Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015



Similar documents
Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection

Protection Against Advanced Persistent Threats

Requirements When Considering a Next- Generation Firewall

Cisco Cybersecurity Pocket Guide 2015

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Threat-Centric Security for Service Providers

SourceFireNext-Generation IPS

Cisco Advanced Malware Protection for Endpoints

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Content Security: Protect Your Network with Five Must-Haves

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

The Top Ten Advantages of Using Cisco Enterprise Networking in 2014

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Cisco Cyber Threat Defense - Visibility and Network Prevention

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

REVOLUTIONIZING ADVANCED THREAT PROTECTION

The Art of Modern Threat Defense. Paul Davis Director, Advanced Threats Security Solution Architects

Intelligent Cybersecurity for the Real World

Braindumps QA

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

Unified Security, ATP and more

Intelligent Cybersecurity for the Real World. Cisco Cybersecurity Pocket Guide

McAfee Network Security Platform

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

STEALTHWATCH MANAGEMENT CONSOLE

Addressing Advanced Web Threats. Addressing Advanced Web Threats: Protect Your Data and Brand

SECURITY ANALYTICS AND MORE Putting together an effective Incident Response plan

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Cisco Cloud Web Security

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Increase insight. Reduce risk. Feel confident.

Network Performance + Security Monitoring

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Deploying Next Generation Firewall with ASA and Firepower services

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Comstor Security Initiative. Comstor Security Initiative

STEALTHWATCH MANAGEMENT CONSOLE

SANS Top 20 Critical Controls for Effective Cyber Defense

Cisco Master Security Specialization Practice Areas Summary. February 2016

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Palo Alto Networks and Splunk: Combining Next-generation Solutions to Defeat Advanced Threats

White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible

Cisco Web Security: Protection, Control, and Value

Cisco ASA with FirePOWER Services. October 2014

Delivering Control with Context Across the Extended Network

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Assessing the Business Value of the Secured Datacenter

Vulnerability Management

How To Sell Security Products To A Network Security Company

What is Security Intelligence?

How To Buy Nitro Security

Integrated Network Security Architecture: Threat-focused Nextgeneration

Leading The World Into Connected Security. Paolo Florian Sales Engineer

Cisco Cloud Web Security Datasheet

Integrating MSS, SEP and NGFW to catch targeted APTs

2012 North American Managed Security Service Providers Growth Leadership Award

Payment Card Industry Data Security Standard

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Securing Your Business with DNS Servers That Protect Themselves

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Network as an Sensor & Enforcer

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cisco SecureX Product Brochure

Secure Cloud Computing

Cisco ASA und FirePOWER Services

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

Metric Matters. Dain Perkins, CISSP

About the Authors. Tom Hogue, Security Solutions Manager, Security Business Group, Cisco

THE EVOLUTION OF SIEM

Q1 Labs Corporate Overview

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

FROM PRODUCT TO PLATFORM

Teradata and Protegrity High-Value Protection for High-Value Data

Mucho Big Data y La Seguridad para cuándo?

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

The Hillstone and Trend Micro Joint Solution

Analyzing HTTP/HTTPS Traffic Logs

Cisco Secure BYOD Solution

McAfee Endpoint Protection Products

IBM QRadar Security Intelligence April 2013

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

The SIEM Evaluator s Guide

The Purview Solution Integration With Splunk

State of Security Monitoring of Public Cloud

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Secure Cloud-Ready Data Centers Juniper Networks

Transcription:

Cisco Security Strategy Update Integrated Threat Defense Oct 28, 2015

Breaches are the New Normal FDA Wards of Security Flaw in Infusion Pump Cisco Confidential

Cisco s Covers the Threat-Centric Entire Attack Security Continuum Model BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall VPN NGIPS DDoS Advanced Malware Protection Application Control Policy Management Web Security Malware Sandboxing Secure Access Network + Identity Services Endpoint Email Mobile Security Virtual Network Behavior Cloud Analysis Point in Time Security Services Continuous

Massive Innovation and Investment over Last 15 months AMP Everywhere Cisco ASA with FirePOWER Services Network as a Sensor and Enforcer New Platforms (ASA 5506, 5508, 5516, 5506-H, & FirePOWER 9300) Elastica, RadWARE, and ZIX partnerships FirePOWER Services on ISR ThreatGRID appliance Neohapsis and Porticullis Acquisitions Advanced Threat Analytics ACI Integration with ASA and FirePOWER OpenDNS and Lancope Acquisition Hosted Identity Services AMP in AnyConnect

