Your SlideShare is downloading. ×
Cisco Vision de Arquitectura de Seguridad sin Fronteras (2010-01-21)
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cisco Vision de Arquitectura de Seguridad sin Fronteras (2010-01-21)

1,682
views

Published on

Presentación realizada por Ricardo Rivera, Business Develpment Manager Security & Mobility para Cono Sur en Cisco. …

Presentación realizada por Ricardo Rivera, Business Develpment Manager Security & Mobility para Cono Sur en Cisco.
Las empresas actuales sustentan sus nuevos negocios en esquemas donde se desdibujan las fronteras del centro de cómputo y el espacio físico laboral. Las interconexiones entre los empleados con las fuentes informativas y servicios que ellos necesitan ha formado una red de combinaciones que es necesario analizar bajo el esquema de seguridad innovadora de hoy. Es por ello, que CISCO propone un esquema de Seguridad de Redes sin Fronteras.

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,682
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
100
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Visión de la Arquitectura Seguridad Sin Fronteras Ricardo Rivera Business Development Manager Security & Mobility – Southern Cone Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
  • 2. Frontera Corporativa Tradicional Políticas Frontera Corporativa Aplicaciones y Datos Oficina Corporativa Oficina Remota Atacantes Partners Clientes Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Movilidad y Colaboración están Disolviendo la Frontera de Internet Políticas Frontera Corporativa Aplicaciones y Datos Oficina Corporativa Oficina Remota Oficina de Aeropuerto Casa Usuario Coffee Móvil Atacantes Partners Clientes Shop Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Cloud Computing está Disolviendo la Frontera del Data Center Políticas Frontera Corporativa Platform Infrastructure Aplicaciones as a Service as a Service Software X y Datos as a Service as a Service Oficina Corporativa Oficina Remota Oficina de Aeropuerto Casa Usuario Coffee Móvil Atacantes Partners Clientes Shop Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Los Clientes Quieren Negocios sin Fronteras Políticas Frontera Corporativa Platform Infrastructure Aplicaciones as a Service as a Service Software X y Datos as a Service as a Service Oficina Corporativa Oficina Remota Oficina de Aeropuerto Casa Usuario Coffee Móvil Atacantes Partners Clientes Shop Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Arquitectura Cisco para Seguridad de Redes sin Fronteras Políticas Policy 4 (Control de Acceso, Uso Permitido, Malware, Seguridad de Datos) Data Center Borderless Corporate Border Platform Infrastructure Applications as a Service as a Service X 3 and Data Software as a Service as a Service Corporate Office Borderless Internet 2 Branch Office End Zones Borderless Home Office Airport 1 Mobile Coffee User Attackers Partners Customers Shop Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Pillar 1: Borderless End Zone Intelligent End Point Traffic Routing Broadest Coverage Persistent Connectivity Advanced Security Most OS’s and Protocols Always On, Location Aware Strong Authentication Windows Mobile Auto Head-end Discovery Fast, Accurate Protection Apple iPhone IPsec , SSL VPN, DTLS Consistent Enforcement Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Always On Security and Protection Cisco Borderless Network Security Traditional VPN Protected Un-Protected Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Anytime, Anywhere, Any Device Always On Security and Protection In the Office Sitting in a Park At a Coffee Shop Cape Town, South Africa Cape Town, South Africa Sydney, Australia Sydney, Australia San Jose, California San Jose, California Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Pillar 2: Borderless Security Array Advanced Scanning and Enforcement Capabilities Cisco Adaptive Cisco Integrated Cisco IronPort Cisco IronPort Security Appliance Services Routers Web Security Email Security Appliance Appliance Access Control | Acceptable Use | Data Security |Threat Protection Integrated into the Fabric of the Network VM Software Appliance Security Module Hybrid Hosted Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. HTTP Is the New TCP File Transfer Protocol Instant Messaging Peer to Peer Understanding Web Traffic Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Advanced Content Analysis SSN Detection Proper Name Detection Matches Are Found in Close Proximity Rule Is Matched Multiple Times to Increase Score Unique Rule Matches Are Met Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Advanced, Proactive Threat Protection Cisco Security Intelligence Operations Global Global Threat Threat Telemetry Telemetry Cisco Threat Advanced SensorBase Operations Center Algorithms 8:10 GMT 8:10 GMT All Cisco Customers Protected All Cisco Customers Protected Ad Agency HQ ISP Datacenter Bank Branch in London in Moscow in Chicago 8:00 GMT Sensor Detects 8:07 GMT Sensor Detects 8:03 GMT Sensor Detects New Malware New Botnet Hacker Probing Higher Threat Coverage, Greater Accuracy, Proactive Protection Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Pillar 3: Secure Virtualized Data Center Connect Physical Security Secure Physical Embed Security in 1 Infrastructure 2 to Virtual Machines with 3 the Virtual Switch Cisco’s SIA Web App Database Web App Database Web App Database Server Server Server Server Server Server Server Server Server Hypervisor Hypervisor Service Chaining VIRTUAL SECURITY Virtual Contexts Virtual Contexts Physical Security Device Physical Security Device Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Pillar 4: Rich Policy Enables “Ubiquitous”, Consistent Control Who? What? When? Where? How? Access 1 Policy Dynamic 2 Containment Policy Policy On and Off 3 Premise Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Access Control In a Cisco Secure and Protected Borderless Network Access Control Access Control Policy Violation Remote WebEx Participant Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Acceptable Use In a Cisco Secure and Protected Borderless Network Acceptable Use Access Control Policy Violation Employee in Marketing Department Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Data Security In a Cisco Secure and Protected Borderless Network Data Security Data Security Policy Violation Employee at Unmanaged Device Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Arquitectura Cisco para Seguridad de Redes sin Fronteras Políticas Políticas 4 (Control de Acceso, Uso Permitido, Malware, Seguridad de Datos) Data Center Borderless Frontera Corporativa Platform Infrastructure Aplicaciones y as a Service as a Service X 3 Datos Software as a Service as a Service Oficina Corporativa Borderless Internet 2 Oficina Remota End Zones Borderless Oficina de Aeropuerto Casa 1 Usuario Coffee Móvil Atacantes Partners Clientes Shop Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19