SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Información segura. Negocios seguros.


              Securing the Network
              Securing the Network


                                                          Ricardo Ross
                                                          Ricardo Ross
                             Juniper Networks Channel Account Manager
LOGO ORADOR
Agenda
• Perimeters
• Threats and Protections
• Securing the Network
         g




LOGO ORADOR
Perimeters


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote
               Laptop                Internet
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • LAN Access
  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • Remote Access
  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • Campus – Data Center
  Users        Devices      Campus               Datacenter
                                       Core


                  PC

Employees
Customers                    Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                    Branch
 Suppliers
                PDA
Contractors
 Off-Shore                             WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • Remote – Data Center
  Users        Devices      Campus               Datacenter
                                       Core


                  PC

Employees
Customers                    Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                    Branch
 Suppliers
                PDA
Contractors
 Off-Shore                             WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • Branch – Data Center
  Users        Devices      Campus               Datacenter
                                       Core


                  PC

Employees
Customers                    Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                    Branch
 Suppliers
                PDA
Contractors
 Off-Shore                             WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Perimeters
   • Campus – Internet
  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
               Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone




    LOGO ORADOR
Threats and Protections
        Threat                                                Protection
        Internal Network Structure Non Hidden
        I t    lN t    k St t      N Hidd                     Firewall
                                                              Fi    ll
        One Networks Segment                                  Firewall
        One Security Zone                                     Firewall
        Flooding and DoS                                      Firewall
        Protocol Weakness Exploitation                        IDP
        Vulnerabilities Exploitation ‐ Applications and OS    IDP
        Application/Service DoS                               IDP
        Unexpected traffic patterns                           IDP
        Scanning                                              Firewall, IDP
        Brute Force ‐ Cracking Passwords                      Firewall, IDP
        IP Spoofing                                           Firewall, IDP
        Non‐Integrity and Non‐Privacy Sessions Site to Site   VPN Ipsec
        Non‐Integrity and Non‐Privacy Sessions Client to Site SSLVPN

LOGO ORADOR
Threats and Protections
Threat                                Protection
                                      Access Controller, End Point Access Control Agent, 802.1x 
                                      Access Controller End Point Access Control Agent 802 1x
Unauthorized Network Admission L2
                                      Device
Unauthorized Network Admission L3     Access Controller, End Point Access Control Agent, Firewall
Unauthorized Server Access                                                         g
                                      Access Controller, End Point Access Control Agent, Firewall
                                      Access Controller, End Point Access Control Agent, Firewall, 
Identity Spoofing
                                      IDP
Unauthorized Application Access       Access Controller, End Point Access Control Agent, IDP
                                      Access Controller, End Point Access Control Agent, 802.1x 
Weak User Authentication
                                      Device, Firewall
                                      Access Controller, End Point Access Control Agent, 802.1x 
Weak User Authorization
                                      Device, Firewall
                                      Device Firewall
                                      Access Controller, End Point Access Control Agent, 802.1x 
Unmanaged Traffic ‐ Bandwidth Abuse
                                      Device, Firewall, IDP
                                      Access Controller, End Point Access Control Agent, 802.1x 
                                      Access Controller, End Point Access Control Agent, 802.1x
Non‐Compliant End Points
                                      Device, Firewall, IDP

   LOGO ORADOR
Threats and Protections
Threat          Protection
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Virus
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Trojans
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
                A      C     ll E d P i A           C     lA       A i i     A i Ad      A i
Worms
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Keyloggers
                 py                  g                 g
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Adware
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Spyware
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
Malware
                Spyware+Anti‐Pishing, IDP, Web Filtering
                Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐
                Access Controller End Point Access Control Agent Antivirus+Anti Adware+Anti
Backdoors
                Spyware+Anti‐Pishing, IDP, Web Filtering

  LOGO ORADOR
Threats and Protections


     Threat                               Protection
     Spam                                 AntiSpam
                                          AntiSpam, Antivirus+Anti‐Adware+Anti‐
     Pishing
                                          Spyware+Anti‐Pishing, Web Filtering
     Access to Inappropriate Web sites    Web Filtering
     Access to Malicious Websites         Web Filtering
     Data Leakage                         Content Filtering




