Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide
|
|
- Reynard Wheeler
- 8 years ago
- Views:
Transcription
1 Intelligent Cybersecurity for the Real World Cisco Cybersecurity Pocket Guide EMEA 2015
2 Content What an Opportunity! Security Investment is a Top Priority Why Cisco? Cisco is the Leading Security Company Market Recognition Security Intelligence & Research The Cisco Security Strategy The Security Challenge The Threat-Centric Security Model What to Sell - Focus Products Network Security Advanced Malware Protection Web- & -Security Secure Access & Secure Mobility Attach Security to Your Data Center Deals Security Channel Partner Program Security Architecture Specialisations Incentives & Promotions Demand Generation & Demo Cisco and/or its affiliates. All rights reserved.
3 What an Opportunity! Security Investment is a Top Priority 56% 73% 51% of organisations state IT security is critical in meeting their top business objectives of organisations state that IT security is one of the top 5 priority areas for IT investment for the next fiscal year of organisations say IT security is more important than other IT initiatives Source: Cisco Annual Security Report 2014 Security: The Critical Boardroom Topic There is mounting concern at the senior executive and board level regarding information security. Chief Information Security Officers (CISOs) are challenged to push boardroom discussions into additional security investment. Security breaches mean lost intellectual property, compromised customer information and confidence, and valuation impact. These are critical considerations as organizations become more agile and try to grow their business models in the face of the evolving trends of mobility, cloud computing, and advanced targeted attacks. Partner Confidential 3
4 Why Cisco? Cisco is The Leading Security Company Based on our (Breach Detection Systems) reports, Advanced Malware Protection from Cisco should be on everyone s short list. So do any network security vendors understand data center and what s needed to accommodate network security? Cisco certainly does. Cisco is disrupting the advanced threat defense industry Vendor Rating for Security: Positive AMP will be one of the most beneficial aspects of the [Sourcefire] acquisition. The AMP products will provide deeper capability to Cisco's role in providing secure services for the Internet of Everything (IoE) Cisco and/or its affiliates. All rights reserved. Market Recognition Cisco Confidential 1 Cisco is Leader in four Gartner Magic Quadrants: Magic Quadrant for Network Access Control, Dec 2013 Magic Quadrant for Intrusion Prevention Systems, Dec 2013 Magic Quadrant for Secure Web Gateways, June 2014 Magic Quadrant for Secure Gateways, July 2014 Cisco s Security portfolio has been rated Positive in Gartner s Vendor Rating We licensed online versions of the Gartner reports for distribution. Ask us for the access links! Cisco and/or its affiliates. All rights reserved.
5 Why Cisco? NSS Labs Next-Generation Firewall Reports 2014 Cisco ASA with FirePOWER Services Excels! NSS Labs conducted the most rigorous next-generation firewall testing to date. Cisco ASA with FirePOWER Services excelled when compared to other tested products. The industry s first, threat-focused NGFW is now also the first in security effectiveness, according to NSS Labs reports. Next Generation Firewall (NGFW) Security Value MapTM Cisco (3) Cisco (2) Cisco (1) 100% Dell SonicWALL WatchGuard Check Point Fortinet (1) McAfee Fortinet (2) 95% Barracuda Average 90% Cyberoam 85% 80% Palo Alto Networks Product Legend Barracuda F800b Check Point Cisco (1) FirePOWER 8350 Cisco (2) ASA 5525-X Cisco (3) ASA 5585-X SSP60 Cyberoam CR2500iNG-XP Dell SonicWALL SuperMassive E10800 Fortinet (1) FortiGate-3600C Fortinet (2) FortiGate-1500D McAfee NGF-1402 Palo Alto Networks PA-3020 WatchGuard XTM % 70% 65% 60% $70 $60 $50 $40 $30 $20 $10 $0 TCO per Protected-Mbps Source: NSS Labs 2014 Security Value Map Download your copies of the reports, and share the link with your customers! Average September % Partner Confidential 5
6 Why Cisco? Cisco Talos Security Intelligence & Research Group More Than Just a Traditional Response Team The Cisco Talos Security Intelligence and Research Group is comprised of elite cybersecurity experts whose threat intelligence detects, analyses, and protects against both known and emerging threats by aggregating and analyzing Cisco s unrivaled telemetry data of 1.1 million incoming malware samples per day 4.2 billion web filtering blocks per day 1 billion sender base reputation queries per day 100 TB of data received per day Available 7 x 24 x 365 More than just a traditional response organization, Talos works around the clock to proactively discover, assess, and respond to the latest trends in hacking activities, intrusion attempts, malware and vulnerabilities with new rules, signatures, file analysis and security tools to better protect Cisco customers. Talos also maintains the official rule sets of Snort.org, ClamAV, SenderBase.org and SpamCop. Cisco Security Research: Cisco 2014 Midyear Security Report: Cisco and/or its affiliates. All rights reserved.
