SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Javier Liendo, CSE Security
jaliendo@cisco.com
Mexico City May 15th, 2012



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.
C97-694080-00 © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
• Cloud Security – What’s changed?
• Cloud Threats – What are new
      threats specific to cloud?
• Cisco Cloud Security




C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   2
“Cloud computing is a model for
enabling convenient, on-demand
network access to a shared pool of
configurable computing resources
that can be rapidly provisioned and
released with minimal management
effort or service provider interaction.”

C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   3
1. Cloud Software as a Service (SaaS)
   Use provider’s applications over a network
2. Cloud Platform as a Service (PaaS)
   Deploy customer-created applications to a cloud
3. Cloud Infrastructure as a Service (IaaS)
   Rent processing, storage, network capacity, and other
     fundamental computing resources




C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   4
Private cloud
                  Enterprise owned or leased, may reside on or off premise

  Community cloud
                  Shared infrastructure for specific community with common
                  concerns/goals

Public cloud
                  Sold to the public, mega-scale infrastructure

Hybrid cloud
                  Composition of two or more clouds



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   5
Hosted/Private
           Private Cloud                                                  Virtual Cloud       Public Cloud           Public Cloud
               (Iaas)                                                         (IaaS)             (IaaS)                (SaaS)


                       Data                                                 Data                    Data                 Data

                        App                                                  App                    App                  App

                         VM                                                  VM                     VM                       VM

                    Server                                                 Server                  Server               Server

                  Storage                                                  Storage                 Storage             Storage

                 Network                                                   Network             Network                 Network


                                                                                                             “They” are in                   Security
                          IT is in control                                        Shared control
                                                                                                                control

C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                                            Cisco Confidential   6
Old                                     New
                                                                         Protect the Data (and Application)
           Protect the Perimeter
                                                                         Protect the Hypervisor
           Place it in the right security VMs in motion need to move with
           zone                           ‘attached’ security policy
           Zones are static                                              Zones are dynamic and on the move!
                                                                         Virtualization means machine to
           Machine to machine traffic
                                                                         machine traffic never leaves the host
           can be seen on ‘the wire’

           Trust the ‘insider’                                           Pervasive Distrust
                                                                         Any shared resources need security
           Dedicated is secure
                                                                         scrutiny

C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   7
Experience

                                                                             Agility

                                                                         Economics

                                                                           Security



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                 Cisco Confidential   8
Policy
        Corporate Border
             Applications
              and Data




        Corporate Office




           Branch Office




                                                                         Attackers   Partners   Customers



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                      Cisco Confidential   9
Policy
        Corporate Border                                                                   Platform                Infrastructure
             Applications                                                                as a Service               as a Service
                                                                                                                                          X
              and Data                                                    Software
                                                                                                                                    as a Service
                                                                         as a Service




        Corporate Office




           Branch Office

                                                                                                                                               Home Office
                                                           Airport

                                                                                Mobile                                              Coffee
                                                                                 User    Attackers      Partners        Customers   Shop



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                             Cisco Confidential   10
Policy
        Corporate Border                                                                   Platform                Infrastructure
             Applications                                                                as a Service               as a Service
                                                                                                                                          X
              and Data                                                    Software
                                                                                                                                    as a Service
                                                                         as a Service




        Corporate Office




           Branch Office

                                                                                                                                               Home Office
                                                           Airport

                                                                                Mobile                                              Coffee
                                                                                 User    Attackers      Partners        Customers   Shop



C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                             Cisco Confidential   11
2   Public Cloud
                                                                                                                                       • Threat defense
                                                                                                                                       • Secure multitenancy
                                                                                                                                       • Secure communications




                                                                                                                                                       VDC1
   1          Cloud Customer                                                                 Cisco®  ScanSafe
                                                                           Cisco IronPort®                                                             VDC2
              •    Policy management                                           Email             Web Security
              •    Access control
              •    Threat defense                                                                                                vPC
              •    DLP

                                                                                             Internet                  IPsec/SSL

                        Campus
                                                                                     IPsec/SSL     Cisco Security Intelligence
                                                                                                       Operations (SIO)                    Active             Cisco Identity
                                                                                                                                          Directory           Services Engine

