Threat-Centric Security for Service Providers



Similar documents
CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Requirements When Considering a Next- Generation Firewall

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

The Top Ten Advantages of Using Cisco Enterprise Networking in 2014

Security MWC Nokia Solutions and Networks. All rights reserved.

Cisco Cybersecurity Pocket Guide 2015

SourceFireNext-Generation IPS

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Data Center Network Evolution: Increase the Value of IT in Your Organization

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Wireless Security Gateway R2

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

The promise of SDN. EU Future Internet Assembly March 18, Yanick Pouffary Chief Technologist HP Network Services

SOFTWARE DEFINED NETWORKING

Business Case for S/Gi Network Simplification

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

Powering the Internet of Things: SDN/NFV Architectures

The Open Cloud Near-Term Infrastructure Trends in Cloud Computing

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Intelligent WAN 2.0 principles. Pero Gvozdenica, Systems Engineer, Vedran Hafner, Systems Engineer,

Network Services in the SDN Data Center

Braindumps QA

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

Enterprise Security Platform for Government

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Business Case for Virtual Managed Services

vsrx Services Gateway: Protecting the Hybrid Data Center

Securing Virtual Applications and Servers

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

Assessing the Business Value of the Secured Datacenter

Integrated Network Security Architecture: Threat-focused Nextgeneration

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

IINS Implementing Cisco Network Security 3.0 (IINS)

SDN PARTNER INTEGRATION: SANDVINE

A Mock RFI for a SD-WAN

The Hillstone and Trend Micro Joint Solution

The Cisco ASA 5500 as a Superior Firewall Solution

Unified Threat Management, Managed Security, and the Cloud Services Model

Intelligent Cybersecurity for the Real World

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

Network Monitoring Fabrics Are Key to Scaling IT

Movilidad 3.0: Más allá de BYOD. Pilar Santamaria. Directora de Desarrollo Negocio BN y Ciberseguridad, Región Sur de Europa

ITL BULLETIN FOR JANUARY 2011

Open SDN for Network Visibility

Cloud Managed Security with Meraki MX

Understanding the Business Case of Network Function Virtualization

Complete Protection against Evolving DDoS Threats

Mobile Security and Management Opportunities for Telcos and Service Providers

VMware vcloud Networking and Security Overview

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

Internet of Everything. Cisco product managers Vytautas Zulonas Tomas Kirvelaitis

NFV Management and Orchestration: Enabling Rapid Service Innovation in the Era of Virtualization

Deploying Next Generation Firewall with ASA and Firepower services

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Cisco ACI and F5 LTM Integration for accelerated application deployments. Dennis de Leest Sr. Systems Engineer F5

Virtual Privacy vs. Real Security

Network Security. Intertech Associates, Inc.

Orchestrating the next generation data center

Verizon Managed SD WAN with Cisco IWAN. October 28, 2015

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Application Security Manager ASM. David Perodin F5 Engineer

Cisco ASA with FirePOWER Services. October 2014

Implementing Cisco IOS Network Security

The Importance of High Customer Experience

Readiness Assessments: Vital to Secure Mobility

Cisco and Citrix Solution

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Simplify IT. With Cisco Application Centric Infrastructure. Roberto Barrera VERSION May, 2015

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES

Zak Khan Director, Advanced Cyber Defence

Hybrid Cloud: Overview of Intercloud Fabric. Sutapa Bansal Sr. Product Manager Cloud and Virtualization Group

Nokia Networks. security you can rely on

Cisco Cloud Web Security

F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: Mob.:

Secure Cloud-Ready Data Centers Juniper Networks

The Role of Virtual Routers In Carrier Networks

Building Access Networks that Support Carrier Ethernet 2.0 Services and SDN

The Advantages of Cloud Services

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

EVOLVED DATA CENTER ARCHITECTURE

Next Generation Firewalls and Sandboxing

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

How To Extend Security Policies To Public Clouds

Arbor s Solution for ISP

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

ONOS [Open Source SDN Network Operating System for Service Provider networks]

Remote Management Services Portfolio Overview

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Cisco and Citrix: Building Application Centric, ADC-enabled Data Centers

Strategic Direction of Networking IPv6, SDN and NFV Where Do You Start?

