Soumettre la recherche
Mettre en ligne
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
•
1 j'aime
•
580 vues
Cisco do Brasil
Suivre
Apresentação realizada pro especialista Cisco no Security Week
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 51
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
Cisco Canada
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Canada
Cisco Security Architecture
Cisco Security Architecture
Cisco Canada
Presentation cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx
Cisco ASA con fire power services
Cisco ASA con fire power services
Felipe Lamus
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
Recommandé
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
Cisco Canada
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
Cisco Canada
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Canada
Cisco Security Architecture
Cisco Security Architecture
Cisco Canada
Presentation cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx
Cisco ASA con fire power services
Cisco ASA con fire power services
Felipe Lamus
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any size
Cisco Canada
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Canada
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Canada
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco Canada
Palo Alto Networks CASB
Palo Alto Networks CASB
Alberto Rivai
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Canada
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Cisco Canada
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Canada
Data Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Canada
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
Cisco Canada
Contenu connexe
Tendances
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Canada
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
SWITCHPOINT NV/SA
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any size
Cisco Canada
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Canada
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Canada
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco Canada
Palo Alto Networks CASB
Palo Alto Networks CASB
Alberto Rivai
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Canada
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Canada
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Cisco Canada
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Canada
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Canada
Data Center Security Now and into the Future
Data Center Security Now and into the Future
Cisco Security
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Canada
Tendances
(20)
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any size
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Palo Alto Networks CASB
Palo Alto Networks CASB
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
Data Center Security Now and into the Future
Data Center Security Now and into the Future
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Similaire à Proteja seus clientes - Gerenciamento dos Serviços de Segurança
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
Cisco Canada
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco Canada
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 secure dc
Cisco Canada
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Cisco Russia
Protegendo sua rede
Protegendo sua rede
Cisco do Brasil
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Canada
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
Dejan Jeremic
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Cisco Canada
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
Robb Boyd
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Canada
Next Generation Security
Next Generation Security
Cisco Canada
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Cisco DevNet
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public Sector
Amy Blanchard
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
Global Knowledge Training
The Changing Data Center Landscape
The Changing Data Center Landscape
Cisco Canada
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
Nur Shiqim Chok
Similaire à Proteja seus clientes - Gerenciamento dos Serviços de Segurança
(20)
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
Security and Virtualization in the Data Center
Security and Virtualization in the Data Center
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 secure dc
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
Protegendo sua rede
Protegendo sua rede
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Next Generation Security
Next Generation Security
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public Sector
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
The Changing Data Center Landscape
The Changing Data Center Landscape
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
Plus de Cisco do Brasil
Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
Cisco do Brasil
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
Cisco do Brasil
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
Cisco do Brasil
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
Cisco do Brasil
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
Cisco do Brasil
Revista cisco live ed 20
Revista cisco live ed 20
Cisco do Brasil
O seu DNS está protegido
O seu DNS está protegido
Cisco do Brasil
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
Cisco do Brasil
Rio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
Cisco do Brasil
Cisco Tetration Analytics
Cisco Tetration Analytics
Cisco do Brasil
Revista Cisco Live ed 18
Revista Cisco Live ed 18
Cisco do Brasil
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
Cisco do Brasil
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
Cisco do Brasil
Vença o jogo da rede
Vença o jogo da rede
Cisco do Brasil
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
Cisco do Brasil
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
Cisco do Brasil
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
Cisco do Brasil
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
Cisco do Brasil
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
Cisco do Brasil
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
Cisco do Brasil
Plus de Cisco do Brasil
(20)
Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
Revista cisco live ed 20
Revista cisco live ed 20
O seu DNS está protegido
O seu DNS está protegido
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
Rio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
Cisco Tetration Analytics
Cisco Tetration Analytics
Revista Cisco Live ed 18
Revista Cisco Live ed 18
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
Vença o jogo da rede
Vença o jogo da rede
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
Dernier
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Dernier
(20)
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
1.
