BYOD and Security Trends

663 views
532 views

Published on

Published in: Technology, Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
663
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

BYOD and Security Trends

  1. 1. Cisco Confidential 1© 2010 Cisco and/or its affiliates. All rights reserved.BYOD & Security TrendsSébastien CommérotEmerging Markets Channel Lead,EMEAR Security Partner Organization
  2. 2. Cisco Confidential 2© 2010 Cisco and/or its affiliates. All rights reserved.• The “Bring Your Own Device” (BYOD) trend• Security Challenges Related to BYOD• The Latest Internet Threats• Overview of Cisco Security Solutions
  3. 3. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Mordac, I need toaccess myprofessional datafrom my iPadIf I help you, allemployees will wantto do the same!I cannotencouragethis type ofbehaviourThey allwant towork moreefficiently?
  4. 4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47%Tablet53%Laptop35%SmartphoneBYOD Is Already Popular for EmployeesPercent Currently Using Their OwnSource: Yankee Group, June 2012.
  5. 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5WIRED WIRELESS
  6. 6. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6Organizations will have to accept BYOD90% of customerswill allow BYODby 2014from Cisco Annual Security Report, February 2013 from Gartner, Unified Access Magic Quadrant, June 2012
  7. 7. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7How do you allow the right users and devicesto access resources in your network?How do you allow guests in your network in asecured fashion?How do you onboard securely new mobiledevices in your network?How do you implement different securitypolicies per user and per device?
  8. 8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8How do you make sure the devicesaccessing your network are clean?How can you provide consistent securitypolicies across different types of connection(Wired/Wireless/VPN)?How do you implement a secure remoteaccess to your datacenter or to your dataacross the cloud?How can you protect your network anddevices against latest Internet threats?
  9. 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  10. 10. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101. A legitimate site is hacked (iFrameadded on a page)2. User is re-directed by the iFrametowards an infected website3. Malware is automaticallydownloaded on the desktop byexploiting a vulnerability of theweb browserOver 83% of Web-based threats areusing exploitedlegitimate web sites9 out of 10 websites vulnerable toattackfrom Cisco Annual Security Report, February 2013 From White Hat Security, Website Sec Statistics Report
  11. 11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111.1 billion active users751 million mobile users550,000 active applications70% of users engaging withapplications
  12. 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12Stalker example
  13. 13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  14. 14. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14Too big toignore or block.
  15. 15. Cisco Confidential 15© 2012 Cisco and/or its affiliates. All rights reserved. Content with broadpublic interest Email sent to userswith a link to amalicious web-site Web-site isdownloading amalware on theuser’s computer
  16. 16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16SecureUnifiedAccess ASA-X CWSISEAnyConnectDistributedWorkplace & BYODIntegratedThreatDefenseWWWESA WSAASA-X IPS CWS ISRExpanded Perimeters& Attack SurfaceSecureDataCenter ASA-CX ASA-V IPS SGTVirtualization &Cloud TransitionAuthorizedApplication &Content UsageWWWWSAASA-CX CWSExplosion ofCollaboration Tools ESA
  17. 17. Thank you.

×