Why Global Service Providers Choose Cisco Our approach to how we counter threats in terms of our architecture has pointed us toward consolidation of our infrastructure. That s where we have a very vibrant partnership with Cisco. Cisco has made some really smart acquisitions of Sourcefire, Threat Grid, Cognitive, and of the new FirePOWER NGIPS product now provide a differentiated capability in the marketplace. The opportunity in front of us is to build rapidly and advance rapidly Our approach to how we counter threats in terms of our architecture has pointed on our us ability toward deliver consolidation protection of our to infrastructure. our customers That s in where a way we which have a very vibrant partnership with Cisco. working with other partners we can t do.

Best of Breed Portfolio Architectural Approach The Cisco Advantage

Integrated Threat Defense

Dynamic Threat Landscape Customers Biggest Security Challenges Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation A community that hides in plain sight avoids detection and attacks swiftly 60% of data is stolen in HOURS 85% of point-of-sale intrusions aren t discovered for WEEKS 54% of breaches remain undiscovered for MONTHS 51% increase of companies reporting a $10M loss or more in the last YEAR 100% of companies connect to domains that host malicious files or services last YEAR START HOURS WEEKS MONTHS YEARS

Threat-Centric Architectural Approach A Continuously Evolving Threat Landscape Attack Surface Requires an Integrated Threat Defense Architecture Visibility Attack Sophistication DESIGN PRINCIPLES Intelligence Threat Actors Enforcement Faster Time to Detection, Faster Time to Contain

Speed Matters Time to Detect Industry 200 VS DAYS Cisco 46 HOURS Cisco Minimizes The Time to Detect Breaches

Beyond the Event Horizon Analysis Stops Point-in-time Detection Antivirus Sandboxing Not 100% Sleep Techniques Unknown Protocols Encryption Polymorphism Initial Disposition = Clean Actual Disposition = Bad = Too Late!! Blind to scope of compromise Retrospective Detection, Analysis Continues Continuous Turns back time Visibility and Control are Key Initial Disposition = Clean Addresses limitations of point-in-time detection Actual Disposition = Bad = Blocked

Advanced Malware Protection Everywhere Coming Q1CY16 Meraki MX Dedicated FirePOWER Appliance Web & Email Security Appliances FirePOWER Services on ISR FirePOWER Services on ASA Best-in-Class Detection Leader in Security Effectiveness Broadest Deployment Options Mac OS X PC AnyConnect Mobile Virtual Cloud Based Web Security & Hosted Email Private Cloud Cisco Confidential

Threat Centric NGFW We Block More We block 99.2% of exploits per NSS NGFW test Shrink Detection from 200 Days to 46 Hours We Prioritize Better Enables quick focus on the alerts that matter Endpoint plus Network correlation We Integrate Better Clustering & HA models SDN Fabric integration ISE Integration for Policy Open Platform APIs, Open Source, 3 rd Parties

Bringing the Market with us CSTA (Cisco Security Technology Alliance) Ecosystem Partners Vulnerability Management Performance Management & Visualization Custom Detection Packet Capture & Forensics Remediation and Incident Response BEFORE Policy and Control DURING Identification and Block AFTER Analysis and Remediation IAM/SSO Packet Brokering (Taps) Network Infrastructure & Policy Mgt. Mobility SIEM & Threat Defense

Integrated Threat Defense Architecture Global & Local Threat Intelligence ANALYTICS LAYER SERVICES LAYER ENFORCEMENT LAYER DDoS Raw Data (Cisco + 3 rd Party) Threat Research Analytics Engines FW/NGFW Network Platforms Security Platforms Router / Switches / Server WAF NGIPS Integrated Management LB/ADC Anti-Virus Web Cloud Platform SaaS Visib Email OpenDNS + CWS Infra DLP Adv. Malw Access Endpoint Platform AnyConnect AMP Umbrella FPC TELEMETRY INTELLIGENCE Policy Automation and Controller Integration Partnerships Cisco Portfolio

Cisco s Integrated Threat Defense Architecture Global & Local Threat Intelligence (Talos) ANALYTICS LAYER SERVICES LAYER ENFORCEMENT LAYER Raw Data (Cisco + 3 rd Party) Threat Research Analytics Engines Integrated Management Security Services Layer Network Platforms Cloud Platform Endpoint Platform TELEMETRY INTELLIGENCE Policy Automation and Controller Integration Behavioral Threat Analytics Network Behavioral Analytics Network Enforcement & Malware Detection Malware Sandboxing (Adv. Threat Protect.) 24x7 Visibility & Enforcement. Global Intelligence and Research.

