Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa"

Transcription

1 Un mundo de Clouds: Seguridad y Adopción Cisco + Intel Pilar Santamaria Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa

2 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

3 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3

4 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4

5 El número de servidores (físicos y virtuales) a nivel mundial crecerá Hoy x Próxima década IDC's Digital Universe Study, June Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

6 y el número de archivos que los centros de datos tendrán que manejar crecerá 75 Hoy x Próxima Década IDC's Digital Universe Study, June Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

7 El número de profesionales IT en el mundo crecerá 1. 5 Hoy IDC's Digital Universe Study, June 2011 x Próxima Década 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

8 Un evento que cambia la forma en la que pensamos y actuamos. Andy Grove, Fundador de Intel 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

9 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

10 Un Mundo de Múltiples Clouds Personas Múltiples Dispositivos Medio s Data Center Unificado Private Sanida d Aplicaciones Cloud Hybrid Y más Gobiern o Red Public Inteligente para Cloud Cisco está conectando personas y compañías a un Mundo de Múltiples Clouds Compañías Administraciones Públicas 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

11 Network Compute Application Services Storage 11 Optimiza la utilización de los recursos Simplifica la operación Disminuye TCO 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

12 Qué fabricante identificaría como el más competente para acompañarle en una estrategia basada en Fabric Computing? Dell Egenera Other IBM HP VMware Don t Know/Not Sure Cisco % of Respondents Gartner report: Fabric Computing Poised as a Preferred Infrastructure for Virtualization and Cloud Computing, February 11, 2011, George J. Weiss and Andrew Butler Report. ID number: G Cisco and/or its affiliates. All rights reserved. You can read the full Gartner report here: Cisco Confidential 12

13 La Apuesta de Cisco en Cloud TOP Puertos Nexus Puertos MDS Gasto I+D de Cisco De acuerdo a Board de Patentes Prioridades Data Center & Virtualization Millones Millones Q1-FY12 Crecimiento UCS USA, España y Sur de Europa x86 Blade Servers Mundial x86 Blade Server Market Share 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

14 INTEL x86 Plataforma de Computación Estándar Itanium Itanium $ 0.1B $ 4B 2002 Intel x86 $ 19.2B RISC/ Mainframes $ 30B 2010 * Intel x86 $ 30.5B RISC/ Mainframes $ 15B AMD $ 2.8B AMD $ 330M 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Source: IDC World Wide Server Tracker

15 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

16 Cloud: El Corporativo de Clouds no Soportadas Use of Unsupported Applications (Total, n=511) Types of Unsupported Applications (Total, n=287) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

17 Types of Unsupported Applications (By Country) E BCE BE ABCE B CD 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

18 Use of Unsupported Network Devices (Total, n=511) Breach or Loss of Information Due to Unsupported Devices (Total, n=511) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

19 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

20 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20

21 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21

22 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22

23 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23

24 Trusted Wi F i Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24

25 Trusted Wi F i n Wi- Fi Identity Based Access Control Apply defined policy profiles based on: Device Type User Location Application Mobile Device Managem ent WAN Optimization Service Assurance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25

26 Trusted Wi Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26

27 Trusted Wi F i n Wi-Fi Location Video Optimization Spectrum Intelligence Client Acceleration Is Mr. Allen s lab work ready yet? Identity Based Access Control Not yet but i will let you know the moment it arrives Mobile Device Managemen t 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27

28 Untrusted WiFi Access: Limited 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28

29 Hotspot n Wi-Fi Web/ Security Identity Based Access Control VPN Collaboratio n/ UC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29

30 Truste Wi d Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30

31 Trust, Visibility, Transparency Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

32 53% Edad ,000 Páginas de Negocios Locales en Facebook 424 Libros Facebook marketing 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

33 Fuga de Datos Productividad Ataques: 1/3 de los usuarios 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

34 Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook? Lunch Hour Location Streaming Media Business-related Content P2P All Object Compliance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34

35 Cumplimiento de políticas y confidencialidad Allow/Block features like chat, messaging, video & audio Allow/Block thousands of Facebook Apps Block Malware like Farm Town app ad that redirects users to fake antivirus software 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

