Delivering Control with Context Across the Extended Network
|
|
|
- Jane Hodges
- 10 years ago
- Views:
Transcription
1 Delivering Control with Context Across the Extended Network
2 Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3 What Keeps CIOs/CISOs Up at Night? 33% of Global Companies have already experienced a breach $300K = Average Cost of a Single, Successful Cyberattack The pain of managing, on average, over 45 different security vendors in a network 66% of Organizations fail to identify breaches for months or YEARS Over 660 Million personal records stolen from over 4,100 data breaches since % of IT Leaders plan to implement a mobile strategy Over 15 Billion Connected Devices by 2015 (4.4 per person!) Security is the Top of Mind Concern for CIOs/ CISOs
4 Network Threats Are Getting Smarter Phishing, Low Sophistication Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Viruses Worms Spyware and Rootkits 2005 Today APTs Cyberware Today Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
5 More Connected Devices Expand Threat Surface IT Procured Managed Endpoints Enterprises Say Malware Targeted Mobile Devices in the Last 12 Months 1 Guest Access Simple Guest Access Enterprise Mobility Procured & BYOD Mobile Device Use Growing Evolving Need for Secure Access and Threat Defense Internet of Everything Explosion of Network Enabled Devices Cisco and/or its affiliates. All rights reserved. 1 Ponemon Research Cisco Confidential 5
6 The Resulting Challenges for Enterprise IT Breakdown of Traditional Network Perimeters Difficult Balance Between Security & Productivity Increased Complexity When Securing Enterprise Networks Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7 Bottom Line: What s Missing Today? Greater Visibility to accurately identify, rapidly onboard, and secure connected devices across wired, wireless or VPN Rich, contextual information to grant the right people & devices, the right levels of access to the network Capability to connect disparate network and security solutions to more rapidly take action against threats Enterprises require even greater visibility, context, and control to secure and control an increasing number of devices on their networks.
8 Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
9 Cisco Identity Services Engine (ISE) Delivering Visibility, Context, and Control to Secure Network Access NETWORK / USER CONTEXT Who DEVICE PROFILING FEED SERVICE What When Where How REDUCE NETWORK UNKNOWNS AND APPLY THE RIGHT LEVEL OF SECURE ACCESS CONSISTENTLY ACROSS WIRED, WIRELESS and VPN Guest Access Cisco and/or its affiliates. All rights reserved. BYOD and Enterprise Mobility Secure Access Cisco Confidential 9
10 Why Cisco ISE? Cisco ISE is the Market-Leading Security Policy Management Platform that Unifies and Automates Secure Access Control Across Wired, Wireless, and VPN. Visibility Driven Accurately Identify and Assess Network Users & Devices Access Control Grant/Limit access to align with appropriate business policy Context Focused Use dynamic contextual data to accelerate the identification, mitigation, and remediation across extended networks
11 The Different Ways Customers Use ISE Guest Access Management Easily provide visitors secure guest Internet access BYOD and Enterprise Mobility Seamlessly identify & securely onboard devices with the right levels of access Secure Access across the Entire Network Streamline enterprise network access policy over wired, wireless, & VPN Software-Defined Segmentation with Cisco TrustSec Simplify Network Segmentation and Access Policy Enforcement
12 Historically, Securing Access Was Complicated The Past Cisco and/or its affiliates. All rights reserved. ISE 1.3 Cisco Confidential 12
13 Easy-to-Deploy Guest and BYOD Access Admin Friendly Set up a Guest or BYOD workflow in just a few clicks. End User Visibility ISE updates the portal workflow in real-time with each change.