7 Why Cisco? Cisco is Serious about Security. We are Transforming to Harness the Opportunity. Cisco is Transforming Our objective is to be our customers #1 Trusted Security Advisor New Focus on Security: Investment and momentum in Security to create the industry s broadest solution portfolio New Go-To-Market Approach: Empowered, dedicated Security organisation the Global Security Sales Organisation New Security Partner Program: Incentives, promotions and new security specialisations for higher partner profitability Partner Confidential 7
8 The Cisco Security Strategy Security Challenges A combination of three major realities that exist today has made the task of defending a network more difficult than ever, while helping attackers to find new ways to evade the defences. Changing Business Models - The Internet of Everything will accelerate the degree of change in the years to come, making it even more difficult to defend the organisation. Dynamic Threat Landscape - The attackers have become much more sophisticated and the attacks have moved from static to dynamic. Without near real-time discovery capabilities an organisation will be at a significant disadvantage. Complexity and Fragmentation - Most organisations have dozens of security technologies that do not interoperate, and this is exacerbated by a significant lack of security specialists available in the market Cisco and/or its affiliates. All rights reserved. 1
9 The Cisco Security Strategy The Attack Continuum The best way to communicate the totality of the challenge is to look at the attack continuum. There are three stages to an attack: Before, During, and After. Attack Continuum Network Endpoint Mobile Virtual Cloud Point in Time Continuous Before an attack - Organisations need to know what they are defending. They need to know what is on their network to be able to defend it (devices, operating systems, applications, users ) During an attack When attackers get through, the customers need to be able to detect them. Once they detect the attack, they will be able to block them and defend the environment. After the attack Invariably, some attacks will be successful, and customers need to be able to determine the scope of the damage, remediate, and bring operations back to normal. Partner Confidential 9
10 The Cisco Security Strategy The Threat-Centric Security Model: An Integrated, Open, Pervasive, and Continuous Approach By taking a threat-centric and operational approach to security, organisations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum. Unmatched Visibility Consistent Control Advanced Threat Protection Reduced Complexity Global Intelligence With the Right Context Consistent Policies Across the Network and Data Center Detects and Stops Advanced Threats Fits and Adapts to Changing Business Models Visibility-Driven - Get global intelligence and context for deeper insights and better decisions. Threat-Focused - Detect, understand, and stop threats across the entire attack continuum Platform-Based - Reduce fragmentation by using a platform-based approach to protect the network, devices and the Cloud Cisco and/or its affiliates. All rights reserved.
11 The Cisco Security Strategy Only Cisco Delivers: Platform-based solutions that integrate into an overall security system. Attack Continuum Firewall VPN NGIPS Advanced Malware Protection NGFW UTM Web Security Network Behavior Analysis NAC + Identity Services Security Malware Sandboxing Security Services Context-aware Security - Including physical and virtual hosts, operating systems, applications, services, protocols, users, content and network behaviour. Continuous Security - Aggregate and correlate data from across the extended network, discriminating between active attacks and reconnaissance versus simply background noise. Retrospective Security - Detect malware that is sophisticated enough to alter its behaviour to avoid detection, and evaluate full packet capture in order to successfully remediate. Partner Confidential 11
12 What to Sell Focus Products Next-Generation Network & Data Center Security Protect high-value data and data center resources with threat defence, secure virtualisation, segmentation, and policy control. Cisco ASA 5500-X with FirePOWER Services (NGFW) Industry s first threat-focused NGFW Combines ASA firewall with Cisco Next-Generation IPS (NGIPS) and Advanced Malware Protection (AMP) Platform series with wide range of sizes and form factors Cisco ASA 5585-X with FirePOWER Services (NGFW) Purpose-build security appliance for data centers Highest performance, resiliency, and scalability through leading-edge clustering Combines ASA firewall with Cisco Next-Generation IPS (NGIPS) and Advanced Malware Protection (AMP) Cisco FirePOWER Next-Generation IPS (NGIPS) The most advanced threat protection in the industry Industry-leading throughput, threat detection efficacy, and low TCO Platform series with wide range of sizes and form factors Cisco FireSight Management Center Centrally manages operational functions for ASA with FirePOWER Services and FirePOWER NGIPS Automatically aggregates and correlates information Reduces cost by streamlining operations and automating recurring analysis and management tasks Cisco and/or its affiliates. All rights reserved.