36 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36

37 4% Middle East North America 6% 6% Africa 9% Nordic Region 33% Eastern Europe Asia Pacific 9% Source: Cisco IronPort Europe 9% 11% China 14% South America 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37

38 35% Global Visibility 20B Daily Web Requests 300K IPS Signatures 700,000+ Devices 150M + Endpoints 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38

39 Deep Content Analysis Structural Content Investigation Virtualized Script Emulation 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39

40 Países 100% Sin Interrupción de Servicio durante 8 años 20B Peticiones Web por Día Millones De Usuarios Protegidos 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

41 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

42 Protección Cloud en el acceso ubicuo, mediante contexto y desde la Nube 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42

43 The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

44 The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

45 Mobile Applications and Data The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

46 The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46

47 The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

48 AnyConnect Virtual and Cloud Cisco SecureX Architecture Cisco SIO Context Aware Policy The Network Context Aware Enforcement Appliance Module Cloud The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

49

50

Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa

Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless

More information

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions

More information

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987

BYOD Strategy and Solutions. www.nexusis.com 877.286.3987 BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information

More information

Estrategias para la Reducción de Riesgos y Ciber Ataques

Estrategias para la Reducción de Riesgos y Ciber Ataques Estrategias para la Reducción de Riesgos y Ciber Ataques Luis Zamora Consultor en Tecnología 1 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,

More information

Cloud Licensing Trends, Opportunities and Benefits

Cloud Licensing Trends, Opportunities and Benefits Cloud Licensing Trends, Opportunities and Benefits Jake Fox, VP Product Development Insert Your Name Insert Your Title Insert Date Agenda Licensing Trends Cloud & Beyond Cloud Adoption Rates The Opportunity

More information

Web Application Firewall Data Security Solutions. Cloud Firewall

Web Application Firewall Data Security Solutions. Cloud Firewall Web Application Firewall Data Security Solutions Cloud Firewall PORTAFOLIO DE PRODUCTOS Seguridad para la Nube Cloud is just another IT Deployment Model Physical Virtual Private Cloud (On-Premise) Public

More information

Virtualización en Soluciones de Respaldo y Almacenamiento de Datos Diego Schillaci Storage Manager Latinoamerica Sur SUN Microsystems Storage Group

Virtualización en Soluciones de Respaldo y Almacenamiento de Datos Diego Schillaci Storage Manager Latinoamerica Sur SUN Microsystems Storage Group 22/06/06 16:03:53 Virtualización en Soluciones de Respaldo y Almacenamiento de Datos Diego Schillaci Storage Manager Latinoamerica Sur SUN Microsystems Storage Group / 1 Storage virtualization, defined

More information

The cloud for modern business:

The cloud for modern business: The cloud for modern business: Move faster Save money Integrate on-premises apps and data Yolanda Azcúnaga Budí Technical Solutions Professional Azure yoazcuna@microsoft.com Diciembre 2015 Microsoft Confidential

More information

OnPremise y en la nube

OnPremise y en la nube La estrategia de Integración Microsoft OnPremise y en la nube Beacon42 - GABRIEL COR Creando valor a través de la integración ESB es antiguo ahora es NoESB SOA Todo es un API EAI es major que Batch

More information

Microsoft en la empresa y el Gobierno

Microsoft en la empresa y el Gobierno Microsoft en la empresa y el Gobierno El cambio de rol de TI Microsoft es el único habilitado para ayudarlo a balancear las expectativas de los usuarios con los requerimientos institucionales. Dispositivos

More information

Videocolaboración en la Nube. Una solución para CUDI

Videocolaboración en la Nube. Una solución para CUDI Videocolaboración en la Nube Una solución para CUDI Agenda 1. Introduction to Cloud Enablement for Video 2. Scopia Product line 3. Design and Deploy 4. Summary 2013 Avaya Inc. All rights reserved. 2 Soluciones

More information

Movilidad, Seguridad y Alta Disponibilidad en la Entrega de Aplicaciones. Evento de Virtualización ONGEI 2009. Pedro Elera M.

