Partner Summit 2014: Christopher Young General Session

1,797 views

Published on

SVP, of the Cisco Security Solutions Group's general session presentation at Partner Summit 2014.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,797
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
53
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Partner Summit 2014: Christopher Young General Session

  1. 1. Cisco Confidential 1© 2013-2014 Cisco and/or its affiliates. All rights reserved. From the Browser to the Boardroom Browser Mobile Work Office Small Group Spaces Larger Spaces Boardrooms
  2. 2. Cisco Confidential 2© 2013-2014 Cisco and/or its affiliates. All rights reserved. From the Browser to the Boardroom Browser Mobile Work Office Small Group Spaces Larger Spaces Boardrooms
  3. 3. Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved. Any Device to Any Cloud Public Cloud Private Cloud Public Cloud
  4. 4. Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved. Proliferation of Attack Vectors Cloud/SaaS Applications | Off-net Users | Explosion of Data | Internet of Things Public Cloud Private Cloud Public Cloud
  5. 5. Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved. Internet of Things…and Everything EVERY COMPANY BECOMES A TECHNOLOGY COMPANY, EVERY COMPANY BECOMES A SECURITY COMPANY
  6. 6. Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved. APTs Cyberware Spyware & RootkitsWormsViruses 20102000 2005 Today + The Industrialization of Hacking Anti-virus (Host) IDS/IPS (Network) Anti-malware (Host+Network) Intelligence and Analytics (Host+Network+Cloud) Enterprise Response
  7. 7. Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved. The Problem is THREATS
  8. 8. Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved. The New Security Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING Network Endpoint Mobile Virtual Cloud Point in Time Continuous
  9. 9. Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved. The New Security Model BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING Spend Shift 60% 30% 10% Point in Time Continuous
  10. 10. Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved. Advanced Services Covering the Entire Attack Continuum Attack Continuum NGFW Secure Access + Identity Services UTM Web Security Email Security Network Behavior Analysis Firewall VPN NGIPS Advanced Malware Protection BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
  11. 11. Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved. Reduce Complexity and Increase Capability Collective Security Intelligence Centralized Management Appliances, Virtual Network Control Platform Device Control Platform Cloud Services Control Platform Appliances, Virtual Host, Mobile, Virtual Hosted
  12. 12. Thank you.

×