Why OpenDNS?

OpenDNS Sees the Entire Internet

DNS is the fastest way to establish Security Everywhere

DNS is Used by Every Device on Your Network

UMBRELLA Enforcement Network security service protects any device, anywhere INVESTIGATE Intelligence Discover and predict attacks before they happen PRODUCTS & TECHNOLOGIES

OpenDNS Adds to Cisco s Security Portfolio Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate OpenDNS Umbrella OpenDNS Investigate Stay ahead of future attacks by blocking malicious domains, IPs, and ASNs Block callbacks on any port, protocol, or app at the DNS & IP layers OpenDNS Investigate Query live threat intelligence of all the domains & IPs on the internet.

OpenDNS Delivers Worldwide Coverage in Minutes 208.67.222.222 208.67.220.220 24 CONFIDENTIAL

OpenDNS & IoT (Device / Entity) Protection Threat Intelligence Visibility Policy / Context OpenDNS Enforcement/APIs Reporting ALL IoT DEVICES ALL IoT DEVICES No endpoint client / All IoT can use DNS. Seamless, secure, global visibility for millions of IoT devices. Powerful, light approach to global IoT threat enforcement.

Integration of Threat Grid and Umbrella

BIG DATA ANALYTICS: CROSS CUSTOMER & CROSS PRODUCT DNS-BASED ATD SWG NGFW STANDALONE SANDBOX MULTI TENANCY, CENTRALIZED ADMINISTRATION, SCALABLE REPORTING CLOUD PLATFORM SECURITY PRODUCT SECURITY PRODUCT

Cisco Announces Agreement to Acquire Lancope

About Lancope Web Site https://www.lancope.com History Founded 2000 Ownership Privately held Key Talent and Location No. of Employees Customers Mike Potts, CEO Tim Keanini, CTO David Cocchiara, COO/CFO David Scruggs, VP Sales Headquartered in Alpharetta, GA. ~300 employees Blue Chip customer base, including financial services, healthcare, retail, technology, manufacturing, education, service providers, and other enterprises

Lancope Adds to Cisco s Security Portfolio Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Lancope Lancope Discover and monitor traffic baseline for the network Leverage awareness to apply more granular controls Detect Breaches and Insider Threat Faster Accelerate the analyzing and understanding of incidents

Lancope StealthWatch System Context-aware Network Security Using Dynamic NetFlow Analysis Monitor Detect Analyze Respond Understand your network and data center normal Leverage Network Behavior Anomaly detection & analytics Collect & Analyze holistic network audit trails Accelerate network troubleshooting & threat mitigation Gain real-time situational awareness of all traffic Network segmentation and policy instrumentation Detect behaviors linked to APTs, insider threats, DDoS, and malware Achieve faster root cause analysis to conduct thorough forensic investigations Respond quickly to threats by taking action to quarantine through Cisco ISE

Roadmap Highlights

Q3/Q4 CY15 Q1CY16 Q2 CY16 NGFW NGIPS Adv Threat Unified Image and Offbox Mgmt NG DC Platform: 3RU FP9300 AMP ThreatGRID appliance Integration across Portfolio Next Gen Onbox Manager 1RU High Perf Model AMP and Meraki Integration Next Gen 1RU for Midrange Multiple Integrated Threat Defense Capabilities AMP Private Cloud Integrations across Portfolio NaaS NaaE Network as a Enforcer Work Center in ISE Offnet coverage for Network as a Sensor via AnyConnect ACS Capabilities (TACACS+ Lite)

Cisco Security Portfolio NGFW/ NGIPS Advanced Threat Web Email Policy and Access UTM W W W UTM Security Services Integrated Threat Defense Architecture Open Pervasive Integrated Continuous Cisco Confidential

Thank You