Similar documents

1.- L a m e j o r o p c ió n e s c l o na r e l d i s co ( s e e x p li c a r á d es p u é s ).

H ig h L e v e l O v e r v iew. S te p h a n M a rt in. S e n io r S y s te m A rc h i te ct




ACE-1/onearm #show service-policy client-vips

SCO TT G LEA SO N D EM O Z G EB R E-












PSTN. Gateway. Switch. Supervisor PC. Ethernet LAN. IPCC Express SERVER. CallManager. IP Phone. IP Phone. Cust- DB

Put the human back in Human Resources.



EM EA. D is trib u te d D e n ia l O f S e rv ic e

Campus Sustainability Assessment and Related Literature

i n g S e c u r it y 3 1B# ; u r w e b a p p li c a tio n s f r o m ha c ke r s w ith t his å ] í d : L : g u id e Scanned by CamScanner

Practice Writing the Letter A


proxy cert request dn, cert, Pkey, VOMS cred. (short lifetime) certificate: dn, ca, Pkey mod_ssl pre-process: parameters->




3 k t h R e m e A c c e s s b t t t V T T c h t h p V T. Cl ic e ot rad io ut on nex o PN unnel yp e and oose e ap rop riat e PN unnel Int erfac e. 4.



M P L S /V P N S e c u rity , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.


I n la n d N a v ig a t io n a co n t r ib u t io n t o eco n o m y su st a i n a b i l i t y






AN EVALUATION OF SHORT TERM TREATMENT PROGRAM FOR PERSONS DRIVING UNDER THE INFLUENCE OF ALCOHOL P. A. V a le s, Ph.D.



B a rn e y W a r f. U r b a n S tu d ie s, V o l. 3 2, N o. 2, ±3 7 8

Understanding, Modelling and Improving the Software Process. Ian Sommerville 1995 Software Engineering, 5th edition. Chapter 31 Slide 1

<?xml version="1.0" encoding="utf-8"?> <soapenv:envelope xmlns:soapenv="

Using Predictive Modeling to Reduce Claims Losses in Auto Physical Damage

GENERAL INFORMAT ION:

Overview of Spellings on




w ith In fla m m a to r y B o w e l D ise a se. G a s tro in te s tin a l C lin ic, , K a s h iw a z a, A g e o C ity, S a ita m a

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

CUSTOMER INFORMATION SECURITY AWARENESS TRAINING

W h a t is m e tro e th e rn e t


Voxeo CXP Analyzer Report Samples


How To Know If You Are A Good Or Bad Person

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování


B R T S y s te m in S e o u l a n d In te g r a te d e -T ic k e tin g S y s te m






CIS CO S Y S T E M S. G u ille rm o A g u irre, Cis c o Ch ile , C is c o S y s te m s, In c. A ll rig h ts re s e rv e d.

Software Quality Requirements and Evaluation, the ISO Series

A n d r e w S P o m e r a n tz, M D

How To Be A Successful Thai


R e t r o f i t o f t C i r u n i s g e C o n t r o l

PRESENTATION FOR SWERN


UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Workload Management Services. Data Management Services. Networking. Information Service. Fabric Management

Printing Letters Correctly

d e f i n i c j i p o s t a w y, z w i z a n e j e s t t o m. i n. z t y m, i p o jі c i e t o


BMC ITSM Suite - nabité skúsenosťami. Juraj Izák,

Open Source Software Open Standards

ASCENT TM Integrated Shipment Management

U S B Pay m e n t P r o c e s s i n g TM

T c k D E GR EN S. R a p p o r t M o d u le Aa n g e m a a k t o p 19 /09 /2007 o m 09 :29 u u r BJB M /V. ja a r.

MyOWNMcMaster Degree Pathway: Diploma in Business Administration & Bachelor of Arts in History

Requirements The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

The MyOWNMcMaster degree pathway has three parts: diploma, elective and undergraduate courses.

