruba ClearPass address challenges with BYOD?

BYOD is a clear point of emphasis for ClearPass capabilities. ClearPass allows for self-service on-boarding which allows users to onboard their own devices to the network. ClearPass can generate a unique certificate, which can be used to then revoke access into the network if the device is misbehaving.

4a. How does Aruba ClearPass the address the unique challenges of BYOD in a college campus environment?

Students are bringing more devices to their college dorm than ever before. Outside of the expected devices, like an mobile phone and laptop, students are trying to connect video game consoles, Amazon Alexas, smart TVs and devices, tablets, and more. Many of these devices are not able to perform 802.1X authentication. For many of those devices there is no way that a username and password can be entered to get those devices connected to the network. This is a concern for many IT professionals on college campuses because in a lot of institutions the standard process is that a student goes to the IT help desk to register a device. This is not an efficient process, and it certainly doesn’t scale very well.

With ClearPass, a workflow can be created to present a page to students to self-register and manage their own devices. If the student wants to provide access to another student or somebody else in their dorm they can actually do that as well. Students can manage and register their own devices, and IT/network administrators can prevent other users from being able to see those devices on the network. Users have the capability to control and provide access to whoever they want. IT administrators can also identify those devices and can assign the correct access policy into the network as well need be. This puts the power in the hands of the users.

5. How can I tell if the devices on my network are secure?

It’s great that ClearPass can provide you the visibility needed to see all of the devices on the network, but how do you really know if any of those devices have already been compromised? Which devices have vulnerabilities that could be exposed once they are on your network? ClearPass can check the health of each device. It can check, for example, if the device is running an antivirus, or whether it’s running the latest version of the antivirus, the same way an IT administrator can check whether a laptop is running the latest Windows updates. Before the device is granted access, the IT team can ensure the device meets the security requirements set by the organization. At this point ClearPass enables this feature for Windows, Macs, and Linux devices. This ensures that security strategies are being implemented correctly, and the monitoring aspect provides you that level of visibility needed to be confident your network is secure.

Conclusion

Typically, networking and security teams are the two main drivers of adoption for Aruba ClearPass, but more often than not, it’s security. At the end of the day, it’s about the visibility and security at the edge. You want to understand what’s out there. You want to make sure that devices are getting the proper access. You don’t want an IoT device to be on the same VLAN as your trusted laptops. With ClearPass you can identify, classify, and enforce.

It’s also important to note that Aruba ClearPass is pretty hot right now in all verticals, purely based on the success stories companies are experiencing after deployment. The solution is so flexible that is can meet the needs of even the most unique needs at a wide-range of companies. At WEI, we are currently implementing Aruba ClearPass in healthcare and hospitals, financial services, higher education, etc. At the end of the day, Aruba ClearPass is about securing the edge and being able to exchange information with what you already have in place, meaning you don’t have to go and invest in other solutions to get things working, which is always a big win for the IT team and the CFO.

Next Steps: Talk to the Aruba experts at WEI to better understand how a solution like ClearPass can benefit your business. Ask us about a as well to find out how well your current wireless solution is performing and to help identify gaps in coverage.

The post Secure the Edge: 5 FAQs About Aruba ClearPass appeared first on IT Solutions Provider - IT Consulting - Technology Solutions.

]]>
/blog/secure-the-edge-5-faqs-about-aruba-clearpass/feed/ 0