2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 2009 Cisco Systems, Inc.
All rights reserved. Cisco Confidential Presentation_ID
Ricardo Rivera Business Development Manager Security & Mobility Southern Cone Visin de la Arquitectura Seguridad Sin Fronteras 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 2 Frontera Corporativa Tradicional Frontera Corporativa Oficina Remota Aplicaciones y Datos Oficina Corporativa Polticas Atacantes Clientes Partners 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 3 Movilidad y Colaboracin estn Disolviendo la Frontera de Internet Frontera Corporativa Oficina Remota Aplicaciones y Datos Oficina Corporativa Polticas Atacantes Clientes Oficina de Casa Coffee Shop Aeropuerto Usuario Mvil Partners 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 4 Cloud Computing est Disolviendo la Frontera del Data Center Frontera Corporativa Oficina Remota Aplicaciones y Datos Oficina Corporativa Polticas Atacantes Oficina de Casa Coffee Shop Clientes Aeropuerto Usuario Mvil Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 5 Los Clientes Quieren Negocios sin Fronteras Frontera Corporativa Oficina Remota Aplicaciones y Datos Oficina Corporativa Polticas Atacantes Oficina de Casa Coffee Shop Clientes Aeropuerto Usuario Mvil Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 6 B o r d e r l e s s D a t a
C e n t e r 3 B o r d e r l e s s I n t e r n e t 2 B o r d e r l e s s E n d
Z o n e s 1 Arquitectura Cisco para Seguridad de Redes sin Fronteras Policy Corporate Border Branch Office Applications and Data Corporate Office Polticas (Control de Acceso, Uso Permitido, Malware, Seguridad de Datos) 4 Home Office Attackers Coffee Shop Customers Airport Mobile User Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 7 Intelligent End Point Traffic Routing Pillar 1: Borderless End Zone Persistent Connectivity Always On, Location Aware Auto Head-end Discovery IPsec , SSL VPN, DTLS Advanced Security Strong Authentication Fast, Accurate Protection Consistent Enforcement Broadest Coverage Most OSs and Protocols Windows Mobile Apple iPhone 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 8 Always On Security and Protection Traditional VPN Protected Cisco Borderless Network Security Un-Protected 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 9 Always On Security and Protection Anytime, Anywhere, Any Device Sitting in a Park Cape Town, South Africa Cape Town, South Africa At a Coffee Shop Sydney, Australia Sydney, Australia In the Office San J ose, California San J ose, California 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 10 Pillar 2: Borderless Security Array Advanced Scanning and Enforcement Capabilities Access Control | Acceptable Use | Data Security |Threat Protection Integrated into the Fabric of the Network Access Control | Acceptable Use | Data Security |Threat Protection Integrated into the Fabric of the Network Cisco IronPort Email Security Appliance Cisco Adaptive Security Appliance Cisco Integrated Services Routers Cisco IronPort Web Security Appliance 10 VM Software Security Module Hybrid Hosted Appliance 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 11 HTTP Is the New TCP Instant Messaging Peer to Peer File Transfer Protocol Understanding Web Traffic 11 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 12 Advanced Content Analysis 12 SSN Detection Rule Is Matched Multiple Times to Increase Score Unique Rule Matches Are Met Matches Are Found in Close Proximity Proper Name Detection 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 13 Advanced, Proactive Threat Protection Cisco Security Intelligence Operations Global Threat Telemetry Global Threat Telemetry 8:03 GMT Sensor Detects Hacker Probing Bank Branch in Chicago Ad Agency HQ in London ISP Datacenter in Moscow 8:00 GMT Sensor Detects New Malware 8:07 GMT Sensor Detects New Botnet 8:10 GMT All Cisco Customers Protected 8:10 GMT All Cisco Customers Protected Cisco SensorBase Threat Operations Center Advanced Algorithms 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 13 Higher Threat Coverage, Greater Accuracy, Proactive Protection 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 14 App Server Database Server Web Server Physical Security Device Virtual Contexts Pillar 3: Secure Virtualized Data Center App Server Database Server Web Server Hypervisor Physical Security Device Virtual Contexts VIRTUAL SECURITY App Server Database Server Web Server Hypervisor Connect Physical Security to Virtual Machines with Ciscos SIA 2 Secure Physical Infrastructure 1 Embed Security in the Virtual Switch 3 Service Chaining 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 15 Pillar 4: Rich Policy Enables Ubiquitous , Consistent Control Who? What? When? Where? How? 3 Policy On and Off Premise 2 Dynamic Containment Policy 1 Access Policy 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 16 Access Control Access Control Policy In a Cisco Secure and Protected Borderless Network Access Control Violation Remote WebEx Participant 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 17 In a Cisco Secure and Protected Borderless Network Acceptable Use Employee in Marketing Department Acceptable Use Policy Access Control Violation 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 18 In a Cisco Secure and Protected Borderless Network Data Security Data Security Policy Data Security Violation Employee at Unmanaged Device 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 19 B o r d e r l e s s D a t a
C e n t e r 3 B o r d e r l e s s I n t e r n e t 2 B o r d e r l e s s E n d
Z o n e s 1 Arquitectura Cisco para Seguridad de Redes sin Fronteras Polticas Frontera Corporativa Oficina Remota Aplicaciones y Datos Oficina Corporativa Polticas (Control de Acceso, Uso Permitido, Malware, Seguridad de Datos) 4 Oficina de Casa Atacantes Coffee Shop Clientes Aeropuerto Usuario Mvil Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service