13 What to Sell Focus Products Next-Generation Network & Data Center Security Reduce complexity while gaining superior visibility, consistent control, and advanced threat protection across the entire attack continuum. Cisco ASA Virtual Appliance (ASAv) Fully integrated Application Centric Infrastructure (ACI) security Consistent transparent security across physical, virtual, ACI, SDN, and Cloud vswitch support for Cisco, hybrid, and non-cisco data centers Cisco Virtual Next-Generation IPS for VMware Virtualised offering of Cisco FirePOWER NGIPS solution Reclaim visibility lost when virtualizing Extend Payment Card Industry (PCI) compliance to virtual environments Cisco Virtual Security Gateway Integrates with Cisco Nexus 1000V virtual switch Delivers security policy enforcement and visibility at a virtual machine level Logically isolates applications in virtual data centers and multi-tenant environments Enforces separation of duties between security and server administrators Cisco ASA 1000V Cloud Firewall Integrates with the Cisco Nexus 1000V virtual switch Employs proven ASA technology Spans and helps to secure multiple VMware ESX hosts Enables consistency across physical, virtual, and cloud infrastructures Partner Confidential 13
14 What to Sell Focus Products The Cisco ASA Refresh Opportunity in Detail Migrate from ASA 5500 End-of-Life Products Migrate to: ASA 5500-X with FirePOWER Services products Include Technical Support Services Key Selling Points: Migrate to the new threat-focused NGFW that delivers multi-layered protection, improved visibility, and reduced security cost and complexity Obtain integrated threat defence across the entire attack continuum by combining proven ASA NGFW capabilities with industry-leading Cisco NGIPS and AMP Up-Sell: Cisco Security Migration Services Cisco Network Device Security Assessment Services If appropriate: Cisco ISE and ISE Assessment Services Upgrade from ASA 5500-X without FirePOWER Services Upgrade to: FirePOWER Services for Cisco ASA Include Cisco FirePOWER Services Subscription for AMP and URL Filtering Key Selling Points: Same as Migration Key Selling Points Up-Sell: Same as Migration Up-Sell opportunities Cisco and/or its affiliates. All rights reserved.
15 What to Sell Focus Products The Cisco ASA Refresh Opportunity in Detail Migrate from Cisco IPS 4200 End-of-Sale Products, or from Cisco IPS 4300 and 4500 Series Migrate to: Industry-leading Cisco FirePOWER 7000 and 8000 Series Next-Generation IPS (NGIPS) Include Cisco FirePOWER Services Subscription for AMP and URL Filtering Key Selling Points: Dedicated NGIPS / AMP appliance Very high throughput (>6 Gbps transactional IPS) Up-Sell: Cisco Security Migration Services Cisco Network Device Security Assessment Services If appropriate: Cisco ISE and ISE Assessment Services Offer to Network-Centric Buyers: Convergence Cisco ASA with FirePOWER Services allows convergence of the ASA platform and Sourcefire IPS, AMP, URL Filtering Offer for Security-Centric Buyers: Better Together Cisco ASA 5500-X Series plus FirePOWER 7000 or 8000 Series as best-in-class solutions Partner Confidential 15
16 What to Sell Focus Products Advanced Malware Protection Cisco Advanced Malware Protection provides the continuous analysis and advanced analytics that support Cisco s Retrospective Security capabilities. Unlike the many point-in-time solutions on the market, Cisco Advanced Malware Protection offers protection across the full attack continuum. Point-in-time Detection: Antivirus /Sandboxing Analysis Stops Sleep Techniques Unknown Protocols Encryption Polymorphism Initial Disposition = Clean Retrospective Detection: AMP Actual Disposition = Bad Analysis Continues Initial Disposition = Clean Actual Disposition = Bad 1 AMP Everywhere - We offer the industry s broadest portfolio of integrated Advanced Malware Protection solutions AMP for Cisco Web Security AMP for Cisco Cloud Web Security AMP for Cisco Security AMP for Networks AMP for Endpoints Integrated in ASA with FirePOWER Services Cisco and/or its affiliates. All rights reserved.
