Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa
|
|
- Vivian Barrett
- 8 years ago
- Views:
Transcription
1 Un mundo de Clouds: Seguridad y Adopción Cisco + Intel Pilar Santamaria Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa
2 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
4 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
5 El número de servidores (físicos y virtuales) a nivel mundial crecerá Hoy x Próxima década IDC's Digital Universe Study, June Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6 y el número de archivos que los centros de datos tendrán que manejar crecerá 75 Hoy x Próxima Década IDC's Digital Universe Study, June Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7 El número de profesionales IT en el mundo crecerá 1. 5 Hoy IDC's Digital Universe Study, June 2011 x Próxima Década 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
8 Un evento que cambia la forma en la que pensamos y actuamos. Andy Grove, Fundador de Intel 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10 Un Mundo de Múltiples Clouds Personas Múltiples Dispositivos Medio s Data Center Unificado Private Sanida d Aplicaciones Cloud Hybrid Y más Gobiern o Red Public Inteligente para Cloud Cisco está conectando personas y compañías a un Mundo de Múltiples Clouds Compañías Administraciones Públicas 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
11 Network Compute Application Services Storage 11 Optimiza la utilización de los recursos Simplifica la operación Disminuye TCO 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
12 Qué fabricante identificaría como el más competente para acompañarle en una estrategia basada en Fabric Computing? Dell Egenera Other IBM HP VMware Don t Know/Not Sure Cisco % of Respondents Gartner report: Fabric Computing Poised as a Preferred Infrastructure for Virtualization and Cloud Computing, February 11, 2011, George J. Weiss and Andrew Butler Report. ID number: G Cisco and/or its affiliates. All rights reserved. You can read the full Gartner report here: Cisco Confidential 12
13 La Apuesta de Cisco en Cloud TOP Puertos Nexus Puertos MDS Gasto I+D de Cisco De acuerdo a Board de Patentes Prioridades Data Center & Virtualization Millones Millones Q1-FY12 Crecimiento UCS USA, España y Sur de Europa x86 Blade Servers Mundial x86 Blade Server Market Share 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
14 INTEL x86 Plataforma de Computación Estándar Itanium Itanium $ 0.1B $ 4B 2002 Intel x86 $ 19.2B RISC/ Mainframes $ 30B 2010 * Intel x86 $ 30.5B RISC/ Mainframes $ 15B AMD $ 2.8B AMD $ 330M 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Source: IDC World Wide Server Tracker
15 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16 Cloud: El Corporativo de Clouds no Soportadas Use of Unsupported Applications (Total, n=511) Types of Unsupported Applications (Total, n=287) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
17 Types of Unsupported Applications (By Country) E BCE BE ABCE B CD 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
18 Use of Unsupported Network Devices (Total, n=511) Breach or Loss of Information Due to Unsupported Devices (Total, n=511) 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
19 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
20 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
21 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
22 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
23 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
24 Trusted Wi F i Authenticate User Fingerprint Device Apply Corporate Config Enterprise Apps Automatic Policies 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
25 Trusted Wi F i n Wi- Fi Identity Based Access Control Apply defined policy profiles based on: Device Type User Location Application Mobile Device Managem ent WAN Optimization Service Assurance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
26 Trusted Wi Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
27 Trusted Wi F i n Wi-Fi Location Video Optimization Spectrum Intelligence Client Acceleration Is Mr. Allen s lab work ready yet? Identity Based Access Control Not yet but i will let you know the moment it arrives Mobile Device Managemen t 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
28 Untrusted WiFi Access: Limited 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
29 Hotspot n Wi-Fi Web/ Security Identity Based Access Control VPN Collaboratio n/ UC 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
30 Truste Wi d Fi Access: FULL No Yes Electronic Medical Records Mobile TelePresence Instant Messenger 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Presentation_ID 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
31 Trust, Visibility, Transparency Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
32 53% Edad ,000 Páginas de Negocios Locales en Facebook 424 Libros Facebook marketing 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
33 Fuga de Datos Productividad Ataques: 1/3 de los usuarios 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
34 Identity Application Job Sites Human Resource Instant Message No File Transfer Time Facebook? Lunch Hour Location Streaming Media Business-related Content P2P All Object Compliance 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
