CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter. Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO

Similar documents
Threat-Centric Security for Service Providers

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Cisco Cybersecurity Pocket Guide 2015

Requirements When Considering a Next- Generation Firewall

Braindumps QA

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

Cisco Security Strategy Update Integrated Threat Defense. Oct 28, 2015

Cisco Advanced Malware Protection

Cisco ASA und FirePOWER Services

Assessing the Business Value of the Secured Datacenter

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

SourceFireNext-Generation IPS

Securing Virtual Applications and Servers

Deploying Next Generation Firewall with ASA and Firepower services

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Content Security: Protect Your Network with Five Must-Haves

Cisco Secure BYOD Solution

Integrated Network Security Architecture: Threat-focused Nextgeneration

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

The Attacker s Target: The Small Business

Readiness Assessments: Vital to Secure Mobility

Intelligent Cybersecurity for the Real World

Protection Against Advanced Persistent Threats

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Brocade and McAfee Change the Secure Networking Landscape with High Performance at Lowest TCO

Cisco Cloud Web Security

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

How To Extend Security Policies To Public Clouds

Transform Your Business and Protect Your Cisco Nexus Investment While Adopting Cisco Application Centric Infrastructure

Secure Network Access for Personal Mobile Devices

Cyb T er h Threat D f e ense S l o uti tion Moritz Wenz, Lancope 1

McAfee Network Security Platform

Cisco Master Security Specialization Practice Areas Summary. February 2016

Delivering Control with Context Across the Extended Network

Bringing Continuous Security to the Global Enterprise

Cisco Security Appliances

Cisco Master Security Specialization Practice Areas Summary. June 2015

Cisco Advanced Malware Protection for Endpoints

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

About the Authors. Tom Hogue, Security Solutions Manager, Security Business Group, Cisco

Cisco ASA with FirePOWER Services. October 2014

NE T GENERATION CLOUD SECURITY PLATFORM

Cisco Security Appliances

Решения HP по информационной безопасности

Internet Content Provider Safeguards Customer Networks and Services

Advanced Security for Account Managers-ASAM

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

With Great Power comes Great Responsibility: Managing Privileged Users

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Network as an Sensor & Enforcer

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Nine Network Considerations in the New HIPAA Landscape

Cisco Identity Services Engine

Zenoss for Cisco ACI: Application-Centric Operations

Securing Your Business with DNS Servers That Protect Themselves

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

The Benefits of an Integrated Approach to Security in the Cloud

Securing OS Legacy Systems Alexander Rau

Payment Card Industry Data Security Standard

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Cisco Cyber Threat Defense - Visibility and Network Prevention

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Advanced Threats: The New World Order

Thank you for joining us today! The presentation will begin shortly. Thank you for your patience.

Cisco Advanced Malware Protection for Endpoints

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

The Hillstone and Trend Micro Joint Solution

Cisco RSA Announcement Update

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

IBM Security IBM Corporation IBM Corporation

Remote Management Services Portfolio Overview

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Cybersecurity Before - During - After An Integrated Security Strategy

Cisco Web Security: Protection, Control, and Value

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

Transcription:

CYBERSECURITY for ENTERPRISE INFRASTRUCTURE: Protecting your DataCenter Marco Mazzoleni Consulting Systems Engineer, Cisco GSSO 2014 Cisco and/or and/or its affiliates. its affiliates. All rights All reserved. rights reserved. Cisco Public 1 1

Data Center Security Challenges Without integrated security, our customer s data centers are at risk 60% of data is stolen in HOURS 85% of data center intrusions aren t discovered for WEEKS 54% of data center breaches remain undiscovered for MONTHS 51% increase in companies reporting a $10M loss or more in the last YEAR START HOURS WEEKS MONTHS YEARS Source: Verizon 2014 Data Breach Investigations Report (DBIR) 2014 Cisco and/or its affiliates. All rights reserved. 2

Data Center Administrators Need New Security IT professionals don t know what they re protecting They can t see or recognize what s in their environment They can t deal with unknown attacks Even if technologies are purchased, in many cases, IT profesionals cannot use them properly Complexity and fragmentation Operational challenges 2014 Cisco and/or its affiliates. All rights reserved. 3

Fitness Company Builds Secure Data Center With Beachbody the converged quote: Cisco on ASA solution, 5585-X: we We can can now cluster centralize monitoring without losing and management performance. for all It s our the resources perfect and firewall provide better platform support to insert and services into the to users without increasing IT staff. compute environment of Brian C. Young, Infrastructure our UCS. Manager, Adena Health System Customer Stats Challenges Why Cisco? Solution Impact Industry: Health, Wellness and Fitness Location: Santa Monica, California Employees: 600 Provide advanced IT services, Visibility across the network Help ensure security in multitenant environment Simplify network and security operations Has long relied on Cisco for nearly all IT needs, from metro fiber network to data center infrastructure Considered other vendors, but while their devices may be capable, Cisco provides a fully integrated solution Most capable solution for meeting multitenancy, other project-related demands Cisco ASA 5585-X Adaptive Security Appliance with Next- Generation Firewall Services with IPS and Global Threat Correlation Cisco Identity Service Engine Cisco Trutsec Reduce data center footprint by 50 percent Provides holistic view of threat environment for all customer Simplifies security management and operations, and provides economic sustainability for IT infrastructure

Cisco Security: Secure the Data Center ASA and ASAv ASA w/firepower Services FirePOWER NGIPS and vngips ASA + FirePOWER provides: Data Center Integration Physical and virtual solutions Support for asymmetric traffic Policy-based provisioning Full integration with ACI APIC Data Center Performance High availability and failover Advanced multi-site clustering Before/During/After protection at data center speeds Data Center Protection Protection against advanced threats Inspection of custom applications Retrospective analysis and remediation Cisco has been identified as the clear Data Center security leader by data center administrators for the second year in a row Number 1 in All 10 Infonetics Leadership Criteria

Cisco Identity Services Engine (ISE) Delivering the Visibility and Control for Secure Network Access Network Partner Context Data Who What Cisco ISE Where When How Consistent Secure Access Policy

The New Security Model Attack Continuum BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Cloud Point in Time Continuous 2013-2014 Cisco and/or its affiliates. All rights reserved. 7

Thank You