SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Cisco CyberSecurity
Strategy
Ghassan Dreibi
Manager, Business Development
2000	
  1990	
   1995	
   2005	
   2010	
   2015	
   2020	
  
Viruses	
  
1990–2000	
  
Worms	
  
2000–2005	
  
Spyware	
  and	
  Rootkits	
  
2005–Today	
  
APTs	
  Cyberware	
  
Today	
  +	
  
Hacking	
  Becomes	
  
an	
  Industry	
  
SophisEcated	
  AFacks,	
  
Complex	
  Landscape	
  
Phishing,	
  Low	
  
SophisEcaEon	
  	
  
“Captive Portal”
“It matches the pattern”
“No false positives,
no false negatives.”
Application
Control
FW/VPN
IDS / IPS
UTM
NAC
AV
PKI
“Block or Allow”
“Fix the Firewall”
“No key, no access”
Sandboxing
“Detect the
Unknown”
There	
  is	
  no	
  Silver	
  bullet	
  	
  
CyberSecurity	
  
Personal
Files	
  
Financial
Data	
  
Emails	
  Photo	
  
Organiza4ons	
  are	
  more	
  confident	
  
but	
  increasingly	
  vulnerable	
  
90%	
  of	
  companies	
  are	
  	
  
confident	
  about	
  their	
  policies	
  
	
  
But	
  54%	
  admit	
  to	
  having	
  faced	
  public	
  
scru?ny	
  following	
  a	
  security	
  breach.	
  
Countries	
  with	
  higher	
  block	
  ra4os	
  have	
  many	
  Web	
  servers	
  and	
  compromised	
  hosts	
  on	
  networks	
  within	
  their	
  borders.	
  
Russia	
  0.936	
  
Japan	
  1.134	
  
China	
  4.126	
  
Hong	
  Kong	
  6.255	
  
France	
  4.197	
  
Germany	
  1.277	
  
Poland	
  1.421	
  
Canada	
  0.863	
  
U.S.	
  0.760	
  
Brazil	
  1.135	
  
Malware	
  on	
  a	
  Global	
  Scale	
  
Malicious	
  actors	
  do	
  not	
  respect	
  country	
  boundaries.	
  	
   Malware	
  Traffic	
  
Expected	
  Traffic	
  
Complexity	
  and	
  Fragmented	
  
MOBILIT	
   CLOUD	
  
New	
  surface	
  for	
  threats	
  	
  
THREAT	
  
Internet	
  of	
  Things…and	
  Everything	
  
Every	
  company	
  becomes	
  a	
  technology	
  company,	
  	
  
Every	
  company	
  becomes	
  a	
  security	
  company	
  
APT’s	
  
Advanced	
  Persistent	
  Threats	
  	
  
Game	
  Console	
  /	
  
eCommerce	
  
77M	
  Accounts	
  Hacked	
  
Cloud	
  Service	
  
5M	
  Customer	
  Email	
  Records	
  
Stolen	
  Through	
  Phishing	
  
WiFi	
  
45M	
  Customer	
  Records	
  
Stolen	
  
SCADA	
  Control	
  
Water	
  U4lity	
  Disrup4on	
  	
  
by	
  Pump	
  Shutdown	
  
Springfield	
  Water	
  Light	
  
&	
  Power	
  
Social	
  Engineering	
  
40M	
  Secure	
  Tokens	
  Stolen	
  
POS	
  
110M	
  Credit	
  Cards	
  and	
  
Personal	
  Info	
  Stolen	
  
100%
of top 500 companies with
malicious connection
detected
60%
“collected”
in hours
54%
of new
Threats Discovered
after months
Access	
  
Gain	
  access	
  to	
  the	
  Network	
  
How	
  to	
  get	
  
access…	
  
Social	
  Medias	
  |	
  PEN	
  Drives	
  |	
  Social	
  Engineering	
  	
  	
  
73%	
  
Suspected	
  VPN	
  connec4ons	
  
Camouflage	
  |	
  Distrac4on	
  	
  	
  	
  
Stuxnet	
  
Industry	
  Segment	
  threat	
  
Stuxnet	
  Deployed	
  
Stuxnet	
  Detected	
  
BlackEnergy	
  
Launched	
  
2008	
   2009	
   2010	
   2011	
   2012	
   2013	
   2014	
   2015	
  
BlackEnergy	
  Detected	
  Havex	
  Detected*	
  
Havex	
  Launched	
  
Time	
  	
  
Time	
  to	
  reach	
  the	
  target….	
  