9 Summary of California Law (10th), Partnership

Beyond Privatization: Lessons From the Upper Midwestern United States and the Canadian Province of Ontario


CREATE SHAPE VISUALIZE

Bewährte Six Sigma Tools in der Praxis

MS IN EARLY CHILDHOOD STUDIES

SEATTLE CENTRAL COMMUNITY COLLEGE DIVISION OF SCIENCE AND MATHEMATICS. Oxidation-Reduction

Transcription:

Cisco Self-D efen d in g N et w Adaptive Threat Defense or k Latest Product Announcements 1

N ew Secu r it y Ch a llen g es E d g e F i r e w a l l i n g I n t r u s i o n & W o r m M i t i g a t i o n I n t e r n a l F i r e w a l l i n g a n d D e p a r t m e n t S e p a r a t i o n Vi r u s, & W o r m M i t i g a t i o n? S p y w a r e? VPN L o c a t i o n o r U s e r - b a s e d Po l i c i e s? VPN Access B l e n d e d T h r e a t s? A p p l i c a t i o n & Po r t 8 0 M i s u s e? D e n i a l o f S e r v i c e? T r o j a n s? R e m o t e A c c e s s a n d E x t r a n e t C o n t e n t M a n a g e m e n t Evolution of Threats 2

QQ Adaptive Threat Defense in Action Access Control, PP aa ck et I I nsp ecti on Ap p p li li ca ti ti on I I ntelli g g ence, Content I I nsp ecti on, V V i i ru ru s M M i i ti ti g g a a ti ti on I I d d enti ty ty, V V i i rtu a a li li z z a a ti ti on, Q Q os S S eg m m enta ti ti on, T T ra ra f f f f i i c V V i i si b b i i li li ty ty Ap p p I I nsp ecti on, U U se EE nf orcem ent, W W eb Control Application Security M M a a lw lw a a re/ Content D D ef ense, Anom aa ly ly D D etecti on Anti-X DD ef ens es T T ra ra f f f f i i c/ Ad m m i i ssi on Control, PP roa cti vv e R R esp onse CC ontainm ent && CC ontrol CC ii ss cc o o RR oo uu tt ee r r VPN CC SS AA CC ii ss cc o o DD DD oo SS CC aa tt aa ll yy ss tt VPN Access CC ii ss cc o o RR oo uu tt ee r r CC aa tt aa ll yy ss t t PI XX II dd ee nn tt ii tt yy -B aa ss ee dd Ne tt ww oo rr kk ii nn gg NA CC CC SS AA uu aa rr aa nn tt ii nn e e VL AA N CC ii ss cc o o II PS CC SS AA 3

OO Q O M OO OO S W I nteg rated S ec u rity I n Ac tio n: O utb reak Prev enti on E l ements Identify AA no mm aa ll oo uu ss BB eh aa vv io rr ( N A C ), A V, C S A N A C, A V C S A Identify aa nd PP rr ev ent uu tb rr ea kk ss PP er im eter PP rr oo tec tio n fo r r bb rr aa nc h h aa gg aa ins t ww oo rr mm s s,, vv ir uu ss es,, etc.. vv ia IO S S FF W W // IP SS C is c o IS R PP rr ev ent OO uu tb rr ea k k Intr oo du cc tio n aa nd PP rr oo pp aa gg aa tio n C i sco C l ea n Pi p e f f er ed T h r o u g h a n a g ed S ecu r i t y Pr o v i d er Service Provider N et w ork EE rr cc OO uu rr k k CC oo oo ll uu aa rr aa R P mm // aa cc cc ss nfo e tb ea ntr Q ntine R em edia te P er it deny es PP rr ev ent uu tb rr ea k k Intr oo du cc tio n && PP rr oo pp aa gg aa tio n C is c o IS R Identify aa nd CC oo nta in uu tb rr ea kk ss EE ns uu rr e SS ec uu rr ity CC oo mm pp ll ia nc e BB efo rr e AA ll ll oo ww ing Inter net BB rr oo ww ss ing C is c o P IX C is c o 4 2 0 0 IP S S ens o r N A C, A V C S A CC oo mm pp ll aa NN oo C oo mm pp ll EE oo Identify ia nt nd n-cn ia nt ndp ints Cisco A cce ss Con t r ol S e r v e r C is c o C a ta l ys t 6 5 0 0 PP rr ev ent SS er vv er - bb aa ss ed Infec tio n C o ntent E ng ine 3 r d P a r t y P ol icy S e r v e r Cisco W V M N on - R e sp on siv e A sse ssm e n t S e r v e r C S A or k s e b S e r v e r s E m a i l S e r v e r s D N S S e r v e r s HH oo ss t PP rr oo tec tio n 4