LOGO ORADOR
Securing the Network
  • LAN Access


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
  • Remote Access


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
  • Campus – Data Center


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
  • Remote – Data Center


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
  • Branch – Data Center


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
  • Campus – Internet


  Users        Devices     Campus               Datacenter
                                      Core


                  PC

Employees
Customers                   Remote   Internet
                 Laptop
  Guests
 Partners
 Vendors                   Branch
 Suppliers
                 PDA
Contractors
 Off-Shore                            WAN
Outsourced

              Cell Phone


   LOGO ORADOR
Securing the Network
Policy Management       Device Configuration                     Remediation                Event & Flow Processing
VPN Management          Version Control                          User Activity Management   Correlation
Object Management       Software Image Management                Real Time Monitoring
                                                                                   WAN      Analysis
Inventory Management    Security Update                          Event & Flow Collection    Reporting



                       Networking            Security          OS/Applications
                              Visibility & Control Enterprise-wide
     Users              Devices                     Campus                    Datacenter
                                                               Core


                          PC

  Employees
  Customers                                          Remote   Internet
                        Laptop
    Guests
   Partners
   Vendors                                          Branch
   Suppliers
                         PDA
  Contractors
   Off-Shore                                                   WAN
  Outsourced

                       Cell Phone


     LOGO ORADOR

Contenu connexe

Tendances

Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profileuknadh
 
Suprema device web
Suprema device webSuprema device web
Suprema device webSuprema Inc
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeMichael Smith
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Deepak Kl
 
Neal Thompson of Maritz at MPITechCon on RFID
Neal Thompson of Maritz at MPITechCon on RFIDNeal Thompson of Maritz at MPITechCon on RFID
Neal Thompson of Maritz at MPITechCon on RFIDKyle Hillman
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceCarleton Bedell
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016Laurent Dardé
 
NFC Development with Qt - v2.2.0 (5. November 2012)
NFC Development with Qt - v2.2.0 (5. November 2012)NFC Development with Qt - v2.2.0 (5. November 2012)
NFC Development with Qt - v2.2.0 (5. November 2012)Andreas Jakl
 

Tendances (13)

Inspira Biomorf Profile
Inspira Biomorf ProfileInspira Biomorf Profile
Inspira Biomorf Profile
 
Suprema device web
Suprema device webSuprema device web
Suprema device web
 
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - LeeDefCon 2012 - Near-Field Communication / RFID Hacking - Lee
DefCon 2012 - Near-Field Communication / RFID Hacking - Lee
 
psp1000_pss_en
psp1000_pss_enpsp1000_pss_en
psp1000_pss_en
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Neal Thompson of Maritz at MPITechCon on RFID
Neal Thompson of Maritz at MPITechCon on RFIDNeal Thompson of Maritz at MPITechCon on RFID
Neal Thompson of Maritz at MPITechCon on RFID
 
QR Tecnology vqr
QR Tecnology vqrQR Tecnology vqr
QR Tecnology vqr
 
Glonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self ServiceGlonetex ATM & Kiosk Self Service
Glonetex ATM & Kiosk Self Service
 
My ppt
My pptMy ppt
My ppt
 
Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009
 
Introduction to VoIP Security
Introduction to VoIP SecurityIntroduction to VoIP Security
Introduction to VoIP Security
 
NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016NFC Everywhere Brochure 2016
NFC Everywhere Brochure 2016
 
NFC Development with Qt - v2.2.0 (5. November 2012)
NFC Development with Qt - v2.2.0 (5. November 2012)NFC Development with Qt - v2.2.0 (5. November 2012)
NFC Development with Qt - v2.2.0 (5. November 2012)
 