Time	
  to	
  be	
  detected….	
  
Time
Everywhere	
  
Security	
  Strategy	
  
Network
Servers
Operating
Systems
Routers
and
Switches
Mobile
Devices
Printers
VoIP
Phones
Virtual
Machines
Client
Applications
Files
Users
Web
Applications
Application
Protocols
Services
Malware
Command
and Control
Servers
Vulnerabilities
NetFlow
Network
Behavior
Processes
See	
  more	
  …	
  
Understand	
  the	
  scope	
  of	
  aaack	
  
NETWORK	
  /	
  USER	
  	
  
CONTEXT	
  	
  	
  
How	
  
What	
  Who	
  
Where	
  When	
  
EXTERNAL	
  CONTEXT	
  
INTELLIGENCE	
  INFO	
  	
  
CONSISTENT	
  SECURE	
  ACCESS	
  POLICY	
  
ACROSS	
  WIRED,	
  WIRELESS	
  and	
  VPN	
  
Automa?on	
  
Beaer	
  informa4on…Beaer	
  decision	
  
Network	
  	
  
as	
  Sensor	
  
Network	
  as	
  Enforcer	
  
?
Threat-­‐Focused	
  
Detect,	
  Understand,	
  and	
  Stop	
  Threats	
  
?
Collective Security
Intelligence
Threat
Identified
Event History
How
What
Who
Where
When
ISE	
  +	
  Network,	
  Appliances	
  (NGFW/NGIPS)	
  
Context
AMP,	
  CWS,	
  Appliances	
  
Recorded	
  
Enforcement
Con4nuous	
  Advanced	
  Threat	
  Protec4on	
  
ISE	
  +	
  Network,	
  Appliances	
  (NGFW/NGIPS)	
  
How
What
Who
Where
When
Collective Security
Intelligence
AMP,	
  CWS,	
  Appliances	
  
Enforcement
Event History
AMP,	
  Threat	
  Defense	
  
Continuous AnalysisContext
Performance	
  |	
  Capacity	
  |	
  SLA	
  	
  
Cloud
Connected
Network
Mobile Router Firewall
The
Distributed
Perimeter
Collective
Security
Intelligence Telemetry Data Threat Research Advanced Analytics
3M+
Cloud Web
Security Users
6GB
Web Traffic Examined,
Protected
Every Hour
75M
Unique Hits
Every Hour
10M
Blocks Enforced Every
Hour
Shadow	
  IT	
  Risk	
  	
  
Assessment	
  Report	
  
Business	
  	
  
Readiness	
  RaEng™	
  
Audit	
  Score	
  
Shadow	
  Data	
  	
  
Risk	
  Assessment	
  
Aher	
  
StreamIQ™	
  
ThreatScore™	
  
ContentIQ™	
  
Reports	
  &	
  Analysis	
  
Cloud Apps
?	
   ?
??	
  
?	
  ?	
   ?
IO IOI
IO IOI
Protect
IO IOI
IO IOI
Cloud	
  SOC	
  	
  
Policy	
   IO IOI
IO IOI
?
54	
  17	
  
IO IOI
IO IOI
?	
  