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

VSS - Game Changing Technology

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

SECURING DATA IN TRANSIT

Transcription:

Threat-Centric Security for Service Providers Enabling Open & Programmable Networks Sam Rastogi, Service Provider Security Product Marketing, Security Business Group Bill Mabon, Network Security Product Marketing, Security Business Group September 1, 2015

Trends: New Opportunities New Threats The world has gone mobile Traffic growth, driven by video Changing Customer Expectations 10X Mobile Traffic Growth From 2013-2019 Ubiquitous Access to Apps & Services Rise of cloud computing Increasing Threat Machine-to-Machine Sophistication Soon to Change SP Architectures/ Service Delivery 120,000 Other (43%, 25%) 100,000 Internet Video (57%, 75%) Dynamic Threat Landscape 80,000 Changing Enterprise Business Models Efficiency & Capacity Petabytes per Month 60,000 40,000 20,000 Risks to Service Providers and Their Customers 0 People 2013 2014 2015 2016 2017 2018 Emergence of the Internet of Everything Process Data 23% Global CAGR 2013-2018 Things 2

Security for Open & Programmable Networks Cisco Services Benefits: Applications & Services Evolved Services Platform New Revenue Streams Service SMART Profile SERVICE CAPABILITIES Increased Business Agility Lower Operating Costs Evolved Programmable Network Cisco Service Provider Architecture Compute Service Broker Orchestration Engine Storage Catalog of Virtual Functions Network OPEN APIs OPEN APIs OPEN APIs OPEN APIs Security 3

Legacy Security: Costly & Complex Siloed Manual Inefficient Limited integration, security gaps Hard-coded processes Over-provisioned, static, and slow Hinders realization of open and programmable networks 4

Legacy Security: Siloed, Inefficient & Expensive Data Packet 1001 00010111 10001011 10 1001 00010111 10001011 10 1001 00010111 10001011 10 1001 00010111 10001011 10 1001 00010111 10001011 10 DDoS DDoS Platform 1001 00010111 10001011 10 WAF WAF Platform 1001 00010111 10001011 10 Sandbox Sandbox Platform / SSL FW IPS SSL Platform FW Platform IPS Platform Reduced Effectiveness Increased Latency Slows Network Static & Manual 5

Cisco s Covers the Threat-Centric Entire Attack Security Continuum Model BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall VPN NGIPS DDoS Advanced Malware Protection Application Control Policy Management Web Security Malware Sandboxing Secure Access Network + Identity Services Endpoint Email Mobile Security Virtual Network Behavior Cloud Analysis Point in Time Security Services Continuous 6

Threat-Centric Security for Service Providers Integrated Security Operational Efficiency Enhanced Agility Best of Breed security = Cisco + 3 rd party Automated and consistent security policies High speed, scalable security Security services in a consolidated platform Lower integration costs and complexity Dynamic service stitching Visibility and correlation RESTful APIs and 3 rd party tool integration Dynamic provisioning across physical, virtual, and cloud 7

Firepower 9300 Platform High-Speed, Scalable Security Multi-Service Security Benefits Integration of best-of-breed security Dynamic service stitching Features* ASA container Firepower Threat Defense containers NGIPS, AMP, URL, AVC 3 rd Party containers Radware DDoS Other ecosystem partners Modular Benefits Standards and interoperability Flexible Architecture Features Template driven security Secure containerization for customer apps Restful/JSON API 3 rd party orchestration/management Carrier-Class Benefits Industry Leading Performance / RU 600% Higher Performance 30% higher port density Features Compact, 3RU form factor 10G/40G I/O; 100G ready Terabit backplane Low latency, Intelligent fastpath NEBS ready * Contact Cisco for services availability 8

Cisco Transforms Security Service Integration Siloed Data Packet DDoS WAF Sandbox Key: DDoS Platform WAF Platform Sandbox Cisco Service 3 rd Party Service Integrated Data Packet SSL SSL Platform 1001 0001011 1100010 1110 SSL FW IPS DDoS FW WAF NGIPS AMP FW Platform IPS Platform 1001 00010111 10001011 10 Limited effectiveness Increased latency Unified Platform Slows network Static & Manual Maximum protection Highly efficient Scalable processing Dynamic 9