mm P ro du c t Anno u nc em ents S u m m ary PP rod uu cts I P S 5. 0 V P N 3 0 0 0 Concentra tor 4. 7 I O S 1 2. 3 ( 1 4 ) T P I X 7. 0 Ci sco S ecu ri ty Ag ent 4. 5 Ca ta ly st D D os M od u les Ap pp li ca ti on SS ecu ri ty MM uu ll tt ii -Ve cc tt oo r r TT hh rr ee aa tt II dd ee nn tt ii ff ii cc aa tt ii oo nn SS SS L L VPN TT uu nn nn ee l l CC ll ii ee nn tt FF uu ll ll y y CC ll ii ee nn tt ll ee ss s s CC ii tt rr ii xx AA pp pp ll ii cc aa tt ii oo n n II nn ss pp ee cc tt ii oo n n // CC oo nn tt rr oo l l ff oo r r II OO S S FF ii rr ee ww aa ll ll AA pp pp ll ii cc aa tt ii oo n n II nn ss pp ee cc tt ii oo n n // CC oo nn tt rr oo l l ff oo r r FF ii rr ee ww aa ll ll EE nn hh aa nn cc ee d d Vo II P SS ee cc uu rr ii tt yy Anti -X Conta ii nm ent && Control MM aa ll ww aa rr e e,, vv ii rr uu s s,, ww oo rr m m ii tt ii gg aa tt ii oo nn CC ii ss cc o o SS ee cc uu rr e e DD ee ss kk tt oo pp EE nn hh aa nn cc ee d d II nn -L ii nn e e II PS AA nn oo mm aa ll y y GG uu aa rr d d MM oo dd uu ll ee TT rr aa ff ff ii c c AA nn oo mm aa ll y y DD ee tt ee cc tt oo r r AA cc cc uu rr aa tt e e Pr ee vv ee nn tt ii oo n n TT ee cc hh nn oo ll oo gg ii ee s s ff oo r r II nn -L ii nn e e II PS CC ii ss cc o o NA CC Ne tt ww oo rr k k FF oo uu nn dd aa tt ii oo n n Pr oo tt ee cc tt ii oo n n,, Vi rr tt uu aa l l FF ii rr ee ww aa ll l l,, II PS ee c c Vi rr tt uu aa l l II nn tt ee rr ff aa cc ee Vi rr tt uu aa l l ff ii rr ee ww aa ll l l,, QQ oo S S,, tt rr aa nn ss pp aa rr ee nn t t ff ii rr ee ww aa ll l l,, II Pv 66 SS pp yy ww aa rr ee mm ii tt ii gg aa tt ii oo nn CC oo nn tt ee xx tt -b aa ss ee d d pp oo ll ii cc ii ee ss SS yy ss tt ee m m ii nn vv ee nn tt oo rr y y // aa uu dd ii tt ii nn gg Ci sco M AR S EE vv ee nn t t cc oo rr rr ee ll aa tt ii oo n n ff oo r r pp rr oo aa cc tt ii vv e e rr ee ss pp oo nn ss ee Ci sco S ecu ri ty Au d i tor Ne tt ww oo rr kk -w ii dd e e ss ee cc uu rr ii tt y y pp oo ll ii cc y y aa uu dd ii tt ii nn g g 5

P ro du c t Anno u nc em ents IPS 5.0 V PN 3 000 4.7 IO S 1 2.3 ( 1 4 ) T PIX 7.0 C i s c o Se c u r i t y A g e n t ( C SA ) 4.5 C a t a l y s t D D o S M o d u l e Se c u r i t y M a n a g e m e n t - M A R S 6

