• Save
Краткое введение в Cisco SecureX
Upcoming SlideShare
Loading in...5
×
 

Краткое введение в Cisco SecureX

on

  • 1,604 views

 

Statistics

Views

Total Views
1,604
Views on SlideShare
1,604
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Just the facts…Sergeant Joe Friday is a LAPD detective with Dragnet.
  • Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security.  - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc.  - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.
  • Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security.  - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc.  - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.

Краткое введение в Cisco SecureX Краткое введение в Cisco SecureX Presentation Transcript

  • Cisco SecureX© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • Рост Соответствие Внимание ИТ Глобализация Риск-менеджмент Разрешить Защитить Соответствие Регулирование Внимание ИБ Привлечение людей Персданные Внимание руководства© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • Организационно – КТО? Compliance Ops. Endpoint Team Network Ops. Security Ops. Политика Application Team HR Технологически – ЧТО?  Не пустить плохих  Пустить хороших Контроль доступа Endpoint  Соответствовать Identity Mgmt Вторжения  Учесть BYOD Соответствие Управления  Разрешить виртуализацию  Быть готовым к облакам Операционно – КАК? Проводное В сети Беспроводное Поверх сети VPN На устройстве© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 View slide
  • ОТ К # ! % Поэтапный дизайн Координация систем Унифицированные точки Точечные решения применения политик Всесторонний контроль Ограничение обзора на 360 Проверка на «кошках» Проверенный дизайн© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 View slide
  • Маршрутизация всех запросов Источники всех данных Управление всеми устройствами СЕТЬКонтроль всех потоков Контроль всех потоков Видимость всего трафика Контроль всех пользователей© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • Исследования в области ИБ (SIO) Защищенный Защищенный Защищенный ЦОД и универсальный филиал и периметр облако доступ Косьюмеризация Депериметризация Виртуализация Политика Управление Точки приложения сил Сеть© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • Объединить людей и информацию... Безопасно Исследования в области ИБ Политика Устройства & Пользователи Активы & Информация Управление Точки приложения сил Сеть© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • Политика Кто Что Как Где/откуда КогдаАнализугроз SensorBase Operations Center Dynamic UpdatesВнедрение на Интегрированная Высокоскоростная Облачныеуровне сети инфраструктура навесная защита вычисления © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • • Сложность• Операционные затраты• Число уязвимостей• Обучение специалистов• Поддержка• Эксплуатация и управление• Мониторинг и устранение неисправностей• Конфигурация и обновление• Интеграция© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • http://www.facebook.com/CiscoRu http://twitter.com/CiscoRussia http://www.youtube.com/CiscoRussiaMedia http://www.flickr.com/photos/CiscoRussia http://vkontakte.ru/Cisco© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • Спасибо! security-request@cisco.com© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12