1© 2015 Cisco
and/or its affiliates. All rights reserved. Security Strategy Managed Security Services Ghassan Dreibi Manager, Business Development
2.
2© 2015 Cisco
and/or its affiliates. All rights reserved. The Digital Opportunity Hackers 2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation ID Business Employees Consumers
3.
3© 2015 Cisco
and/or its affiliates. All rights reserved. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Welcome to the Hackers’ Economy Source: CNBC Global Cybercrime Market: $450B-$1T (U.S.) How Industrial Hackers Monetize the Opportunity Social Security $1 Medical Record >$50 DDoS as a Service ~$7/hour DDoS Credit Card Data $0.25−$60 Bank Account Info >$1000 depending on account type and balance $ Exploits $100k-$300K Facebook Account $1 for an account with 15 friends Spam $50/500K emails Malware Development $2500 (commercial malware) Mobile Malware $150
4.
4© 2015 Cisco
and/or its affiliates. All rights reserved. Security Solutions for Service Providers Corporate IT Managed Cloud Services Managed CPE Services Production Network Managed, Advisory & Implementation Services Protect Your CustomersProtect Yourself Threat Centric Security to Protect & Grow Your Business
5.
5© 2015 Cisco
and/or its affiliates. All rights reserved. Security Solutions for Service Providers Corporate IT • Network Security (NGFW, NGIPS, NaaS, NaaE) • Advanced Threat Protection • Email / Web Security • Secure Access & Mobility Production Network • SP Data Center • SP Cloud • SP Mobile Edge • SP Infrastructure Edge Managed CPE Services • Physical • Virtual • Hybrid Managed Cloud Services • Cloud Web Security (CWS) • Cloud Email Security (CES) • Hosted Identity Services • Cloud Access Security Protect Your CustomersProtect Yourself Managed, Advisory & Implementation Services Threat Centric Security to Protect & Grow Your Business
6.
6© 2015 Cisco
and/or its affiliates. All rights reserved. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Concepts
7.
© 2014 Cisco
and/or its affiliates. All rights reserved. Cisco Public 7 The Life Cycle of an Attack • Attack planning • The intruder is trying to obtain access • The intruder bypassed the controls • A vulnerability is being exploited • A malware arrived as part of an email or web access • Credentials were stoled • The intruder is inside the network Discover Enforce Harden Detect Block Defend Scope Contain Remediate
8.
© 2014 Cisco
and/or its affiliates. All rights reserved. Cisco Public 8 The Life Cycle of an Attack Discover Enforce Harden Detect Block Defend Scope Contain Remediate Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
9.
© 2014 Cisco
and/or its affiliates. All rights reserved. Cisco Public 9 The Threat-Centric Security Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING Network Endpoint Mobile Virtual Cloud Point in Time Continuous
10.
10© 2015 Cisco
and/or its affiliates. All rights reserved. Unified Solutions Across Deployments Feature Consistency | Open APIs | Flexible Licensing Physical Virtual Cloud
11.
11© 2015 Cisco
and/or its affiliates. All rights reserved. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Solution Overview
12.
12© 2015 Cisco
and/or its affiliates. All rights reserved. ASA with FirePOWER Services Industry’s First Threat-Focused NGFW #1 Cisco Security announcement of the year! • Integrating defense layers helps organizations get the best visibility • Enable dynamic controls to automatically adapt • Protect against advanced threats across the entire attack continuum Proven Cisco ASA firewalling Industry leading NGIPS and AMP Cisco ASA with FirePOWER Services
13.