B C isc o V P N 3 0 0 0 C o nc entrato r Setting the Standard in Remote Access VPNs PRICE Integrated IPSec and SSL VPN solution D y nam ic load b alancing and dev ice clustering F lex ib le user auth entication m eth ods Integrated w eb -b ased m anagem ent Num erous industry aw ards V P N 3 0 3 0 or 3 0 6 0 Clu sters N x 5 0 0 = 10 0 0 s o f S S L VPN S e s s i o n s V P N 3 0 3 0 5 0 0 S S L VPN S e s s i o n s V P N 3 0 0 5 5 0 S S L VPN S e s s i o n s V P N 3 0 2 0 20 0 S S L VPN S e s s i o n s SO HH OO RR OO BB OO SM B EE NN TT EE RR PP RR II SE F U N CT I O N AL I T Y 7

C u stom iz ab l e Appl ication Access AA ll l l SS SS L L VPN FF ee aa tt uu rr ee ss II nn cc ll uu dd ee d d ii n n BB aa ss e e Pr ii cc ii nn g g No SS pp ee cc ii aa l l LL ii cc ee nn ss ee s s!! Deployment Examples: Extend i ng A ppr opr i ate C onnec ti v i ty Ap p p SS ec CC CCom is co pany-m SSL anag VV PP N N ed TT unneling DD es kk top: CC lient CC PPontrolled ers is tent, ss of L tw AN are -lik env e ironm netw ork ent ed connectiv ity KK Acces now n s ss s ecurity to vv irtually pos ture any && application ss ys tem priv ileg es DD UUiv tiliz ers es application ss mm all, dd ynam req ically uirem load ents ed client PP Bos B es t-s t es option ss fclean-up f or bb road optional application acces ss L AN -lik e rem ote connectiv ity dd es ired HH CCom lientles e/ KK ios s s k k,, WWAcces eb -B s s as :: ed Acces ss UU RRncontrolled ev ers e prox env y f ironm irew alled ent - ss connection upport is ss ues UU Acces nk now s s n to ss ecurity ww eb -b as pos ed ture applications && ss ys tem and priv CCileg itrix es LL im NN o ited ss of tw application are dd ow nload acces ed s s allow ed PP os BB es ture t option as ss es ff sor s mm lim ent, ited pos ww t-s eb es application ss ion clean-up acces req s s uired and CC unm us tom anag iz ed ed acces dd kk s s tops portal of ten dd es irab le PP artner TT hh in CC Acces lient PP s s ort :: FF orw ard ing UU ncontrolled RR ev ers e prox env y f ironm irew alled ent - ss upport connection is ss ues UU nk Acces now s s n to ss ecurity ww eb,, em pos ail, ture calend && ss ys ar, tem II M M and priv ileg mm any es oth er VV ery TT CC P P gg ranular applications acces s s controls PP os Sm ture all JJ as av ss a es applet ss mm ent, dd ynam pos t-s ically es ss ion load clean-up ed req uired CC us BB es tom t option iz ed acces ff or lim s s portal ited ww eb of ten and dd es client/ irab le s s erv er applications and unm anag ed dd es kk tops 8

M S ec u rity C hal l eng es S S L V P N B r i ng s N ew P oi nts of A ttac k Anti -X BB ef ore SS SS L L VV PP N N SS essi on WW hh o ow ns th e end pp oi nt? EE nd pp oi nt secu ri ty pp ostu re: AV, pp ersona l ff ii rew aa ll? II s mm aa lw aa re ru nni ng?? DD uu ri ng SS SS L L VV PP N N SS essi on II s sessi on dd aa ta pp rotected?? pp pp aa pp?? Are ty ed ssw ord s rotected HH aa s mm aa lw aa re la uu nch ed?? Af ter SS SS L L VV PP N N SS essi on BB row ser ca ch ed ii ntra net ww eb pp aa gg es? BB row ser stored pp aa ssw ord s? DD ow nloa dd ed ff ii les lef t bb eh ii nd?? SS uu pp pp ll y y Pa rr tt nn ee rr E x t r a n e t D e v i c e EE mm pp ll oo yy ee e e aa t t HH oo mm ee U n m a n a g e d D e v i c e RR ee mm oo tt e e UU ss ee rr C u s t o m e r a n a g e d D e v i c e 9