Movilidad, Seguridad y Alta Disponibilidad en la Entrega de Aplicaciones. Evento de Virtualización ONGEI 2009. Pedro Elera M. Movilidad, Seguridad y Alta Disponibilidad en la Entrega de Aplicaciones. Evento de Virtualización ONGEI 2009 Pedro Elera M. Agenda: Introducción Entrega de aplicaciones y Alta Disponibilidad Movilidad

More information

Cuánto se demora una pit stop?

Cuánto se demora una pit stop? Cuánto se demora una pit stop? The Internet of Things Connect Transform Reimagine Edgar Galindo Septiembre 2015 Version 1.0 2 Agenda The IoT Por qué nos debería importar? Optimice su cadena de valor a

More information

50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008

50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008 50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008 Fabricante: Indra Grupo: Inteligencia de Negocios Subgrupo: SQL Server 2008 - ETL - AS - RS Formación: Indra Horas: 25 Introducción

More information

AULA EUROPEA DE EMPRESA

AULA EUROPEA DE EMPRESA AULA EUROPEA DE EMPRESA AULA EUROPEA DE EMPRESA Formación Microsoft Primer Cuatrimestre 2014 C/ Méndez Álvaro 56, 28045-Madrid www.aedeibs.com MOC: MICROSOFT OFFICIAL CURRICULUM... 1 Cloud Computing...

More information

WatchGuard: Real World Security. Carlos Vieira Carlos.Vieira@WatchGuard.com Country Manager Spain & Portugal

WatchGuard: Real World Security. Carlos Vieira Carlos.Vieira@WatchGuard.com Country Manager Spain & Portugal WatchGuard: Real World Security Carlos Vieira Carlos.Vieira@WatchGuard.com Country Manager Spain & Portugal 2012 About WatchGuard Accolades > Founded in 1996 privately held > Firewall appliance pioneer

More information

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015 #TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security

More information

Curriculum Reform in Computing in Spain

Curriculum Reform in Computing in Spain Curriculum Reform in Computing in Spain Sergio Luján Mora Deparment of Software and Computing Systems Content Introduction Computing Disciplines i Computer Engineering Computer Science Information Systems

More information

20-22 MAYO MAY 2014 ORGANIZA ORGANISED BY

20-22 MAYO MAY 2014 ORGANIZA ORGANISED BY 20-22 MAYO MAY 2014 ORGANIZA ORGANISED BY XVI Salón Profesional Internacional de la Tecnología Audiovisual 16th International Audio-Visual Technology Trade Fair Del 20 al 22 de mayo de 2014 From May 20

More information

GUL-UC3M Jornadas Técnicas

GUL-UC3M Jornadas Técnicas GUL-UC3M Jornadas Técnicas Global Open Source Enterprises My experience in Openbravo 14 de Noviembre de 2008 Agenda Introduction to Openbravo Dynamics of Open Source Openbravo Community Services My takeaways

More information

Cisco Desktop Virtualization with UCS: A Blueprint for Success

Cisco Desktop Virtualization with UCS: A Blueprint for Success Cisco Desktop Virtualization with UCS: A Blueprint for Success Eugenios Zervoudis Product Sales Specialist ezervoud@cisco.com Challenges with Desktop Virtualization today Challenges implementing Enterprise

More information

Despliegues en la Plataforma Cloud AWS Antonio Alvarez EMEA Business Developer Manager. SAP Forum Madrid, 12 Marzo 2015

Despliegues en la Plataforma Cloud AWS Antonio Alvarez EMEA Business Developer Manager. SAP Forum Madrid, 12 Marzo 2015 Despliegues en la Plataforma Cloud AWS Antonio Alvarez EMEA Business Developer Manager SAP Forum Madrid, 12 Marzo 2015 Agenda Que es AWS? Beneficios de AWS Cloud + Intel SAP on AWS: Casos de Uso y referencias