13© 2015 Cisco
and/or its affiliates. All rights reserved. Collective Security Intelligence (CSI) Contextual Device, Network and End-Point Visibility Classic Stateful Firewall Gen1 IPS Application Visibility Web—URL Controls AV and Basic Protections NGIPS Vulnerability Management *Client Anti- Malware (AMP) Correlated SIEM Eventing Incident Control System Network Anti- Malware Controls (AMP) Behavioral Indications of Compromise User Identity NGFW Open APP-ID SNORT Open IPS Network/Host Trajectory Retrospective Analysis ThreatGrid Auto-Remediation *Agent Adaptive Security Sandboxing Retrospective DetectionMalware File Trajectory Threat Hunting Forensics and Log Management URL ReputationIP Reputation How Cisco Appears Competitively BEFORE DURING AFTER Cisco Only Cisco AND Competitors
14.
14© 2015 Cisco
and/or its affiliates. All rights reserved. VIRTUAL PHYSICAL ASA 5585-X 16 Way Clustering with State Synchronization Scalable to 640Gbps ASAv • Full ASA Feature Set • Hypervisor Independent • Virtual Switch Agnostic • Dynamic Scalability ACI SECURITY SOLUTION STARTS WITH CISCO ASA ASA ASAv on VMWare – Available Today – Ask your SE
15.
15© 2015 Cisco
and/or its affiliates. All rights reserved. Cisco Identity Services Engine (ISE) 1.3 Delivering the Visibility, Context and Control for Secure Network Access NETWORK / USER CONTEXT How WhatWho WhereWhen PARTNER CONTEXT DATA CONSISTENT SECURE ACCESS POLICY ACROSS WIRED, WIRELESS and VPN
16.
16© 2015 Cisco
and/or its affiliates. All rights reserved. Email and web are the top threat vectors Data Loss Acceptable Use Violations Malware Infections IPv6 Spam Blended Threats Targeted Attacks APTs Advanced Malware Rootkits Worms Trojan Horse 93% of customer networks access websites that host malware* *Cisco 2014 Midyear Security Report
17.
17© 2015 Cisco
and/or its affiliates. All rights reserved. File Sandboxing Behavioral analysis of unknown files File Retrospection Retrospective alerting after an attack Advanced Malware Protection File Reputation Preventative blocking of suspicious files
18.
18© 2015 Cisco
and/or its affiliates. All rights reserved. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Offerings
19.
19© 2015 Cisco
and/or its affiliates. All rights reserved. Flexible Deployment Options Industry-leading, Best of Breed Email Protection at the Gateway Deployment Options VirtualAppliance Multi-device Support Desktop TabletLaptopMobile Cloud ManagedHybridHybrid On-Premises Cloud
20.
20© 2015 Cisco
and/or its affiliates. All rights reserved. Cisco Security as a Service Solutions Service Provider Virtual Private Cloud Hosted Security Solution SP-Hosted Firewall, VPN Email, and Web Services Turnkey Public Cloud Cisco Managed Security Cloud Cisco or SP-Hosted, Cisco-Run Web Security Services
21.
21© 2015 Cisco
and/or its affiliates. All rights reserved. Cisco Offers Two Security as a Service Solutions Attribute Cisco Hosted Security Solution (HSS) Cisco Managed Security Cloud (CMSC) Services Phase 1: Web, Email - Phase 1.1: Firewall, VPN Cloud Web Security (formerly Scansafe) Delivery Model Virtual Private Cloud – SP Hosted Public Cloud – Cisco or SP hosted Pricing Model SP price per user and per usage Price per user SP CapEx Costs § Web, Email, Firewall, VPN software licenses § Cloud infrastructure (VMware, UCS, storage, Network Infrastructure) None SP OpEx Costs § Bandwidth § OSS / BSS § Operations (People) § Minimum commitment of users § Hosting, including bandwidth (in case of SP hosted) Reporting / Log Data Owned by SP, stays at SP DC Centralized in Cisco Cloud Orchestration / Management With third-party tools (e.g. Ubiqube) Turnkey Cisco solution Connectivity Differences VPN link to customer site OTT internet connectivity
22.
