Managing endpoint risk for VPN access

Why Your VPN Security Should Include Endpoint Risk Analysis & Proactive Remediation Actions

Today, most organizations enable network access for remote employees via VPN – and this trend has increased exponentially due to the Coronavirus outbreak. Most VPN implementations are based on user authentication (username + password) and can include multi-factor authentication (token, push notification, and more). Previously, we discussed the need to understand endpoint risk awareness and to verify the security posture of each endpoint.

Whether the endpoint is a managed corporate device, or privately-owned (where BYOD policies apply), you still want to ensure that these devices are compliant with corporate policies, such as: antivirus and firewall being activated and up-to-date and beyond – whatever your internal compliance policy calls for.

Each organization should include in its security stack a network access control solution, that provides endpoint security posture checks as well as these capabilities to monitor and secure VPN connections:

  1. Continuous endpoint risk awareness of endpoints both on/off-premise
  2. Automated risk-based actions such as granting, denying or quarantining users
  3. Real-time endpoint remediation to keep devices in line with compliance policies

Portnox CLEAR is a network access control solution, deployed as a cloud service that provides all of the above. In the following videos, we’ll demonstrate how Portnox CLEAR enhances VPN security by verifying that all endpoints are compliant with corporate policies.

Use Case – Windows Device Connects to Corporate VPN

Scenario Description:

  • Connects an endpoint to the VPN with Active Directory credentials including Portnox CLEAR’s AgentP strong factor.
  • Risk assessment identifies security violations and denies VPN access, according to policies:
  • Antivirus is not up and running.
  • Mobile device is connected to the endpoint via USB.
  • Notifies the end-user about the endpoint risk and provides the reason for VPN access being denied.
  • Executes remediation actions to mitigate the risks and allows VPN access:
  • Starts Antivirus.
  • Disconnects USB connections for mobile devices.
  • Following these remediation actions, connects the endpoint successfully to the corporate VPN.

 

Use Case – MAC OS X Device Connects to Corporate VPN

 Scenario Description:

  • Connects an endpoint to VPN with Active Directory credentials including Portnox CLEAR AgentP strong factor.
  • Risk assessment identifies security violations and denies VPN access, according to policies:
  • Local firewall is turned off.
  • Notifies the end-user about the risk and provides the reason for VPN access being denied.
  • Executes remediation action to mitigate the endpoint risk and allows VPN access:
  • Turns on the local firewall.
  • Following the remediation action, connects the endpoint successfully to the corporate VPN.

 

By incorporating continuous risk monitoring, risk analysis, and remediation actions, a remote workforce will be able to safely connect to the corporate network and take at least one item off of the ever-expanding IT team’s “to-do” list.

Request a Demo

Manage Endpoint Risk with Portnox CLEAR in Minutes.