More information

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses

Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security

More information

Recuperación de Desastres en el Cloud. Carlos Silva Solution Architect Vision Solutions

Recuperación de Desastres en el Cloud. Carlos Silva Solution Architect Vision Solutions Recuperación de Desastres en el Cloud. Carlos Silva Solution Architect Vision Solutions 1 Y se hizo el Cloud. 2 Migrate, Protect & Recover Anywhere * Forrester: Prepare For 2020: Transform Your IT Infrastructure

More information

Bring Your Own Device

Bring Your Own Device Bring Your Own Device Cisco Values in BYOD Eric NG (bokng@cisco.com) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

LINIO COLOMBIA. Starting-Up & Leading E-Commerce. www.linio.com.co. Luca Ranaldi, CEO. Pedro Freire, VP Marketing and Business Development

LINIO COLOMBIA. Starting-Up & Leading E-Commerce. www.linio.com.co. Luca Ranaldi, CEO. Pedro Freire, VP Marketing and Business Development LINIO COLOMBIA Starting-Up & Leading E-Commerce Luca Ranaldi, CEO Pedro Freire, VP Marketing and Business Development 22 de Agosto 2013 www.linio.com.co QUÉ ES LINIO? Linio es la tienda online #1 en Colombia

More information

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問 聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置

More information

We are Network Security. Francesc Sellés, 3 de Mayo de 2013 Pueden contactarnos llamando al: 902160145 o enviando un email a abox@abox.

We are Network Security. Francesc Sellés, 3 de Mayo de 2013 Pueden contactarnos llamando al: 902160145 o enviando un email a abox@abox. We are Francesc Sellés, 3 de Mayo de 2013 Pueden contactarnos llamando al: 902160145 o enviando un email a abox@abox.com We are Perfil de compañía Fundada en 1997 Soluciones de seguridad de red dirigidas

More information

Green Project Management

Green Project Management Green Project Management Projects integrating Sustainable Methods Training Providing Project Managers with methods, tools, and techniques to execute Projects, Programs, and Portfolios using sustainable

More information

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com. Developments in Web Application and Cloud Security

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com. Developments in Web Application and Cloud Security Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application

More information

Manejo Basico del Servidor de Aplicaciones WebSphere Application Server 6.0

Manejo Basico del Servidor de Aplicaciones WebSphere Application Server 6.0 Manejo Basico del Servidor de Aplicaciones WebSphere Application Server 6.0 Ing. Juan Alfonso Salvia Arquitecto de Aplicaciones IBM Uruguay Slide 2 of 45 Slide 3 of 45 Instalacion Basica del Server La

More information

ECCAIRS 5 Instalación

ECCAIRS 5 Instalación ECCAIRS 5 Instalación Paso a paso Preparado por: Arturo Martínez Oficina Regional Sudamericana Uniendo a la Aviación en Seguridad Operacional Seguridad Medioambiente Instalación Paso a paso Escenario Windows

More information

IBM PureSystems: Familia de Sistemas Expertos Integrados

IBM PureSystems: Familia de Sistemas Expertos Integrados IBM PureSystems: Familia de Sistemas Expertos Integrados Carlos Etchart Sales Support Specialist IBM Está IT listo para el Cambio? New server spending Power & cooling costs Server mgmt & admin costs 2013

More information

BYOD Security Challenges in Education: Protect the Network, Information, and Students

BYOD Security Challenges in Education: Protect the Network, Information, and Students BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white

More information

Base on-premises deployment You start your on-premises deployment with the base functionality of instant messaging and presence.