22© 2015 Cisco
and/or its affiliates. All rights reserved. Evolution of Managed Security Services Premise to Cloud W W W IPS WEB EMAIL MALWARECONTEXT Switching AP Voice NGFW VPN Routing NAT DHCP Cloud Switching AP Voice Hybrid CPE Managed CPESP W W W NGFW VPN IPS WEB EMAIL MALWARECONTEXT Switching NAT DHCP AP Voice Routing
23.
23© 2015 Cisco
and/or its affiliates. All rights reserved. Challenges of MSSP Complex, rigid and slow Legacy Service Revenue Decline High Cost and Complexity Slow Service Creation and Service Delivery Cloud Readiness
24.
24© 2015 Cisco
and/or its affiliates. All rights reserved. • Physical • Virtual • Hybrid Managed CPE Services
25.
25© 2015 Cisco
and/or its affiliates. All rights reserved. CPE Services for SP • End-to-End Single- Sourced Provider • Market-Leading: Gartner & NSS Labs • Highly Customizable • Flexible Configuration • Open Architecture • 3rd Party Integration • Full Visibility for SOC Analysts Managed CPESP BenefitsUse Case 1 WWW NGFW VPN IPS Web Email Malware Context Switching NAT DHCP AP Voice Routing Key Verticals: Government, Financial Services, Health Care, Utilities
26.
26© 2015 Cisco
and/or its affiliates. All rights reserved. CPEs Flexibility Cisco ISR ASA 5506 Meraki
27.
27Cisco ASA for
SMB and Distributed Enterprise Presentation | © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Extend the value of your NGFW Start with the hardware option that fits best All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities Desktop 5506-X Wireless AP 5506W-X Ruggedized 5506H-X Rackmount 5508-X/5516-X Add FirePOWER Services* for enhanced protection *Available as subscriptions Next-Generation Intrusion Prevention System (NGIPS) URL FilteringAdvanced Malware Protection (AMP) Choose the appropriate management solution Appliance sold separately FireSIGHT Management Center On-box manager comes standard Adaptive Security Device Manager (ASDM)
28.
28© 2015 Cisco
and/or its affiliates. All rights reserved. “When to Sell What” Meraki MX & ASA with FirePOWER Services & ISR Bundle Meraki MX ASA with FirePOWER ISR Lean IT Focus: For highly distributed enterprises or enterprises seeking a best in class UTM and simple deployment Threat-focused NGFW with advanced threat protection capabilities in the lowest cost form factor available Standard FW, IPS and Web Security with iWAN capabilities and advanced network and communication support in the lowest form factor available Note: ISR4K now supports Firepower Radically simplified deployment and ultra low operating cost via cloud management with robust security that is optimized for highly distributed environments Unmatched visibility and control that enables correlation and analytics to automatically prioritize and protect against advanced threats Best ROI (simple, integrated, flexible), cost reduction with improved flexibility, secondary link, better performance through WAN optimization and expansibility through integrated UCS Ideal time to position: • With Meraki networking environments • Large multi-site deployments (100s/1000s sites) with full UTM requirements • Against traditional UTM competitors • When deployment of units to a high distributed enterprise is a issue Ideal time to position: • Existing/refreshing ASA or PIX customers • Distributed enterprises; smaller organizations • Against legacy NGFWs and firewalls • Against advanced UTMs with NG capabilities, with AMP/NGIPS Ideal time to position: • Large multi-site deployments (100s/1000s sites) with iWAN requirements • Stores, branches and small sites interested on a single device for both WAN and security • WAN redundancy over 3G or ADSL connections
29.
