SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
1© 2015 Cisco and/or its affiliates. All rights reserved.
Security Strategy
Managed Security Services
Ghassan Dreibi
Manager, Business Development
2© 2015 Cisco and/or its affiliates. All rights reserved.
The Digital Opportunity
Hackers
2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation ID
Business Employees Consumers
3© 2015 Cisco and/or its affiliates. All rights reserved. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Welcome to the Hackers’ Economy
Source: CNBC
Global
Cybercrime
Market:
$450B-$1T
(U.S.)
How Industrial Hackers Monetize the Opportunity
Social
Security
$1 Medical
Record
>$50
DDoS
as a Service
~$7/hour
DDoS
Credit
Card Data
$0.25−$60
Bank Account Info
>$1000
depending on account
type and balance
$
Exploits
$100k-$300K
Facebook Account
$1 for an account
with 15 friends
Spam
$50/500K emails
Malware
Development
$2500
(commercial malware)
Mobile Malware
$150
4© 2015 Cisco and/or its affiliates. All rights reserved.
Security Solutions for Service Providers
Corporate IT Managed Cloud
Services
Managed CPE
Services
Production
Network
Managed, Advisory & Implementation Services
Protect Your CustomersProtect Yourself
Threat Centric Security to Protect & Grow Your Business
5© 2015 Cisco and/or its affiliates. All rights reserved.
Security Solutions for Service Providers
Corporate IT
•  Network Security
(NGFW, NGIPS, NaaS, NaaE)
•  Advanced Threat Protection
•  Email / Web Security
•  Secure Access & Mobility
Production
Network
•  SP Data Center
•  SP Cloud
•  SP Mobile Edge
•  SP Infrastructure Edge
Managed CPE
Services
•  Physical
•  Virtual
•  Hybrid
Managed Cloud
Services
•  Cloud Web Security (CWS)
•  Cloud Email Security (CES)
•  Hosted Identity Services
•  Cloud Access Security
Protect Your CustomersProtect Yourself
Managed, Advisory & Implementation Services
Threat Centric Security to Protect & Grow Your Business
6© 2015 Cisco and/or its affiliates. All rights reserved. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Concepts
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
The Life Cycle of an Attack
•  Attack planning
•  The intruder is trying to
obtain access
•  The intruder bypassed
the controls
•  A vulnerability is being
exploited
•  A malware arrived as
part of an email or web
access
•  Credentials were stoled
•  The intruder is inside the
network
Discover
Enforce
Harden
Detect
Block
Defend
Scope
Contain
Remediate
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
The Life Cycle of an Attack
Discover
Enforce
Harden
Detect
Block
Defend
Scope
Contain
Remediate
Attack Continuum
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Detect
Block
Defend
DURING
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
The Threat-Centric Security Model
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Attack Continuum
Detect
Block
Defend
DURING
Network Endpoint Mobile Virtual Cloud
Point in Time Continuous
10© 2015 Cisco and/or its affiliates. All rights reserved.
Unified Solutions Across Deployments
Feature Consistency | Open APIs | Flexible Licensing
Physical Virtual Cloud
11© 2015 Cisco and/or its affiliates. All rights reserved. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Solution Overview
12© 2015 Cisco and/or its affiliates. All rights reserved.
ASA with FirePOWER Services
Industry’s First Threat-Focused
NGFW
#1 Cisco Security announcement of the year!
•  Integrating defense layers helps organizations
get the best visibility
•  Enable dynamic controls
to automatically adapt
•  Protect against advanced threats
across the entire attack continuum
Proven Cisco ASA firewalling
Industry leading NGIPS and AMP
Cisco ASA with FirePOWER Services
13© 2015 Cisco and/or its affiliates. All rights reserved.
Collective Security
Intelligence (CSI)
Contextual Device, Network and End-Point Visibility
Classic Stateful Firewall
Gen1 IPS
Application Visibility
Web—URL Controls
AV and Basic Protections
NGIPS
Vulnerability
Management
*Client Anti-
Malware (AMP)
Correlated SIEM
Eventing
Incident Control
System
Network Anti-
Malware Controls
(AMP)
Behavioral
Indications of
Compromise
User Identity
NGFW
Open APP-ID SNORT Open IPS
Network/Host Trajectory Retrospective Analysis
ThreatGrid Auto-Remediation
*Agent
Adaptive Security
Sandboxing
Retrospective DetectionMalware File Trajectory
Threat Hunting
Forensics and Log Management
URL ReputationIP Reputation
How Cisco Appears Competitively
BEFORE DURING AFTER Cisco Only
Cisco AND
Competitors
14© 2015 Cisco and/or its affiliates. All rights reserved.
VIRTUAL PHYSICAL
ASA 5585-X
16 Way Clustering with
State Synchronization
Scalable to 640Gbps
ASAv
•  Full ASA Feature Set
•  Hypervisor Independent
•  Virtual Switch Agnostic
•  Dynamic Scalability
ACI SECURITY SOLUTION STARTS WITH CISCO ASA
ASA
ASAv on VMWare – Available Today – Ask your SE
15© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Identity Services Engine (ISE) 1.3
Delivering the Visibility, Context and Control for Secure Network Access
NETWORK / USER
CONTEXT
How
WhatWho
WhereWhen
PARTNER CONTEXT
DATA
CONSISTENT SECURE ACCESS POLICY
ACROSS WIRED, WIRELESS and VPN
16© 2015 Cisco and/or its affiliates. All rights reserved.
Email and web are the top threat vectors
Data Loss
Acceptable Use
Violations
Malware Infections
IPv6 Spam
Blended Threats
Targeted Attacks
APTs
Advanced Malware
Rootkits
Worms
Trojan Horse
93%
of customer networks
access websites that
host malware*
*Cisco 2014 Midyear Security Report
17© 2015 Cisco and/or its affiliates. All rights reserved.
File Sandboxing
Behavioral analysis
of unknown files
File Retrospection