14 Simplifying Guest Access for the Enterprise Corporate Branding and Themes Desktop & Mobile Ready! Streamlined Guest Creation Create Accounts Print SMS Mobile Guest Sponsorship Your credentials username: trex42 password: littlearms Guest Access Notification via SMS Cisco and/or its affiliates. All rights reserved. Design Easily in Minutes, Deploy Securely in Just Hours Cisco Confidential 14
15 Streamlining BYOD and Enterprise Mobility Reducing the Complexity of Managing BYOD and Device Onboarding Improved Device Recognition Integrated Native Certificate Authority for Devices Desktop & Mobile Ready! Customizable Branded Experiences Easy User Onboarding with Self-Service Device Portals Comprehensive Device Security with Posture and EMM Supports 1M Registered Endpoints and 250K ACTIVE, Concurrent Endpoints Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16 Dynamic Control with Rich Contextual Profiling Simple Identity Simply Isn t Helpful Enough Anymore POOR context awareness à Simple Identity - Who are you? à IP Address RESULT: Any user, Any device, Anywhere gets on the network EXTENSIVE context awareness à RICHER Identity Who? à Bob What? à Tablet Where? à Building 200, 1 st Floor When? à 11:00 AM EST on April 10 th RESULT: The Right user, on Right device, from the Right place is granted the RIGHT ACCESS
17 Increase Device Visibility with Profile Feed Service Reduce Unknown Devices on Networks by 74%, on Average * DEVICE PROFILING FEED SERVICE Get New, Vetted Device Profiles from Cisco & the Community More Accurately Profiled Devices; Faster, More Secure Onboarding Corporate Managed Tablet Cisco and/or its affiliates. All rights reserved. VoIP Office Phone IoT Security Camera Cisco Confidential 17
18 Enterprise Mobility Management Integrations Enforce True Device Compliance for All Mobile Devices Sees unregistered devices on the network? Forces EMM Policy Compliance? Keeps noncompliant devices off network? Sees ALL devices on the network Requires devices to comply with EMM policy Provides guest access to non-emm devices EMM Secures Actual Device SOLUTION ISE + EMM Together Cisco ISE Secures Network Access Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
19 Secure Access with Cisco ISE and TrustSec Who: Doctor What: Laptop Where: Office Confidential Patient Records Internal Employee Intranet Who: Doctor What: ipad Where: Office Internet Who: Guest What: ipad Where: Office ü Acquires Important Context & Identity from the Network ü Monitors & Provides Visibility into Unauthorized Access ü ISE provides Differentiated Access to the network; TrustSec provides Segmentation throughout the network
20 access-list 102 permit udp lt gt 356 access-list 102 deny tcp eq gt 327 access-list 102 permit icmp lt lt 2286 access-list 102 deny tcp eq eq 4191 access-list 102 deny udp lt eq 3721 access-list 102 permit tcp eq eq 3716 access-list 102 permit icmp gt eq 4533 access-list 102 deny tcp lt gt 539 access-list 102 deny ip eq lt 4570 access-list 102 deny ip gt gt 2754 access-list 102 deny icmp lt lt 486 access-list 102 deny udp gt eq 2165 access-list 102 deny udp lt gt 428 access-list 102 permit ip eq gt 1511 access-list 102 deny tcp gt gt 1945 access-list 102 permit icmp lt eq 116 access-list 102 deny udp eq eq 959 access-list 102 deny tcp eq lt 4993 access-list 102 deny tcp eq lt 848 access-list 102 deny ip eq gt 4878 access-list 102 permit icmp lt eq 1216 access-list 102 deny icmp gt gt 1111 access-list 102 deny ip eq eq 4175 access-list 102 permit tcp lt gt 1462 access-list 102 permit tcp gt lt 4384 access-list 102 permit icmp eq eq 878 access-list 102 permit ip gt eq 467 Cisco TrustSec Software-Defined Segmentation Control Access to Resources Based on Business Policies Simplifies Firewall Rule, ACL, VLAN Management Prevents Lateral Movement of Potential Threats Traditional Security Policy Eliminates Costly Network Re-architecture Switch Router VPN & Firewall DC Switch Wireless Controller Cisco and/or its affiliates. All rights reserved. TrustSec Security Policy Segmentation Policy Enforced Across the Extended Network Cisco Confidential 20
21 Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
22 Cisco Platform Exchange Grid (pxgrid) Accelerating Partner Technology Efficiencies via Context Sharing NE W For security, which is more useful information? The compromised device is OR - The compromised device is Paul Russell s ipad in Bldg. 200 Cisco ISE collects contextual big data from multiple sources across the network. Via Cisco pxgrid technology, this contextual data is shared with partners. With ISE contextual data, Partner Solutions can more accurately and more quickly identify, mitigate, and remediate security threats across the network Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
23 Streamline Security Operations with ISE Ecosystem Connect Disparate Solutions and Reduce Threat Response Time NE W Faster Remediation of Threats with SIEM / TD Extension of Access Policy & Compliance with MDM Context-driven OT Policy and Segmentation for IoT Endpoint Vulnerability Remediation Simplified Network Troubleshooting and Forensics SSO Secure Access to Sensitive Data on Mobile Devices Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
24 Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
25 Cisco ISE Success Story Guest Lifecycle Industry: Finance Employees: 1,300 in 75 Branches Their Challenges: Too Many Guests Needing Access Security Risks from Open Guest Accounts Compliance in a BYOD environment Their Results: ü Speedier Guest Network, with Better Profiling ü Improved Compliance and Security ü IT Staff Operational Efficiencies The lack of expiry dates on guest access accounts was always a security threat. Using the Cisco ISE guest portal, we can flexibly and securely create temporary access.