?
IO IOI
Audit
Detect
?
Investigate
Web	
  Sec	
  
Before	
  During	
  
Securelet™ Gateway
Elastica CloudSOC™
Other	
  
Appliances	
  
Firewall	
  
In	
  collabora4on	
  with:	
  
Data	
   Account	
   User	
  
Security	
  
OperaEons	
  
Center	
  
Analyze &
Control
Service	
  
Provider	
  
Endpoint	
  
Data	
  Center	
  
Edge	
  
Campus	
  
Opera4onal	
  
Technology	
  
Branch	
  WAN	
  
Ecosystem	
  
Services	
  
User	
  
AnyConnect
featuring
AMP for
Endpoints
FirePOWER
Threat
Defense for
ISR
ACI
Integration
with
TrustSec
Ruggedized
Cisco ASA
with
FirePOWER
Services
pxGrid
Ecosystem
expansion
ACI +
FirePOWER
Services
Integration
Threat-
Centric
Security for
Service
ProvidersCloud Web
Security +
Intelligent
WAN
Services
User
Cisco
Hosted
Identity
Services
Start	
  with	
  the	
  hardware	
  op4on	
  that	
  fits	
  best	
  
All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities
Desktop
5506-X
Wireless AP
5506W-X
Ruggedized
5506H-X
Rackmount
5508-X/5516-X
Add	
  FirePOWER	
  Services*	
  for	
  enhanced	
  protec4on	
  
*Available as subscriptions
Next-­‐GeneraEon	
  Intrusion	
  
PrevenEon	
  System	
  (NGIPS)	
  
URL	
  Filtering	
  Advanced	
  Malware	
  
ProtecEon	
  (AMP)	
  
Choose	
  the	
  appropriate	
  management	
  solu4on	
  	
  
Appliance sold
separately
FireSIGHT	
  Management	
  
Center	
  
On-box manager
comes standard
AdapEve	
  Security	
  Device	
  
Manager	
  (ASDM)	
  	
  
Cisco ASA with FirePOWER
Identity-Policy
Control & VPN
URL Filtering
(Subscription)
FireSIGHT
Analytics &
Automation
Advanced
Malware
Protection
(Subscription)
Application
Visibility &
Control
Network Firewall
Routing |
Switching
Clustering &
High Availability
WWW
Cisco Collective Security Intelligence Enabled
Built-in Network
Profiling
Intrusion
Prevention
(Subscription)
World’s	
  most	
  widely	
  deployed,	
  enterprise-­‐
class	
  ASA	
  stateful	
  firewall	
  	
  
Granular	
  Cisco®	
  Applica4on	
  	
  
Visibility	
  and	
  Control	
  (AVC)	
  	
  
Industry-­‐leading	
  FirePOWER	
  	
  
next-­‐genera4on	
  IPS	
  (NGIPS)	
  	
  
Reputa4on-­‐	
  and	
  category-­‐based	
  	
  
URL	
  filtering	
  
Advanced	
  malware	
  protec4on	
  
Deployment	
  
OpEons	
  
Virtual	
  Appliance	
  
MulE-­‐device	
  
Support	
  
Desktop	
   Tablet	
  Laptop	
  Mobile	
  
Cloud	
   Managed	
  Hybrid	
  Hybrid	
  
On-­‐Premises	
   Cloud	
  
AMP
Advanced Malware
Protection
AMP	
  for	
  Networks	
  
AMP	
  on	
  Web	
  and	
  Email	
  Security	
  
Appliances	
  
AMP	
  on	
  Cisco®	
  	
  ASA	
  Firewall	
  with	
  
FirePOWER	
  Services	
  
AMP	
  for	
  Endpoints	
  
AMP	
  for	
  	
  Cloud	
  Web	
  Security	
  	
  
and	
  Hosted	
  Email	
  
AMP	
  Private	
  Cloud	
  	
  
Virtual	
  Appliance	
  
MAC OS
Windows OS
Android Mobile
Virtual
CWS	
  
AMP	
  Threat	
  Grid	
  	
  
Malware	
  Analysis	
  +	
  Threat	
  
Intelligence	
  Engine	
  	
  
Appliance	
  or	
  Cloud	
  
*AMP for Endpoints can be
launched from AnyConnect
Employee Tag
PCI POS Tag
Partner Tag
Non-Compliant Tag
Voice Tag
Employee Non-Compliant
Campus Core
Data Center
Data VLAN 20
( PCI Segmenta4on within the same VLAN)
Non-Compliant
Access Layer
Voice Employee PCI POS Partner
SSL	
  VPN	
  