Retrospective
alerting after an
attack
Advanced Malware Protection
File Reputation
Preventative blocking
of suspicious files
18© 2015 Cisco and/or its affiliates. All rights reserved. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Offerings
19© 2015 Cisco and/or its affiliates. All rights reserved.
Flexible Deployment Options
Industry-leading, Best of Breed Email Protection at the Gateway
Deployment
Options
VirtualAppliance
Multi-device
Support
Desktop TabletLaptopMobile
Cloud ManagedHybridHybrid
On-Premises Cloud
20© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Security as a Service Solutions
Service Provider
Virtual Private Cloud
Hosted Security
Solution
SP-Hosted Firewall, VPN
Email, and Web Services
Turnkey
Public Cloud
Cisco Managed
Security Cloud
Cisco or SP-Hosted,
Cisco-Run Web
Security Services
21© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Offers Two Security as a Service Solutions
Attribute Cisco Hosted Security Solution (HSS) Cisco Managed Security Cloud (CMSC)
Services Phase 1: Web, Email - Phase 1.1: Firewall, VPN Cloud Web Security (formerly Scansafe)
Delivery Model Virtual Private Cloud – SP Hosted Public Cloud – Cisco or SP hosted
Pricing Model SP price per user and per usage Price per user
SP CapEx Costs §  Web, Email, Firewall, VPN software licenses
§  Cloud infrastructure (VMware, UCS, storage,
Network Infrastructure)
None
SP OpEx Costs §  Bandwidth
§  OSS / BSS
§  Operations (People)
§  Minimum commitment of users
§  Hosting, including bandwidth
(in case of SP hosted)
Reporting / Log Data Owned by SP, stays at SP DC Centralized in Cisco Cloud
Orchestration / Management With third-party tools (e.g. Ubiqube) Turnkey Cisco solution
Connectivity Differences VPN link to customer site OTT internet connectivity
22© 2015 Cisco and/or its affiliates. All rights reserved.
Evolution of Managed Security Services
Premise to Cloud
W W W
IPS
WEB
EMAIL MALWARECONTEXT
Switching AP Voice
NGFW VPN
Routing
NAT DHCP
Cloud
Switching AP Voice
Hybrid
CPE Managed
CPESP
W W W
NGFW VPN IPS WEB EMAIL MALWARECONTEXT
Switching NAT DHCP AP Voice Routing
23© 2015 Cisco and/or its affiliates. All rights reserved.
Challenges of MSSP
Complex, rigid and slow
Legacy Service
Revenue Decline
High Cost and
Complexity
Slow Service
Creation and
Service Delivery
Cloud
Readiness
24© 2015 Cisco and/or its affiliates. All rights reserved.
•  Physical
•  Virtual
•  Hybrid
Managed CPE Services
25© 2015 Cisco and/or its affiliates. All rights reserved.
CPE Services for SP
•  End-to-End Single-
Sourced Provider
•  Market-Leading:
Gartner & NSS Labs
•  Highly Customizable
•  Flexible Configuration
•  Open Architecture
•  3rd Party Integration
•  Full Visibility for SOC
Analysts
Managed
CPESP
BenefitsUse Case 1
WWW
NGFW VPN IPS Web Email Malware Context
Switching NAT DHCP AP Voice Routing
Key Verticals:
Government, Financial
Services, Health Care, Utilities
26© 2015 Cisco and/or its affiliates. All rights reserved.
CPEs Flexibility
Cisco ISR
ASA 5506
Meraki
27Cisco ASA for SMB and Distributed Enterprise Presentation | © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Extend the value of your NGFW
Start with the hardware option that fits best
All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities
Desktop
5506-X
Wireless
AP
5506W-X
Ruggedized
5506H-X
Rackmount
5508-X/5516-X
Add FirePOWER Services* for enhanced protection
*Available as subscriptions
Next-Generation
Intrusion Prevention
System (NGIPS)
URL FilteringAdvanced Malware
Protection (AMP)
Choose the appropriate management solution
Appliance sold
separately
FireSIGHT
Management Center
On-box manager
comes standard
Adaptive Security Device
Manager (ASDM)
28© 2015 Cisco and/or its affiliates. All rights reserved.
“When to Sell What”
Meraki MX & ASA with FirePOWER Services & ISR Bundle
Meraki MX ASA with FirePOWER ISR
Lean IT Focus: For highly distributed
enterprises or enterprises seeking a
best in class UTM and simple
deployment
Threat-focused NGFW with advanced
threat protection capabilities in the
lowest cost form factor available
Standard FW, IPS and Web Security
with iWAN capabilities and advanced
network and communication support in
the lowest form factor available
Note: ISR4K now supports Firepower
Radically simplified deployment and
ultra low operating cost via cloud
management with robust security that is
optimized for highly distributed
environments
Unmatched visibility and control that
enables correlation and analytics to
automatically prioritize and protect
against advanced threats
Best ROI (simple, integrated, flexible),
cost reduction with improved flexibility,
secondary link, better performance
through WAN optimization and
expansibility through integrated UCS
Ideal time to position:
•  With Meraki networking
environments
•  Large multi-site deployments
(100s/1000s sites) with full UTM
requirements
•  Against traditional UTM
competitors
•  When deployment of units to a high
distributed enterprise is a issue
Ideal time to position:
•  Existing/refreshing ASA or PIX
customers
•  Distributed enterprises; smaller
organizations
•  Against legacy NGFWs and
firewalls
•  Against advanced UTMs with NG
capabilities, with AMP/NGIPS
Ideal time to position:
•  Large multi-site deployments
(100s/1000s sites) with iWAN
requirements
•  Stores, branches and small sites
interested on a single device for
both WAN and security
•  WAN redundancy over 3G or
ADSL connections
29© 2015 Cisco and/or its affiliates. All rights reserved.
Feature Description Cisco ISR (without
Firepower)
ASA NGFW Meraki MX
Intelligent Path
Selection
Load Balancing
Policy-Based Path Selection