Similaire à Securing the Network, por Ricardo Ross

NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General OverviewMichael Starr
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyTyler Shields
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AlivePositive Hack Days
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012dvanwyk30
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay aliveqqlan
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveDefconRussia
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikPositive Hack Days
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7ka312312
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edgeitnewsafrica
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...BAKOTECH
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wirelessvfmindia
 
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...SPTechCon
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolationSierraware
 

Similaire à Securing the Network, por Ricardo Ross (20)

Freedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profileFreedom infotech pvt. ltd. company profile
Freedom infotech pvt. ltd. company profile
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
NGSoft General Overview
NGSoft General OverviewNGSoft General Overview
NGSoft General Overview
 
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your PrivacyDirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
 
BYOD Monitoring
BYOD MonitoringBYOD Monitoring
BYOD Monitoring
 
How to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay AliveHow to Hack a Telecom and Stay Alive
How to Hack a Telecom and Stay Alive
 
Microtracking in Australia
Microtracking in AustraliaMicrotracking in Australia
Microtracking in Australia
 
Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012Sophos utm-roadshow-south africa-2012
Sophos utm-roadshow-south africa-2012
 
How to hack a telecom and stay alive
How to hack a telecom and stay aliveHow to hack a telecom and stay alive
How to hack a telecom and stay alive
 
Sergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay aliveSergey Gordeychik - How to hack a telecom and stay alive
Sergey Gordeychik - How to hack a telecom and stay alive
 
How to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey GordeychikHow to hack a telecommunication company and stay alive. Sergey Gordeychik
How to hack a telecommunication company and stay alive. Sergey Gordeychik
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
End to End Security With Palo Alto Networks (Onur Kasap, engineer Palo Alto N...
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
S series presentation
S series presentationS series presentation
S series presentation
 
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
Planning and Configuring Extranets in SharePoint 2010 by Geoff Varosky - SPTe...
 
Sierraware browser isolation
Sierraware browser isolationSierraware browser isolation
Sierraware browser isolation
 

Plus de Foro Global Crossing

Presentación consolidada 3er Foro Global Crossing - Ecuador
Presentación consolidada 3er Foro Global Crossing - EcuadorPresentación consolidada 3er Foro Global Crossing - Ecuador
Presentación consolidada 3er Foro Global Crossing - EcuadorForo Global Crossing
 
Miguel Cisterna - Outsourcing IT: cuando implementarlo
Miguel Cisterna - Outsourcing IT: cuando implementarloMiguel Cisterna - Outsourcing IT: cuando implementarlo
Miguel Cisterna - Outsourcing IT: cuando implementarloForo Global Crossing
 
David Delgado - Microsoft: el camino hacia la nube con nuestros socios tecno...
David Delgado  - Microsoft: el camino hacia la nube con nuestros socios tecno...David Delgado  - Microsoft: el camino hacia la nube con nuestros socios tecno...
David Delgado - Microsoft: el camino hacia la nube con nuestros socios tecno...Foro Global Crossing
 
Marcelo Ruiz (Frost & Sullivan) - Outsourcing tic vision y tendencias
Marcelo Ruiz  (Frost & Sullivan) - Outsourcing tic vision y tendenciasMarcelo Ruiz  (Frost & Sullivan) - Outsourcing tic vision y tendencias
Marcelo Ruiz (Frost & Sullivan) - Outsourcing tic vision y tendenciasForo Global Crossing
 
Gabriel Marcos - Soluciones en la nube, decisiones aterrizadas
Gabriel Marcos -  Soluciones en la nube, decisiones aterrizadasGabriel Marcos -  Soluciones en la nube, decisiones aterrizadas
Gabriel Marcos - Soluciones en la nube, decisiones aterrizadasForo Global Crossing
 
Puppy Rojas - Banda Ancha para todos, mas allá de la Infraestructura
Puppy Rojas - Banda Ancha para todos, mas allá de la InfraestructuraPuppy Rojas - Banda Ancha para todos, mas allá de la Infraestructura
Puppy Rojas - Banda Ancha para todos, mas allá de la InfraestructuraForo Global Crossing
 