ISE	
  
ASA	
  
Lancope/Nenlow	
  
(SMC/FC)	
  
Data	
  VLAN	
  20	
  
Quaran4ne	
  
ClassificaEon	
  Results:	
  
Device	
  Type:	
  Apple	
  iPAD	
  
User:	
  Mary	
  
Group:	
  Employee	
  
Corporate	
  Asset:	
  Yes	
  
Malware	
  Detected	
  Yes	
  
Data Center
Firewall
PROTECTION
Integrated Security and Consistent Policy Enforcement (Physical & Virtual)
Active Monitoring & Comprehensive Diagnostics for Threat Mitigation
PROVISIONING
Simplified Service Chaining
Dynamic Policy Management
Rapid Instantiation
PERFORMANCE
On Demand Scalability
Increased Clustering Size
Multi-Site Clustering

Contenu connexe

Tendances

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controlsxKinAnx
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for merakiCisco Canada
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Belsoft
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortTen Sistemas e Redes
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecuritySkycure
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSLarry Austin
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Sophos Benelux
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 

Tendances (20)

IronPort
IronPortIronPort
IronPort
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Presentation cisco iron port web usage controls
Presentation   cisco iron port web usage controlsPresentation   cisco iron port web usage controls
Presentation cisco iron port web usage controls
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
The Four Horsemen of Mobile Security
The Four Horsemen of Mobile SecurityThe Four Horsemen of Mobile Security
The Four Horsemen of Mobile Security
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Web Application Security
Web Application SecurityWeb Application Security
Web Application Security
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
Forcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPSForcepoint SD-WAN and NGFW + IPS
Forcepoint SD-WAN and NGFW + IPS
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014Security: more important than ever - Sophos Day Belux 2014
Security: more important than ever - Sophos Day Belux 2014
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 

Similaire à Estratégia de segurança da Cisco (um diferencial para seus negócios)

Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?S&T Consulting Hungary
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsNetworkCollaborators
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionBlue Coat
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdfssusera76ea9
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban PrósperoClusterCba
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPSData#3 Limited
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachNetworkCollaborators
 

Similaire à Estratégia de segurança da Cisco (um diferencial para seus negócios) (20)

Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Information Security
Information SecurityInformation Security
Information Security
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Revolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat ProtectionRevolutionizing Advanced Threat Protection
Revolutionizing Advanced Threat Protection
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
Sangfor's Presentation.pdf
Sangfor's Presentation.pdfSangfor's Presentation.pdf
Sangfor's Presentation.pdf
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier CiscoIsday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Esteban Próspero
Esteban PrósperoEsteban Próspero
Esteban Próspero
 
Next Generation Firewall and IPS
Next Generation Firewall and IPSNext Generation Firewall and IPS
Next Generation Firewall and IPS
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
 

Plus de Cisco do Brasil

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialCisco do Brasil
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Cisco do Brasil
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Cisco do Brasil
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Cisco do Brasil
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Cisco do Brasil
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20Cisco do Brasil
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegidoCisco do Brasil
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco do Brasil
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - CiscoCisco do Brasil
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration AnalyticsCisco do Brasil
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18Cisco do Brasil
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsCisco do Brasil
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCisco do Brasil
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoCisco do Brasil
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no localCisco do Brasil
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua redeCisco do Brasil
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua redeCisco do Brasil
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamentoCisco do Brasil
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasCisco do Brasil
 

Plus de Cisco do Brasil (20)

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration Analytics
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
 
Vença o jogo da rede
Vença o jogo da redeVença o jogo da rede
Vença o jogo da rede
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
 

Dernier

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Estratégia de segurança da Cisco (um diferencial para seus negócios)