Number of Paths Supported
Rapid Failure Detection and Mitigation
Yes
Yes (L7 / app level)
Multiple (Any Transport)
Yes (Blackout & Brownout)
No
Yes
Multiple
Yes
Yes
Yes (L3-L4 / Network level –
based on loss, latency)
2 (Broadband, 4G, MPLS)
Yes
Security Virtual Private Network
Firewall
Intrusion Prevention & Detection
Content/URL Filtering
Anti-Virus
Yes
Yes
Yes (Cisco IDS)
Yes (Cloud Web Security)
No
Yes
Yes
Yes
Yes
Yes/No (AMP)
Yes
Yes
Yes (Snort)
Yes (Built-in)
Yes (Built-in)
Transport
Independence
WAN Connectivity
Cellular
IPv6
T1/E1, T3/E3, Serial, xDSL, Ethernet
Yes (Integrated/Module)
Yes
Ethernet
No
Yes
Ethernet
Yes (Dongle)
Planned (2H2015)
Application
Optimization
WAN Optimization
Content Caching
Application Visibility
Congestion Control
Yes (WAAS)
Yes (Akamai)
Yes
Yes (HQoS)
No
No
Yes
No
No
Yes (Squid-Cache)
Yes
Yes (L7 Traffic prioritization)
Unified
Communications
Voice Gateway
Session Border Controller
Call Control Agent
Yes
Yes
Yes
No
No
No
No
No
No
Routed Protocols OSPF
EIGRP
BGP
Yes
Yes
Yes
Yes
Yes
Yes
Planned (2H2015)
Planned
Planned (2H2015)
Integrated Storage
& Compute
Integrated Compute Yes (UCS E-Series) No No
Management Cloud Management
Number of Sites Managed
Plug and Play deployment
No
Thousands
No
No
300
No
Yes
Thousands
Yes
30© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco ISR UTM 1100, 2100, 3100
Complete package of WAN and Security solutions
Remote User / Hot
Spot
Mobile Device
Guest
Access Control
Benefits :
§  Centralized security basic features at local
appliances
§  Advanced security inspection at Cisco Cloud
§  Network Segmentation and Control
§  Business Continuity options – WAN HA
Perimeter Firewall
§  Security for internal and external access
§  Protocol anomaly detection and stateful inspection
Security Services Layers 2–7
§  Identify and react to new threats creating dinamic ACLs, new
firewalls policies, signatures, etc.
Network IPS
§  Global threats vision and update
§  Zero Day analysis
Web Security - ScanSafe
§  User web access control based on category and security levels –
AV, Anti-Malware
Management Solution
§  Centralized management solution
Service Modules
§  IPS network module
§  WAN Acceleration module
CWS
31© 2015 Cisco and/or its affiliates. All rights reserved.
When to position Meraki and Cisco
Cisco Enterprise Portfolio
 Cisco Cloud Managed
Prime
 ISE
Catalyst 2K/3K/4K/6K
ASA - Firewall
Cisco UTM Appliances - Routing
MS Switches
MX Security Appliances
Aironet Access Points & Controllers
Dashboard
Cisco Networking Portfolio!
MR APs
Systems Manager
3rd Party MDM Integration
Unparalleled Deployment Flexibility
 100% Cloud Managed
32© 2015 Cisco and/or its affiliates. All rights reserved.
CPE Services for SP
(incl. vMS, HSS, CWS)
•  Lower OPEX Costs
•  Minimize Truck Roll
•  Simplify Service
Activation
•  Flexible service
delivery and licensing
models
•  Enable Service
Customization
•  Flexible Deployment:
SP or Cisco Managed
Cloud
CPESP
BenefitsUse Case 2
Switching AP Voice
Cisco Confidential 33© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Hosted Security as a Service
•  Delivered from service provider’s
infrastructure
•  Orchestration SW interfaces with
native appliance configuration
mechanisms
•  All customer data lives inside the
SP Cloud environment
•  Security on virtual form factor
available today
INFRA-
STRUCTURE
Hypervisor
Cisco UCS
Storage
SERVICES
LAYER
WSAv
WSAv
ASAv
Tenant 1
ESAv
WSAv
ASAv
Tenant 2
ESAv
CSR1Kv
Tenant 3
ORCH.
LAYER
Policy Analytics Reporting
SP existing
orchestration,
reporting, billing
infrastructure
§ Provisioning
API
§ Reporting API
§ Billing API
Cisco Confidential 34© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Centralized Management and Reporting
HSS with ESAV
Per user
pricing
model
driven by
features
Inbound
Security
Outbound
Control
Virus and
Malware
Defense
Spam
Defense
DLP
Secure
Messaging
(Encryption)
HSS CVD 1.0
AMP
NOT in HSS CVD 1.0 (future release)
Email Security as a Service Using ESAV
HSS CVD 1.0 Release
Cisco Confidential 35© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Centralized Management and Reporting
HSS with WSAV
Web Security
§  Anti-malware protection
§  Web content analysis
§  Script emulation
Web Filtering
§  Web usage controls
§  Application visibility
§  Bi-directional control
Per user
pricing
model driven
by features
HSS CVD 1.0
AMP NOT in HSS CVD 1.0 (future release)
Web Security as a Service Using WSAV
HSS CVD 1.0 Release
Cisco Confidential 36© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Centralized Management and Reporting
HSS with ASAV or CSR1000v
Firewall Support
§ Stateful inspection
§ Application inspection
§ Network address translation
§ Encrypted traffic inspection
§ Protocol inspection
Per throughput
and per feature
service pricing
Smart Licensing
Advanced Firewall
§ Identity-aware policy
enforcement
§ Malware traffic detection
and blocking
§ Botnet traffic filter
§ Voice and video security
HSS CVD 2.0
Firewall as a Service Using ASAV/CSR1kV
HSS CVD 2.0 Release
37© 2015 Cisco and/or its affiliates. All rights reserved.
CPE Services for SP
•  Lower OPEX Costs
•  Simplify Service
Delivery
•  Flexible Service
Delivery Models
•  Highly Customizable
•  Flexible Physical &
Virtual Form-Factors
•  Flexible Deployment:
SP or Cisco Managed
Hybrid
CPESP
BenefitsUse Case 3
WWW
IPS
WEB
EMAIL MALWARE CONTEXT
Switching AP Voice
NGFW VPN
Routing
NAT DHCP
38© 2015 Cisco and/or its affiliates. All rights reserved.
•  Cloud Web Security (CWS)
•  Cloud Email Security (CES)
•  Hosted Identity Services
•  Cloud Access Security
Managed Cloud Services
39© 2015 Cisco and/or its affiliates. All rights reserved.