M m C isc o S ec u re Desk to p C omp rehensiv e E ndp oint Secu rity f or SSL VPN Anti -X Com pp lete PP re-connect Assessm ent: LL oo cc aa tt ii oo n n aa ss ss ee ss ss mm ee nn t t m aa nn aa gg ee d d oo r r uu nn mm aa nn aa gg ee d d dd ee ss kk tt oo p p? SS ee cc uu rr ii tt y y pp oo ss tt uu rr e e aa ss ss ee ss ss mm ee nn t t AA V oo pp ee rr aa tt ii oo nn aa l l // uu pp -t t oo -d d aa tt e e,, pp ee rr ss oo nn aa l l ff ii rr ee ww aa ll l l oo pp ee rr aa tt ii oo nn aa l l,, mm aa ll ww aa rr ee pp rr ee ss ee nn t t? W in d ow s 2 0 0 0 or X P Cisco Secure Desktop Com pp reh ensi vv e SS essi on PP rotecti on: DD aa tt a a ss aa nn dd bb oo x x aa nn d d ee nn cc rr yy pp tt ii oo n n pp rr oo tt ee cc tt s s ee vv ee rr y y aa ss pp ee cc t t oo f f ss ee ss ss ii oo nn MM aa ll ww aa rr ee dd ee tt ee cc tt ii oo n n ww ii tt h h hh oo oo kk s s tt o o M ii cc rr oo ss oo ff t t ff rr ee e e aa nn tt ii -s s pp yy ww aa rr ee ss oo ff tt ww aa rr ee O rig in a l U ser Desktop T em pora ry CSD Desktop PP ost-s S essi on Clea n-un U p p :: EE nn cc rr yy pp tt ee d d pp aa rr tt ii tt ii oo n n oo vv ee rr ww rr ii tt e e (( nn oo t t jj uu ss t t dd ee ll ee tt ii oo n n )) uu ss ii nn g g DD oo DD aa ll gg oo rr ii tt hh mm CC aa cc hh e e,, hh ii ss tt oo rr y y aa nn d d cc oo oo kk ii e e oo vv ee rr ww rr ii tt ee FF ii ll e e dd oo ww nn ll oo aa d d aa nn d d ee mm aa ii l l aa tt tt aa cc hh mm ee nn t t oo vv ee rr ww rr ii tt ee AA uu tt oo -c c oo mm pp ll ee tt e e pp aa ss ss ww oo rr d d oo vv ee rr ww rr ii tt ee Works with Desktop Guest Permissions NN o aa dd min priv il eg es req uired 10