Roadmap & Vision Consistent Security Across Physical, Virtual & Cloud Physical Virtual Cloud 10

Securing Mobile and Carrier Networks 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

Technology trends are driving use cases Trends 3G-to-LTE IPv4-to-IPv6 Hotspots Stateful devices Virtual Applications & smart phones Gi/SGi S1 SWu SP Wi-Fi S8 EPC 12

Securing network edges is critical Gi/SGi Interface Internet EPC S8 Interface Roaming Increase in connected devices and app complexity Growing number of IP addresses Migration from IPv4 to IPv6 protocol S1 Interface Proliferation of microcells, cell stations, Evolved Node Bs (enodebs), or hotspots SWu Interface OTT SP Wi-Fi Subscribers using Mobile SPs networks for their own personal Wi-Fi hotspots Subscribers increasingly access customer EPCs via other operators and untrusted networks Voice over Wi-Fi as a business imperative 13

Security for Carrier and Mobile Edge Use Case HW Requirements Mobile Packet Core Mobile Access Edge Partner Edge Internet Edge Internet Ultra High Performance FW High Port Density, 100Gbps NEBS Power Efficiency SW Requirements Mobile Access: Strong authentication, authorization (IKE v1/v2 & PKI protocols); Data confidentiality w/ IPSec ESP; LTE S1 FW (GTP, S1-SP FW) Partner Edge: GTP, NAT Internet Edge: FW, NAT, IPS, Content Filtering 14

Securing the Data Center 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

In Data Center Security, Threat Defense, Agility, and Control are Challenges Unique Threats Time- consuming provisioning Complex data flows Unpredictable data volume 16

Data Centers Require Specialized Security Standard edge security Sees symmetric traffic only Data center security Requires asymmetric traffic management Scales statically for predictable data volume, limited by edge data connection Must scale dynamically to secure high-volume data bursts Monitors ingress and egress traffic Needs to secure intra-data-center traffic Is deployed typically as a physical appliance Requires both a physical and virtual solution Deploys in days or weeks Must deploy in hours or minutes 17

Deployed Where You Need It Most 76% 17% 7% East-west traffic North-south traffic Inter-data-center traffic 18

Threat Centric Security to Protect Your Data Center from Sophisticated Attacks Today s adversaries are more advanced than ever Well-funded. Both organized crime and nation states adversaries. Inventive. Agile methodology, and now finding East-West vulnerabilities to exploit. Insidious. They blend in with the targeted organization, sometimes taking weeks or months to establish multiple footholds in infrastructure and user databases. 60% 95% 100% of data is stolen in hours; detection can take weeks or months of data center breaches can be tied to misconfigured security solutions of companies connect to domains that host malicious files or services Sources: Verizon 2014 Data Breach Investigations 2015 Report Cisco and/or (DBIR); its affiliates. Gartner; All rights Cisco reserved. Annual Cisco Security Confidential Report 19 2015

Security for Data Center Global Orchestration Global Orchestration Global Orchestration Global Orchestration Requirements Scalability: High Throughput Multi-Tenancy: Multi-Context Segmentation: Internal/External North-South, East-West traffic Multi-Site Security & Mobility Multi-Vendor Orchestration Benefits High Scale: access rule, TrustSec Network Integration: Routing, switching, inter-site DC extensions High Density: 40G/100G Clustering: Intra-chassis, Interchassis, Inter-site Flow offload Consistent Policy Mgmt 20

Trust The Market Leader Cisco is the clear leader here IT decision-makers consider Cisco the top data center security solution supplier across 10 separate categories. Infonetics Research Report Experts: Data Center Security Strategies and Vendor Leadership: North American Enterprise Survey, March 2014 and April 2015 21

Cisco Difference for Service Providers Unmatched Visibility Consistent Control Advanced Threat Protection Complexity Reduction End-to-End Network Visibility from SP Core to Customer Premise Consistent Policies Across Network, Data Center, and Workloads Detect & Mitigate Advanced Threats across CPE, Cloud, and Network Reduce IT Silos, Respond Faster to New Opportunities & Business Models 22