17 What to Sell Focus Products Web- & Security Cisco s Content Security portfolio protects organisations from evolving and web threats. and Web security are critical components of a holistic security strategy and represent a multibillion dollar market in Europe. Cisco Security (Appliances & Cloud-based) Fights spam, viruses, and blended threats for organisations of all sizes Enforces compliance and protects reputation and brand assets Also available as Cloud-based and Hybrid solution (onsite appliance + Cloud) Cisco Web Security (Appliances & Cloud-based) Proactive security, application visibility, and control for all users Extend real-time protection and policy enforcement to remote employees Also available as Cloud-based solution and Cloud-based integrated with Cisco firewalls Opportunity! Leverage AMP integration as a key competitive differentiator ( AMP Everywhere ) Check out for latest Security Incentives and Promos Partner Confidential 17
18 What to Sell Focus Products Secure Access & Mobility Enhance network visibility and control with identity-aware secure access solutions. Cisco Identity Services Engine (ISE) Security policy management platform that enforces secure access to network resources (wired, wireless, and VPN) Accurately identifies every user and device that connects to the network Cisco Network Admission Control (NAC) Enforces network security policies by allowing access only to trusted devices Blocks access by noncompliant devices and limits damage from emerging threats and risks Cisco TrustSec Secure network access based on rich contextual data ( who, what, where, when, how ) Automates firewall rules and access control list administration, uses plain-language policies Embedded in the operating systems of Cisco ISE, Catalyst and Nexus switches, Integrated Services Routers, and ASA firewalls Cisco AnyConnect Secure Mobility Services Highly secure, simple, and reliable off-premise connectivity Endpoint intelligence and context across any access method (wired, wireless, VPN ), from any device Remote secure access to authorised applications for tablets and smartphones Cisco and/or its affiliates. All rights reserved.
19 What to Sell Focus Products The Avenue for Driving Incremental Pipeline: Attach Security to Data Center Opportunities Did you know that including Cisco security architectures as a component of all data center opportunities can drive an average of 41% incremental revenue on each deal? Since there are no data center designs without a security component, you will be addressing one of your data center customers top concerns. Make Cisco s tightly integrated solution portfolio one of your key competitive advantages: Differentiate your offerings by selling an end-to-end data center solution, which reduces the complexity of working with multiple vendors and point products. Check out the Cisco Secure Datacenter Solutions and the Cisco Validated Designs Check out for latest Security Incentives and Promos Partner Confidential 19
20 Partner Program Security Architecture Specialisations Cisco has re-designed the Security Specialisation program, aligning it to the new product portfolio. Master Security Specialisation Complete Security Portfolio Complexity Advanced Security Architecture Specialisation Complete Security Portfolio Express Security Specialisations Web NG Firewall NG IPS SMB Midmarket Enterprise Market Segment 2014 Cisco and/or its affiliates. All rights reserved. Express Security Specialisation A new entry point into security specialisations, allowing a partner to focus on one or several specific products ( , Web, Next-Generation Firewall, IPS). Advanced Security Architecture Specialisation This specialisation covers the breadth of Cisco s Security Portfolio, and offers more advanced enablement for threat defence, secure access, Cloud and management solutions. Master Security Architecture Specialisation This specialisation builds upon expertise attained in the Advanced Security Architecture Specialisation and enables partners to deliver value-added security solutions to their customers. Cisco Confidential 1 -> Security Architecture Specializations Cisco and/or its affiliates. All rights reserved.