Web
Filtering WebpageWeb
Reputation
Application
Visibility and
Control
Anti-
Malware
Outbreak
Intelligence
File
Reputation
Cognitive
Threat
Analytics
Before
After
www.website.com
During
File
Retrospection
www
Roaming User
Reporting
Log Extraction
Management
Branch Office
www www
Allow Warn Block Partial Block
Campus Office
ASA StandaloneWSA ISR G2 AnyConnect®
AdminTraffic
Redirections
www
HQ
File
Sandboxing
Cloud Web Security
40© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco® Email Security
Before
AfterDuring
File
Retrospection
Reporting
Message Track
Management
Allow Warn
Admin
HQ
File
Sandboxing
Anti-Spam
and
Anti-Virus
Mail Flow
Policies
Data Loss
Protection
Encryption
Before
During
Inbound
Email
Outbound
Email
Cisco
Appliance VirtualCloud
Talos
Block
Partial
Block
Mail Flow
Policies
Email
Reputation
Acceptance
Controls Content
Controls
File
Reputation
Anti-Spam and
Anti-Virus
Outbreak
Filters
41© 2015 Cisco and/or its affiliates. All rights reserved. 41© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Hosted Identity Services
4
1
Complete
Integrated
Solution Benefits
Pay As
You Grow
No Capital
Expense
BYOD
24/7
Support
Secure and
Scalable
Quick Time
to
Deployment
42© 2015 Cisco and/or its affiliates. All rights reserved.
Shadow IT Risk
Assessment Report
Business
Readiness Rating™
Audit Score
Shadow Data
Risk Assessment
After
StreamIQ™
ThreatScore™
ContentIQ™
Reports &
Analysis
Cloud Apps ? ?
??
?? ?
IO IOI
IO IOI
Protect
IO IOI
IO IOI
Cloud SOC
Policy IO IOI
IO IOI
?
5417
IO IOI
IO IOI
?
?
IO IOI
Audit
Detect
?
Investigate
WSA
BeforeDuring
Elastica CloudSOC™
Other
Appliances
ASA
Data Account User
Security
Operations
Center
Analyze &
Control
Securlet™
Gateway
Cloud Access Security
43© 2015 Cisco and/or its affiliates. All rights reserved.
Business Case Review – LATAM Customers
44© 2015 Cisco and/or its affiliates. All rights reserved.
§  Virtualize services
§  Extend DC to Stores
§  Prepare for Internet
of Everything
Application
Consolidation and
Virtualization
§  Avoid backhaul and
offload corporate WAN
§  Direct Internet access
without compromising
security
§  High reliability for
dynamic apps
SaaS Application
Experience
§  More content without
exploding WAN costs
§  More efficient use of
current bandwidth
§  Instant access to HD
video over tablets
§  Guest WiFI
Content Explosion
§  Increase revenue
§  Longer dwell time
§  Immersive Marketing
§  Employee training
§  Virtual Stores
Retail of the Future
Looking for Business Outcomes
Retail
Retail of the Future
Market Trends
45© 2015 Cisco and/or its affiliates. All rights reserved.
Business Continuity – Primary requirement for
Retail
Primary
Link
Credit Card
Acquire Company
Backup
Link
Issue / Problem
Without connectivity during
"Hot Dates”
Initial Solution
Backup link solution based on
UTM* or 3G Modem
Due PCI Compliance
Results
Cisco Confidential
Lack of management
No SLA control
?
Retail
46© 2015 Cisco and/or its affiliates. All rights reserved.
Business Continuity – Primary requirement for
Retail
Primary
Link
Internet
Application Visibility &
Control (AVC)
Understand the applications
and knows how to prioritize
Performance Routing
(PfR)
Dynamically pick the best path
for high priority traffic
Advanced Security
(DMVPN, CWS)
Cisco Confidential
Reshape traffic patterns to
cloud from the branch with
dynamic security
Retail
3s
47© 2015 Cisco and/or its affiliates. All rights reserved.
© 2013 Cisco and/or its affiliates. All rights reserved. 47
Transport
Independent
Intelligent
Path Control
Secure Connectivity Application
Optimization
Internet
Retail
WAAS PfR
3G/4G-LTE
Provider Flexibility
Lower Cost
Dynamic Path Selection
High Quality Experience
Direct, Scalable Security
Protect Resources (FW/VPN/
IPS/Web and Email Security)
App Acceleration
Minimize Downtime
AVC
MPLS Data Center
Cisco UTM Solution – Based on Cisco IWAN Solution
48© 2015 Cisco and/or its affiliates. All rights reserved.
Network
Services
Simplify
Application
Delivery
One Network
UNIFIED
SERVICES
Routing Redefined
Routing
Switching
WLAN
Cisco UTM
Application
Services
Optimization
Collaboration
Server
Hosting
Security
Optimization Vendor
Security Appliance Vendor
Collaboration Vendor
1
2
3
4
5 Router Vendor
Server Vendor
Cisco Intelligent Solution – UTMCompetitive Solution – Multiple Vendors
Cisco UTM Business Advantage
49© 2015 Cisco and/or its affiliates. All rights reserved.
Cloud
Connected
Network
Mobile Router Firewall
The
Distributed
Perimeter
The Security Perimeter in the Cloud
Collective
Security
Intelligence Telemetry Data Threat Research Advanced Analytics
3M+
Cloud Web
Security Users
6GB
Web Traffic Examined,
Protected
Every Hour
75M
Unique Hits
Every Hour
10M
Blocks Enforced Every
Hour
50© 2015 Cisco and/or its affiliates. All rights reserved.
© 2013 Cisco and/or its affiliates. All rights reserved. 50
Add Secure Identity and BYOD
DMVPN
Data Center
Branch
•  DMVPN Inline Tagging—ISR G2 (IOS 15.2(2)T), ASR1k (XE 3.11*)
•  SG Firewall for Egress Enforcement
•  SGT Capability exchange during DMVPN IKEv2 negotiations
•  Learn SGT from SXP or Auth-methods
•  Simple one command configuration – DMVPN “crypto ikev2 cts sgt”
*ASR1k IOS (XE3.11) will be available in Fall 2013.
ISR-G2
Catalyst
Switch
AP
Branch NetworkSales
Finance
Admin
Catalyst
Switch
Catalyst Switch
HR
SGT
SGT
ASR-1K
SGT SGT
Nexus 7000
ISE
Profiler
Posture
Guest Server
SGT
Nexus
5000/2000
Catalyst 6500
Egress Enforcement
WAN: ISR G2/ASR1k, SG Firewall
Campus Aggregation: Cat6K/Sup2—SGACL
Data Center Enforcement: Nexus 7000—SGT/
SGACL
51© 2015 Cisco and/or its affiliates. All rights reserved.