Tomás Grassi - Communications as a Service
Tomás Grassi - Communications as a ServiceTomás Grassi - Communications as a Service
Tomás Grassi - Communications as a ServiceForo Global Crossing
 
Gabriela Franchetto - Innovación a la velocidad 100% web
Gabriela Franchetto - Innovación a la velocidad 100% webGabriela Franchetto - Innovación a la velocidad 100% web
Gabriela Franchetto - Innovación a la velocidad 100% webForo Global Crossing
 
Gianni Hanawa - Accediendo a la nube: Network Solutions
Gianni Hanawa - Accediendo a la nube: Network SolutionsGianni Hanawa - Accediendo a la nube: Network Solutions
Gianni Hanawa - Accediendo a la nube: Network SolutionsForo Global Crossing
 
Marcela Núñez - Cloud Computing: Aterrizando la nube
Marcela Núñez - Cloud Computing: Aterrizando la nubeMarcela Núñez - Cloud Computing: Aterrizando la nube
Marcela Núñez - Cloud Computing: Aterrizando la nubeForo Global Crossing
 
Rodrigo Rojas - "To share or not to share"
Rodrigo Rojas - "To share or not to share"Rodrigo Rojas - "To share or not to share"
Rodrigo Rojas - "To share or not to share"Foro Global Crossing
 
Alfredo Barriga - Cloud Computing y Competitividad País
Alfredo Barriga - Cloud Computing y Competitividad País Alfredo Barriga - Cloud Computing y Competitividad País
Alfredo Barriga - Cloud Computing y Competitividad País Foro Global Crossing
 
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing Perú 2011
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing  Perú 2011Presentación Marmora, Hanawa & Repetti - Foro Global Crossing  Perú 2011
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing Perú 2011Foro Global Crossing
 
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011Foro Global Crossing
 
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011Elder Cama Ernst & Young - Foro Global Crossing Peru 2011
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011Foro Global Crossing
 
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011Foro Global Crossing
 
miguel cisterna como ordenarnos metodologicamente
miguel cisterna   como ordenarnos metodologicamentemiguel cisterna   como ordenarnos metodologicamente
miguel cisterna como ordenarnos metodologicamenteForo Global Crossing
 
Culpa o caso fortuito - Rodrigo Rojas
Culpa o caso fortuito - Rodrigo Rojas Culpa o caso fortuito - Rodrigo Rojas
Culpa o caso fortuito - Rodrigo Rojas Foro Global Crossing
 
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo  10 Mandamientos de la Continuidad de Negocios - Luis Piccolo
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo Foro Global Crossing
 
Continuidad de Negocios: Aportando valor a la empresa - Marcela Nuñez
Continuidad de Negocios: Aportando valor a la empresa - Marcela NuñezContinuidad de Negocios: Aportando valor a la empresa - Marcela Nuñez
Continuidad de Negocios: Aportando valor a la empresa - Marcela NuñezForo Global Crossing
 

Plus de Foro Global Crossing (20)

Presentación consolidada 3er Foro Global Crossing - Ecuador
Presentación consolidada 3er Foro Global Crossing - EcuadorPresentación consolidada 3er Foro Global Crossing - Ecuador
Presentación consolidada 3er Foro Global Crossing - Ecuador
 
Miguel Cisterna - Outsourcing IT: cuando implementarlo
Miguel Cisterna - Outsourcing IT: cuando implementarloMiguel Cisterna - Outsourcing IT: cuando implementarlo
Miguel Cisterna - Outsourcing IT: cuando implementarlo
 
David Delgado - Microsoft: el camino hacia la nube con nuestros socios tecno...
David Delgado  - Microsoft: el camino hacia la nube con nuestros socios tecno...David Delgado  - Microsoft: el camino hacia la nube con nuestros socios tecno...
David Delgado - Microsoft: el camino hacia la nube con nuestros socios tecno...
 