26 Cisco ISE Success Story Campus BYOD Industry: Education Students & Faculty: 13,500+ Their Challenges: Better Control over Devices on Network Providing Consistent Secure Access Scaling to Meet Exploding BYOD Campus Needs Their Results: ü 10% Reduction in IT Troubleshooting ü 100% Network Uptime ü Vastly Improved End-User Experiences Our goal is to get as many people on our network as quickly, securely, and reliably as possible without our involvement. ISE enables us to do that.
27 Cisco ISE Success Story Secure Access Industry: Healthcare Endpoints: 35,000+ Their Challenges: Separating Clinical vs. Consumer Data Segregating Medical Devices, Based on Usage Controlling Compliant Access without Disruption Their Results: ü Granular Access Controls based on Context ü Implemented Port-Level Room Controls ü Comprehensive, Accurate Medical Endpoint Profiling Cisco ISE met our high water mark for use cases with flying colors. We are excited to be working with Cisco as we extend the model to other Sentara Healthcare facilities
28 Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
29 Analysts Recognize Cisco ISE Industry Leadership Analysts Continue to Position Cisco ISE as Market and Technology Leader A LEADER in Gartner Magic Quadrant for NAC - Gartner December 2013, 2012, 2011 A CHAMPION in Info-Tech Vendor Landscape for NAC - Info-Tech Research Group, 2014 Cisco TrustSec and Cisco ISE are consistent with our view of identitycentric end-to-end security that is both needed and lacking in the enterprise today. - Forrester 2011 The Cisco ISE 1.3 is Cisco s most important NAC version since Cisco first offered the ISE 1.0. Perhaps the most exciting part of Cisco ISE 1.3 NAC is the integration with pxgrid... In this generation NAC platform, Cisco wanted to make an easier, more intuitive platform while adding features and functionality. Cisco has gone a long way toward achieving these objectives. Image: Gartner Magic Quadrant for Network Access Control 2013, Lawrence Orans, John Pescatore 12 December Frost & Sullivan, 2014
30 Customers Around the World Trust Cisco ISE Continuing to Drive the Market as the #1 Solution Purchased by 50% of Fortune Global % of Fortune Global 25 Leading Technology Innovation that Drives Industry Standards in the NAC Market and Beyond 600+ ATP Partners 7,000 Customers 36 Million+ Endpoints Licensed
31 Cisco ISE is Core to Cisco Security Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall VPN NGIPS Advanced Malware Protection NGFW UTM Web + Security Network Behavior Analysis NAC + Identity Services pxgrid + ISE Ecosystem ISE Provides Visibility, Context, and Control Across the Entire Continuum
32 Cisco ISE Provides One Policy for Cisco Unified Access ONE NETWORK Integrated Wired and Wireless in ONE Physical Infrastructure, with ONE Operating System & Open APIs CISCO UNIFIED ACCESS ONE MANAGEMENT Single Plane of Glass Management with Cisco Prime ONE POLICY Simplified, Unified Policy Management with Cisco ISE
33 Only Cisco ISE Can Offer Unparalleled Network Visibility Reduce the Complexity of Securing Access Contain Advanced Network Threats Optimize Downstream Security Services Eliminate Unknowns to Get a Clearer Picture of Who & What Is On Your Network Manage Simplified, Unified Access Policy across Wired, Wireless, & VPN Identify Threats and Prevent Lateral Movement Across the Network Share Dynamic Context with Partners to Accelerate their Security Capabilities Cisco ISE is the Key Component to Support Secure Unified Access and Achieve Enterprise Security Objectives.