Contenu connexe

Tendances

Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a HackerCisco Canada
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...SWITCHPOINT NV/SA
 
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any sizeAccelerating incident response in organizations of any size
Accelerating incident response in organizations of any sizeCisco Canada
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attackCisco Canada
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Canada
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...Cisco Canada
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat IntelligenceCisco Canada
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...Cisco Canada
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASBAlberto Rivai
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simpleCisco Canada
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...Cisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Canada
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
 

Tendances (20)

Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 -  Security Through The Eyes of a HackerCisco Connect Toronto 2017 -  Security Through The Eyes of a Hacker
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
 
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
PALO ALTO presentation used during the SWITCHPOINT NV/SA Quarterly Experience...
 
Accelerating incident response in organizations of any size
Accelerating incident response in organizations of any sizeAccelerating incident response in organizations of any size
Accelerating incident response in organizations of any size
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018   Anatomy of attackCisco Connect Halifax 2018   Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
Cisco Connect Halifax 2018   Accelerating incident  response in organizations...Cisco Connect Halifax 2018   Accelerating incident  response in organizations...
Cisco Connect Halifax 2018 Accelerating incident response in organizations...
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 

Similaire à Proteja seus clientes - Gerenciamento dos Serviços de Segurança

BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronDejan Jeremic
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIARobb Boyd
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted ApplicationsCisco DevNet
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public SectorCisco UCS Director for the Public Sector
Cisco UCS Director for the Public SectorAmy Blanchard
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Global Knowledge Training
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...Nur Shiqim Chok
 

Similaire à Proteja seus clientes - Gerenciamento dos Serviços de Segurança (20)

BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Idc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian AronIdc security roadshow may2015 Adrian Aron
Idc security roadshow may2015 Adrian Aron
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco UCS Director for the Public Sector
Cisco UCS Director for the Public SectorCisco UCS Director for the Public Sector
Cisco UCS Director for the Public Sector
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 

Plus de Cisco do Brasil

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialCisco do Brasil
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Cisco do Brasil
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Cisco do Brasil
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Cisco do Brasil
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Cisco do Brasil
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20Cisco do Brasil
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegidoCisco do Brasil
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco do Brasil
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - CiscoCisco do Brasil
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration AnalyticsCisco do Brasil
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18Cisco do Brasil
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsCisco do Brasil
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCisco do Brasil
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoCisco do Brasil
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no localCisco do Brasil
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua redeCisco do Brasil
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua redeCisco do Brasil
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamentoCisco do Brasil
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasCisco do Brasil
 

Plus de Cisco do Brasil (20)

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration Analytics
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
 
Vença o jogo da rede
Vença o jogo da redeVença o jogo da rede
Vença o jogo da rede
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
 

Dernier

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Proteja seus clientes - Gerenciamento dos Serviços de Segurança