Base on-premises deployment You start your on-premises deployment with the base functionality of instant messaging and presence. Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based

More information

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

How to choose the right NGFW for your organization: Independent 3 rd Party Testing How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Marketing 2 Confidential Marketing vs. Reality 3

More information

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes

More information

Luka Markota. Enterprise Networking, Central Europe. April 2015

Luka Markota. Enterprise Networking, Central Europe. April 2015 Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010

More information

INTELIGENCIA DE NEGOCIO CON SQL SERVER

INTELIGENCIA DE NEGOCIO CON SQL SERVER INTELIGENCIA DE NEGOCIO CON SQL SERVER Este curso de Microsoft e-learning está orientado a preparar a los alumnos en el desarrollo de soluciones de Business Intelligence con SQL Server. El curso consta

More information

Cisco Actualtests 642-584 Exam Questions & Answers

Cisco Actualtests 642-584 Exam Questions & Answers Cisco Actualtests 642-584 Exam Questions & Answers Number: 642-584 Passing Score: 800 Time Limit: 120 min File Version: 33.4 http://www.gratisexam.com/ Cisco 642-584 Exam Questions & Answers Exam Name:

More information

Solution Requirements and Process Flow

Solution Requirements and Process Flow CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment

More information

Collaboration: Empower, Engage, Innovate. Comunicaciones Agiles al alcance de tu empresa

Collaboration: Empower, Engage, Innovate. Comunicaciones Agiles al alcance de tu empresa Collaboration: Empower, Engage, Innovate. Comunicaciones Agiles al alcance de tu empresa C97-730913-00 2014 Cisco and/or its affiliates. All rights reserved. Carolina Aguilar Ruiz PSE Collaboration Mexico

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013

More information

CUSTOMER ENGAGEMENT & COMMERCE PORQUE EL CAMINO & EL RESULTADO IMPORTAN

CUSTOMER ENGAGEMENT & COMMERCE PORQUE EL CAMINO & EL RESULTADO IMPORTAN CUSTOMER ENGAGEMENT & COMMERCE PORQUE EL CAMINO & EL RESULTADO IMPORTAN NAME TITLE 2011 SAP AG. All rights reserved. 1 QUÉ SIGNIFICA CUSTOMER ENGAGEMENT AND COMMERCE? RELACIONARNOS CON NUESTROS CLIENTES

More information

Monetizing the Cloud with Cisco Desktop-as-a-Service Solutions

Monetizing the Cloud with Cisco Desktop-as-a-Service Solutions Monetizing the Cloud with Cisco Desktop-as-a-Service Solutions Today s Presenters John Malzahn, Sr. Marketing Manager, Cloud Solutions Marketing, Cisco Systems Ashok Rajagopalan, Sr. Manager, UCS Product

More information

Por qué ExecuTrain? Por qué ExecuTrain? Modalidad de servicio

Por qué ExecuTrain? Por qué ExecuTrain? Modalidad de servicio Por qué ExecuTrain? ExecuTrain es un proveedor de entrenamiento corporativo a nivel internacional y líder mundial en la capacitación empresarial. Contamos con 22 años y más de 62 mil personas capacitadas

More information

Implicaciones para. CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC

Implicaciones para. CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC La computación en nube Implicaciones para Auditoría y Seguridad d Ing. Miguel Angel Aranguren Romero Ing. Miguel Angel Aranguren Romero CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC Introducción

More information

Construindo Soluções de Contact Center Inovadoras para os próximos 20 anos

Construindo Soluções de Contact Center Inovadoras para os próximos 20 anos Construindo Soluções de Contact Center Inovadoras para os próximos 20 anos Cilnet Breakout Rui Corrêa d Oliveira Customer Collaboration South Manager @ruribeir Solid Architecture over a decade Advanced

More information

Portafolio de Cursos

Portafolio de Cursos Lenguaje sql y pl/sql Portafolio de Cursos Oracle Base de datos Oracle: introducción a sql Base de datos Oracle: programación pl/sql Base de datos Oracle 11g: pl/sql avanzado Base de datos Oracle 11g:

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Cumplimiento de PMG SSI para sector Gobierno en Chile Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts jaime.briggs@oracle.com Agenda Pilares Fundamentales de SSI Desafios de Seguridad

More information

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan

Stephen Miles. Transform IT assets to Drive Business Service Innovation. CA Expo Hong Kong. Vice President - Service Assurance Asia Pacific & Japan Stephen Miles Vice President - Service Assurance Asia Pacific & Japan CA Expo Hong Kong 21 September, 2012 Transform IT assets to Drive Business Service Innovation The age of innovation has arrived CLOUD

