Cisco TrustSec for PCI Scope Reduction Verizon Assessment and Validation
|
|
|
- Lee Stevens
- 10 years ago
- Views:
Transcription
1 Cisco TrustSec for PCI Scope Reduction Verizon Assessment and Validation
2 CONTENTS Overview 3 Legacy Segmentation Challenges 3 TrustSec Security Group Tagging 3 Benefits of Segmentation with TrustSec 4 Verizon Validation Overview 4 Use Case 1 PCI Scope Reduction with Security Group Tags (Wired Network) 5 Description 5 Use Case 2 PCI Scope Reduction with Security Group Tags (Wireless Network) 6 Description 6 Use Case 3 PCI Scope Reduction with Security Group Tags (Across Networks) 7 Description 7 Verizon Validation Summary 9 Cisco Components to Support TrustSec 12 For More Information 14 Cisco TrustSec for PCI Scope Reduction--Verizon Assessment and Validation 2
3 Overview Cisco TrustSec Security Group Tagging (SGT) technology dramatically simplifies PCI compliance. Cisco s innovation transforms segmentation and offers a more intuitive business-level approach on how it is designed, enforced, and managed. The Qualified Security Assessors and Penetration Testers at Verizon have performed an assessment of Cisco Security Group Tagging within Cisco s laboratories; Verizon has validated that Cisco Security Group Tagging can be used to reduce the scope for PCI and simplify the management of segmentation. Legacy Segmentation Challenges Network segmentation isolates particular groups of users and computers into logical segments on a network to allow security enforcement points to permit or deny traffic between those groups. Traditionally, this discrete separation uses access controls based on network addressing, VLANs, and firewalls. Companies are then able to apply controls on how traffic flows are permitted between these groups to meet compliance targets. The benefit is that the network area separated from the PCI environment is no longer within the scope of PCI compliance, reducing the cost of managing and sustaining compliance across an environment. Unfortunately, this method of segmentation can be difficult and time-consuming to manage: For some industries such as healthcare and retail, the activity of implementing a separate PCI network from their current flat network can be a daunting task because of the scale and complexity of their organizations, and its associated cost. Access control lists and firewall rules based on IP addresses tend to grow and become hard to audit as more applications are introduced. Management of the segmentation policies is manual, with the risk of rules being misconfigured; each branch office needs to be identified individually because each site has its own addressing scheme, making policy management for those branch offices tedious and sometimes difficult. TrustSec Security Group Tagging Organizations frequently have simple business goals that they want their security architecture to facilitate; for example, they may want only traders to access trading systems, or only doctors to access patient records. However, when these policies are implemented, they traditionally need to be translated into network security rules that define users and servers by their IP addresses, subnet, or site. The Corporate Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA USA Copyright 2014 Cisco Systems, Inc. All rights reserved