  • 1. 1© 2015 Cisco and/or its affiliates. All rights reserved. Security Strategy Managed Security Services Ghassan Dreibi Manager, Business Development
  • 2. 2© 2015 Cisco and/or its affiliates. All rights reserved. The Digital Opportunity Hackers 2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco PublicPresentation ID Business Employees Consumers
  • 3. 3© 2015 Cisco and/or its affiliates. All rights reserved. 3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Welcome to the Hackers’ Economy Source: CNBC Global Cybercrime Market: $450B-$1T (U.S.) How Industrial Hackers Monetize the Opportunity Social Security $1 Medical Record >$50 DDoS as a Service ~$7/hour DDoS Credit Card Data $0.25−$60 Bank Account Info >$1000 depending on account type and balance $ Exploits $100k-$300K Facebook Account $1 for an account with 15 friends Spam $50/500K emails Malware Development $2500 (commercial malware) Mobile Malware $150
  • 4. 4© 2015 Cisco and/or its affiliates. All rights reserved. Security Solutions for Service Providers Corporate IT Managed Cloud Services Managed CPE Services Production Network Managed, Advisory & Implementation Services Protect Your CustomersProtect Yourself Threat Centric Security to Protect & Grow Your Business
  • 5. 5© 2015 Cisco and/or its affiliates. All rights reserved. Security Solutions for Service Providers Corporate IT •  Network Security (NGFW, NGIPS, NaaS, NaaE) •  Advanced Threat Protection •  Email / Web Security •  Secure Access & Mobility Production Network •  SP Data Center •  SP Cloud •  SP Mobile Edge •  SP Infrastructure Edge Managed CPE Services •  Physical •  Virtual •  Hybrid Managed Cloud Services •  Cloud Web Security (CWS) •  Cloud Email Security (CES) •  Hosted Identity Services •  Cloud Access Security Protect Your CustomersProtect Yourself Managed, Advisory & Implementation Services Threat Centric Security to Protect & Grow Your Business
  • 6. 6© 2015 Cisco and/or its affiliates. All rights reserved. 6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Concepts
  • 7. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 The Life Cycle of an Attack •  Attack planning •  The intruder is trying to obtain access •  The intruder bypassed the controls •  A vulnerability is being exploited •  A malware arrived as part of an email or web access •  Credentials were stoled •  The intruder is inside the network Discover Enforce Harden Detect Block Defend Scope Contain Remediate
  • 8. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 The Life Cycle of an Attack Discover Enforce Harden Detect Block Defend Scope Contain Remediate Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
  • 9. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 The Threat-Centric Security Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING Network Endpoint Mobile Virtual Cloud Point in Time Continuous
  • 10. 10© 2015 Cisco and/or its affiliates. All rights reserved. Unified Solutions Across Deployments Feature Consistency | Open APIs | Flexible Licensing Physical Virtual Cloud
  • 11. 11© 2015 Cisco and/or its affiliates. All rights reserved. 11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Solution Overview
  • 12. 12© 2015 Cisco and/or its affiliates. All rights reserved. ASA with FirePOWER Services Industry’s First Threat-Focused NGFW #1 Cisco Security announcement of the year! •  Integrating defense layers helps organizations get the best visibility •  Enable dynamic controls to automatically adapt •  Protect against advanced threats across the entire attack continuum Proven Cisco ASA firewalling Industry leading NGIPS and AMP Cisco ASA with FirePOWER Services
  • 13. 13© 2015 Cisco and/or its affiliates. All rights reserved. Collective Security Intelligence (CSI) Contextual Device, Network and End-Point Visibility Classic Stateful Firewall Gen1 IPS Application Visibility Web—URL Controls AV and Basic Protections NGIPS Vulnerability Management *Client Anti- Malware (AMP) Correlated SIEM Eventing Incident Control System Network Anti- Malware Controls (AMP) Behavioral Indications of Compromise User Identity NGFW Open APP-ID SNORT Open IPS Network/Host Trajectory Retrospective Analysis ThreatGrid Auto-Remediation *Agent Adaptive Security Sandboxing Retrospective DetectionMalware File Trajectory Threat Hunting Forensics and Log Management URL ReputationIP Reputation How Cisco Appears Competitively BEFORE DURING AFTER Cisco Only Cisco AND Competitors
  • 14. 14© 2015 Cisco and/or its affiliates. All rights reserved. VIRTUAL PHYSICAL ASA 5585-X 16 Way Clustering with State Synchronization Scalable to 640Gbps ASAv •  Full ASA Feature Set •  Hypervisor Independent •  Virtual Switch Agnostic •  Dynamic Scalability ACI SECURITY SOLUTION STARTS WITH CISCO ASA ASA ASAv on VMWare – Available Today – Ask your SE
  • 15. 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Identity Services Engine (ISE) 1.3 Delivering the Visibility, Context and Control for Secure Network Access NETWORK / USER CONTEXT How WhatWho WhereWhen PARTNER CONTEXT DATA CONSISTENT SECURE ACCESS POLICY ACROSS WIRED, WIRELESS and VPN
  • 16. 16© 2015 Cisco and/or its affiliates. All rights reserved. Email and web are the top threat vectors Data Loss Acceptable Use Violations Malware Infections IPv6 Spam Blended Threats Targeted Attacks APTs Advanced Malware Rootkits Worms Trojan Horse 93% of customer networks access websites that host malware* *Cisco 2014 Midyear Security Report
  • 17. 17© 2015 Cisco and/or its affiliates. All rights reserved. File Sandboxing Behavioral analysis of unknown files File Retrospection Retrospective alerting after an attack Advanced Malware Protection File Reputation Preventative blocking of suspicious files
  • 18. 18© 2015 Cisco and/or its affiliates. All rights reserved. 18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Offerings
  • 19. 19© 2015 Cisco and/or its affiliates. All rights reserved. Flexible Deployment Options Industry-leading, Best of Breed Email Protection at the Gateway Deployment Options VirtualAppliance Multi-device Support Desktop TabletLaptopMobile Cloud ManagedHybridHybrid On-Premises Cloud
  • 20. 20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Security as a Service Solutions Service Provider Virtual Private Cloud Hosted Security Solution SP-Hosted Firewall, VPN Email, and Web Services Turnkey Public Cloud Cisco Managed Security Cloud Cisco or SP-Hosted, Cisco-Run Web Security Services
  • 21. 21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Offers Two Security as a Service Solutions Attribute Cisco Hosted Security Solution (HSS) Cisco Managed Security Cloud (CMSC) Services Phase 1: Web, Email - Phase 1.1: Firewall, VPN Cloud Web Security (formerly Scansafe) Delivery Model Virtual Private Cloud – SP Hosted Public Cloud – Cisco or SP hosted Pricing Model SP price per user and per usage Price per user SP CapEx Costs §  Web, Email, Firewall, VPN software licenses §  Cloud infrastructure (VMware, UCS, storage, Network Infrastructure) None SP OpEx Costs §  Bandwidth §  OSS / BSS §  Operations (People) §  Minimum commitment of users §  Hosting, including bandwidth (in case of SP hosted) Reporting / Log Data Owned by SP, stays at SP DC Centralized in Cisco Cloud Orchestration / Management With third-party tools (e.g. Ubiqube) Turnkey Cisco solution Connectivity Differences VPN link to customer site OTT internet connectivity
