Contenu connexe Similaire à BYOD & Security Trends Cisco Report Similaire à BYOD & Security Trends Cisco Report (20) Plus de Cisco Russia (20) BYOD & Security Trends Cisco Report1. Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved.
BYOD & Security Trends
Sébastien Commérot
Emerging Markets Channel Lead,
EMEAR Security Partner Organization
2. Cisco Confidential 2© 2010 Cisco and/or its affiliates. All rights reserved.
• The “Bring Your Own Device” (BYOD) trend
• Security Challenges Related to BYOD
• The Latest Internet Threats
• Overview of Cisco Security Solutions
3. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Mordac, I need to
access my
professional data
from my iPad
If I help you, all
employees will want
to do the same!
I cannot
encourage
this type of
behaviour
They all
want to
work more
efficiently?
4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
7%
Tablet
53%
Laptop
35%
Smartphone
BYOD Is Already Popular for Employees
Percent Currently Using Their Own
Source: Yankee Group, June 2012.
5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
WIRED WIRELESS
6. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Organizations will have to accept BYOD
90% of customers
will allow BYOD
by 2014
from Cisco Annual Security Report, February 2013 from Gartner, Unified Access Magic Quadrant, June 2012
7. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
How do you allow the right users and devices
to access resources in your network?
How do you allow guests in your network in a
secured fashion?
How do you onboard securely new mobile
devices in your network?
How do you implement different security
policies per user and per device?
8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
How do you make sure the devices
accessing your network are clean?
How can you provide consistent security
policies across different types of connection
(Wired/Wireless/VPN)?
How do you implement a secure remote
access to your datacenter or to your data
across the cloud?
How can you protect your network and
devices against latest Internet threats?
9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
1. A legitimate site is hacked (iFrame
added on a page)
2. User is re-directed by the iFrame
towards an infected website
3. Malware is automatically
downloaded on the desktop by
exploiting a vulnerability of the
web browser
Over 83% of Web-
based threats are
using exploited
legitimate web sites
9 out of 10 web
sites vulnerable to
attack
from Cisco Annual Security Report, February 2013 From White Hat Security, Website Sec Statistics Report
11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
1.1 billion active users
751 million mobile users
550,000 active applications
70% of users engaging with
applications
12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Stalker example
13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
14. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Too big to
ignore or block.
15. Cisco Confidential 15© 2012 Cisco and/or its affiliates. All rights reserved.
Content with broad
public interest
Email sent to users
with a link to a
malicious web-site
Web-site is
downloading a
malware on the
user’s computer
16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Secure
Unified
Access ASA-X CWSISEAnyConnect
Distributed
Workplace & BYOD
Integrated
Threat
Defense
WWW
ESA WSAASA-X IPS CWS ISR
Expanded Perimeters
& Attack Surface
Secure
Data
Center ASA-CX ASA-V IPS SGT
Virtualization &
Cloud Transition
Authorized
Application &
Content Usage
WWW
WSAASA-CX CWS
Explosion of
Collaboration Tools ESA