35 Cumplimiento de políticas y confidencialidad Allow/Block features like chat, messaging, video & audio Allow/Block thousands of Facebook Apps Block Malware like Farm Town app ad that redirects users to fake antivirus software 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
36 Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad para Cloud y Movilidad: Acceso basado en Contexto Seguridad desde la Nube: Telemetría Global y Pago por Uso 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
37 4% Middle East North America 6% 6% Africa 9% Nordic Region 33% Eastern Europe Asia Pacific 9% Source: Cisco IronPort Europe 9% 11% China 14% South America 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
38 35% Global Visibility 20B Daily Web Requests 300K IPS Signatures 700,000+ Devices 150M + Endpoints 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
39 Deep Content Analysis Structural Content Investigation Virtualized Script Emulation 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
40 Países 100% Sin Interrupción de Servicio durante 8 años 20B Peticiones Web por Día Millones De Usuarios Protegidos 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
41 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
42 Protección Cloud en el acceso ubicuo, mediante contexto y desde la Nube 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
43 The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
44 The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
45 Mobile Applications and Data The Network Desktop DMZ 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
46 The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
47 The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
48 AnyConnect Virtual and Cloud Cisco SecureX Architecture Cisco SIO Context Aware Policy The Network Context Aware Enforcement Appliance Module Cloud The Network 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
49
50
Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa
Movilidad 3.0: Más allá de BYOD Pilar Santamaria Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Web 3.0 Más allá de BYOD IPV6 y la Arquitectura Borderless
More informationTaking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
More informationBYOD Strategy and Solutions. www.nexusis.com 877.286.3987
BYOD Strategy and Solutions 1 www.nexusis.com 877.286.3987 Presentation_ID 2 Presentation_ID 3 Presentation_ID 4 Demand for Mobile Access 15 billion new networked mobile devices by 2015 56% of information
More informationEstrategias para la Reducción de Riesgos y Ciber Ataques
Estrategias para la Reducción de Riesgos y Ciber Ataques Luis Zamora Consultor en Tecnología 1 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,
More informationCloud Licensing Trends, Opportunities and Benefits
Cloud Licensing Trends, Opportunities and Benefits Jake Fox, VP Product Development Insert Your Name Insert Your Title Insert Date Agenda Licensing Trends Cloud & Beyond Cloud Adoption Rates The Opportunity
More informationThe cloud for modern business:
The cloud for modern business: Move faster Save money Integrate on-premises apps and data Yolanda Azcúnaga Budí Technical Solutions Professional Azure yoazcuna@microsoft.com Diciembre 2015 Microsoft Confidential
More informationWeb Application Firewall Data Security Solutions. Cloud Firewall
Web Application Firewall Data Security Solutions Cloud Firewall PORTAFOLIO DE PRODUCTOS Seguridad para la Nube Cloud is just another IT Deployment Model Physical Virtual Private Cloud (On-Premise) Public
More informationVirtualización en Soluciones de Respaldo y Almacenamiento de Datos Diego Schillaci Storage Manager Latinoamerica Sur SUN Microsystems Storage Group
22/06/06 16:03:53 Virtualización en Soluciones de Respaldo y Almacenamiento de Datos Diego Schillaci Storage Manager Latinoamerica Sur SUN Microsystems Storage Group / 1 Storage virtualization, defined
More informationMicrosoft en la empresa y el Gobierno
Microsoft en la empresa y el Gobierno El cambio de rol de TI Microsoft es el único habilitado para ayudarlo a balancear las expectativas de los usuarios con los requerimientos institucionales. Dispositivos
More informationOnPremise y en la nube
La estrategia de Integración Microsoft OnPremise y en la nube Beacon42 - GABRIEL COR Creando valor a través de la integración ESB es antiguo ahora es NoESB SOA Todo es un API EAI es major que Batch
More informationVideocolaboración en la Nube. Una solución para CUDI
Videocolaboración en la Nube Una solución para CUDI Agenda 1. Introduction to Cloud Enablement for Video 2. Scopia Product line 3. Design and Deploy 4. Summary 2013 Avaya Inc. All rights reserved. 2 Soluciones
More informationCuánto se demora una pit stop?
Cuánto se demora una pit stop? The Internet of Things Connect Transform Reimagine Edgar Galindo Septiembre 2015 Version 1.0 2 Agenda The IoT Por qué nos debería importar? Optimice su cadena de valor a
More information50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008
50399AE Diseño de soluciones Business Intelligence con Microsoft SQL Server 2008 Fabricante: Indra Grupo: Inteligencia de Negocios Subgrupo: SQL Server 2008 - ETL - AS - RS Formación: Indra Horas: 25 Introducción
More informationMovilidad, Seguridad y Alta Disponibilidad en la Entrega de Aplicaciones. Evento de Virtualización ONGEI 2009. Pedro Elera M.