4 Verizon Validation Overview resulting rules are no longer simple to understand and may not clearly correlate with the original business goals. They also do not account for user, device, or server roles, leading to some complexity in how protected assets are classified, and are at risk of misconfiguration. Cisco TrustSec simplifies the provisioning and management of secure access to network services and applications. Compared to access control mechanisms based on network topology, Cisco TrustSec defines policies using logical policy groupings, so that secure access is consistently maintained even as resources are moved. De-coupling access policy from IP addresses and VLANs simplifies security policy maintenance tasks, lowers operational costs, and allows common access policies to be applied to wired, wireless, and VPN access consistently. Benefits of Segmentation with TrustSec Security Group Tagging transforms segmentation by simplifying administration: Security group tags allow organizations to segment their networks without having to redesign to accommodate more VLANs and subnets. Firewall rules are dramatically streamlined by using an intuitive business-level profile method. Policy enforcement is automated, assisting compliance and increasing security efficacy. Security auditing becomes much easier, as Qualified Security Assessors can more easily validate that rules are being enforced to meet compliance. Verizon Validation Overview Verizon QSA assessors were invited into Cisco s laboratories to evaluate the effectiveness of TrustSec Security Group Tagging for the purposes of reducing PCI scope. Verizon performed and observed a series of tests, including network penetration testing for evaluating network segmentation. Based on assessment and observations, Verizon concludes that TrustSec Security Group Tagging meets the intent of segmentation, as required by the Payment Card Industry Data Security Standard (PCI DSS), for purposes of PCI scope reduction and restricting access to cardholder data, above and beyond that required by PCI DSS requirements. Note It is important to note that all three use cases described subsequently use the same policy, demonstrating how easily segmentation can be consistently managed. Figure 1 shows the Cisco TrustSec policy. Figure 1 Cisco TrustSec Policy Destination PCI Devices Non-PCI Devices Source PCI Devices Permit DENY Non-PCI Devices DENY Permit
5 Verizon Validation Overview The following three use cases were used for testing the efficacy of TrustSec security group tags for PCI scope reduction. Use Case 1 PCI Scope Reduction with Security Group Tags (Wired Network) Description All devices are connected to the same subnet (VLAN 10). The POS register and the POS server are classified into PCI security groups and are assigned the relevant security group tags. The workstation has no security group tag assigned. The register can communicate with the server and the data center but no communication can be established with the workstation. The workstation can communicate to the data center but communication is denied with the register or POS server. Figure 2 shows a diagram of Use Case 1. Figure 2 Use Case 1 PCI Scope Reduction with Security Group Tags (Wired Network) WAN to Data Center PCI POS Server PCI Non-PCI Register Workstation Segmentation Enforcement PCI Scope: All devices in same VLAN
6 Verizon Validation Overview Use Case 2 PCI Scope Reduction with Security Group Tags (Wireless Network) Description All devices are connected to the same subnet (VLAN 10). All wireless devices are associated to the same SSID. The mobile register and server are classified in PCI security groups and assigned relevant security group tags. The mobile workstation has no security group tag. The mobile register can communicate with the server and the data center. The workstation can communicate to the data center but not to the register or the server. Figure 3 shows a diagram of Use Case 2. Figure 3 Use Case 2 PCI Scope Reduction with Security Group Tags (Wireless Network) WAN to Data Center PCI POS Server PCI Non-PCI Register Workstation Segmentation Enforcement PCI Scope: All devices in same VLAN and SSID