29© 2015 Cisco
and/or its affiliates. All rights reserved. Feature Description Cisco ISR (without Firepower) ASA NGFW Meraki MX Intelligent Path Selection Load Balancing Policy-Based Path Selection Number of Paths Supported Rapid Failure Detection and Mitigation Yes Yes (L7 / app level) Multiple (Any Transport) Yes (Blackout & Brownout) No Yes Multiple Yes Yes Yes (L3-L4 / Network level – based on loss, latency) 2 (Broadband, 4G, MPLS) Yes Security Virtual Private Network Firewall Intrusion Prevention & Detection Content/URL Filtering Anti-Virus Yes Yes Yes (Cisco IDS) Yes (Cloud Web Security) No Yes Yes Yes Yes Yes/No (AMP) Yes Yes Yes (Snort) Yes (Built-in) Yes (Built-in) Transport Independence WAN Connectivity Cellular IPv6 T1/E1, T3/E3, Serial, xDSL, Ethernet Yes (Integrated/Module) Yes Ethernet No Yes Ethernet Yes (Dongle) Planned (2H2015) Application Optimization WAN Optimization Content Caching Application Visibility Congestion Control Yes (WAAS) Yes (Akamai) Yes Yes (HQoS) No No Yes No No Yes (Squid-Cache) Yes Yes (L7 Traffic prioritization) Unified Communications Voice Gateway Session Border Controller Call Control Agent Yes Yes Yes No No No No No No Routed Protocols OSPF EIGRP BGP Yes Yes Yes Yes Yes Yes Planned (2H2015) Planned Planned (2H2015) Integrated Storage & Compute Integrated Compute Yes (UCS E-Series) No No Management Cloud Management Number of Sites Managed Plug and Play deployment No Thousands No No 300 No Yes Thousands Yes
30.
30© 2015 Cisco
and/or its affiliates. All rights reserved. Cisco ISR UTM 1100, 2100, 3100 Complete package of WAN and Security solutions Remote User / Hot Spot Mobile Device Guest Access Control Benefits : § Centralized security basic features at local appliances § Advanced security inspection at Cisco Cloud § Network Segmentation and Control § Business Continuity options – WAN HA Perimeter Firewall § Security for internal and external access § Protocol anomaly detection and stateful inspection Security Services Layers 2–7 § Identify and react to new threats creating dinamic ACLs, new firewalls policies, signatures, etc. Network IPS § Global threats vision and update § Zero Day analysis Web Security - ScanSafe § User web access control based on category and security levels – AV, Anti-Malware Management Solution § Centralized management solution Service Modules § IPS network module § WAN Acceleration module CWS
31.
31© 2015 Cisco
and/or its affiliates. All rights reserved. When to position Meraki and Cisco Cisco Enterprise Portfolio Cisco Cloud Managed Prime ISE Catalyst 2K/3K/4K/6K ASA - Firewall Cisco UTM Appliances - Routing MS Switches MX Security Appliances Aironet Access Points & Controllers Dashboard Cisco Networking Portfolio! MR APs Systems Manager 3rd Party MDM Integration Unparalleled Deployment Flexibility 100% Cloud Managed
32.
32© 2015 Cisco
and/or its affiliates. All rights reserved. CPE Services for SP (incl. vMS, HSS, CWS) • Lower OPEX Costs • Minimize Truck Roll • Simplify Service Activation • Flexible service delivery and licensing models • Enable Service Customization • Flexible Deployment: SP or Cisco Managed Cloud CPESP BenefitsUse Case 2 Switching AP Voice
33.
Cisco Confidential 33©
2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Hosted Security as a Service • Delivered from service provider’s infrastructure • Orchestration SW interfaces with native appliance configuration mechanisms • All customer data lives inside the SP Cloud environment • Security on virtual form factor available today INFRA- STRUCTURE Hypervisor Cisco UCS Storage SERVICES LAYER WSAv WSAv ASAv Tenant 1 ESAv WSAv ASAv Tenant 2 ESAv CSR1Kv Tenant 3 ORCH. LAYER Policy Analytics Reporting SP existing orchestration, reporting, billing infrastructure § Provisioning API § Reporting API § Billing API
34.
Cisco Confidential 34©
2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with ESAV Per user pricing model driven by features Inbound Security Outbound Control Virus and Malware Defense Spam Defense DLP Secure Messaging (Encryption) HSS CVD 1.0 AMP NOT in HSS CVD 1.0 (future release) Email Security as a Service Using ESAV HSS CVD 1.0 Release
35.
