Contenu connexe Plus de Infosecurity2010 (9) Gordon Thomson Infosecurity.nl 4 november Jaarbeurs Utrecht 1. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
The Secure Borderless Network
Gordon Thomson
Director of Security Sales, Europe
November 4, 2010
2. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Urgent Sales Quote
Hello,
Our team needs a sales quote ASAP.
Please respond as soon as possible.
https://www.salesforce.com/
Urgent! Need Sales Quote
User : ED
Hello,
Our team needs a sales quote ASAP.
Please respond as soon as possible.
https://www.salesforce.com/
Urgent! Need Sales Quote
User : TED
3. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Cisco Secure Mobility
3
4. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
No Cisco Secure Mobility
5. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
While reporters and onlookers were
lamenting the passing of the King of Pop…
6. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 6
6
6
6
6
6
6
6
6
6
6
6
Fri
June
26
20:00
0.00%
1.00%
2.00%
3.00%
4.00%
5.00%
6.00%
Michael Jackson Spam as a Percentage of Global Spam
Sat
June
27
02:00
Sat
June
27
08:00
Sat
June
27
14:00
Sat
June
27
20:00
Sun
June
28
02:00
Sun
June
28
08:00
…criminals spewed over 2 billion Michael Jackson
spam messages
7. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Web 2.0 Abuse
Commercial tools for account creation, posting,
CAPTCHA bypass, and IP rotation are readily available
Targets popular sites and blogs including Gmail,
Yahoo, Facebook, Twitter, and Craigslist
Enables abuse of many services including webmail
account creation for spamming
7
8. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Botnet Trends
Reducing……………
Better Hidden, More Refined, but
Hard Working as Ever
2007: Big Botnet story was Storm
2008: Storm not dead yet, now joined by Kraken/Bobax and Asprox
2009: Storm evolves to Waledac, Conficker, Koobface
2009: Zeus………what‘s next?
9. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 9
9
9
9
9
9
9
9
9
9
9
9
Strategic Alliances:
Conficker and Waledac
Waledac monetizes Conficker botnet
Fake and malicious SMS software
Scareware Antivirus software
10. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 10
10
10
10
10
10
10
10
10
10
10
10
Service dedicated to checking if a malware
executable is detectable by AV engines
Criminal SaaS Offerings Expand
11. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Rise in SMS Attacks
Often will direct users to call automated phone
systems designed to steal personal info
Targeted (by area code)
Credible
―Smishing‖: SMS being used to
deliver phishing links
Smartphone OS vulnerability
exploits being discovered
11
12. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
Security Top of Agenda
‗How important are each of the following IT initiatives to your
organizations usiness or corporate initiatives for the coming year?‗
1st Security Enhancement
3rd Updating Disaster recovery
5th Beginning/Updating Server
Virtualisation
11th Adoption of Unified
Communications
Technology
IT Managers place highest priority on adoption of security
Critical Priority High Priority Low Priority Not on our agenda
Source: Wedbush Morgan, Jan. 2010,
49% 36% 12% 3%
35% 38% 21% 5%
34% 35% 25% 5%
25% 35% 26% 14%
13. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 13
13
13
13
13
13
13
13
13
13
13
13
‖
I need security to be simpler,
transparent to the user and
more agile.
―
— John Stewart
CSO Cisco
Collaboration is changing
workplace experience
Cloud computing
drives efficiency
Vendor consolidation
lowers costs
14. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 14
14
14
14
14
14
14
14
14
14
14
14
My business has a mass of
data. I need to identify which
data needs protection, and put
systems in place to protect it.
―
— Dave Martin
CSO EMC
‖
Data theft turns
―professional‖
Regulations make data
control more critical
Anytime, anywhere access
increases risk
15. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 15
15
15
15
15
15
15
15
15
15
15
15
I need to be thinking about
all threats – rational and
irrational, amateur,
professional and political.