                                 Cisco                                   Cisco VXI                                                           Cisco                   Cisco
                                                                                                                                          AnyConnect™                UCS™
                               TrustSec®
                                                                                                                                          Cisco ASA              Cisco
   3                                                                                                                                        1000V                VSG
              Private Cloud
                                                                                                                                            Cisco
             • Secure multitenancy                                                                                                          ASA                       VMs
             • Separation of duties                                                                                                        5585-X

             • Data protection                                                                                                               Virtualization
                                                                                                                                              Hypervisor

C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                                   Cisco Confidential   12
Related
  Secure Cloud                                                        Cloud Security           Secure
                                                                                                                    AS Security
  Infrastructure                                                       as a Service         Cloud Access
                                                                                                                     Services
• Cisco ASA 5585; ASA                                         •       Cisco ScanSafe     • Secure SaaS access   • Secure Cloud
  SM; ASA1000V                                                        Web Security and                            Discovery Service
                                                                      Filtering          • Cisco AnyConnect™
• Cisco Nexus® 1000V                                                                                            • Security PDI
  switch                                                      •       CiscoIronPort®     • Cisco TrustSec®
                                                                      Cloud, Managed,                           • IT-GRC Services
• Cisco Virtual Security                                                                 • Cisco Identity
                                                                      and Hybrid Email     Services Engine
  Gateway                                                             Security
                                                                                         • VPN
                                                              •       Cisco SIO




 C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.                                                    Cisco Confidential   13
• Cloud Security – What’s changed?
• Cloud Threats – What are new
      threats specific to cloud?
• Cisco Cloud Security




C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   14
Thank you.




C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   15

Contenu connexe

Tendances

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Managing your Cloud with Confidence
Managing your Cloud with Confidence Managing your Cloud with Confidence
Managing your Cloud with Confidence CA Nimsoft
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum India
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefungCloud Congress
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Logicalis Latam
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Dropbox
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private CloudJim Kaskade
 

Tendances (16)

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Managing your Cloud with Confidence
Managing your Cloud with Confidence Managing your Cloud with Confidence
Managing your Cloud with Confidence
 
EMC Forum Track Introductions
EMC Forum Track IntroductionsEMC Forum Track Introductions
EMC Forum Track Introductions
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
SunGard Cloud - Infrastructure as a Service - IaaS
SunGard Cloud - Infrastructure as a Service - IaaSSunGard Cloud - Infrastructure as a Service - IaaS
SunGard Cloud - Infrastructure as a Service - IaaS
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cccc net app_wallacefung
Cccc net app_wallacefungCccc net app_wallacefung
Cccc net app_wallacefung
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010Presentación Data Center Cablevisión Day 2010
Presentación Data Center Cablevisión Day 2010
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
Webinar: eFolder Expert Series: Five Technologies from AppAssure to Boost You...
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 

En vedette

UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de software
UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de softwareUNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de software
UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de softwareMundo Contact
 
The Wireless Enterprise. Networks for Business Mobility
The Wireless Enterprise. Networks for Business MobilityThe Wireless Enterprise. Networks for Business Mobility
The Wireless Enterprise. Networks for Business MobilityMundo Contact
 
Open Source, un CRM al alcance de las PyME
Open Source, un CRM al alcance de las PyMEOpen Source, un CRM al alcance de las PyME
Open Source, un CRM al alcance de las PyMEMundo Contact
 
Telepresencia y Comunicaciones Unificadas: Mitos y Realidades
Telepresencia y Comunicaciones Unificadas: Mitos y RealidadesTelepresencia y Comunicaciones Unificadas: Mitos y Realidades
Telepresencia y Comunicaciones Unificadas: Mitos y RealidadesMundo Contact
 
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Mundo Contact
 
La Revolución del Social Business
La Revolución del Social BusinessLa Revolución del Social Business
La Revolución del Social BusinessMundo Contact
 
La Experiencia del Cliente: cumpliendo con la promesa de la marca
La Experiencia del Cliente: cumpliendo con la promesa de la marcaLa Experiencia del Cliente: cumpliendo con la promesa de la marca
La Experiencia del Cliente: cumpliendo con la promesa de la marcaMundo Contact
 

En vedette (7)

UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de software
UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de softwareUNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de software
UNIVERGE 3C: Comunicaciones unificadas, colaboración y servicios de software
 
The Wireless Enterprise. Networks for Business Mobility
The Wireless Enterprise. Networks for Business MobilityThe Wireless Enterprise. Networks for Business Mobility
The Wireless Enterprise. Networks for Business Mobility
 