Cisco Confidential 35©
2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with WSAV Web Security § Anti-malware protection § Web content analysis § Script emulation Web Filtering § Web usage controls § Application visibility § Bi-directional control Per user pricing model driven by features HSS CVD 1.0 AMP NOT in HSS CVD 1.0 (future release) Web Security as a Service Using WSAV HSS CVD 1.0 Release
36.
Cisco Confidential 36©
2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with ASAV or CSR1000v Firewall Support § Stateful inspection § Application inspection § Network address translation § Encrypted traffic inspection § Protocol inspection Per throughput and per feature service pricing Smart Licensing Advanced Firewall § Identity-aware policy enforcement § Malware traffic detection and blocking § Botnet traffic filter § Voice and video security HSS CVD 2.0 Firewall as a Service Using ASAV/CSR1kV HSS CVD 2.0 Release
37.
37© 2015 Cisco
and/or its affiliates. All rights reserved. CPE Services for SP • Lower OPEX Costs • Simplify Service Delivery • Flexible Service Delivery Models • Highly Customizable • Flexible Physical & Virtual Form-Factors • Flexible Deployment: SP or Cisco Managed Hybrid CPESP BenefitsUse Case 3 WWW IPS WEB EMAIL MALWARE CONTEXT Switching AP Voice NGFW VPN Routing NAT DHCP
38.
38© 2015 Cisco
and/or its affiliates. All rights reserved. • Cloud Web Security (CWS) • Cloud Email Security (CES) • Hosted Identity Services • Cloud Access Security Managed Cloud Services
39.
39© 2015 Cisco
and/or its affiliates. All rights reserved. Web Filtering WebpageWeb Reputation Application Visibility and Control Anti- Malware Outbreak Intelligence File Reputation Cognitive Threat Analytics Before After www.website.com During File Retrospection www Roaming User Reporting Log Extraction Management Branch Office www www Allow Warn Block Partial Block Campus Office ASA StandaloneWSA ISR G2 AnyConnect® AdminTraffic Redirections www HQ File Sandboxing Cloud Web Security
40.
40© 2015 Cisco
and/or its affiliates. All rights reserved. Cisco® Email Security Before AfterDuring File Retrospection Reporting Message Track Management Allow Warn Admin HQ File Sandboxing Anti-Spam and Anti-Virus Mail Flow Policies Data Loss Protection Encryption Before During Inbound Email Outbound Email Cisco Appliance VirtualCloud Talos Block Partial Block Mail Flow Policies Email Reputation Acceptance Controls Content Controls File Reputation Anti-Spam and Anti-Virus Outbreak Filters
41.
41© 2015 Cisco
and/or its affiliates. All rights reserved. 41© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Hosted Identity Services 4 1 Complete Integrated Solution Benefits Pay As You Grow No Capital Expense BYOD 24/7 Support Secure and Scalable Quick Time to Deployment
42.
42© 2015 Cisco
and/or its affiliates. All rights reserved. Shadow IT Risk Assessment Report Business Readiness Rating™ Audit Score Shadow Data Risk Assessment After StreamIQ™ ThreatScore™ ContentIQ™ Reports & Analysis Cloud Apps ? ? ?? ?? ? IO IOI IO IOI Protect IO IOI IO IOI Cloud SOC Policy IO IOI IO IOI ? 5417 IO IOI IO IOI ? ? IO IOI Audit Detect ? Investigate WSA BeforeDuring Elastica CloudSOC™ Other Appliances ASA Data Account User Security Operations Center Analyze & Control Securlet™ Gateway Cloud Access Security
43.
43© 2015 Cisco
and/or its affiliates. All rights reserved. Business Case Review – LATAM Customers
44.