34
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)
White Paper Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS) By Jon Oltsik, Senior Principal Analyst October 2014 This ESG White
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
How To Improve Your Network Security
Matthias Meier VP Engineering, bw digitronik 2013 ForeScout Technologies, Page 1 2014 ForeScout Technologies, Page 1 Inadequate Visibility Inadequate Collaboration Inadequate Automation 2013 ForeScout
BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR
BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR The IndustrializaBon of Hacking SophisEcated AFacks, Complex Landscape Hacking Becomes an Industry Phishing, Low
Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
Solution Overview Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility What You Will Learn Whether you want to simply allow tablets on your network or transform business processes
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?
Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In? Bruce Alexander Product Specialist- Wireless and Mobility Bret Straffon Product Specialist-Security
Secure Network Access for Personal Mobile Devices
White Paper Secure Network Access for Personal Mobile Devices What You Will Learn People around the globe are enamored with their smartphones and tablet computers, and they feel strongly that they should
Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015
#TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco is All In with Security I expect security
Cisco Cybersecurity Pocket Guide 2015
Cisco Cybersecurity Pocket Guide 2015 Why Security Security investment: A top priority Security: A critical boardroom topic Why Security? Security Investment: A Top Priority Figure 1 How Enterprises View
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Embracing Complete BYOD Security with MDM and NAC
Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP
Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO
Taking Charge with Apps, Policy, Security and More October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO How You Can Achieve BYOD without Compromise Mike Nielsen Senior Director, Security Solutions
Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi
Cisco and Sourcefire AGILE SECURITY : Security for the Real World Stefano Volpi SOURCEfire Worldwide John Chambers statement Security is the TOP issue for Cisco and many of the CIO s in the industry. We
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問
聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 主 講 人 : 廖 國 宏 Jerry Liao 職 稱 : 技 術 顧 問 Each attack instance can be slightly different 攻 擊 模 式 有 些 微 的 不 同 Domains are rotated in days, even hours 攻 擊 主 機 位 置
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Whitepaper. Securing Visitor Access through Network Access Control Technology
Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.
Secure Your Mobile Device Access with Cisco BYOD Solutions
Solution Overview Secure Your Mobile Device Access with Cisco BYOD Solutions BENEFITS The Cisco Meraki solution (cloud managed) and Cisco BYOD Solution (on-premises management) help you secure multiple
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Remote Management Services Portfolio Overview
Enterprise environments today have various technologies and concerns in their network environment; from telephony, Internet, video, compute, and infrastructure, to regulatory and security management. On
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Cisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
BYOD @ Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. [email protected]. Co-Author Bitkom Leitfaden BYOD
BYOD @ Stefan Dürnberger Consulting Systems Engineer Cisco Deutschland [email protected] CCIE Security #16458 Co-Author Bitkom Leitfaden BYOD http://www.bitkom.org/files/documents/20130404_lf_byod_2013_v2.pdf
Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016
Cisco Advanced Malware Protection Ross Shehov Security Virtual Systems Engineer March 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious
Braindumps.700-295.50.QA
Braindumps.700-295.50.QA Number: 700-295 Passing Score: 800 Time Limit: 120 min File Version: 6.0 http://www.gratisexam.com/ Comprehensive, easy and to the point study material made it possible for me
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
An Intelligent Solution for the Mobile Enterprise
An Intelligent Solution for the Mobile Enterprise IntelliGO - An Intelligent Solution for the Mobile Enterprise BYOD and the mobile movement continue to gain momentum fueled by the explosive growth of
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1