  • 22. 22© 2015 Cisco and/or its affiliates. All rights reserved. Evolution of Managed Security Services Premise to Cloud W W W IPS WEB EMAIL MALWARECONTEXT Switching AP Voice NGFW VPN Routing NAT DHCP Cloud Switching AP Voice Hybrid CPE Managed CPESP W W W NGFW VPN IPS WEB EMAIL MALWARECONTEXT Switching NAT DHCP AP Voice Routing
  • 23. 23© 2015 Cisco and/or its affiliates. All rights reserved. Challenges of MSSP Complex, rigid and slow Legacy Service Revenue Decline High Cost and Complexity Slow Service Creation and Service Delivery Cloud Readiness
  • 24. 24© 2015 Cisco and/or its affiliates. All rights reserved. •  Physical •  Virtual •  Hybrid Managed CPE Services
  • 25. 25© 2015 Cisco and/or its affiliates. All rights reserved. CPE Services for SP •  End-to-End Single- Sourced Provider •  Market-Leading: Gartner & NSS Labs •  Highly Customizable •  Flexible Configuration •  Open Architecture •  3rd Party Integration •  Full Visibility for SOC Analysts Managed CPESP BenefitsUse Case 1 WWW NGFW VPN IPS Web Email Malware Context Switching NAT DHCP AP Voice Routing Key Verticals: Government, Financial Services, Health Care, Utilities
  • 26. 26© 2015 Cisco and/or its affiliates. All rights reserved. CPEs Flexibility Cisco ISR ASA 5506 Meraki
  • 27. 27Cisco ASA for SMB and Distributed Enterprise Presentation | © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Extend the value of your NGFW Start with the hardware option that fits best All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities Desktop 5506-X Wireless AP 5506W-X Ruggedized 5506H-X Rackmount 5508-X/5516-X Add FirePOWER Services* for enhanced protection *Available as subscriptions Next-Generation Intrusion Prevention System (NGIPS) URL FilteringAdvanced Malware Protection (AMP) Choose the appropriate management solution Appliance sold separately FireSIGHT Management Center On-box manager comes standard Adaptive Security Device Manager (ASDM)
  • 28. 28© 2015 Cisco and/or its affiliates. All rights reserved. “When to Sell What” Meraki MX & ASA with FirePOWER Services & ISR Bundle Meraki MX ASA with FirePOWER ISR Lean IT Focus: For highly distributed enterprises or enterprises seeking a best in class UTM and simple deployment Threat-focused NGFW with advanced threat protection capabilities in the lowest cost form factor available Standard FW, IPS and Web Security with iWAN capabilities and advanced network and communication support in the lowest form factor available Note: ISR4K now supports Firepower Radically simplified deployment and ultra low operating cost via cloud management with robust security that is optimized for highly distributed environments Unmatched visibility and control that enables correlation and analytics to automatically prioritize and protect against advanced threats Best ROI (simple, integrated, flexible), cost reduction with improved flexibility, secondary link, better performance through WAN optimization and expansibility through integrated UCS Ideal time to position: •  With Meraki networking environments •  Large multi-site deployments (100s/1000s sites) with full UTM requirements •  Against traditional UTM competitors •  When deployment of units to a high distributed enterprise is a issue Ideal time to position: •  Existing/refreshing ASA or PIX customers •  Distributed enterprises; smaller organizations •  Against legacy NGFWs and firewalls •  Against advanced UTMs with NG capabilities, with AMP/NGIPS Ideal time to position: •  Large multi-site deployments (100s/1000s sites) with iWAN requirements •  Stores, branches and small sites interested on a single device for both WAN and security •  WAN redundancy over 3G or ADSL connections
  • 29. 29© 2015 Cisco and/or its affiliates. All rights reserved. Feature Description Cisco ISR (without Firepower) ASA NGFW Meraki MX Intelligent Path Selection Load Balancing Policy-Based Path Selection Number of Paths Supported Rapid Failure Detection and Mitigation Yes Yes (L7 / app level) Multiple (Any Transport) Yes (Blackout & Brownout) No Yes Multiple Yes Yes Yes (L3-L4 / Network level – based on loss, latency) 2 (Broadband, 4G, MPLS) Yes Security Virtual Private Network Firewall Intrusion Prevention & Detection Content/URL Filtering Anti-Virus Yes Yes Yes (Cisco IDS) Yes (Cloud Web Security) No Yes Yes Yes Yes Yes/No (AMP) Yes Yes Yes (Snort) Yes (Built-in) Yes (Built-in) Transport Independence WAN Connectivity Cellular IPv6 T1/E1, T3/E3, Serial, xDSL, Ethernet Yes (Integrated/Module) Yes Ethernet No Yes Ethernet Yes (Dongle) Planned (2H2015) Application Optimization WAN Optimization Content Caching Application Visibility Congestion Control Yes (WAAS) Yes (Akamai) Yes Yes (HQoS) No No Yes No No Yes (Squid-Cache) Yes Yes (L7 Traffic prioritization) Unified Communications Voice Gateway Session Border Controller Call Control Agent Yes Yes Yes No No No No No No Routed Protocols OSPF EIGRP BGP Yes Yes Yes Yes Yes Yes Planned (2H2015) Planned Planned (2H2015) Integrated Storage & Compute Integrated Compute Yes (UCS E-Series) No No Management Cloud Management Number of Sites Managed Plug and Play deployment No Thousands No No 300 No Yes Thousands Yes
  • 30. 30© 2015 Cisco and/or its affiliates. All rights reserved. Cisco ISR UTM 1100, 2100, 3100 Complete package of WAN and Security solutions Remote User / Hot Spot Mobile Device Guest Access Control Benefits : §  Centralized security basic features at local appliances §  Advanced security inspection at Cisco Cloud §  Network Segmentation and Control §  Business Continuity options – WAN HA Perimeter Firewall §  Security for internal and external access §  Protocol anomaly detection and stateful inspection Security Services Layers 2–7 §  Identify and react to new threats creating dinamic ACLs, new firewalls policies, signatures, etc. Network IPS §  Global threats vision and update §  Zero Day analysis Web Security - ScanSafe §  User web access control based on category and security levels – AV, Anti-Malware Management Solution §  Centralized management solution Service Modules §  IPS network module §  WAN Acceleration module CWS
  • 31. 31© 2015 Cisco and/or its affiliates. All rights reserved. When to position Meraki and Cisco Cisco Enterprise Portfolio Cisco Cloud Managed Prime ISE Catalyst 2K/3K/4K/6K ASA - Firewall Cisco UTM Appliances - Routing MS Switches MX Security Appliances Aironet Access Points & Controllers Dashboard Cisco Networking Portfolio! MR APs Systems Manager 3rd Party MDM Integration Unparalleled Deployment Flexibility 100% Cloud Managed
  • 32. 32© 2015 Cisco and/or its affiliates. All rights reserved. CPE Services for SP (incl. vMS, HSS, CWS) •  Lower OPEX Costs •  Minimize Truck Roll •  Simplify Service Activation •  Flexible service delivery and licensing models •  Enable Service Customization •  Flexible Deployment: SP or Cisco Managed Cloud CPESP BenefitsUse Case 2 Switching AP Voice
  • 33. Cisco Confidential 33© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Hosted Security as a Service •  Delivered from service provider’s infrastructure •  Orchestration SW interfaces with native appliance configuration mechanisms •  All customer data lives inside the SP Cloud environment •  Security on virtual form factor available today INFRA- STRUCTURE Hypervisor Cisco UCS Storage SERVICES LAYER WSAv WSAv ASAv Tenant 1 ESAv WSAv ASAv Tenant 2 ESAv CSR1Kv Tenant 3 ORCH. LAYER Policy Analytics Reporting SP existing orchestration, reporting, billing infrastructure § Provisioning API § Reporting API § Billing API
