Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi 13-10-2015

Similar documents
Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Intelligent Cybersecurity for the Real World

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

SourceFireNext-Generation IPS

Cisco Cybersecurity Pocket Guide 2015

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Braindumps QA

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Cisco Advanced Malware Protection

Requirements When Considering a Next- Generation Firewall

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

Cisco & Big Data Security

Cisco ASA und FirePOWER Services

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Deploying Next Generation Firewall with ASA and Firepower services

Content Security: Protect Your Network with Five Must-Haves

Threat-Centric Security for Service Providers

Cisco ASA with FirePOWER Services. October 2014

Protection Against Advanced Persistent Threats

Delivering Control with Context Across the Extended Network

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Cisco Cloud Web Security

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco Secure BYOD Solution

Cisco RSA Announcement Update

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Integrated Network Security Architecture: Threat-focused Nextgeneration

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Cisco Cloud Web Security Datasheet

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Cybersecurity Before - During - After An Integrated Security Strategy

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

How to choose the right NGFW for your organization: Independent 3 rd Party Testing

Readiness Assessments: Vital to Secure Mobility

Symantec Consulting Services

OVERVIEW. Enterprise Security Solutions

Secure Network Access for Personal Mobile Devices

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Critical Security Controls

Netzwerkvirtualisierung? Aber mit Sicherheit!

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Cisco ISR Web Security with Cisco ScanSafe

Cisco Systems and the Migration from Network Access Control (NAC) to Endpoint Visualization, Access, and Security (EVAS)

Dell SonicWALL Portfolio

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Cisco Master Security Specialization Practice Areas Summary. June 2015

HP Next-Generation Network Security Solutions Radoslav Georgiev Technical Consultant HP Networking

IBM Security IBM Corporation IBM Corporation

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Analyzing HTTP/HTTPS Traffic Logs

Cisco Security Appliances

Решения HP по информационной безопасности

Cisco Master Security Specialization Practice Areas Summary. February 2016

IBM QRadar Security Intelligence April 2013

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

EndUser Protection. Peter Skondro. Sophos

McAfee Security Architectures for the Public Sector

Cisco Security Manager 4.2: Integrated Security Management for Cisco Firewall, IPS, and VPN Solutions

Cisco Threat Defense for Borderless Networks

On and off premises technologies Which is best for you?

Cisco Web Security: Protection, Control, and Value

Concierge SIEM Reporting Overview

The Protection Mission a constant endeavor

Cisco Security Intelligence Operations

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Securing Your Business with DNS Servers That Protect Themselves

Critical Controls for Cyber Security.

Risk Analytics for Cyber Security

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Unified Threat Management, Managed Security, and the Cloud Services Model

IBM Internet Security Systems

Cisco Security Appliances

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

2012 North American Managed Security Service Providers Growth Leadership Award

The Emergence of Security Business Intelligence: Risk

Using SIEM for Real- Time Threat Detection

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

How To Sell Security Products To A Network Security Company

Transcription:

#TIGcyberSec Cisco Security: Moving to Security Everywhere Stefano Volpi 13-10-2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1

Cisco is All In with Security I expect security to grow very healthily as we move forward. And you will continue to see us make a number of resource investments in areas like services, sales, and consultancy in a way that really brings this picture to life. I think you re going to see good growth out of our security business...we are positioned really well. John Chambers CEO, Cisco Q2 FY15 Earnings Call February 11, 2015 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

In the news: Feb 2013 Today Global Security Sales Organization 6000+ 2014 2013-2014 Cisco and/or Cisco and/or its affiliates. its affiliates. All rights All reserved. rights reserved. Cisco Confidential 3 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

Talos Group: Threats by the Numbers 7399 Common Vulnerabilities and Exposure (CVE) Entries in 2013 a 10% increase from 2012 1,100,000 Incoming Malware Samples Per Day, Increasing Daily 4.2 Billion Web Filtering Blocks Per Day 1 Billion Sender Base Reputation Queries Per Day 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 4

The Security Problem Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 5

Silos Create Security Gaps Traditional Firewall Functions VPN Functions Context- Aware Functions IPS Functions WWW Malware Functions 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 6

The Network and Security Synergies Through Integration Increases Visibility Accelerates Detection Scales Enforcement 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 7

Security Services Advisory Integration Managed Custom Threat Intelligence Integration Services Managed Threat Defense Technical Security Assessments Security Optimization Services Remote Managed Services 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 8

Strategic Imperatives Visibility-Driven Threat-Focused Platform-Based Network-Integrated, Broad Sensor Base, Context and Automation Continuous Advanced Threat Protection, Cloud-Based Security Intelligence Agile and Open Platforms, Built for Scale, Consistent Control, Management Network Endpoint Mobile Virtual Cloud 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 9

Mapping Technologies to the Model Attack Continuum Discover Enforce Harden Detect Block Defend Scope Contain Remediate Firewall Patch Mgmt IPS IDS AMD App Control Vuln Mgmt Antivirus FPC Log Mgmt VPN IAM/NAC Email/Web Forensics SIEM Security Services 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 10

Comprehensive Security Product Portfolio Firewall & NGFW Cisco ASA 5500-X Series Cisco ASA 5500-X w/ NGFW license Cisco ASA 5585-X w/ NGFW blade Cisco ASA with FirePOWER Services IPS & NGIPS Cisco IPS 4300 Series Cisco ASA 5500-X Series integrated IPS FirePOWER NGIPS FirePOWER NGIPS w/ Application Control FirePOWER Virtual NGIPS Advanced Malware Protection AMP for Networks AMP for Endpoints AMP for Private Cloud / Virtual Appliance Web Security Cisco Web Security Appliance (WSA) Cisco Virtual Web Security Appliance (vwsa) Cisco Cloud Web Security Email Security Cisco Email Security Appliance (ESA) Cisco Virtual Email Security Appliance (vesa) Cisco Cloud Email Security NAC + Identity Services Cisco Identity Services Engine (ISE) Cisco Access Control Server (ACS) VPN Cisco AnyConnect VPN Meraki MX UTM 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Next Generation Firewall VPN + AnyConnect Web / Email Security (cloud) Next Generation IPS Advanced Malware Protection Web / Email Security (cloud) Advanced Malware Protection pxgrid APIC-EM Network as an Enforcer Network as a Sensor 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 12

Security Everywhere Endpoint Branch Edge Campus Data Center Cloud Operational Technology Services Cisco Confidential For Internal Use 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 13