Marcelo Ruiz (Frost & Sullivan) - Outsourcing tic vision y tendencias
Marcelo Ruiz  (Frost & Sullivan) - Outsourcing tic vision y tendenciasMarcelo Ruiz  (Frost & Sullivan) - Outsourcing tic vision y tendencias
Marcelo Ruiz (Frost & Sullivan) - Outsourcing tic vision y tendencias
 
Gabriel Marcos - Soluciones en la nube, decisiones aterrizadas
Gabriel Marcos -  Soluciones en la nube, decisiones aterrizadasGabriel Marcos -  Soluciones en la nube, decisiones aterrizadas
Gabriel Marcos - Soluciones en la nube, decisiones aterrizadas
 
Puppy Rojas - Banda Ancha para todos, mas allá de la Infraestructura
Puppy Rojas - Banda Ancha para todos, mas allá de la InfraestructuraPuppy Rojas - Banda Ancha para todos, mas allá de la Infraestructura
Puppy Rojas - Banda Ancha para todos, mas allá de la Infraestructura
 
Tomás Grassi - Communications as a Service
Tomás Grassi - Communications as a ServiceTomás Grassi - Communications as a Service
Tomás Grassi - Communications as a Service
 
Gabriela Franchetto - Innovación a la velocidad 100% web
Gabriela Franchetto - Innovación a la velocidad 100% webGabriela Franchetto - Innovación a la velocidad 100% web
Gabriela Franchetto - Innovación a la velocidad 100% web
 
Gianni Hanawa - Accediendo a la nube: Network Solutions
Gianni Hanawa - Accediendo a la nube: Network SolutionsGianni Hanawa - Accediendo a la nube: Network Solutions
Gianni Hanawa - Accediendo a la nube: Network Solutions
 
Marcela Núñez - Cloud Computing: Aterrizando la nube
Marcela Núñez - Cloud Computing: Aterrizando la nubeMarcela Núñez - Cloud Computing: Aterrizando la nube
Marcela Núñez - Cloud Computing: Aterrizando la nube
 
Rodrigo Rojas - "To share or not to share"
Rodrigo Rojas - "To share or not to share"Rodrigo Rojas - "To share or not to share"
Rodrigo Rojas - "To share or not to share"
 
Alfredo Barriga - Cloud Computing y Competitividad País
Alfredo Barriga - Cloud Computing y Competitividad País Alfredo Barriga - Cloud Computing y Competitividad País
Alfredo Barriga - Cloud Computing y Competitividad País
 
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing Perú 2011
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing  Perú 2011Presentación Marmora, Hanawa & Repetti - Foro Global Crossing  Perú 2011
Presentación Marmora, Hanawa & Repetti - Foro Global Crossing Perú 2011
 
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011
Octavio Novoa Textil del Valle - Foro Global Crossing Peru 2011
 
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011Elder Cama Ernst & Young - Foro Global Crossing Peru 2011
Elder Cama Ernst & Young - Foro Global Crossing Peru 2011
 
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011
Oscar Schmitz CXO Community - Foro Global Crossing Peru 2011
 
miguel cisterna como ordenarnos metodologicamente
miguel cisterna   como ordenarnos metodologicamentemiguel cisterna   como ordenarnos metodologicamente
miguel cisterna como ordenarnos metodologicamente
 
Culpa o caso fortuito - Rodrigo Rojas
Culpa o caso fortuito - Rodrigo Rojas Culpa o caso fortuito - Rodrigo Rojas
Culpa o caso fortuito - Rodrigo Rojas
 
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo  10 Mandamientos de la Continuidad de Negocios - Luis Piccolo
10 Mandamientos de la Continuidad de Negocios - Luis Piccolo
 
Continuidad de Negocios: Aportando valor a la empresa - Marcela Nuñez
Continuidad de Negocios: Aportando valor a la empresa - Marcela NuñezContinuidad de Negocios: Aportando valor a la empresa - Marcela Nuñez
Continuidad de Negocios: Aportando valor a la empresa - Marcela Nuñez
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Securing the Network, por Ricardo Ross