  • 34. Cisco Confidential 34© 2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with ESAV Per user pricing model driven by features Inbound Security Outbound Control Virus and Malware Defense Spam Defense DLP Secure Messaging (Encryption) HSS CVD 1.0 AMP NOT in HSS CVD 1.0 (future release) Email Security as a Service Using ESAV HSS CVD 1.0 Release
  • 35. Cisco Confidential 35© 2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with WSAV Web Security §  Anti-malware protection §  Web content analysis §  Script emulation Web Filtering §  Web usage controls §  Application visibility §  Bi-directional control Per user pricing model driven by features HSS CVD 1.0 AMP NOT in HSS CVD 1.0 (future release) Web Security as a Service Using WSAV HSS CVD 1.0 Release
  • 36. Cisco Confidential 36© 2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting HSS with ASAV or CSR1000v Firewall Support § Stateful inspection § Application inspection § Network address translation § Encrypted traffic inspection § Protocol inspection Per throughput and per feature service pricing Smart Licensing Advanced Firewall § Identity-aware policy enforcement § Malware traffic detection and blocking § Botnet traffic filter § Voice and video security HSS CVD 2.0 Firewall as a Service Using ASAV/CSR1kV HSS CVD 2.0 Release
  • 37. 37© 2015 Cisco and/or its affiliates. All rights reserved. CPE Services for SP •  Lower OPEX Costs •  Simplify Service Delivery •  Flexible Service Delivery Models •  Highly Customizable •  Flexible Physical & Virtual Form-Factors •  Flexible Deployment: SP or Cisco Managed Hybrid CPESP BenefitsUse Case 3 WWW IPS WEB EMAIL MALWARE CONTEXT Switching AP Voice NGFW VPN Routing NAT DHCP
  • 38. 38© 2015 Cisco and/or its affiliates. All rights reserved. •  Cloud Web Security (CWS) •  Cloud Email Security (CES) •  Hosted Identity Services •  Cloud Access Security Managed Cloud Services
  • 39. 39© 2015 Cisco and/or its affiliates. All rights reserved. Web Filtering WebpageWeb Reputation Application Visibility and Control Anti- Malware Outbreak Intelligence File Reputation Cognitive Threat Analytics Before After www.website.com During File Retrospection www Roaming User Reporting Log Extraction Management Branch Office www www Allow Warn Block Partial Block Campus Office ASA StandaloneWSA ISR G2 AnyConnect® AdminTraffic Redirections www HQ File Sandboxing Cloud Web Security
  • 40. 40© 2015 Cisco and/or its affiliates. All rights reserved. Cisco® Email Security Before AfterDuring File Retrospection Reporting Message Track Management Allow Warn Admin HQ File Sandboxing Anti-Spam and Anti-Virus Mail Flow Policies Data Loss Protection Encryption Before During Inbound Email Outbound Email Cisco Appliance VirtualCloud Talos Block Partial Block Mail Flow Policies Email Reputation Acceptance Controls Content Controls File Reputation Anti-Spam and Anti-Virus Outbreak Filters
  • 41. 41© 2015 Cisco and/or its affiliates. All rights reserved. 41© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Cisco Hosted Identity Services 4 1 Complete Integrated Solution Benefits Pay As You Grow No Capital Expense BYOD 24/7 Support Secure and Scalable Quick Time to Deployment
  • 42. 42© 2015 Cisco and/or its affiliates. All rights reserved. Shadow IT Risk Assessment Report Business Readiness Rating™ Audit Score Shadow Data Risk Assessment After StreamIQ™ ThreatScore™ ContentIQ™ Reports & Analysis Cloud Apps ? ? ?? ?? ? IO IOI IO IOI Protect IO IOI IO IOI Cloud SOC Policy IO IOI IO IOI ? 5417 IO IOI IO IOI ? ? IO IOI Audit Detect ? Investigate WSA BeforeDuring Elastica CloudSOC™ Other Appliances ASA Data Account User Security Operations Center Analyze & Control Securlet™ Gateway Cloud Access Security
  • 43. 43© 2015 Cisco and/or its affiliates. All rights reserved. Business Case Review – LATAM Customers
  • 44. 44© 2015 Cisco and/or its affiliates. All rights reserved. §  Virtualize services §  Extend DC to Stores §  Prepare for Internet of Everything Application Consolidation and Virtualization §  Avoid backhaul and offload corporate WAN §  Direct Internet access without compromising security §  High reliability for dynamic apps SaaS Application Experience §  More content without exploding WAN costs §  More efficient use of current bandwidth §  Instant access to HD video over tablets §  Guest WiFI Content Explosion §  Increase revenue §  Longer dwell time §  Immersive Marketing §  Employee training §  Virtual Stores Retail of the Future Looking for Business Outcomes Retail Retail of the Future Market Trends
  • 45. 45© 2015 Cisco and/or its affiliates. All rights reserved. Business Continuity – Primary requirement for Retail Primary Link Credit Card Acquire Company Backup Link Issue / Problem Without connectivity during "Hot Dates” Initial Solution Backup link solution based on UTM* or 3G Modem Due PCI Compliance Results Cisco Confidential Lack of management No SLA control ? Retail
  • 46. 46© 2015 Cisco and/or its affiliates. All rights reserved. Business Continuity – Primary requirement for Retail Primary Link Internet Application Visibility & Control (AVC) Understand the applications and knows how to prioritize Performance Routing (PfR) Dynamically pick the best path for high priority traffic Advanced Security (DMVPN, CWS) Cisco Confidential Reshape traffic patterns to cloud from the branch with dynamic security Retail 3s
  • 47. 47© 2015 Cisco and/or its affiliates. All rights reserved. © 2013 Cisco and/or its affiliates. All rights reserved. 47 Transport Independent Intelligent Path Control Secure Connectivity Application Optimization Internet Retail WAAS PfR 3G/4G-LTE Provider Flexibility Lower Cost Dynamic Path Selection High Quality Experience Direct, Scalable Security Protect Resources (FW/VPN/ IPS/Web and Email Security) App Acceleration Minimize Downtime AVC MPLS Data Center Cisco UTM Solution – Based on Cisco IWAN Solution
  • 48. 48© 2015 Cisco and/or its affiliates. All rights reserved. Network Services Simplify Application Delivery One Network UNIFIED SERVICES Routing Redefined Routing Switching WLAN Cisco UTM Application Services Optimization Collaboration Server Hosting Security Optimization Vendor Security Appliance Vendor Collaboration Vendor 1 2 3 4 5 Router Vendor Server Vendor Cisco Intelligent Solution – UTMCompetitive Solution – Multiple Vendors Cisco UTM Business Advantage
  • 49. 49© 2015 Cisco and/or its affiliates. All rights reserved. Cloud Connected Network Mobile Router Firewall The Distributed Perimeter The Security Perimeter in the Cloud Collective Security Intelligence Telemetry Data Threat Research Advanced Analytics 3M+ Cloud Web Security Users 6GB Web Traffic Examined, Protected Every Hour 75M Unique Hits Every Hour 10M Blocks Enforced Every Hour
  • 50. 50© 2015 Cisco and/or its affiliates. All rights reserved. © 2013 Cisco and/or its affiliates. All rights reserved. 50 Add Secure Identity and BYOD DMVPN Data Center Branch •  DMVPN Inline Tagging—ISR G2 (IOS 15.2(2)T), ASR1k (XE 3.11*) •  SG Firewall for Egress Enforcement •  SGT Capability exchange during DMVPN IKEv2 negotiations •  Learn SGT from SXP or Auth-methods •  Simple one command configuration – DMVPN “crypto ikev2 cts sgt” *ASR1k IOS (XE3.11) will be available in Fall 2013. ISR-G2 Catalyst Switch AP Branch NetworkSales Finance Admin Catalyst Switch Catalyst Switch HR SGT SGT ASR-1K SGT SGT Nexus 7000 ISE Profiler Posture Guest Server SGT Nexus 5000/2000 Catalyst 6500 Egress Enforcement WAN: ISR G2/ASR1k, SG Firewall Campus Aggregation: Cat6K/Sup2—SGACL Data Center Enforcement: Nexus 7000—SGT/ SGACL
  • 51. 51© 2015 Cisco and/or its affiliates. All rights reserved.