Movilidad, Seguridad y Alta Disponibilidad en la Entrega de Aplicaciones. Evento de Virtualización ONGEI 2009 Pedro Elera M. Agenda: Introducción Entrega de aplicaciones y Alta Disponibilidad Movilidad
More information20-22 MAYO MAY 2014 ORGANIZA ORGANISED BY
20-22 MAYO MAY 2014 ORGANIZA ORGANISED BY XVI Salón Profesional Internacional de la Tecnología Audiovisual 16th International Audio-Visual Technology Trade Fair Del 20 al 22 de mayo de 2014 From May 20
More informationWatchGuard: Real World Security. Carlos Vieira Carlos.Vieira@WatchGuard.com Country Manager Spain & Portugal
WatchGuard: Real World Security Carlos Vieira Carlos.Vieira@WatchGuard.com Country Manager Spain & Portugal 2012 About WatchGuard Accolades > Founded in 1996 privately held > Firewall appliance pioneer
More informationCisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015
#TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security
More informationLINIO COLOMBIA. Starting-Up & Leading E-Commerce. www.linio.com.co. Luca Ranaldi, CEO. Pedro Freire, VP Marketing and Business Development
LINIO COLOMBIA Starting-Up & Leading E-Commerce Luca Ranaldi, CEO Pedro Freire, VP Marketing and Business Development 22 de Agosto 2013 www.linio.com.co QUÉ ES LINIO? Linio es la tienda online #1 en Colombia
More informationGUL-UC3M Jornadas Técnicas
GUL-UC3M Jornadas Técnicas Global Open Source Enterprises My experience in Openbravo 14 de Noviembre de 2008 Agenda Introduction to Openbravo Dynamics of Open Source Openbravo Community Services My takeaways
More informationDespliegues en la Plataforma Cloud AWS Antonio Alvarez EMEA Business Developer Manager. SAP Forum Madrid, 12 Marzo 2015
Despliegues en la Plataforma Cloud AWS Antonio Alvarez EMEA Business Developer Manager SAP Forum Madrid, 12 Marzo 2015 Agenda Que es AWS? Beneficios de AWS Cloud + Intel SAP on AWS: Casos de Uso y referencias
More informationRecuperación de Desastres en el Cloud. Carlos Silva Solution Architect Vision Solutions
Recuperación de Desastres en el Cloud. Carlos Silva Solution Architect Vision Solutions 1 Y se hizo el Cloud. 2 Migrate, Protect & Recover Anywhere * Forrester: Prepare For 2020: Transform Your IT Infrastructure
More informationAULA EUROPEA DE EMPRESA
AULA EUROPEA DE EMPRESA AULA EUROPEA DE EMPRESA Formación Microsoft Primer Cuatrimestre 2014 C/ Méndez Álvaro 56, 28045-Madrid www.aedeibs.com MOC: MICROSOFT OFFICIAL CURRICULUM... 1 Cloud Computing...
More informationAdvantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses
Advantages of Consolidating Network Security with Wireless for Small & Mid-Size Businesses Patrick Bedwell VP, Product Marketing 1 Copyright 2014 Fortinet Inc. All rights reserved. Today s Agenda Security
More informationGreen Project Management
Green Project Management Projects integrating Sustainable Methods Training Providing Project Managers with methods, tools, and techniques to execute Projects, Programs, and Portfolios using sustainable
More informationCisco Desktop Virtualization with UCS: A Blueprint for Success
Cisco Desktop Virtualization with UCS: A Blueprint for Success Eugenios Zervoudis Product Sales Specialist ezervoud@cisco.com Challenges with Desktop Virtualization today Challenges implementing Enterprise
More informationBYOD Security Challenges in Education: Protect the Network, Information, and Students
BYOD Security Challenges in Education: What You Will Learn The influx of personal smartphones and tablets on campus, and the resulting data deluge, imposes a new set of security challenges. This white
More informationCurriculum Reform in Computing in Spain
Curriculum Reform in Computing in Spain Sergio Luján Mora Deparment of Software and Computing Systems Content Introduction Computing Disciplines i Computer Engineering Computer Science Information Systems
More informationManejo Basico del Servidor de Aplicaciones WebSphere Application Server 6.0
Manejo Basico del Servidor de Aplicaciones WebSphere Application Server 6.0 Ing. Juan Alfonso Salvia Arquitecto de Aplicaciones IBM Uruguay Slide 2 of 45 Slide 3 of 45 Instalacion Basica del Server La
More informationECCAIRS 5 Instalación
ECCAIRS 5 Instalación Paso a paso Preparado por: Arturo Martínez Oficina Regional Sudamericana Uniendo a la Aviación en Seguridad Operacional Seguridad Medioambiente Instalación Paso a paso Escenario Windows
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationINTELIGENCIA DE NEGOCIO CON SQL SERVER
INTELIGENCIA DE NEGOCIO CON SQL SERVER Este curso de Microsoft e-learning está orientado a preparar a los alumnos en el desarrollo de soluciones de Business Intelligence con SQL Server. El curso consta
More informationWe are Network Security. Francesc Sellés, 3 de Mayo de 2013 Pueden contactarnos llamando al: 902160145 o enviando un email a abox@abox.
We are Francesc Sellés, 3 de Mayo de 2013 Pueden contactarnos llamando al: 902160145 o enviando un email a abox@abox.com We are Perfil de compañía Fundada en 1997 Soluciones de seguridad de red dirigidas
More informationSophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
More informationBring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG (bokng@cisco.com) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
More informationGetting the Power of Infinite Scalability with Microsoft s Public Cloud Solutions What s new in Windows Azure?
Getting the Power of Infinite Scalability with Microsoft s Public Cloud Solutions What s new in Windows Azure? Alexis Castanares, Windows Azure Product Manager @alexisc Guadalupe Casuso, Windows Azure
More informationCisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
More informationCisco Actualtests 642-584 Exam Questions & Answers
Cisco Actualtests 642-584 Exam Questions & Answers Number: 642-584 Passing Score: 800 Time Limit: 120 min File Version: 33.4 http://www.gratisexam.com/ Cisco 642-584 Exam Questions & Answers Exam Name:
More informationDigital Experience Day. Panorama actual. Madrid, Junio 2009. Oded Lida Greiss Director de la región Latina, Eyeblaster
Digital Experience Day Madrid, Junio 2009 Panorama actual Oded Lida Greiss Director de la región Latina, Eyeblaster Media - hace 90 años Radio Print Media - hace 60 años TV Radio Print Media - hace 30
More informationCollaboration: Empower, Engage, Innovate. Comunicaciones Agiles al alcance de tu empresa
Collaboration: Empower, Engage, Innovate. Comunicaciones Agiles al alcance de tu empresa C97-730913-00 2014 Cisco and/or its affiliates. All rights reserved. Carolina Aguilar Ruiz PSE Collaboration Mexico
More informationCUSTOMER ENGAGEMENT & COMMERCE PORQUE EL CAMINO & EL RESULTADO IMPORTAN
CUSTOMER ENGAGEMENT & COMMERCE PORQUE EL CAMINO & EL RESULTADO IMPORTAN NAME TITLE 2011 SAP AG. All rights reserved. 1 QUÉ SIGNIFICA CUSTOMER ENGAGEMENT AND COMMERCE? RELACIONARNOS CON NUESTROS CLIENTES
More information聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
More informationHow To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or
Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based
More informationFI-WARE Catalogue REST API
FI-WARE Catalogue REST API Topics addressed: Catalogue, Manual, Drupal, API, REST Editor: Pedro Rodríguez Pérez e-mail: prodriguez@dit.upm.es Page 1 Changes History Release Major changes description Date
More informationCisco SecureX Product Brochure
Cisco SecureX Product Brochure Security Matters More Than Ever Traditional approaches to network security were designed for a single purpose: to protect resources inside the network from threats and malware
More informationIBM PureSystems: Familia de Sistemas Expertos Integrados
IBM PureSystems: Familia de Sistemas Expertos Integrados Carlos Etchart Sales Support Specialist IBM Está IT listo para el Cambio? New server spending Power & cooling costs Server mgmt & admin costs 2013
More informationPor qué ExecuTrain? Por qué ExecuTrain? Modalidad de servicio
Por qué ExecuTrain? ExecuTrain es un proveedor de entrenamiento corporativo a nivel internacional y líder mundial en la capacitación empresarial. Contamos con 22 años y más de 62 mil personas capacitadas
More informationPortafolio de Cursos
Lenguaje sql y pl/sql Portafolio de Cursos Oracle Base de datos Oracle: introducción a sql Base de datos Oracle: programación pl/sql Base de datos Oracle 11g: pl/sql avanzado Base de datos Oracle 11g:
More informationCisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]
Cisco Cloud Web Security Cisco IT Methods Introduction Malicious scripts, or malware, are executable code added to webpages that execute when the user visits the site. Many of these seemingly harmless
More informationOvercoming the Security Challenges of the Cloud
Overcoming the Security Challenges of the Cloud Best Practices for Keeping Your Data and Your Organization Safe 1.800.800.0014 www.pcconnection.com 2013 PC Connection, Inc. All rights reserved. PC Connection
More informationVladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific v.yordanov@f5.com Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
More informationMobil data hetare än någonsin.
