• Save
Defending the Data Center: Cisco Launch Event
 

Defending the Data Center: Cisco Launch Event

on

  • 10,202 views

Discover how Cisco is securing the Data Center with the highest performance density and innovative new products & solutions. Watch the full video: http://cs.co/CiscoDCSecurity. ...

Discover how Cisco is securing the Data Center with the highest performance density and innovative new products & solutions. Watch the full video: http://cs.co/CiscoDCSecurity.

You will learn about the new ASA 1000V Cloud Firewall, IPS 4500 Series Sensors, ASA 9.0 Firewall Platform, and our vision for the future of data center security.

Statistics

Views

Total Views
10,202
Views on SlideShare
8,776
Embed Views
1,426

Actions

Likes
5
Downloads
0
Comments
2

10 Embeds 1,426

https://twitter.com 1010
https://si0.twimg.com 308
http://twitter.com 63
http://cloudcomputingwire.com 34
http://fr.twitter.com 3
https://fr.twitter.com 2
http://www.twylah.com 2
http://www.slashdocs.com 2
https://twimg0-a.akamaihd.net 1
http://en.twitter.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • it's good doc
    Are you sure you want to
    Your message goes here
    Processing…
  • Rajeev Kulshrestha - ( Founder & Managing Director ) - M/s RAM'S MEDIA SERVICES , NEW DELHI - INDIA
    +91 9654985213, +91 9899839118
    WWW.RAMSMEDIASERVICES.COM INFO@RAMSMEDIASERVICES.COM
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • .
  • Allow customers to securely and fluidly transform from physical, virtual, cloud (as needed)Provide operational consistency (choice) by delivering form factor agnostic solutions – integrated versus overlay – while maintaining mgmt/policy consistencyProvide high-speed (physical) and/or elastic (virtual/cloud) designs to meet demandsDeliver solutions using tested and validated architectural designsSeamlessly integrated security into fabric of the network

Defending the Data Center: Cisco Launch Event Defending the Data Center: Cisco Launch Event Presentation Transcript

  • DEFENDINGTHE DATA CENTERChristopher YoungSenior Vice President, Security & Government Group© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • Business Security and Budget 24x7 Business Agility Compliance Constraints Proliferation Cloud Data Deluge Energy Efficiency of Devices© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • VIRTUAL WORKLOAD CLOUD WORKLOAD PHYSICAL WORKLOAD HYPERVISOR VDC-1 VDC-2 • One App Per Server • Many Apps Per Server • Multiple Tenants Per Server • Static • Mobile • Automated Scaling • Manual Provisioning • Dynamic Provisioning • Elastic© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 View slide
  • • Establish boundaries— • Stop internal and • Provide transparency network, compute, virtual external attacks to usage and utilization • Enforce policy by • Patrol zone and • Apply business context functions, devices, orgs edge boundaries to network activity • Control access to • Control information • Simplify operations and networks, resources, apps access and usage compliance reporting© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 View slide
  • BUSINESS CONTEXT UNIFIED DATA Compute Network Storage Management CENTER MANAGEMENT Segmentation Threat Defense Visibility SECURITY VALIDATED NEW Data Center Security CVD Virtual Multi-Service Data Center DESIGNS Physical Virtual Cloud© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • Enforcing Consistent Policies Across Physical and Virtual Boundaries to Protect Data at Rest And In Motion Fabric Segmentation Network Segmentation UCS Fabric Interconnect Physical Virtual (VLAN, VRF) Virtualized (Zones) TrustSec Context-Aware Segmentation Firewall Segmentation Security Group Tags (SGT) Stateful/reflective ACL Security Exchange Protocol (SXP) Multi-context Security Group ACL VPN© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • Protecting Businesses From External and Internal Threats Organized Hackers Crime Cyber Disgruntled Criminals Employee© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • Maintaining compliance and providing insight into data center operations Management and Reporting Enabling centralized operations with administrative separation Insights Providing a detailed understanding of network and security sessions Policy Orchestration Creating identity-based policies that carry consistently throughout the network© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • THE AVERAGE APPROACH THE CISCO APPROACH Systems approach that covers physical, Limited infrastructure footprint virtual and cloud infrastructure Integrated compute, network, security and Security as a bolt on storage resources Narrow coverage and depth Broadest ecosystem of partners Limited coverage and response times Global threat intelligence footprint Standards based Standards + innovations driving standards On sight resiliency testing Backed by Cisco Validated Designs© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • PERFORMANCE DENSITY POWER CONSUMPTION Connection Speed per Rack Unit 350 3000 100% 300 2500 Power Consumption 250 8x 2000 200 1500 150 1000 100 84% 16% 50 500 0 0 Other Cisco Other Cisco© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • SECURITY NETWORK COMPUTE© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • Providing operational consistency Allowing customers to (choice) by delivering form factor securely and fluidly transform agnostic solutions while maintaining from physical, virtual and management and policy consistency cloud architectures SECURITY Cisco’s UNIQUE ADVANTAGE Offering high-performance physical devices and elastic Delivering solutions that are virtual/cloud designs to meet NETWORK COMPUTE lab tested and validated stringent demands architectural designs© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • DEFENDINGTHE DATA CENTERManish GuptaVP of Product Management© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • • Scales linearly to deliver up to 320 Gbps; yet managed as one firewall• Highest performance density• Now supports IPv6 remote access connections• Provides context awareness for next-generation visibility and control
  • NEW • Purpose built virtual ASA firewall for multitenant environments • Integrated with Nexus 1000V • Enables secure segmentation, for consistent, end-to-end security across physical, virtual, and cloud environments
  • • New! 10Gbps inspection performance, small form factor • Scale as you grow modelNEW • Offers the broadest visibility of attacker, victim, and attack information of any inline IPS
  • • Health and performance monitoring• Sophisticated, phased upgrade process of managed devices• Granular role based access control• New APIs that enable integration with 3rd party vendors
  • • Differentiated device access to enable BYOD deployments• IPv6 capable• Latest Next Generation Encryption, including NSA’s Suite B Cryptography
  • © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20