SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Protegendo sua Rede
Sergio Dias
Systems Engineer
CCIE DC #47837
Fabiane Paulino
Consulting Systems Engineer
Legacy	
  Security:	
  Costly	
  &	
  Complex	
  
Siloed	
  
Inefficient	
  
Manual	
  
Limited	
  integra,on,	
  security	
  gaps	
  
Hard-­‐coded	
  processes	
  
Over-­‐provisioned,	
  sta,c	
  and	
  slow	
  
•  $	
  400	
  Millions	
  the	
  es?mated	
  
financial	
  loss	
  in	
  2015	
  with	
  breachs	
  
•  98%	
  stemmed	
  from	
  External	
  Agents	
  	
  
•  81%	
  u?lized	
  some	
  form	
  of	
  Hacking	
  
•  69%	
  incorporated	
  Malware	
  	
  
•  96%	
  of	
  aPacks	
  Not	
  Highly	
  Difficult	
  
	
  
	
  
	
  
*	
  Verizon	
  2015	
  Data	
  Breach	
  Inves?ga?on	
  Report	
  	
  
	
  
Cisco’s	
  Threat-­‐Centric	
  Security	
  Model	
  
Network	
   Endpoint	
   Mobile	
   Virtual	
   Cloud	
  
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
BEFORE
Discover
Enforce
Harden
Advanced	
  Malware	
  Protec?on	
  VPN	
  Firewall	
   NGIPS	
   DDoS	
  
Policy	
  Management	
  Applica?on	
  Control	
  
Secure Access + Identity Services
Malware	
  Sandboxing	
  Web	
  Security	
  
Email	
  Security	
   Network	
  Behavior	
  Analysis	
  
Security	
  Services	
  
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Corp Network
Global
Orchestration
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Corporate HQ
PartnersGuests
...
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Branches / Home Office
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Partners Guests
Network Security Challengers
Distributed Network, Compliance and Control
Grant and Control access to Corporate
Devices, Guests Devices and BYOD Devices.
Compliance.
Borderless network (wireless, wired and VPN)
keeping the same level of access and control.
Distributed network (Datacenter, Stores and
Remote Locations, HQ and Remote Users).
Employees...
Grant and Control access to
Employees, Partners and Guests.
Compliance.
Keep track and have visibility over all
users, devices, applications and
vulnerabilities on the network.
Protect the network against security
events and advanced threats.
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Access Control
Consistent Secure Access Policy Across Wired, Wireless and VPN
Guests
BYOD
Corporate and Partners
SSID: Guest
SSID: Corporate
Authentication
Users and Devices
Cisco ISE
Onboarding (Portals)
Access Enforcement
Traffic Analysis
AD, LDAP, RADIUS
or Local Database
Rest API
Full Reports
Corporate
Corporate and
Partners
Corporate and
Partners How
WhatWho
WhereWhen
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco pxGrid
Context Sharing
FirePower
NGIPS
ASA and
ASA with FP Services
Stealth Watch
WSA
FirePower
Threat Defense
Cisco ISE
pxGrid
User Identity
User, Location IP,
Device Type and SGT Tag
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
FirePower and ISE Integration
Fire&ISE
pxGrid
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
WSA and ISE Integration
WSA&ISE
pxGrid
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Corp Network
Global
Orchestration
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
New
Features
Sourcefire
FirePOWER
Cisco ASA
Converged Software – FirepowerThreat Defense
(FTD)
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Total Visibility
Web
WWW
Endpoints NetworkEmail MobileCloud
FTD - Centralized Management
Web, Multi-Tenant, Full Visibility
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Corp Network
Global
Orchestration
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Q&A
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Thank you!!

Contenu connexe

Tendances

Tendances (20)

Cisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration PressCisco Live Cancun Collaboration Press
Cisco Live Cancun Collaboration Press
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
Cisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vnCisco Connect 2018 Vietnam - data center transformation - vn
Cisco Connect 2018 Vietnam - data center transformation - vn
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined AccessCisco Connect 2018 Singapore - Cisco Software Defined Access
Cisco Connect 2018 Singapore - Cisco Software Defined Access
 
Cisco Connect 2018 Singapore - delivering intent for data center networking
Cisco Connect 2018 Singapore -   delivering intent for data center networkingCisco Connect 2018 Singapore -   delivering intent for data center networking
Cisco Connect 2018 Singapore - delivering intent for data center networking
 