More information

ARQUITETURA OPEN SOURCE PARA NUVEM HÍBRIDA

ARQUITETURA OPEN SOURCE PARA NUVEM HÍBRIDA ARQUITETURA OPEN SOURCE PARA NUVEM HÍBRIDA Hybrid IT, Cloud Computing & Open Innovation Sr Product Manager Latin America Roberto@redhat.com Red Hat 1 2 3 4 5 6 7 8 9 FOR OPEN HYBRID CLOUD AUTO-SERVICE

More information

Cisco SecureX Product Brochure

Cisco SecureX Product Brochure Cisco SecureX Product Brochure Security Matters More Than Ever Traditional approaches to network security were designed for a single purpose: to protect resources inside the network from threats and malware

More information

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Internet of Everything Cisco product managers Vytautas Zulonas Tomas Kirvelaitis Content Internet of Everything application Internet of Everything challenges Cisco solutions Convergence of Mobile, Social,

More information

Copyright 2010 EMC Corporation. All rights reserved.

Copyright 2010 EMC Corporation. All rights reserved. 1 Optimización de los sistemas de Backup / Recovery 2 Rediseño del Backup Tiered Build Out Consolidation Technology Refresh Backup Redesign Virtualization Adoption Improving Performance Archiving Improving

More information

WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services

WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services WHITE PAPER: Egenera Cloud Suite for EMC VSPEX The Proven Solution For Building Cloud Services Build, Manage and Protect Your Cloud with the VSPEX Certified Egenera Cloud Suite Today, organizations are

More information

Overcoming the Security Challenges of the Cloud

Overcoming the Security Challenges of the Cloud Overcoming the Security Challenges of the Cloud Best Practices for Keeping Your Data and Your Organization Safe 1.800.800.0014 www.pcconnection.com 2013 PC Connection, Inc. All rights reserved. PC Connection

More information

Digital Experience Day. Panorama actual. Madrid, Junio 2009. Oded Lida Greiss Director de la región Latina, Eyeblaster

Digital Experience Day. Panorama actual. Madrid, Junio 2009. Oded Lida Greiss Director de la región Latina, Eyeblaster Digital Experience Day Madrid, Junio 2009 Panorama actual Oded Lida Greiss Director de la región Latina, Eyeblaster Media - hace 90 años Radio Print Media - hace 60 años TV Radio Print Media - hace 30

More information

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1

SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 Objetivo Securing Web with Cisco Web Security Appliance (SWSA) é um curso com carga horário de dois dias, que proporciona aos alunos os conhecimentos

More information

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.

are some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud. W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs

More information

Braindumps.700-295.50.QA

Braindumps.700-295.50.QA Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me

More information

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance

More information

Integrating NComputing Virtual Desktops with VMware and Citrix

Integrating NComputing Virtual Desktops with VMware and Citrix Click to edit Master title style Integrating NComputing Virtual Desktops with VMware and Citrix Karen Gaines Director of Southern Europe, NComputing, Inc. September, 2010 1 Click Topicsto edit Master title

More information

PRESIDIO MANAGED SERVICES OVERVIEW

PRESIDIO MANAGED SERVICES OVERVIEW OVERVIEW VALUE AND COMMITMENT OUR COMMITMENT In our pursuit of excellence for Managed Services we dedicate our team to support the strategic business and IT drivers from our customers. Enabling you to

More information

Best Practices for a BYOD World

Best Practices for a BYOD World Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile

More information

Mobil data hetare än någonsin.