Open Source, un CRM al alcance de las PyME
Open Source, un CRM al alcance de las PyMEOpen Source, un CRM al alcance de las PyME
Open Source, un CRM al alcance de las PyME
 
Telepresencia y Comunicaciones Unificadas: Mitos y Realidades
Telepresencia y Comunicaciones Unificadas: Mitos y RealidadesTelepresencia y Comunicaciones Unificadas: Mitos y Realidades
Telepresencia y Comunicaciones Unificadas: Mitos y Realidades
 
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
 
La Revolución del Social Business
La Revolución del Social BusinessLa Revolución del Social Business
La Revolución del Social Business
 
La Experiencia del Cliente: cumpliendo con la promesa de la marca
La Experiencia del Cliente: cumpliendo con la promesa de la marcaLa Experiencia del Cliente: cumpliendo con la promesa de la marca
La Experiencia del Cliente: cumpliendo con la promesa de la marca
 

Similaire à Seguridad en la Nube

Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
Cloud computing
Cloud computingCloud computing
Cloud computingLew Tucker
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...HKISPA
 
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...HKITF
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012Lew Tucker
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerIBM Danmark
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCECenk Ersoy
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012Cisco Public Relations
 
OpenStack, SDN, and the Future of Software Defined Infrastructure
OpenStack, SDN, and the Future of Software Defined InfrastructureOpenStack, SDN, and the Future of Software Defined Infrastructure
OpenStack, SDN, and the Future of Software Defined InfrastructureLew Tucker
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护ITband
 
Geospatial Community Cloud Vision
Geospatial Community Cloud VisionGeospatial Community Cloud Vision
Geospatial Community Cloud VisionDaneyon Hansen
 
Cloud Xero #1 - Intro to Cloud Computing
Cloud Xero #1 - Intro to Cloud ComputingCloud Xero #1 - Intro to Cloud Computing
Cloud Xero #1 - Intro to Cloud ComputingCraig Walker
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at CiscoCisco Canada
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsCA API Management
 
Cisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalCisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalldangelo0772
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Avaya sipwithinyourenterprise-090629022848-phpapp02
Avaya sipwithinyourenterprise-090629022848-phpapp02Avaya sipwithinyourenterprise-090629022848-phpapp02
Avaya sipwithinyourenterprise-090629022848-phpapp02Newlink
 

Similaire à Seguridad en la Nube (20)

Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
Data center 2.0: The journey to the cloud from the datacenter perspertive by ...
 
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
Government 2.1 - Let The Virtual Journey Begins, NOW: From Desktop To the Clo...
 
The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012The Ever Changing Cloud, CloudExpo 2012
The Ever Changing Cloud, CloudExpo 2012
 
PCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf FegerPCTY 2012, Cloud security (real life) v. Ulf Feger
PCTY 2012, Cloud security (real life) v. Ulf Feger
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCE
 
Tech editors conf tucker yen-jacoby revised final for may 24 2012
Tech editors conf tucker yen-jacoby revised final  for may 24 2012Tech editors conf tucker yen-jacoby revised final  for may 24 2012
Tech editors conf tucker yen-jacoby revised final for may 24 2012
 
OpenStack, SDN, and the Future of Software Defined Infrastructure
OpenStack, SDN, and the Future of Software Defined InfrastructureOpenStack, SDN, and the Future of Software Defined Infrastructure
OpenStack, SDN, and the Future of Software Defined Infrastructure
 
分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护分会场八云及虚拟环境安全防护
分会场八云及虚拟环境安全防护
 
Geospatial Community Cloud Vision
Geospatial Community Cloud VisionGeospatial Community Cloud Vision
Geospatial Community Cloud Vision
 
Cloud Xero #1 - Intro to Cloud Computing
Cloud Xero #1 - Intro to Cloud ComputingCloud Xero #1 - Intro to Cloud Computing
Cloud Xero #1 - Intro to Cloud Computing
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
 
Layer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model RequirementsLayer 7 & Burton Group: New Cloud Security Model Requirements
Layer 7 & Burton Group: New Cloud Security Model Requirements
 
Cisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-finalCisco at v mworld 2015 vmworld-deck-2015-final
Cisco at v mworld 2015 vmworld-deck-2015-final
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Avaya sipwithinyourenterprise-090629022848-phpapp02
Avaya sipwithinyourenterprise-090629022848-phpapp02Avaya sipwithinyourenterprise-090629022848-phpapp02
Avaya sipwithinyourenterprise-090629022848-phpapp02
 

Plus de Mundo Contact

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Mundo Contact
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Mundo Contact
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Mundo Contact
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Mundo Contact
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Mundo Contact
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Mundo Contact
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Mundo Contact
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Mundo Contact
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Mundo Contact
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Mundo Contact
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Mundo Contact
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Mundo Contact
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Mundo Contact
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Mundo Contact
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Mundo Contact
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Mundo Contact
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Mundo Contact
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Mundo Contact
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Mundo Contact
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Mundo Contact
 

Plus de Mundo Contact (20)

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Seguridad en la Nube

  • 1. Javier Liendo, CSE Security jaliendo@cisco.com Mexico City May 15th, 2012 C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. C97-694080-00 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. • Cloud Security – What’s changed? • Cloud Threats – What are new threats specific to cloud? • Cisco Cloud Security C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. “Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.” C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. 1. Cloud Software as a Service (SaaS) Use provider’s applications over a network 2. Cloud Platform as a Service (PaaS) Deploy customer-created applications to a cloud 3. Cloud Infrastructure as a Service (IaaS) Rent processing, storage, network capacity, and other fundamental computing resources C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Private cloud Enterprise owned or leased, may reside on or off premise Community cloud Shared infrastructure for specific community with common concerns/goals Public cloud Sold to the public, mega-scale infrastructure Hybrid cloud Composition of two or more clouds C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. Hosted/Private Private Cloud Virtual Cloud Public Cloud Public Cloud (Iaas) (IaaS) (IaaS) (SaaS) Data Data Data Data App App App App VM VM VM VM Server Server Server Server Storage Storage Storage Storage Network Network Network Network “They” are in Security IT is in control Shared control control C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Old New Protect the Data (and Application) Protect the Perimeter Protect the Hypervisor Place it in the right security VMs in motion need to move with zone ‘attached’ security policy Zones are static Zones are dynamic and on the move! Virtualization means machine to Machine to machine traffic machine traffic never leaves the host can be seen on ‘the wire’ Trust the ‘insider’ Pervasive Distrust Any shared resources need security Dedicated is secure scrutiny C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Experience Agility Economics Security C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Policy Corporate Border Applications and Data Corporate Office Branch Office Attackers Partners Customers C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Policy Corporate Border Platform Infrastructure Applications as a Service as a Service X and Data Software as a Service as a Service Corporate Office Branch Office Home Office Airport Mobile Coffee User Attackers Partners Customers Shop C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Policy Corporate Border Platform Infrastructure Applications as a Service as a Service X and Data Software as a Service as a Service Corporate Office Branch Office Home Office Airport Mobile Coffee User Attackers Partners Customers Shop C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. 2 Public Cloud • Threat defense • Secure multitenancy • Secure communications VDC1 1 Cloud Customer Cisco® ScanSafe Cisco IronPort® VDC2 • Policy management Email Web Security • Access control • Threat defense vPC • DLP Internet IPsec/SSL Campus IPsec/SSL Cisco Security Intelligence Operations (SIO) Active Cisco Identity Directory Services Engine Cisco Cisco VXI Cisco Cisco AnyConnect™ UCS™ TrustSec® Cisco ASA Cisco 3 1000V VSG Private Cloud Cisco • Secure multitenancy ASA VMs • Separation of duties 5585-X • Data protection Virtualization Hypervisor C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Related Secure Cloud Cloud Security Secure AS Security Infrastructure as a Service Cloud Access Services • Cisco ASA 5585; ASA • Cisco ScanSafe • Secure SaaS access • Secure Cloud SM; ASA1000V Web Security and Discovery Service Filtering • Cisco AnyConnect™ • Cisco Nexus® 1000V • Security PDI switch • CiscoIronPort® • Cisco TrustSec® Cloud, Managed, • IT-GRC Services • Cisco Virtual Security • Cisco Identity and Hybrid Email Services Engine Gateway Security • VPN • Cisco SIO C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. • Cloud Security – What’s changed? • Cloud Threats – What are new threats specific to cloud? • Cisco Cloud Security C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Thank you. C97-694080-00 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15