Sei sulla pagina 1di 20

2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 2009 Cisco Systems, Inc.

All rights reserved. Cisco Confidential Presentation_ID


Ricardo Rivera
Business Development Manager
Security & Mobility Southern Cone
Visin de la Arquitectura
Seguridad Sin Fronteras
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 2
Frontera Corporativa Tradicional
Frontera Corporativa
Oficina Remota
Aplicaciones
y Datos
Oficina Corporativa
Polticas
Atacantes Clientes
Partners
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 3
Movilidad y Colaboracin
estn Disolviendo la Frontera de Internet
Frontera Corporativa
Oficina Remota
Aplicaciones
y Datos
Oficina Corporativa
Polticas
Atacantes Clientes
Oficina de
Casa
Coffee
Shop
Aeropuerto
Usuario
Mvil
Partners
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 4
Cloud Computing est Disolviendo
la Frontera del Data Center
Frontera Corporativa
Oficina Remota
Aplicaciones
y Datos
Oficina Corporativa
Polticas
Atacantes
Oficina de
Casa
Coffee
Shop
Clientes
Aeropuerto
Usuario
Mvil
Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 5
Los Clientes Quieren Negocios
sin Fronteras
Frontera Corporativa
Oficina Remota
Aplicaciones
y Datos
Oficina Corporativa
Polticas
Atacantes
Oficina de
Casa
Coffee
Shop
Clientes
Aeropuerto
Usuario
Mvil
Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 6
B
o
r
d
e
r
l
e
s
s
D
a
t
a

C
e
n
t
e
r
3
B
o
r
d
e
r
l
e
s
s
I
n
t
e
r
n
e
t
2
B
o
r
d
e
r
l
e
s
s
E
n
d

Z
o
n
e
s
1
Arquitectura Cisco para Seguridad de
Redes sin Fronteras
Policy
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Polticas
(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)
4
Home Office
Attackers
Coffee
Shop
Customers
Airport
Mobile
User
Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 7
Intelligent End Point Traffic Routing
Pillar 1: Borderless End Zone
Persistent Connectivity
Always On, Location Aware
Auto Head-end Discovery
IPsec , SSL VPN, DTLS
Advanced Security
Strong Authentication
Fast, Accurate Protection
Consistent Enforcement
Broadest Coverage
Most OSs and Protocols
Windows Mobile
Apple iPhone
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 8
Always On Security and Protection
Traditional VPN
Protected
Cisco Borderless Network Security
Un-Protected
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 9
Always On Security and Protection
Anytime, Anywhere, Any Device
Sitting in a Park
Cape Town, South Africa
Cape Town, South Africa
At a Coffee Shop
Sydney, Australia
Sydney, Australia
In the Office
San J ose, California
San J ose, California
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 10
Pillar 2: Borderless Security Array
Advanced Scanning and Enforcement Capabilities
Access Control | Acceptable Use | Data Security |Threat Protection
Integrated into the Fabric of the Network
Access Control | Acceptable Use | Data Security |Threat Protection
Integrated into the Fabric of the Network
Cisco IronPort
Email Security
Appliance
Cisco Adaptive
Security Appliance
Cisco Integrated
Services Routers
Cisco IronPort
Web Security
Appliance
10
VM Software Security Module Hybrid Hosted Appliance
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 11
HTTP Is the New TCP
Instant Messaging
Peer to Peer
File Transfer
Protocol
Understanding Web Traffic
11
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 12
Advanced Content Analysis
12
SSN Detection
Rule Is Matched Multiple
Times to Increase Score
Unique Rule Matches Are Met
Matches Are Found
in Close Proximity
Proper Name
Detection
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 13
Advanced, Proactive Threat Protection
Cisco Security Intelligence Operations
Global
Threat
Telemetry
Global
Threat
Telemetry
8:03 GMT Sensor Detects
Hacker Probing
Bank Branch
in Chicago
Ad Agency HQ
in London
ISP Datacenter
in Moscow
8:00 GMT Sensor Detects
New Malware
8:07 GMT Sensor Detects
New Botnet
8:10 GMT
All Cisco Customers Protected
8:10 GMT
All Cisco Customers Protected
Cisco
SensorBase
Threat
Operations Center
Advanced
Algorithms
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 13
Higher Threat Coverage, Greater Accuracy, Proactive Protection
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 14
App
Server
Database
Server
Web
Server
Physical Security Device
Virtual Contexts
Pillar 3: Secure Virtualized Data Center
App
Server
Database
Server
Web
Server
Hypervisor
Physical Security Device
Virtual Contexts
VIRTUAL SECURITY
App
Server
Database
Server
Web
Server
Hypervisor
Connect Physical Security
to Virtual Machines with
Ciscos SIA
2
Secure Physical
Infrastructure
1
Embed Security in
the Virtual Switch
3
Service Chaining
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 15
Pillar 4: Rich Policy Enables
Ubiquitous , Consistent Control
Who? What? When? Where? How?
3
Policy On and Off
Premise
2
Dynamic
Containment Policy
1
Access
Policy
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 16
Access Control
Access Control
Policy
In a Cisco Secure and Protected Borderless Network
Access Control
Violation
Remote WebEx
Participant
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 17
In a Cisco Secure and Protected Borderless Network
Acceptable Use
Employee in Marketing
Department
Acceptable Use
Policy
Access Control
Violation
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 18
In a Cisco Secure and Protected Borderless Network
Data Security
Data Security
Policy
Data Security
Violation
Employee at
Unmanaged Device
2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 19
B
o
r
d
e
r
l
e
s
s
D
a
t
a

C
e
n
t
e
r
3
B
o
r
d
e
r
l
e
s
s
I
n
t
e
r
n
e
t
2
B
o
r
d
e
r
l
e
s
s
E
n
d

Z
o
n
e
s
1
Arquitectura Cisco para Seguridad de
Redes sin Fronteras
Polticas
Frontera Corporativa
Oficina Remota
Aplicaciones y
Datos
Oficina
Corporativa
Polticas
(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)
4
Oficina de
Casa
Atacantes
Coffee
Shop
Clientes
Aeropuerto
Usuario
Mvil
Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service

Potrebbero piacerti anche