Mobil data hetare än någonsin. Mobil data hetare än någonsin. Peter Jerhamre, Systems Engineer 2010 Cisco and/or its affiliates. All rights reserved. 1 2010 Cisco and/or its affiliates. All rights reserved. 2 60% Ifrågasätter kontorets

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

Remote Management Services Portfolio Overview

Remote Management Services Portfolio Overview Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On

More information

w w w w w..a A K K TIO TIO..com com

w w w w w..a A K K TIO TIO..com com Solución de Seguridad en dispositivos IBM Endpoint Manager Enrique G. Dutra Enterprise Security MVP MCT - IBM Sales Spec. Auditor Lider ISO/IEC 27001:2005 Punto Net Soluciones SRL edutra@puntonetsoluciones.com.ar

More information

Best Practices for Deploying Virtual Desktop Infrastructure on the Unified Computing System

Best Practices for Deploying Virtual Desktop Infrastructure on the Unified Computing System Best Practices for Deploying Virtual Desktop Infrastructure on the Unified Computing System Shawn Kaiser & Doron Chosnek 1 Focus of this session Touch on VDI market Touch on balance of resources Focus

More information

SourceFireNext-Generation IPS

SourceFireNext-Generation IPS D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture

More information

UNIFIED COMMUNICATION COMPARISON GUIDE. Unified Messaging, Mobile Integration & Unified User Interface

UNIFIED COMMUNICATION COMPARISON GUIDE. Unified Messaging, Mobile Integration & Unified User Interface UNIFIED COMMUNICATION COMPARISON GUIDE Unified Messaging, Mobile Integration & Unified User Interface Introduction Unified communications is one of the most promising and powerful business technologies

More information

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.] Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless

More information

Network Security Scenario

Network Security Scenario Network Security Scenario Jeffrey Wheatman Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must

More information

http://www.velocis.in Extending Collaboration to BYOD Devices

http://www.velocis.in Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Extending Collaboration to BYOD Devices Device Freedom without Compromising the IT Network Today s employees are increasingly on the move, using mobile devices throughout

More information

DIPLOMADO EN BASE DE DATOS

DIPLOMADO EN BASE DE DATOS DIPLOMADO EN BASE DE DATOS OBJETIVOS Preparan al Estudiante en el uso de las tecnologías de base de datos OLTP y OLAP, con conocimientos generales en todas las bases de datos y especialización en SQL server

More information

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document

More information

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program 2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program WHERE: CENTRO EUROPA-Banco Popular de PR TRAINING CENTER (Frente Centro Bellas Artes, Ave Ponce De León, Santurce

More information

Welcome to New Style of Networking. Budhaditya Mukherjee Country Product Manager - HP Networking India

Welcome to New Style of Networking. Budhaditya Mukherjee Country Product Manager - HP Networking India Welcome to New Style of Networking Budhaditya Mukherjee Country Product Manager - HP Networking India Look at the World Around Us Tectonic shifts are changing how technology is consumed, delivered and

More information

Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.

More information

Citrix XenDesktop & XenApp

Citrix XenDesktop & XenApp VMware Management Pack for Citrix XenDesktop & XenApp How Blue Medora Complements vrealize VMware provides best-ofbreed management for Virtualization / Cloud vsphere via vrealize Operations How Blue Medora

More information

VMware Integrated Partner Solutions for Networking and Security

VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Networking and Security VMware Integrated Partner Solutions for Security and Compliance VMware vcloud Networking and Security is the leading networking and security

More information

Getting the Power of Infinite Scalability with Microsoft s Public Cloud Solutions What s new in Windows Azure?

Getting the Power of Infinite Scalability with Microsoft s Public Cloud Solutions What s new in Windows Azure? Getting the Power of Infinite Scalability with Microsoft s Public Cloud Solutions What s new in Windows Azure? Alexis Castanares, Windows Azure Product Manager @alexisc Guadalupe Casuso, Windows Azure

More information

Cisco Secure BYOD Solution

Cisco Secure BYOD Solution Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice

More information

Estructura de aplicación en PHP para System i

Estructura de aplicación en PHP para System i Estructura de aplicación en PHP para System i La aplicación esta diseñada para IBM DB2 en System i, UNIX y Windows. Se trata de la gestión de una entidad deportiva. A modo de ejemplo de como está desarrollada