44© 2015 Cisco
and/or its affiliates. All rights reserved. § Virtualize services § Extend DC to Stores § Prepare for Internet of Everything Application Consolidation and Virtualization § Avoid backhaul and offload corporate WAN § Direct Internet access without compromising security § High reliability for dynamic apps SaaS Application Experience § More content without exploding WAN costs § More efficient use of current bandwidth § Instant access to HD video over tablets § Guest WiFI Content Explosion § Increase revenue § Longer dwell time § Immersive Marketing § Employee training § Virtual Stores Retail of the Future Looking for Business Outcomes Retail Retail of the Future Market Trends
45.
45© 2015 Cisco
and/or its affiliates. All rights reserved. Business Continuity – Primary requirement for Retail Primary Link Credit Card Acquire Company Backup Link Issue / Problem Without connectivity during "Hot Dates” Initial Solution Backup link solution based on UTM* or 3G Modem Due PCI Compliance Results Cisco Confidential Lack of management No SLA control ? Retail
46.
46© 2015 Cisco
and/or its affiliates. All rights reserved. Business Continuity – Primary requirement for Retail Primary Link Internet Application Visibility & Control (AVC) Understand the applications and knows how to prioritize Performance Routing (PfR) Dynamically pick the best path for high priority traffic Advanced Security (DMVPN, CWS) Cisco Confidential Reshape traffic patterns to cloud from the branch with dynamic security Retail 3s
47.
47© 2015 Cisco
and/or its affiliates. All rights reserved. © 2013 Cisco and/or its affiliates. All rights reserved. 47 Transport Independent Intelligent Path Control Secure Connectivity Application Optimization Internet Retail WAAS PfR 3G/4G-LTE Provider Flexibility Lower Cost Dynamic Path Selection High Quality Experience Direct, Scalable Security Protect Resources (FW/VPN/ IPS/Web and Email Security) App Acceleration Minimize Downtime AVC MPLS Data Center Cisco UTM Solution – Based on Cisco IWAN Solution
48.
48© 2015 Cisco
and/or its affiliates. All rights reserved. Network Services Simplify Application Delivery One Network UNIFIED SERVICES Routing Redefined Routing Switching WLAN Cisco UTM Application Services Optimization Collaboration Server Hosting Security Optimization Vendor Security Appliance Vendor Collaboration Vendor 1 2 3 4 5 Router Vendor Server Vendor Cisco Intelligent Solution – UTMCompetitive Solution – Multiple Vendors Cisco UTM Business Advantage
49.
49© 2015 Cisco
and/or its affiliates. All rights reserved. Cloud Connected Network Mobile Router Firewall The Distributed Perimeter The Security Perimeter in the Cloud Collective Security Intelligence Telemetry Data Threat Research Advanced Analytics 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour
50.
50© 2015 Cisco
and/or its affiliates. All rights reserved. © 2013 Cisco and/or its affiliates. All rights reserved. 50 Add Secure Identity and BYOD DMVPN Data Center Branch • DMVPN Inline Tagging—ISR G2 (IOS 15.2(2)T), ASR1k (XE 3.11*) • SG Firewall for Egress Enforcement • SGT Capability exchange during DMVPN IKEv2 negotiations • Learn SGT from SXP or Auth-methods • Simple one command configuration – DMVPN “crypto ikev2 cts sgt” *ASR1k IOS (XE3.11) will be available in Fall 2013. ISR-G2 Catalyst Switch AP Branch NetworkSales Finance Admin Catalyst Switch Catalyst Switch HR SGT SGT ASR-1K SGT SGT Nexus 7000 ISE Profiler Posture Guest Server SGT Nexus 5000/2000 Catalyst 6500 Egress Enforcement WAN: ISR G2/ASR1k, SG Firewall Campus Aggregation: Cat6K/Sup2—SGACL Data Center Enforcement: Nexus 7000—SGT/ SGACL
51.
51© 2015 Cisco
and/or its affiliates. All rights reserved.
Télécharger maintenant