C b Th Cyber Threatt Defense D f S Solution l ti Moritz Wenz, Lancope 1 The Threat Landscape is evolving Enterprise Response Antivirus (Host-Based) IDS/IPS (Network Perimeter) Reputation (Global) and Sandboxing
Preparing your network for the mobile onslaught
IBM Global Technology Services Thought Leadership White Paper Preparing your network for the mobile onslaught How networks can overcome the security, delivery challenges posed by mobile devices 2 Preparing
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout
Embracing BYOD with MDM and NAC Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout 1 Today s Agenda The BYOD Landscape Network Access Control (NAC) 101 Embracing BYOD with MDM and NAC Use Cases 2 The BYOD
BYOD(evice) without BYOI(nsecurity)
BYOD(evice) without BYOI(nsecurity) Dan Houser CISSP-ISSAP CISM Goran Avramov MCSE+M VCP4 Cardinal Health Session ID: HOT-107 Session Classification: Intermediate Agenda Drivers for Bring Your Own Device
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives
WHITEPAPER The Emergence of Adaptive Network Security Evolve your network strategy to meet new threats and achieve expanded business imperatives Frank Andrus CTO, Bradford Networks Executive Summary...
Cisco Identity Services Engine
Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations
WHITEPAPER An Adaptive Approach to Network Security Evolve your network security strategy to meet new threats and simplify IT security operations Frank Andrus CTO, Bradford Networks Executive Summary...
Securing BYOD With Network Access Control, a Case Study
Securing BYOD With Network Access Control, a Case Study 29 August 2012 ID:G00226207 Analyst(s): Lawrence Orans VIEW SUMMARY This Case Study highlights how an organization utilized NAC and mobile device
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Cisco Mobile Collaboration Management Service
Cisco Mobile Collaboration Management Service Cisco Collaboration Services Business is increasingly taking place on both personal and company-provided smartphones and tablets. As a result, IT leaders are
Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group
Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Five Steps For Securing The Data Center: Why Traditional Security May Not Work
White Paper Five Steps For Securing The Data Center: Why Traditional Security May Not Work What You Will Learn Data center administrators face a significant challenge: They need to secure the data center
Bring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG ([email protected]) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011
Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected]
Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected] NAC is Here to Enforce identity-based access policies Control who is accessing what Prevent guests
Windows Phone 8.1 in the Enterprise
Windows Phone 8.1 in the Enterprise Version 1.4 MobileIron 415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected] Introduction 3 Why Windows
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
McAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
Mobile Device Strategy
Mobile Device Strategy Technology Experience Bulletin, TEB: 2012-01 Mobile Device Strategy Two years ago, the Administrative Office of Pennsylvania Courts (AOPC) standard mobile phone was the Blackberry.
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Sourcefire Next-Generation IPS
Sourcefire Next-Generation IPS Key NGIPS Capabilities Snort IPS detection engine Network intelligence Impact assessment User identification Automated policy tuning Network behavior analysis Packet-level
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
RSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
HiveManager Client Management
Solution Brief HiveManager Client Management Context-Based Access & Device Controls for a Mobile First Enterprise Introduction BYOD and the Consumerization of IT are changing enterprise networking. Just
SourceFireNext-Generation IPS
D Ů V Ě Ř U J T E S I L N Ý M SourceFireNext-Generation IPS Petr Salač CCNP Security, CCNP, CICSP, CCSI #33835 [email protected] Our Customers Biggest Security Challenges Maintaining security posture
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Simple, scalable and secure unified wired and wireless networking
Simple, scalable and secure unified wired and wireless networking The only Complete BYOD solution Lars Kølendorf Head of Wireless Business HP Networking EMEA Email: [email protected] Copyright 2012 Hewlett-Packard
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Mobile Device Management
Mobile Device Management Complete remote management for company devices Corporate and personal mobile devices (commonly referred to as Bring Your Own Device, or BYOD) must be provisioned, configured, monitored,
What Is Cisco Mobile Workspace Solution?
Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