7 Verizon Validation Overview Use Case 3 PCI Scope Reduction with Security Group Tags (Across Networks) Description This use case demonstrates effective segmentation across networks. The register in the branch and the PCI server in the data center are both assigned PCI security group tags. The workstation in the branch and the non-pci server in the data center do not use security group tags. Classification information (security group tags and associated device information) are shared between branch office and data center The register and the PCI server can communicate to each other but not to the workstation or the non-pci server. The workstation and the non-pci server can communicate to each other but not to the register or the PCI server. Figure 4 shows a diagram of Use Case 3. 7
8 Verizon Validation Overview Figure 4 Use Case 3 PCI Scope Reduction with Security Group Tags (Across Networks) Data Center PCI Server Generic Server PCI Non-PCI Data Center Network WAN Branch PCI Non-PCI Register Workstation Segmentation Enforcement PCI Scope: Segmentation Across Company
9 Verizon Validation Summary Verizon Validation Summary 9
10 Verizon Validation Summary 10
11 Verizon Validation Summary 11
12 Cisco Components to Support TrustSec Cisco Components to Support TrustSec Table 1 lists the Cisco components that have TrustSec capabilities. Table 1 Cisco Components with TrustSec Capabilities Type Platform Function Version Policy server Cisco ISE 3315, 3395, 3415, 3495, and VMware Campus switches Data center switches Cisco Catalyst 2960-S, 2960-X/XR Cisco Catalyst 3560-E&C/3750-E Cisco Catalyst 3560-X/3750-X Cisco Catalyst 3650/3850 Cisco Catalyst 4500 Sup7-E/7L-E Cisco Catalyst 4500 Sup6-E /6L-E Cisco Catalyst 6500 Sup2T Cisco Catalyst 6500 Sup720/Sup32 Cisco Nexus 5500/Nexus 2000 Cisco Nexus 7000/Nexus 2000 Cisco Nexus 1000v for VMware ESXi Policy server for TrustSec classification and policy creation/provisioning (SXP only) (SXP only) (SXP, inline SGT), enforcement (SG-ACL) (SXP, inline SGT), enforcement (SG-ACL) (SXP, inline SGT), enforcement (SG-ACL) (SXP only) (SXP, inline SGT), enforcement (SG-ACL) (SXP only) Classification (port, port profile), propagation (inline SGT), enforcement (SG-ACL) (SXP, inline SGT), enforcement (SG-ACL) Classification (port profile), propagation (SXP only) Version 1.2 Patch 1 IOS 15.0(2)SE or IOS 15.0(2)EX4 IOS 15.0(2)SE5 IOS15.2(1)E IOS-XE 3.3.0SE IOS-XE 3.4.2SG IOS 15.2(1)E IOS 15.1(2)SY 12.2(33)SXJ6 NX-OS 5.1(3)N2(1c) NX-OS 6.2(2) NX-OS 4.2(1)SV2(1.1) 12
13 Cisco Components to Support TrustSec Table 1 Cisco Components with TrustSec Capabilities (continued) Routers Cisco ISRG2 C800, C1900, C2900, C3900 Cisco ISR 4451X Cisco ASR1000 Wireless Cisco WLC 5500, 2500, WiSM2, WLCM2 Cisco WLC 5760 Classification (static IP-SGT), propagation (SXPv4), enforcement (zone-based SG firewall) Classification (static IP-SGT), propagation (SXPv4), enforcement (zone-based SG firewall) Classification (static IP-SGT), propagation (SXPv4, SGT over GETVPN), enforcement (zone-based SG firewall) (SXP only) (SXP, inline SGT), enforcement (SG-ACL) Firewall Cisco ASA5500 Propagation (SXP only), enforcement (SG firewall) Cisco Connected Grid devices Cisco CGR2010 Classification (static IP-SGT), transport (SXPv4), enforcement (zone-based SG firewall) IOS 15.4(1)T IOS-XE 3.11S IOS-XE 3.11S AireOS 7.4 IOS-XE 3.3.0SE Version 9.1 IOS 15.3(2)T Management Cisco Security Manager ASA SG-FW management CSM4.4 13
14 For More Information For More Information For more Cisco PCI compliance information, see the following URL: For more Cisco TrustSec information, see the following URL: 14
Network as an Sensor & Enforcer
Network as an Sensor & Enforcer Leveraging the network to control threats Jaromír Pilař [email protected] May, 2016 Agenda Overview of Network as a Sensor and Enforcer Network as a Sensor Network as an
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, [email protected] Vedran Hafner, Systems Engineer, vehafner@cisco.