Mobil data hetare än någonsin. Peter Jerhamre, Systems Engineer 2010 Cisco and/or its affiliates. All rights reserved. 1 2010 Cisco and/or its affiliates. All rights reserved. 2 60% Ifrågasätter kontorets
More informationARQUITETURA OPEN SOURCE PARA NUVEM HÍBRIDA
ARQUITETURA OPEN SOURCE PARA NUVEM HÍBRIDA Hybrid IT, Cloud Computing & Open Innovation Sr Product Manager Latin America Roberto@redhat.com Red Hat 1 2 3 4 5 6 7 8 9 FOR OPEN HYBRID CLOUD AUTO-SERVICE
More informationare some of the key drivers behind mandates from executives to move IT infrastructure from on-premises to the cloud.
W H I T E PA P E R Public Network External Application MTA Moving to the Cloud Important Things to Consider Before Migrating Your Messaging Infrastructure to the Cloud Fallback MTA External Corporate MTAs
More informationEstructura de aplicación en PHP para System i
Estructura de aplicación en PHP para System i La aplicación esta diseñada para IBM DB2 en System i, UNIX y Windows. Se trata de la gestión de una entidad deportiva. A modo de ejemplo de como está desarrollada
More informationCopyright 2010 EMC Corporation. All rights reserved.
1 Optimización de los sistemas de Backup / Recovery 2 Rediseño del Backup Tiered Build Out Consolidation Technology Refresh Backup Redesign Virtualization Adoption Improving Performance Archiving Improving
More informationMonetizing the Cloud with Cisco Desktop-as-a-Service Solutions
Monetizing the Cloud with Cisco Desktop-as-a-Service Solutions Today s Presenters John Malzahn, Sr. Marketing Manager, Cloud Solutions Marketing, Cisco Systems Ashok Rajagopalan, Sr. Manager, UCS Product
More informationThe Top Ten Advantages of Using Cisco Enterprise Networking in 2014
Luka Markota Enterprise Networking, Central Europe April 2015 The Customer Journey Can you make the leap? Today Digitisation IoT/IoE 2015 000100101011010101001001001001000101 101001010011100100101010001001001010
More informationw w w w w..a A K K TIO TIO..com com
Solución de Seguridad en dispositivos IBM Endpoint Manager Enrique G. Dutra Enterprise Security MVP MCT - IBM Sales Spec. Auditor Lider ISO/IEC 27001:2005 Punto Net Soluciones SRL edutra@puntonetsoluciones.com.ar
More informationSWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1
SWSA ((SECURING WEB WITH CISCO WEB SECURITY APPLIANCE)) 2.1 Objetivo Securing Web with Cisco Web Security Appliance (SWSA) é um curso com carga horário de dois dias, que proporciona aos alunos os conhecimentos
More informationBest Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
More informationHPN Product Tools. Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HPN Product Tools Requerimiento: Conozco el numero de parte (3Com,H3C,Procurve) Solución : El lookup Tool 1 Permite convertir el número de parte de un equipo proveniente de 3Com, H3C o Procurve para obtener
More informationLBWN ALQUILAR CON OPCIÓN A COMPRAR
LBWN ALQUILAR CON OPCIÓN A COMPRAR BENEFICIOS PARA LA COMUNIDAD LBWN Alquilar con Opción a Comprar es una iniciativa de desarrollo de $5.8 millones que convertirá 24 foreclosures en viviendas unifamiliares
More informationBest Practices for Deploying Virtual Desktop Infrastructure on the Unified Computing System
Best Practices for Deploying Virtual Desktop Infrastructure on the Unified Computing System Shawn Kaiser & Doron Chosnek 1 Focus of this session Touch on VDI market Touch on balance of resources Focus
More informationSourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 petr.salac@alefnula.com Our Customers Biggest Security Challenges Maintaining security posture
More informationSecure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services
Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services Udo Schneider Trend Micro Udo_Schneider@trendmicro.de 26.03.2013
More informationHow to choose the right NGFW for your organization: Independent 3 rd Party Testing
How to choose the right NGFW for your organization: Independent 3 rd Party Testing Daniel Ayoub, CISSP, CISM, CISA, CEH Manager, Product Marketing Dell Marketing 2 Confidential Marketing vs. Reality 3
More informationDIPLOMADO EN BASE DE DATOS
DIPLOMADO EN BASE DE DATOS OBJETIVOS Preparan al Estudiante en el uso de las tecnologías de base de datos OLTP y OLAP, con conocimientos generales en todas las bases de datos y especialización en SQL server
More informationInformación On Demand Podemos predecir lo que sucederá?