  • 2. 2000  1990   1995   2005   2010   2015   2020   Viruses   1990–2000   Worms   2000–2005   Spyware  and  Rootkits   2005–Today   APTs  Cyberware   Today  +   Hacking  Becomes   an  Industry   SophisEcated  AFacks,   Complex  Landscape   Phishing,  Low   SophisEcaEon    
  • 3. “Captive Portal” “It matches the pattern” “No false positives, no false negatives.” Application Control FW/VPN IDS / IPS UTM NAC AV PKI “Block or Allow” “Fix the Firewall” “No key, no access” Sandboxing “Detect the Unknown” There  is  no  Silver  bullet    
  • 5. Organiza4ons  are  more  confident   but  increasingly  vulnerable   90%  of  companies  are     confident  about  their  policies     But  54%  admit  to  having  faced  public   scru?ny  following  a  security  breach.  
  • 6. Countries  with  higher  block  ra4os  have  many  Web  servers  and  compromised  hosts  on  networks  within  their  borders.   Russia  0.936   Japan  1.134   China  4.126   Hong  Kong  6.255   France  4.197   Germany  1.277   Poland  1.421   Canada  0.863   U.S.  0.760   Brazil  1.135   Malware  on  a  Global  Scale   Malicious  actors  do  not  respect  country  boundaries.     Malware  Traffic   Expected  Traffic  
  • 8.
  • 10.
  • 11. New  surface  for  threats    
  • 13. Internet  of  Things…and  Everything   Every  company  becomes  a  technology  company,     Every  company  becomes  a  security  company  
  • 15. Game  Console  /   eCommerce   77M  Accounts  Hacked   Cloud  Service   5M  Customer  Email  Records   Stolen  Through  Phishing   WiFi   45M  Customer  Records   Stolen   SCADA  Control   Water  U4lity  Disrup4on     by  Pump  Shutdown   Springfield  Water  Light   &  Power   Social  Engineering   40M  Secure  Tokens  Stolen   POS   110M  Credit  Cards  and   Personal  Info  Stolen  
  • 16. 100% of top 500 companies with malicious connection detected 60% “collected” in hours 54% of new Threats Discovered after months
  • 17. Access   Gain  access  to  the  Network  
  • 18. How  to  get   access…   Social  Medias  |  PEN  Drives  |  Social  Engineering      
  • 19. 73%   Suspected  VPN  connec4ons  
  • 22. Stuxnet  Deployed   Stuxnet  Detected   BlackEnergy   Launched   2008   2009   2010   2011   2012   2013   2014   2015   BlackEnergy  Detected  Havex  Detected*   Havex  Launched  
  • 23. Time     Time  to  reach  the  target….  
  • 24. Time  to  be  detected….   Time
  • 25.
  • 29. Understand  the  scope  of  aaack  
  • 30. NETWORK  /  USER     CONTEXT       How   What  Who   Where  When   EXTERNAL  CONTEXT   INTELLIGENCE  INFO     CONSISTENT  SECURE  ACCESS  POLICY   ACROSS  WIRED,  WIRELESS  and  VPN  
  • 32. Network     as  Sensor   Network  as  Enforcer  
  • 34. Detect,  Understand,  and  Stop  Threats   ? Collective Security Intelligence Threat Identified Event History How What Who Where When ISE  +  Network,  Appliances  (NGFW/NGIPS)   Context AMP,  CWS,  Appliances   Recorded   Enforcement
  • 35. Con4nuous  Advanced  Threat  Protec4on   ISE  +  Network,  Appliances  (NGFW/NGIPS)   How What Who Where When Collective Security Intelligence AMP,  CWS,  Appliances   Enforcement Event History AMP,  Threat  Defense   Continuous AnalysisContext
  • 36. Performance  |  Capacity  |  SLA    
  • 37. Cloud Connected Network Mobile Router Firewall The Distributed Perimeter Collective Security Intelligence Telemetry Data Threat Research Advanced Analytics 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour
  • 38. Shadow  IT  Risk     Assessment  Report   Business     Readiness  RaEng™   Audit  Score   Shadow  Data     Risk  Assessment   Aher   StreamIQ™   ThreatScore™   ContentIQ™   Reports  &  Analysis   Cloud Apps ?   ? ??   ?  ?   ? IO IOI IO IOI Protect IO IOI IO IOI Cloud  SOC     Policy   IO IOI IO IOI ? 54  17   IO IOI IO IOI ?   ? IO IOI Audit Detect ? Investigate Web  Sec   Before  During   Securelet™ Gateway Elastica CloudSOC™ Other   Appliances   Firewall   In  collabora4on  with:   Data   Account   User   Security   OperaEons   Center   Analyze & Control
  • 39. Service   Provider   Endpoint   Data  Center   Edge   Campus   Opera4onal   Technology   Branch  WAN   Ecosystem   Services   User  
  • 40. AnyConnect featuring AMP for Endpoints FirePOWER Threat Defense for ISR ACI Integration with TrustSec Ruggedized Cisco ASA with FirePOWER Services pxGrid Ecosystem expansion ACI + FirePOWER Services Integration Threat- Centric Security for Service ProvidersCloud Web Security + Intelligent WAN Services User Cisco Hosted Identity Services
  • 41.
  • 42. Start  with  the  hardware  op4on  that  fits  best   All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities Desktop 5506-X Wireless AP 5506W-X Ruggedized 5506H-X Rackmount 5508-X/5516-X Add  FirePOWER  Services*  for  enhanced  protec4on   *Available as subscriptions Next-­‐GeneraEon  Intrusion   PrevenEon  System  (NGIPS)   URL  Filtering  Advanced  Malware   ProtecEon  (AMP)   Choose  the  appropriate  management  solu4on     Appliance sold separately FireSIGHT  Management   Center   On-box manager comes standard AdapEve  Security  Device   Manager  (ASDM)    
  • 43. Cisco ASA with FirePOWER Identity-Policy Control & VPN URL Filtering (Subscription) FireSIGHT Analytics & Automation Advanced Malware Protection (Subscription) Application Visibility & Control Network Firewall Routing | Switching Clustering & High Availability WWW Cisco Collective Security Intelligence Enabled Built-in Network Profiling Intrusion Prevention (Subscription) World’s  most  widely  deployed,  enterprise-­‐ class  ASA  stateful  firewall     Granular  Cisco®  Applica4on     Visibility  and  Control  (AVC)     Industry-­‐leading  FirePOWER     next-­‐genera4on  IPS  (NGIPS)     Reputa4on-­‐  and  category-­‐based     URL  filtering   Advanced  malware  protec4on  
  • 44. Deployment   OpEons   Virtual  Appliance   MulE-­‐device   Support   Desktop   Tablet  Laptop  Mobile   Cloud   Managed  Hybrid  Hybrid   On-­‐Premises   Cloud  
  • 45. AMP Advanced Malware Protection AMP  for  Networks   AMP  on  Web  and  Email  Security   Appliances   AMP  on  Cisco®    ASA  Firewall  with   FirePOWER  Services   AMP  for  Endpoints   AMP  for    Cloud  Web  Security     and  Hosted  Email   AMP  Private  Cloud     Virtual  Appliance   MAC OS Windows OS Android Mobile Virtual CWS   AMP  Threat  Grid     Malware  Analysis  +  Threat   Intelligence  Engine     Appliance  or  Cloud   *AMP for Endpoints can be launched from AnyConnect
  • 46. Employee Tag PCI POS Tag Partner Tag Non-Compliant Tag Voice Tag Employee Non-Compliant Campus Core Data Center Data VLAN 20 ( PCI Segmenta4on within the same VLAN) Non-Compliant Access Layer Voice Employee PCI POS Partner SSL  VPN   ISE   ASA   Lancope/Nenlow   (SMC/FC)   Data  VLAN  20   Quaran4ne   ClassificaEon  Results:   Device  Type:  Apple  iPAD   User:  Mary   Group:  Employee   Corporate  Asset:  Yes   Malware  Detected  Yes   Data Center Firewall
  • 47. PROTECTION Integrated Security and Consistent Policy Enforcement (Physical & Virtual) Active Monitoring & Comprehensive Diagnostics for Threat Mitigation PROVISIONING Simplified Service Chaining Dynamic Policy Management Rapid Instantiation PERFORMANCE On Demand Scalability Increased Clustering Size Multi-Site Clustering