More information

Arbor Networks DDoS Solutions. Alex Lopez alopez@arbor.net +34 676995439

Arbor Networks DDoS Solutions. Alex Lopez alopez@arbor.net +34 676995439 Arbor Networks DDoS Solutions Alex Lopez alopez@arbor.net +34 676995439 Agenda The Problem The Business Risk Smart. Secure. Available. The Arbor Solution Company Overview 2 Agenda Company The Problem Overview

More information

www.dlinkondroad.com

www.dlinkondroad.com www.dlinkondroad.com m ydlink Cloud Services Soluciones Globales I P de D-Link m ydlink TM Cloud Services Evolución del mundo de la tecnología LAS TI para unos pocos Las TI para TODOS Imposible? Del Hardware

More information

Red Hat Enterprprise Linux - Renewals DETAILS SUPPORTED ARCHITECTURE

Red Hat Enterprprise Linux - Renewals DETAILS SUPPORTED ARCHITECTURE Red Hat Enterprprise Linux - Renewals PRODUCT CODE DESCRIPTION 1 Year DETAILS SUPPORTED ARCHITECTURE Red Hat Enterprise Linux Advanced Platform Red Hat Enterprise Linux Advanced Platform, (unlimited Red

More information

Cisco Data Center Optimization Services

Cisco Data Center Optimization Services Cisco Data Center Optimization Services Evolve your data center solutions to support business growth, deliver nextgeneration services, and maintain competitive advantage with Cisco Data Center Optimization

More information

FI-WARE Catalogue REST API

FI-WARE Catalogue REST API FI-WARE Catalogue REST API Topics addressed: Catalogue, Manual, Drupal, API, REST Editor: Pedro Rodríguez Pérez e-mail: prodriguez@dit.upm.es Page 1 Changes History Release Major changes description Date

More information

LBWN ALQUILAR CON OPCIÓN A COMPRAR

LBWN ALQUILAR CON OPCIÓN A COMPRAR LBWN ALQUILAR CON OPCIÓN A COMPRAR BENEFICIOS PARA LA COMUNIDAD LBWN Alquilar con Opción a Comprar es una iniciativa de desarrollo de $5.8 millones que convertirá 24 foreclosures en viviendas unifamiliares

More information

HPN Product Tools. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

HPN Product Tools. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HPN Product Tools Requerimiento: Conozco el numero de parte (3Com,H3C,Procurve) Solución : El lookup Tool 1 Permite convertir el número de parte de un equipo proveniente de 3Com, H3C o Procurve para obtener

More information

Optimizing the Mobile Cloud Era Through Agility and Automation

Optimizing the Mobile Cloud Era Through Agility and Automation Session ID: CDS-F01 Optimizing the Mobile Cloud Era Through Agility and Automation Edwin Lee Director of Enterprise Solutions, ASEAN AirWatch by VMware Industry Trends Explosive Growth of Mobile Mobile

More information

UC & C Success Requires a Services Lead Approach

UC & C Success Requires a Services Lead Approach UC & C Success Requires a Services Lead Approach Presented by Zeus Kerravala Principal Analyst 2014 ZK RESEARCH, A DIVISION OF KERRAVALA CONSULTING The Business Climate is Changing Technology Solution

More information

Advanced Security for Account Managers-ASAM

Advanced Security for Account Managers-ASAM Advanced Security for Account Managers-ASAM Number: 646-580 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 What are three major trends that fuel the

More information

How Cisco IT Built Virtual Desktop Infrastructure

How Cisco IT Built Virtual Desktop Infrastructure Cisco IT Case Study May 2012 Virtualization Desktop Infrastructure (VDI) How Cisco IT Built Virtual Desktop Infrastructure Cisco Virtualization Experience Infrastructure (VXI) is core pillar of Cisco strategy

More information

Braindumps Q.A. Cisco Cisco Express Foundation for Account Managers (CXFA) Exam

Braindumps Q.A. Cisco Cisco Express Foundation for Account Managers (CXFA) Exam Braindumps.646-365.42Q.A Number: 646-365 Passing Score: 800 Time Limit: 120 min File Version: 8.7 Cisco 646-365 Cisco Express Foundation for Account Managers (CXFA) Exam a) With the guidance and help from

More information