Información On Demand Podemos predecir lo que sucederá? Jeffrey Haggott IBM Corporation Americas Data Warehouse Business Unit Latin America Sales Leader jhaggot@us.ibm.com Temas de Nuestra Charla Gestión
More informationUNIFIED COMMUNICATION COMPARISON GUIDE. Unified Messaging, Mobile Integration & Unified User Interface
UNIFIED COMMUNICATION COMPARISON GUIDE Unified Messaging, Mobile Integration & Unified User Interface Introduction Unified communications is one of the most promising and powerful business technologies
More information2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program
2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program WHERE: CENTRO EUROPA-Banco Popular de PR TRAINING CENTER (Frente Centro Bellas Artes, Ave Ponce De León, Santurce
More informationAdditional information >>> HERE <<<
Additional information >>> HERE http://urlzz.org/videomarke/pdx/fph1 Tags:
More informationGreen Corridors and TEN-T Policy Planning Sara Fozza Project Manager - Sustainable Logistics - D'Appolonia S.p.A Humberto Moyano Director de I+D Autoridad Portuaria de Gijón. Content of the presentation
More informationWHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services
WHITE PAPER: Egenera Cloud Suite for EMC VSPEX The Proven Solution For Building Cloud Services Build, Manage and Protect Your Cloud with the VSPEX Certified Egenera Cloud Suite Today, organizations are
More informationSolution Requirements and Process Flow
CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment
More informationSecurity Practices for Online Collaboration and Social Media
Cisco IT Best Practice Collaboration Security Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 2013 Cisco and/or its affiliates. All rights reserved.
More informationIntegrating NComputing Virtual Desktops with VMware and Citrix
Click to edit Master title style Integrating NComputing Virtual Desktops with VMware and Citrix Karen Gaines Director of Southern Europe, NComputing, Inc. September, 2010 1 Click Topicsto edit Master title
More informationBtoB MKT Trends. El Escenario Online. Luciana Sario. Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1
BtoB MKT Trends El Escenario Online Luciana Sario Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1 Audio Test Estamos haciendo un Audio Test y estoy hablando en este momento
More informationImplicaciones para. CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC
La computación en nube Implicaciones para Auditoría y Seguridad d Ing. Miguel Angel Aranguren Romero Ing. Miguel Angel Aranguren Romero CISA, CISM, CGEIT, CRISC, CISSP, OSCP, Cobit FC, ITIL v3 FC Introducción
More informationPRESIDIO MANAGED SERVICES OVERVIEW
OVERVIEW VALUE AND COMMITMENT OUR COMMITMENT In our pursuit of excellence for Managed Services we dedicate our team to support the strategic business and IT drivers from our customers. Enabling you to
More informationConstruindo Soluções de Contact Center Inovadoras para os próximos 20 anos
Construindo Soluções de Contact Center Inovadoras para os próximos 20 anos Cilnet Breakout Rui Corrêa d Oliveira Customer Collaboration South Manager @ruribeir Solid Architecture over a decade Advanced
More informationCisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
More informationBraindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
More informationDomina Google Con Video Marketing 2.0 -> Click Here
Online video marketing wikipedia, marketing video production software, video marketing 3.0, software generador de trafico web, promociona tu negocio letsbonus. Domina Google Con Video Marketing 2.0 ->
More informationEl costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
More informationWEB SERVICES WEB SERVICES
From Chapter 19 of Distributed Systems Concepts and Design,4 th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison Wesley/Pearson Education June 2005 1 Topics Introduccion Web
More informationCisco One Enterprise Cloud Suite jzimet@cisco.com. Josip Zimet Cloud Product sales specialist SEE-12
Cisco One Enterprise Cloud Suite jzimet@cisco.com Josip Zimet Cloud Product sales specialist SEE-12 AT&T Digital Moment Personalized Guest Experiences Digital Concierge Business Moment New Revenue Opportunities
More informationMarketing segmentation video download, video game marketing agency, promociona tu negocio en internet, como promocionar un negocio de cupcakes.