  • 1. Información segura. Negocios seguros. Securing the Network Securing the Network Ricardo Ross Ricardo Ross Juniper Networks Channel Account Manager LOGO ORADOR
  • 2. Agenda • Perimeters • Threats and Protections • Securing the Network g LOGO ORADOR
  • 3. Perimeters Users Devices Campus Datacenter Core PC Employees Customers Remote Laptop Internet Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 4. Perimeters • LAN Access Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 5. Perimeters • Remote Access Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 6. Perimeters • Campus – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 7. Perimeters • Remote – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 8. Perimeters • Branch – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 9. Perimeters • Campus – Internet Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 10. Threats and Protections Threat Protection Internal Network Structure Non Hidden I t lN t k St t N Hidd Firewall Fi ll One Networks Segment  Firewall One Security Zone Firewall Flooding and DoS Firewall Protocol Weakness Exploitation IDP Vulnerabilities Exploitation ‐ Applications and OS IDP Application/Service DoS  IDP Unexpected traffic patterns IDP Scanning Firewall, IDP Brute Force ‐ Cracking Passwords Firewall, IDP IP Spoofing Firewall, IDP Non‐Integrity and Non‐Privacy Sessions Site to Site VPN Ipsec Non‐Integrity and Non‐Privacy Sessions Client to Site SSLVPN LOGO ORADOR
  • 11. Threats and Protections Threat Protection Access Controller, End Point Access Control Agent, 802.1x  Access Controller End Point Access Control Agent 802 1x Unauthorized Network Admission L2 Device Unauthorized Network Admission L3 Access Controller, End Point Access Control Agent, Firewall Unauthorized Server Access g Access Controller, End Point Access Control Agent, Firewall Access Controller, End Point Access Control Agent, Firewall,  Identity Spoofing IDP Unauthorized Application Access Access Controller, End Point Access Control Agent, IDP Access Controller, End Point Access Control Agent, 802.1x  Weak User Authentication Device, Firewall Access Controller, End Point Access Control Agent, 802.1x  Weak User Authorization Device, Firewall Device Firewall Access Controller, End Point Access Control Agent, 802.1x  Unmanaged Traffic ‐ Bandwidth Abuse Device, Firewall, IDP Access Controller, End Point Access Control Agent, 802.1x  Access Controller, End Point Access Control Agent, 802.1x Non‐Compliant End Points Device, Firewall, IDP LOGO ORADOR
  • 12. Threats and Protections Threat Protection Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Virus Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Trojans Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ A C ll E d P i A C lA A i i A i Ad A i Worms Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Keyloggers py g g Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Adware Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Spyware Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Malware Spyware+Anti‐Pishing, IDP, Web Filtering Access Controller, End Point Access Control Agent, Antivirus+Anti‐Adware+Anti‐ Access Controller End Point Access Control Agent Antivirus+Anti Adware+Anti Backdoors Spyware+Anti‐Pishing, IDP, Web Filtering LOGO ORADOR
  • 13. Threats and Protections Threat Protection Spam AntiSpam AntiSpam, Antivirus+Anti‐Adware+Anti‐ Pishing Spyware+Anti‐Pishing, Web Filtering Access to Inappropriate Web sites  Web Filtering Access to Malicious Websites Web Filtering Data Leakage Content Filtering LOGO ORADOR
  • 14. Securing the Network • LAN Access Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 15. Securing the Network • Remote Access Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 16. Securing the Network • Campus – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 17. Securing the Network • Remote – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 18. Securing the Network • Branch – Data Center Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 19. Securing the Network • Campus – Internet Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR
  • 20. Securing the Network Policy Management Device Configuration Remediation Event & Flow Processing VPN Management Version Control User Activity Management Correlation Object Management Software Image Management Real Time Monitoring WAN Analysis Inventory Management Security Update Event & Flow Collection Reporting Networking Security OS/Applications Visibility & Control Enterprise-wide Users Devices Campus Datacenter Core PC Employees Customers Remote Internet Laptop Guests Partners Vendors Branch Suppliers PDA Contractors Off-Shore WAN Outsourced Cell Phone LOGO ORADOR