―
‖
— Charlie Forand
CSO Verizon
Cyber crime fuels
malicious R&D
Industrial espionage
is a real threat
Political attacks are
growing threat
16. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 16
16
16
16
16
16
16
16
16
16
16
16
Business Imperatives
Security Imperatives
Simplify
Security for the User,
the Business, and for
the Operations
Maintain Regulatory
Compliance and
Manage Risk Well
Design and Defend
for Unpredictable
Threats
Enable
Business Speed
and Agility
Maintain Regulatory
Compliance and
Manage Risk Well
Protect Intellectual
Property
17. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
17
17
17
17
17
17
The European CIO Landscape
18. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
The Customer’s Problem
Theft
Unintentional
Loss
Virus Scanning - Host & Server
Anomaly Detection
& Mitigation
Encryption Software
One-Time
Token Software
Multifunction
Security
Firewall
Physical
Security
Endpoint Security
Network Intrusion
Protection
Router/Switch
Security
Security
Management
VPN
Compliance
Validation
Application
Optimization
Identity
Management
Security Alerts
Event Logging
Application
Vulnerability
Assessment
Access Control &
Video Surveillance
Vulnerability Scan
Risk Management
Facility
Management
Application
Security
Policy Access
Control
Identity
Web Security
Website
Defacement
Loss of
Confidentiality
Virus
Outbreak
DDoS
19. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
19
19
19
19
19
19
Our Approach to Security
needs to Change
Improve Effectiveness
Reduce Risk
Control Costs
20. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 20
20
20
20
20
20
20
20
20
20
20
20
Opposing Forces
Access Control
Cyber Security
Control Open
Smart Connected Communities
Mobility
Cloud
Collaboration
Virtualization
Smart Grid
Connected Cameras, Printers…
Acceptable Use
Threat Protection
Data Security
Compliance
21. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 21
21
21
21
21
21
21
21
21
21
21
21
The Traditional Network
DMZ and Server
Desktop
22. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 22
22
22
22
22
22
22
22
22
22
22
22
Any Device, Anytime, Anywhere Workplace
Applications and Data Are Now Mobile
23. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 23
23
23
23
23
23
23
23
23
23
23
23
Applications and Data Are Now Mobile
Security Extends from the Network
24. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 24
24
24
24
24
24
24
24
24
24
24
24
From Self-Defending Network to Secure
Borderless Networks
Keep the
Bad Guys
Out
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
Self-Defending Network
25. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 25
25
25
25
25
25
25
25
25
25
25
25
From Self-Defending Network to Secure
Borderless Networks
Self-Defending Network
Enable
Secure
Borderless
Access
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
Policy & Identity
Trusted Access
Secure Mobility
Always On
Cloud Security
Hosted/Hybrid
New Security Requirements
Keep the
Bad Guys
Out
26. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 26
26
26
26
26
26
26
26
26
26
26
26
From Self-Defending Network to Secure
Borderless Networks
Self-Defending Network
Enable
Secure
Borderless
Access
Keep the
Bad Guys
Out
Secure Mobility
Always On
Secure Borderless Networks
Policy & Identity
Trusted Access
Cloud Security
Hosted/Hybrid
Cisco Security Intelligence Operations
Firewall
Access Control
Intrusion
Prevention
Block Attacks
Content
Security
Email & Web
27. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 27
27
27
27
27
27
27
27
27
27
27
27
Cisco’s Security Approach
Accurately, Seamlessly & Always On
DEFEND
Defend Against
Threats
Anyone, Anywhere, Anything, Anytime
Threat Defence and
Risk Reduction
EXTEND PREVENT COMPLY
Achieve Regulatory
Compliance
Prevent Loss of
Business Assets
Secure Enterprise
Connectivity
Secure Mobile
Workforce
Physical and Data
Loss Prevention
Governance, Risk
and Compliance
28. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
New Business Models in Security
Suitable for single site, no mobile
workers, low perception of security risk,
DIY mentality.
Appliance
Self-Managed, On-Premise
Hybrid Hosted
Divided Control, On-Premise &
Cloud-Based
Managed
Fully-Managed, On-Premise or
DC.
Suitable for multiple sites, many
mobile workers, TCO aware , Cloud
friendly.
Large HQ, hub sites, many mobile
workers, but cloud not strategic.
Company outsource to SI or SP.
Technology agnostic.
Hosted
Cloud-Based, SaaS
Infrastructure
31. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 31
31
31
31
31
31
31
31
31
31
31
31
The New Borderless Organization
Securely, Reliably, Seamlessly
Borderless Experience
Anything
Anytime
Anywhere
Anyone
32. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 32
32
32
32
32
32
32
32
32
32
32
32
Critical Questions to Consider
Do I Have a Consistent Access Policy Architecture Across My
Network for all Users and Devices?
Can Mobile Devices Access My Network Securely, Reliably and Seamlessly?
Can My Network Deliver Real-Time Collaboration Experiences?
Can My Network Deliver Protection from the Premises to the Cloud?
Can My Network Optimize Performance of Applications
Anytime, Anywhere?
Am I Using My Network to Reduce My Energy Costs?
Is My Network Ready for Current and Future
Regulatory Requirements?
Where Am I Now? Where Do I Start?
1
2
3
4
5
6
7
8
33. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID
33
33
33
33
33
33
SECURITY NEEDS TO
SECURE, ENABLE AND
CONTROL COST
Secure Borderless
Networks delivers the
anytime, anywhere
experience securely
34. 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID 34
34
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Presentation_ID