Marketing segmentation video download, video game marketing agency, promociona tu negocio en internet, como promocionar un negocio de cupcakes. > CHECK HERE < Wistia video marketing 101 product details
More informationTourist Visa Application Form
Introduction Tourist Visa Application Form This document contains the official visa application form issued by the Immigration and Naturalization Services of Costa Rica (Direccion General de Migracion)
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Cumplimiento de PMG SSI para sector Gobierno en Chile Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts jaime.briggs@oracle.com Agenda Pilares Fundamentales de SSI Desafios de Seguridad
More informationIntro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe
Intro to QualysGuard IT Risk & Asset Management Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe A Unified and Continuous View of ICT Security, Risks and Compliance
More informationBALANCE DUE 10/25/2007 $500.00 STATEMENT DATE BALANCE DUE $500.00 PLEASE DETACH AND RETURN TOP PORTION WITH YOUR PAYMENT
R E M I T T O : IF PAYING BY MASTERCARD, DISCOVER, VISA, OR AMERICAN EXPRESS, FILL OUT BELOW: XYZ Orthopaedics STATEMENT DATE BALANCE DUE 10/25/2007 $500.00 BALANCE DUE $500.00 ACCOUNT NUMBER 1111122222
More informationAgility2.0. Enterdev S.A.S. Collin Kleine
Agility2.0 Enterdev S.A.S. Collin Kleine Table of Contents Stages with versions... 4 Metamodel structure...5 Conceptual Static Model... 7 Conceptual Dynamic Model... 9 Agility Manager...10 Agility Automation
More informationSeptember 20,2011 Clarification of the Functionality for the Service Provider Module Please see at the bottom a summary of these detail.
September 20,2011 Clarification of the Functionality for the Service Provider Module Please see at the bottom a summary of these detail. The MY PROFILE should have the following concepts: The first should
More informationArbor Networks DDoS Solutions. Alex Lopez alopez@arbor.net +34 676995439
Arbor Networks DDoS Solutions Alex Lopez alopez@arbor.net +34 676995439 Agenda The Problem The Business Risk Smart. Secure. Available. The Arbor Solution Company Overview 2 Agenda Company The Problem Overview
More informationYour New Denver Public Library Card
Your New Denver Public Library Card Tu nueva tarjeta de usuario de la Biblioteca Pública de Denver Please tell us if you move or get a new phone number. You can check out LOTS of books. Por favor avísanos
More informationMonterey County Behavioral Health Policy and Procedure
Monterey County Behavioral Health Policy and Procedure 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Policy Number 144 Policy Title Disclosure of Unlicensed Status for License
More informationSecuring and Optimizing the Next Generation Branch Office
Securing and Optimizing the Next Generation Branch Office 1 Global Organizations Current state of affairs 3 Globally distributed enterprises rely on the WAN for day to day operations to stay competitive
More informationDyna ISSN: 0012-7353 dyna@unalmed.edu.co Universidad Nacional de Colombia Colombia
Dyna ISSN: 0012-7353 dyna@unalmed.edu.co Universidad Nacional de Colombia Colombia POSADA, ENRIQUE Rational energy use and waste minimization goals based on the use of production data Dyna, vol. 75, núm.
More informationFernando DLn Posicionamiento Web Mercado De Afiliados - User Review --->>> Click Here > Click Now <
Example of a affiliate marketing website, matt's affiliate marketing blog, affiliate marketing dead 2014. Fernando DLn Posicionamiento Web Mercado De Afiliados - User Review --->>> Click Here > Click Now
More information