W e eb V P N C l ientl ess Ac c ess F u lly C li entless C i tr i x S u ppor t Ap p p SS ec Po r t F o r w a r d i n g A p p l e t D o w n l o a d S l o w d o w n l o a d, s o f t w a r e c o n f l i c t s, b r o w s e r b l o c k s a p p l e t Ci tri x S erv er Ci tri x S erv er T r u l y C l i e n t l e s s C i t r i x S u p p o r t TT ypical SSL VV PP N N CC itrix Support Ci tri x x su pp pp ort req uu ii res vv end or SS SS L L Cli ent or JJ aa vv a a aa pp pp lets or oth er sy stem resi dd ent sof tw aa re SS ll oo w w aa pp pp ll ii cc aa tt ii oo n n ii nn ii tt ii aa tt ii oo nn MM aa y y nn oo t t ff uu nn cc tt ii oo n n dd uu e e tt o o bb rr oo ww ss ee r r ss ee cc uu rr ii tt y y ss ee tt tt ii nn gg ss Po tt ee nn tt ii aa l l ss oo ff tt ww aa rr e e cc oo nn ff ll ii cc tt s s,, ee ss pp ee cc ii aa ll ll y y oo n n nn oo nn -m m aa nn aa gg ee d d ss yy ss tt ee mm ss CC is co CC itrix Support TT ru ly cli entless Ci tri x x Access FF aa ss t t ii nn ii tt ii aa tt ii oo n n tt ii mm aa dd dd ii tt ii oo nn aa l l tt o o dd oo ww e nn oo tt hh ii nn g g nn ll oo aa dd HH ii gg h h pp ee rr ff oo rr mm aa nn cc e e nn o o ll oo cc aa l l aa pp pp ll ii cc aa tt ii oo n n tt rr aa nn ss ll aa tt ii oo nn No t t ii mm pp aa cc tt ee d d bb y y dd ii ff ff ee rr ee nn cc ee s s ii n n bb rr oo ww ss ee r r pp rr ee ff ee rr ee nn cc e e oo r r ss ee cc uu rr ii tt y y ss ee tt tt ii nn gg ss HH ii gg hh ll y y ss tt aa bb ll e e nn o o pp oo tt ee nn tt ii aa l l ff oo r r cc ll ii ee nn t t ss oo ff tt ww aa rr e e cc oo nn ff ll ii cc tt ss 11

SSL VPN DEMO 13

P ro du c t Anno u nc em ents IPS 5.0 V PN 3 000 4.7 IO S 1 2.3 ( 1 4 ) T PIX 7.0 C i s c o Se c u r i t y A g e n t ( C SA ) 4.5 C a t a l y s t D D o S M o d u l e Se c u r i t y M a n a g e m e n t 14

Advanc ed R o u ter S ec u rity S ervic es CC isc o II OO S S FF irewa ll ll CC isc o II OO S S II PS E n g in eerin g C is c o IO S F W C o r p o r a t e L AN I n t er n et A ccou n t in g Vi r t u a l i z e d F i r e w a l l s e r v i c e s VR F -A w a r e F i r e w a l l & I PS e c Vi r t u a l I n t e r f a c e A d v a n c e d A p p l i c a t i o n I n s p e c t i o n & C o n t r o l H T T P I n s p e c t i o n E n g i n e - Po r t 8 0 M i s u s e : I M a n d Pe e r -t o -Pe e r E m a i l Pr o t o c o l I n s p e c t i o n E n g i n e - S M T P, E S M T P, i M A P I PS S t r i n g E n g i n e s e n a b l e c u s t o m m a t c h i n g C u s t o m i z e d s i g n a t u r e s f o r n e w t h r e a t s 40 0 + n e w w o r m a n d a t t a c k s i g n a t u r e s D y n a m 2 D r o p P a c k et i c s e l e c t i o n o f 120 0 s i g n a t u r e s S u p p o r t s n e w s i g n a t u r e s f r o m T r e n d M i c r o 4 A l a r m 3 R es et C o nn. 1 A tta c k IP S S er v er + + NN etwork FF ound aa tion Protec tion EE xx tensions 15

W W W C o m panies Are O pening P o rt 8 0 Attacks Enter Through Web-enabl ed Ap p l i cati ons Internet ac c es s 9 8 % Internal U s ers 7 5 % of successf ul attack s against eb serv ers are entering th rough ap p lications and not at th e netw ork lev el. R i c h m ed i a 4 3 % IM traf f i c 4 3 % eb enab led ap p s 5 5 % Port 80 eb s erv i c es 4 3 % Internet 8 0 H T T P 6 4 % of enterp ri ses h a v e op ened P ort 8 0 on th ei r f i rew a lls f or th ei r g row i ng w eb a p p li ca ti on tra f f i c Source: s e l f _ d e f e Aug n d i n g _ 2002 n e t w o r k InfoWorld/Network _ v b i e r i 2 0 0 5 C i Computing s c o S y s t e m s, I n survey c. A l l r i g h of t s r IT e s e Professionals r v e d. John Pescatore, VP and Research Director, Gartner, June 2002. 17