Intelligent WAN 2.0 principles Pero Gvozdenica, Systems Engineer, [email protected] Vedran Hafner, Systems Engineer, [email protected] Then VS Now Intelligent WAN: Leveraging the Any Transport
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Cisco Application Policy Infrastructure Controller Enterprise Module (Cisco APIC-EM)
TM Cisco Application Policy Infrastructure Controller Enterprise Module (Cisco APIC-EM) Early Field Trial #2 Release Notes Version 0.7.1.3 Corporate Headquarters Cisco 170 West Tasman Drive San Jose, CA
What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1
What s New in PCI DSS 2.0 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 Agenda PCI Overview PCI 2.0 Changes PCI Advanced Technology Update PCI Solutions 2010 Cisco and/or
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats
Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats Dragan Novaković Consulting Systems Engineer Security November 2015. New Networks Mean New Security Challenges
Cisco IOS Firewall. Scenarios
Cisco IOS Firewall Common Deployment Scenarios http://www.cisco.com/go/iosfirewall com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 Cisco IOS Firewall Feature Overview
Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance
White Paper Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance What You Will Learn The Cisco Medical-Grade Network (MGN) 1 provides a network foundation that enables reliable, transparent,
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
Enforcing PCI Data Security Standard Compliance
Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The
Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Cisco License Manager 3.1
Product Bulletin Cisco License Manager 3.1 Last Updated: May 2011 Cisco announces Cisco License Manager 3.1 for managing Cisco IOS Software activation and license management for a wide range of Cisco platforms
Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led
Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led Course Description Implementing and Configuring Cisco Identity Services Engine (SISE) v1.3 is a 5-day ILT training
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments
Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop
White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization
Palo Alto Networks AAC Lab Creation Guidelines v1.0
Palo Alto Networks AAC Lab Creation Guidelines v1.0 Contact Information Corporate Headquarters: Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 http://www.paloaltonetworks.com/ About this Guide
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Implementation of Virtual Local Area Network using network simulator
1060 Implementation of Virtual Local Area Network using network simulator Sarah Yahia Ali Department of Computer Engineering Techniques, Dijlah University College, Iraq ABSTRACT Large corporate environments,
Cisco Passguide 648-385 Exam Questions & Answers
Cisco Passguide 648-385 Exam Questions & Answers Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 34.1 http://www.gratisexam.com/ Cisco 648-385 Exam Questions & Answers Exam Name: CXFF
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
VERIFONE ENHANCED ZONE ROUTER
VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement
How to Dramatically Reduce the Cost and Complexity of PCI Compliance
How to Dramatically Reduce the Cost and Complexity of PCI Compliance Using Network Segmentation and Policy-Based Control Over Applications, Users And Content to Protect Cardholder Data December 2008 Palo
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
How To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
White Paper 230-1040-001. Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012
Nomadix Service Engine Enterprise Guest Access Application Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012 30851 Agoura Road Suite 102 Agoura Hills, CA 91301 USA www.nomadix.com
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
Cisco Secure BYOD Solution
Q&A Cisco Secure BYOD Solution What Is New? Q. What is new from security to take organizations beyond BYOD? A. Cisco is announcing a solution that goes beyond BYOD in enabling you to securely deliver bring-your-owndevice
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support
Product Bulletin Cisco IOS Software Release 15.0(1)SY1 New Features and Hardware Support PB696622 Cisco IOS Software Release 15.0(1)SY1 supports Cisco Catalyst 6500 Series Supervisor Engine 2T only. Release
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications
Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications What You Will Learn This whitepaper describes how to meet the Payment Card Industry Data Security Standard (PCI DSS) for
IP Addressing and VLAN Numbering A Secant Standards White Paper
IP Addressing and VLAN Numbering A Secant Standards White Paper Publication No.:100 Version: 11/28/11 ABOU SANDARDS Secant is pleased to publicly release several key technology standards for reference
White Paper. Juniper Networks. Enabling Businesses to Deploy Virtualized Data Center Environments. Copyright 2013, Juniper Networks, Inc.
White Paper Juniper Networks Solutions for VMware NSX Enabling Businesses to Deploy Virtualized Data Center Environments Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools
WHATSUP GOLD BUYER S GUIDE Buyer s Guide to Automated Layer 2 Discovery & Mapping Tools 4 Critical Components of Successful Layer 2 Discovery INTRODUCTION TO AUTOMATIC LAYER 2 DISCOVERY & MAPPING Layer
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Cisco IOS Advanced Firewall
Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security
Bring Your Own Device
Bring Your Own Device Cisco Values in BYOD Eric NG ([email protected]) Technical Solution Architect Enterprise Networking Group, Greater China 2011 Cisco and/or its affiliates. All rights reserved. Cisco
Securing Web Applications...at the Network Layer
Securing Web Applications......at the Network Layer OWASP Spain Chapter Meeting 16 th June, 2006 Barcelona (ES) Carlos Fragoso Mariscal Chief Technical Director [email protected] Securing Web Applications
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
Windows Server 2012 Hyper-V Extensible Switch and Cisco Nexus 1000V Series Switches
Windows Server 2012 Hyper-V Extensible Switch and Cisco Nexus 1000V Series Switches Streamlining Virtual Networks in the Data Center A Microsoft/Cisco White Paper May 2012 Windows Server 2012 Hyper-V Extensible
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre
Unlock the full potential of data centre virtualisation with micro-segmentation Making software-defined security (SDS) work for your data centre Contents 1 Making software-defined security (SDS) work for
Itex VMware NSX Network Virtualization Presentation
Itex VMware NSX Network Virtualization Presentation Gabriel Maciel VCP3, VCP4/5-DCV, Security+, Project+ Sr. Systems Engineer Canadian Federal Government @gmaciel_ca 2014 VMware Inc. All rights reserved.
Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader
Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader Cisco Support Community Expert Series Webcast Today s featured expert is Cisco Technical Leader Ask him questions
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A
Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Request for Proposals (RFP) for PCI DSS COMPLIANCE SERVICES Project # 15-49-9999-016 Addendum #1 - Q&A May 29,
Cisco Actualtests 642-584 Exam Questions & Answers
Cisco Actualtests 642-584 Exam Questions & Answers Number: 642-584 Passing Score: 800 Time Limit: 120 min File Version: 33.4 http://www.gratisexam.com/ Cisco 642-584 Exam Questions & Answers Exam Name:
Cisco Configuration Assistant
Cisco Configuration Assistant Configuring Your Business Entire Routing, Switching, Wireless, Security and Voice Network with a Single, Easy-to-Use Tool Today s businesses depend on network-based applications
SURF Feed Connection Guide
SURF Feed Connection Guide Tullett Prebon Information Ltd A wholly owned subsidiary of Tullett Prebon Version 6.0 3 rd August 2005 Contents 1. Introduction...3 1.1 General...3 2. Connectivity via the Internet...4
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
Networking Basics for Automation Engineers
Networking Basics for Automation Engineers Page 1 of 10 mac-solutions.co.uk v1.0 Oct 2014 1. What is Transmission Control Protocol/Internet Protocol (TCP/IP)------------------------------------------------------------
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Application Note Secure Enterprise Guest Access August 2004
Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
The Policy Governed Network
White Paper The Policy Governed Network A New Enterprise Architecture for Delivering Policy-Based Services What You Will Learn This document discusses the need for a policy-based architecture in today
Cisco-Citrix Alliance
Cisco-Citrix Alliance Mobile Workstyles Cisco- Citrix Cloud Networking Cloud Services Agenda Partnership overview Joint Solution areas Netscaler review 2 The Internet of Everything Amazing Things Happen
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
IWAN Security for Remote Site Direct Internet Access and Guest Wireless
IWAN Security for Remote Site Direct Internet Access and Guest Wireless Technology Design Guide (ISR4K) March 2015 Table of Contents Preface...1 CVD Navigator...2 Use Cases... 2 Scope... 2 Proficiency...
Router Throughput Tests
Lab Testing Summary Report June 2013 Report 130605 Key findings and conclusions: Cisco 4451-X ISR branch office router, with advanced features enabled, demonstrated 1 GB and 2 GB capacity as advertised
Palo Alto Networks. Security Models in the Software Defined Data Center
Palo Alto Networks Security Models in the Software Defined Data Center Christer Swartz Palo Alto Networks CCIE #2894 Network Overlay Boundaries & Security Traditionally, all Network Overlay or Tunneling
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY
CHAPTER 6 DESIGNING A NETWORK TOPOLOGY Expected Outcomes Able to identify terminology that will help student discuss technical goals with customer. Able to introduce a checklist that can be used to determine
Simplify VMware vsphere* 4 Networking with Intel Ethernet 10 Gigabit Server Adapters
WHITE PAPER Intel Ethernet 10 Gigabit Server Adapters vsphere* 4 Simplify vsphere* 4 Networking with Intel Ethernet 10 Gigabit Server Adapters Today s Intel Ethernet 10 Gigabit Server Adapters can greatly