New security solutions for next generation of IT
New security solutions for next generation of ITNew security solutions for next generation of IT
New security solutions for next generation of IT
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
01 presentation-kenwillen
01 presentation-kenwillen01 presentation-kenwillen
01 presentation-kenwillen
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructureCisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
Cisco Connect 2018 Singapore - Next generation hyperconverged infrastructure
 

Similaire à Protegendo sua rede

[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
 

Similaire à Protegendo sua rede (20)

Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
MobileIron plus Cisco - Mobilizing Network Security
MobileIron plus Cisco - Mobilizing Network SecurityMobileIron plus Cisco - Mobilizing Network Security
MobileIron plus Cisco - Mobilizing Network Security
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
Making SIP Migration Easy
Making SIP Migration EasyMaking SIP Migration Easy
Making SIP Migration Easy
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Keeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotelyKeeping your collaboration safe while working remotely
Keeping your collaboration safe while working remotely
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 

Plus de Cisco do Brasil

Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
Cisco do Brasil
 

Plus de Cisco do Brasil (20)

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration Analytics
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
 
Vença o jogo da rede
Vença o jogo da redeVença o jogo da rede
Vença o jogo da rede
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Protegendo sua rede

  • 1. Protegendo sua Rede Sergio Dias Systems Engineer CCIE DC #47837 Fabiane Paulino Consulting Systems Engineer
  • 2. Legacy  Security:  Costly  &  Complex   Siloed   Inefficient   Manual   Limited  integra,on,  security  gaps   Hard-­‐coded  processes   Over-­‐provisioned,  sta,c  and  slow   •  $  400  Millions  the  es?mated   financial  loss  in  2015  with  breachs   •  98%  stemmed  from  External  Agents     •  81%  u?lized  some  form  of  Hacking   •  69%  incorporated  Malware     •  96%  of  aPacks  Not  Highly  Difficult         *  Verizon  2015  Data  Breach  Inves?ga?on  Report      
  • 3. Cisco’s  Threat-­‐Centric  Security  Model   Network   Endpoint   Mobile   Virtual   Cloud   DURING Detect Block Defend AFTER Scope Contain Remediate BEFORE Discover Enforce Harden Advanced  Malware  Protec?on  VPN  Firewall   NGIPS   DDoS   Policy  Management  Applica?on  Control   Secure Access + Identity Services Malware  Sandboxing  Web  Security   Email  Security   Network  Behavior  Analysis   Security  Services  
  • 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Corp Network Global Orchestration
  • 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Corporate HQ PartnersGuests ...
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Branches / Home Office
  • 7. 7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Partners Guests Network Security Challengers Distributed Network, Compliance and Control Grant and Control access to Corporate Devices, Guests Devices and BYOD Devices. Compliance. Borderless network (wireless, wired and VPN) keeping the same level of access and control. Distributed network (Datacenter, Stores and Remote Locations, HQ and Remote Users). Employees... Grant and Control access to Employees, Partners and Guests. Compliance. Keep track and have visibility over all users, devices, applications and vulnerabilities on the network. Protect the network against security events and advanced threats.
  • 8. 8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Access Control Consistent Secure Access Policy Across Wired, Wireless and VPN Guests BYOD Corporate and Partners SSID: Guest SSID: Corporate Authentication Users and Devices Cisco ISE Onboarding (Portals) Access Enforcement Traffic Analysis AD, LDAP, RADIUS or Local Database Rest API Full Reports Corporate Corporate and Partners Corporate and Partners How WhatWho WhereWhen
  • 9. 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco pxGrid Context Sharing FirePower NGIPS ASA and ASA with FP Services Stealth Watch WSA FirePower Threat Defense Cisco ISE pxGrid User Identity User, Location IP, Device Type and SGT Tag
  • 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FirePower and ISE Integration Fire&ISE pxGrid
  • 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential WSA and ISE Integration WSA&ISE pxGrid
  • 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Corp Network Global Orchestration
  • 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential New Features Sourcefire FirePOWER Cisco ASA Converged Software – FirepowerThreat Defense (FTD)
  • 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Total Visibility Web WWW Endpoints NetworkEmail MobileCloud FTD - Centralized Management Web, Multi-Tenant, Full Visibility
  • 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Corp Network Global Orchestration
  • 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Q&A
  • 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Thank you!!