21 Partner Program Security Promotions & Incentives Incentive Programs & Promotions are Cisco s commitment to Partner Profitability. Increase your revenue potential with upfront discount and backend payment programs, and special promotions that have been designed to help you sell Cisco security products and solutions. Marketing & Demand Generation The free, ready-to-use marketing campaigns are designed to showcase your partnership with us, and help you effectively market Cisco security products and solutions to your customers. Demoing Cisco Security Solutions Cisco dcloud, the Cisco Demo Cloud, provides powerful self-service capabilities for Cisco Partners. From scripted, repeatable demonstrations to fully customized labs with complete administrative access, Cisco dcloud can work for any use case. -> Filter Category Security dcloud.cisco.com Partner Confidential 21
22 Partner Program Useful Links Cisco Security Intelligence Operations tools.cisco.com/security/center/home.x Security Community communities.cisco.com/community/technology/security Cisco Security Blog blogs.cisco.com/security Partner Support Training & Certification Certification Tracking cisco.pearsoncred.com Marketing Assets Library bx.cisco.com/cbx-portal Competitive Information Cisco and/or its affiliates. All rights reserved.
23 What Next? Build and Practice your Security Pitch Focus on Business Challenges Focus on The Attack Continuum Become comfortable talking about security Have a Security Conversation with Your Customer Identify the Security decision makers Open the door for a deeper dive Engage With Your Cisco Security Team! Security can be a major contributor to your company s bottom line Security is no stand-alone technology, it is a differentiator for your portfolio The Security market is very fragmented; Cisco provides you and your customers a One-Stop-Shop Partner Confidential 23
24
Cisco Cybersecurity Pocket Guide 2015
Cisco Cybersecurity Pocket Guide 2015 Why Security Security investment: A top priority Security: A critical boardroom topic Why Security? Security Investment: A Top Priority Figure 1 How Enterprises View
More informationRequirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
More informationCisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015
#TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationAddressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
More informationCisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
More informationBraindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
More informationComstor Security Initiative. Comstor Security Initiative
Comstor Comstor Work in partnership with Comstor and Cisco to unlock the potential of Cyber security Cyber security is projected to be a $170 billion market by 2020. There are 10 billion connected sensors
More informationFive Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
More informationCisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
More informationCisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015
Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015 Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential Cisco s Covers the Threat-Centric Entire
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationContent Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
More informationCisco ASA with FirePOWER Services. October 2014
Cisco ASA with FirePOWER Services October 2014 What We Are Announcing September 16, 2014 Industry s First Threat-Focused NGFW Proven Cisco ASA firewalling + Industry leading NGIPS and AMP Cisco ASA with
More informationEXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
More informationCisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi
Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We
More informationCisco SecureX Product Brochure
Cisco SecureX Product Brochure Security Matters More Than Ever Traditional approaches to network security were designed for a single purpose: to protect resources inside the network from threats and malware
More informationSecure Network Access for Personal Mobile Devices
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
More informationProtection Against Advanced Persistent Threats
Protection Against Advanced Persistent Threats Peter Mesjar Systems Engineer, CCIE 17428 October 2014 Agenda Modern Threats Advanced Malware Protection Solution Why Cisco? Cisco Public 2 The Problem are
More informationNetwork as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
More informationDeploying Next Generation Firewall with ASA and Firepower services
Deploying Next Generation Firewall with ASA and Firepower services Dragan Novaković Security Consulting Systems Engineer March 2015. Threat Landscape Demands more than Application Control 60% of data is
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
More informationNEXT GENERATION FIREWALL COMPARATIVE ANALYSIS
NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER
More informationCYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO
CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO 2014 Cisco and/or and/or its affiliates. its affiliates. All rights All reserved.
More informationAddressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand
Addressing Advanced Web Threats: Protect Your Data and Brand What You Will Learn From collaboration to communication to data access, the web is a mission-critical business tool. Enterprises rely on the
More informationCisco Small Business ISA500 Series Integrated Security Appliances
Q & A Cisco Small Business ISA500 Series Integrated Security Appliances Q. What is the Cisco Small Business ISA500 Series Integrated Security Appliance? A. The Cisco Small Business ISA500 Series Integrated
More informationData Center Security That Accelerates Your Business
Solution Overview Data Center Security That Accelerates Your Business Business today runs at a breakneck pace. Customers want exceptional service, and workers expect instant access to their job tools,
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More informationCisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
More informationHow To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
More informationNext-Generation Firewalls: CEO, Miercom
Next-Generation Firewalls: Results from the Lab Robert Smithers Robert Smithers CEO, Miercom Agenda Participating i Vendors and Products How We Did It Categories of Products Tested About the Technology
More informationThreat-Centric Security for Service Providers
Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product
More informationFortiGuard Security Services
FortiGuard Security Services FORTIGUARD SECURITY SERVICES FortiGuard Labs: Securing Your Organization Extensive knowledge of the threat landscape combined with the ability to respond quickly at multiple
More informationBEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR
BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR The IndustrializaBon of Hacking SophisEcated AFacks, Complex Landscape Hacking Becomes an Industry Phishing, Low
More information2012 North American Enterprise Firewalls Market Penetration Leadership Award
2012 2012 North American Enterprise Firewalls Market Penetration Leadership Award 2012 Frost & Sullivan 1 We Accelerate Growth Market Penetration Leadership Award Enterprise Firewalls North America, 2012
More informationCisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security
White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with
More informationWatchGuard: Your Security Partner of Choice. Carlos Vieira
WatchGuard: Your Security Partner of Choice Carlos Vieira About WatchGuard Over a decade of security expertise Security is our sole focus Firewall appliance pioneer Headquartered in Seattle, WA Offices
More informationAssessing the Business Value of the Secured Datacenter
IDC SOLUTION BRIEF Assessing the Business Value of the Secured Datacenter Sponsored by: Cisco Pete Lindstrom Matthew Marden December 2014 Richard L. Villars OVERVIEW The world of IT is in the midst of
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationNext-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
More informationHigh Performance NGFW Extended
High Performance NGFW Extended Enrique Millán Country Manager Colombia emillan@fortinet.com 1 Copyright 2013 Fortinet Inc. All rights reserved. D I S C L A I M E R This document contains confidential material
More informationInternet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis
Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationIntelligent Cybersecurity for the Real World
Intelligent Cybersecurity for the Real World Ali Fuat TÜRKAY aturkay@cisco.com 0 532 677 4080 Ali Fuat Türkay: Security Sales Fuat Kılıç: Consulting System Engineer Hakan Tağmaç: Emerging Markets SE Manager
More informationCisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
More informationyou us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services
MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced
More informationIntegrated Network Security Architecture: Threat-focused Nextgeneration
White Paper Integrated Network Security Architecture: Threat-focused Nextgeneration Firewall By Jon Oltsik, Senior Principal Analyst September 2014 This ESG White Paper was commissioned by Cisco Systems
More informationMcAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
More informationSymantec Endpoint Protection 12.1.2
Data Sheet: Endpoint Security Overview offers comprehensive defense against complex attacks for both physical and virtual environments. It integrates ten essential security technologies in a single, high
More informationClose the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
More informationFirewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: info@lsasystems.com Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
More informationCopyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention
Copyright 2013 WatchGuard Technologies, Inc. All rights reserved. Introducción a Watchguard DLP Data Loss Prevention About WatchGuard > Taken private in 2006; enabled strategic shift > Firewall appliance
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationWEBSENSE TRITON SOLUTIONS
WEBSENSE TRITON SOLUTIONS INNOVATIVE SECURITY FOR WEB, EMAIL, DATA AND MOBILE TRITON STOPS MORE THREATS. WE CAN PROVE IT. PROTECTION AS ADVANCED AND DYNAMIC AS THE THREATS THEMSELVES The security threats
More informationRetail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
More informationProduct Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET
Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET ELITE S NEXT GENERATION MANAGED SECURITY SERVICES Security risks to business information systems are expanding at a rapid rate; often,
More informationSymantec Endpoint Protection 12.1.4
Data Sheet: Endpoint Security Overview provides unrivaled security across physical and virtual platforms and support for the latest operating systems-mac OS X 10.9 and Windows 8.1. Powered by Symantec
More informationSecuring Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationUnlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
More informationCloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationSimplify Your Network Security with All-In-One Unified Threat Management
Singtel Business Product Factsheet Brochure Managed Defense Unified Services Management Simplify Your Network Security with All-In-One Unified Management Singtel Managed Unified Management (UTM) Services,
More informationMcAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)
McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs) McAfee Network Security Platform is uniquely intelligent and purpose-built to offer unmatched protection, performance,
More informationCisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
More informationSourcefire Next-Generation IPS
Sourcefire Next-Generation IPS Key NGIPS Capabilities Snort IPS detection engine Network intelligence Impact assessment User identification Automated policy tuning Network behavior analysis Packet-level
More informationSecuring the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
More informationWhy it's time to upgrade to a Next Generation Firewall. Dickens Lee Technical Manager
Why it's time to upgrade to a Next Generation Firewall Dickens Lee Technical Manager Dell History 2 Confidential Dell s legacy Became leading provider of subscription services on optimized appliances Shipped
More informationCLOUD & Managed Security Services
CLOUD & Managed Security Services INFOCOM Security April 1 st 2015, Athens, Greece Angeliki Philippopoulou, MSEE, MBA Regional Sales Manager Copyright Fortinet Inc. All rights reserved. Agenda A few words
More informationData Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com
Business Intelligence Data Centre Cloud Mobility Enterprise Computing Solutions United Kingdom Security Solutions arrow.com Safeguarding Data, Securing Business At Arrow, we work in a unique world that
More informationThe Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
More informationThe Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
More informationSecuring the Internet of Things
Business Brief Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy IoT Architectural Challenges Given the diversity and scale of the IoT, new security
More informationSecuring your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?
Securing your IOT journey and beyond Alvin Rodrigues Market Development Director South East Asia and Hong Kong 1 What is the internet of things? 2 1 Imagine if Meeting @ 9am 5 mins later Meeting delayed
More informationMcAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
More informationAchieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
More informationLeading The World Into Connected Security. Paolo Florian Sales Engineer
Leading The World Into Connected Security Paolo Florian Sales Engineer History of Defining Largest Dedicated Delivering a Next Generation Architecture Security Provider Security Architecture Inventor of
More informationsecurity changes with Orange focus on your business, we focus on your security
security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a
More informationHow To Get A Fortinet Security System For Free
Fortinet FortiGate Appliances Earn Coveted Recommend Ratings from NSS Labs in Next Generation Firewall, IPS, and Network Firewall in NSS Labs Group Tests Fortinet s Enterprise-Class Triple Play Fortinet
More informationMcAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
More informationThe Top Ten Advantages of Using Cisco Enterprise Networking in 2014
Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010
More informationSolution Overview. Cisco Hosted Security Solution: Reduce Operating Expenses for Managed Security Services. What You Will Learn. Challenge.
Solution Overview Cisco Hosted Security Solution: Reduce Operating Expenses for Managed Security Services What You Will Learn Cisco Hosted Security Solution (HSS) allows service providers to deliver highly
More informationFighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationThe Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
More informationNetwork Security Solution. Arktos Lam
Network Security Solution Arktos Lam Dell Software Group(DSG) 2 Confidential Trend Dell Software addresses key trends Cloud Big data Mobility Security Management Security 3 Software We deliver security
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationStop advanced targeted attacks, identify high risk users and control Insider Threats
TRITON AP-EMAIL Stop advanced targeted attacks, identify high risk users and control Insider Threats From socially engineered lures to targeted phishing, most large cyberattacks begin with email. As these
More informationHealthcare Security: Improving Network Defenses While Serving Patients
White Paper Healthcare Security: Improving Network Defenses While Serving Patients What You Will Learn Safeguarding the privacy of patient information is critical for healthcare providers. However, Cisco
More informationVMware Hybrid Cloud. Accelerate Your Time to Value
VMware Hybrid Cloud Accelerate Your Time to Value Fulfilling the Promise of Hybrid Cloud Computing Through 2020, the most common use of cloud services will be a hybrid model combining on-premises and external
More informationREVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
More informationNetworking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
More informationCisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
More informationCisco Web Security: Protection, Control, and Value
Cisco Web Security: Protection, Control, and Value Benefits Strong protection: Protects every device through a sophisticated global threat-intelligence infrastructure, which includes Cisco Talos Security
More informationHow To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
More informationCisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
More informationSecurity for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
More information