C isco I O S F irew al l Ad v anced Ap p l i cati on I nsp ecti on and C ontrol Ap p p SS ec I a m em a il tr a ffic h o nes t! P a yl o a d P o r t 8 0 P a yl o a d P o r t 2 5 I a m h ttp w eb tr a ffic h o nes t! S erv er F arm Corporate O f f i c e HH TT TT P In ss pp ee cc tt ii oo n n EE nn gg ii nn ee D eliv ers application lev el control th roug h ins pection of port 8 0 tunneled traf f ic I O S F i a a I I P S i Conv erg ence of Ci sco rew ll nd nli ne tech nolog es C ontrol port 8 0 m is us e b y rog ue apps th at h id e traf f ic ins id e h ttp to av oid s crutiny E x a m p le: I nsta nt m essa g i ng a nd p eer-to-p eer a p p li ca ti ons su ch a s K a z a a E ma il I nspec tion E ng ine C ontrol m is us e of em ail protocols SM T P, E SM T P, I M AP, P O P ins pection eng ines I nspec tion E ng ines prov id e protoc ol a noma l y d etec tion serv ic es 18

C isc o I O S I P S N ew F eatures and Engi nes Al l I nl i ne! Anti -X N e w l y e n h a n c e d r o u t e r -b a s e d IPS e n a b l e s b r o a d l y - d e p l o y e d w o r m a n d t h r e a t m i t i g a t i o n s e r v i c e s -- e v e n t o r e m o t e b r a n c h o f f i c e s St r i n g E n g i n e s e n a b l e c u s t o m m a t c h i n g o f a n y s t r i n g i n t h e p a c k e t Customize signatures for quick reaction to new threats T C P S tring, U DP S tring, I C M P S tring, T rend M ic ro 4 00 w o r m a n d a t t a c k s i g n a t u r e s a d d e d m o r e t h a n 1 2 00 t o t a l s i g n a t u r e s f r o m w h i c h t o d y n a m i c a l l y s e l e c t S up p orts Trend M i cro S i gnatures 19

C isc o I O S V irtu al iz ed S ervic es V R F -Aw are V i rtual F i rew al l & I P S ec V i rtual I nterf ace NN CC VV RR FF -Aw aa re V ii rtu aa l FF ii rew aa ll II PP sec V ii rtu aa l II nterf aa ce E n g in eerin g C i sco I O S F W C o r p o r a t e L AN I n t er n et. 1. 1 T u nnel 0. 2. 1 A ccou n t in g V R F s upports m ultiple ind epend ent contex ts ( ad d res s ing, routing and interf aces ) at th e b ranch location f or s eparation of d epartm ents, s ub s id iaries, or cus tom ers V R F -Aw are F W allow s cus tom ers to ad d F W to th e lis t of s erv ices av ailab le at th e ind iv id ual contex t lev el Sim plif ied I P s ec V P N conf ig uration and d es ig n ( N etw ork -aw are I P s ec) E as ier and s calab le m anag em ent, and f as ter d eploym ent of I P s ec tech nolog y E s f V 3 P N h M Q R s nh anced upport or applications th roug ulticas t, os and outing upport 20

SU M M A R Y 22

P ro du c t Anno u nc em ents S u m m ary PP rod uu cts I P S 5. 0 V P N 3 0 0 0 Concentra tor 4. 7 P I X 7. 0 Ap pp li ca ti on SS ecu ri ty Anti -X Conta ii nm ent && Control I O S 1 2. 3 ( 1 4 ) T Ci sco S ecu ri ty Ag ent 4. 5 Ca ta ly st D D os M od u les Ci sco M AR S Ci sco S ecu ri ty Au d i tor 23

S el f-defending I nteg rated S ec u rity S y stem S ecuri ty i s not O p ti onal! s S ec urity a s a n O ption Security is an ad d -on C h alleng ing integ ration N ot cos t ef f ectiv e C annot f ocus on core priority S ec urity a s pa rt of a S y stem Security is b uilt-in I ntellig ent collab oration Appropriate s ecurity D irect f ocus on core priority 24

25