Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The intent has shifted from the past when many of the security threats were from script kiddies or individuals looking more to have fun and make a name for themselves than anything else. Early attacks like web defacements were a nuisance, but did not cause serious damage. As the attempts to get more broad scale attention increased, the impact of attacks increased but it still was driven by a desire for fame, many of those attack may have caused some disruption, but could have been much more malicious had they destroyed or compromised data. We are now in an era where the attackers are focused on financial gain. In this mode they typically operate quietly, slower, are more resourceful, have greater intensity in their efforts. This has the potential to create more significant losses and thus drives a need to change defenses and how we approach security.
  • SDN 3.0 additions provide the architectural foundation to address the diverse threat environment Technologies and services to deploy a successful security solutions SOLUTIONS
  • Unique from Cisco is a complete service offering in which security is integral to the network. Cisco offers security services to support the complete lifecycle of your network. Cisco engineers can help you minimize the risk to valuable business assets by working with your team to assess, design, implement and optimize network security solutions that are critical to managing the evolving information security threat. Offering expert advice to meet your company’s security guidelines and policy, Cisco engineers can help you successfully plan for, design and manage the integration of security solutions such as network and host-based intrusion prevention systems, firewall devices, and security technologies like IPSec VPNs into your network infrastructure. Looking across the PDIO lifecycle Cisco offers: PLAN and ASSESS Cisco assessment and planning services range from developing an overview of your organization’s operational approach to security, to assessing the security of networked applications, systems, and devices. By assessing all aspects of your networked business environment, Cisco can help determine your organization’s ability to detect, defend against, and respond to attack. As the first step in planning network security, Cisco can provide you with a comprehensive Security posture assessment (SPA) of your organization’s network security posture. Cisco offers an IP Telephony Review service to ensure operational readiness with full security for a new IP telephony deployment DESIGN Once you have assessed the security state of the network, Cisco can work with you to develop a strong security design. Our design methodology considers all aspects of network security and its integration with the core network infrastructure. Using an in-depth, architectural approach based on industry standards, Cisco experts can help you develop a multi-layer defense against directed attacks from hackers or an indiscriminate attack from viruses and worms. Network Security Design Review - Cisco security consultants can assist you in defining the policies, standards and procedures that form the foundation of secure e-business, and then work to review and analyze your security architecture and design, addressing whether or not it supports your corporate security strategy and policy Network Security Design Development - The Network Security Design Development service can assist in developing a strategy, plan and design for integrating a new security solution into the core network infrastructure IMPLEMENT When your security solution design is set, Cisco Advanced Services engineers can support your team through implementation and deployment activities. The sound security design principles and assistance provided during the planning and design phases are made available during the implementation phase, strengthening your team’s ability to meet aggressive deployment schedules while minimizing costly disruptions to the existing network infrastructure. Implementation Plan Review - provide a review of your plan that analyzes the technical requirements, procedures, and resources needed to deploy, integrate, and manage the security solution. Network Security Implementation Engineering - To be fully effective security solutions must be carefully deployed, configured, tuned and integrated into the network infrastructure. Cisco offers services to support you through all aspects of deploying a new security solution including solution deployment, including installation, configuration, integration and management. CSA Implementation Services OPERATE Cisco offers Technical Support Services for the operational phase of the network lifecycle. Most relevant to the IPS 5.0 launch are: Cisco Service for IPS - Intrusion Prevention Products detect and control threats to the network using policies and signatures. Focused on quality and timeliness, Cisco strives to provide high fidelity signatures for more network threats with response commensurate with severity of the threat. Cisco has significant investment in people, tools, and process and has partnered with leading network anti-virus developer, Trend Micro, to provide standard, urgent, and emergency releases of signature update and alerts. Cisco Software Application Services (Software Application Support (SAS) and Software Application Support with Upgrades (S) for IPS – To extend the life and value of application software, Cisco offers Software Application Support plus Upgrades (SASU). This services provides updates and upgrades to Cisco Security Agent and Cisco Works VMS to ensure the end points (desktop and servers) and the security management application is running on latest revision benefiting from latest features. SMARTnet - Cisco SMARTnet protects investment in Cisco Integrated Services Routers by extending the life of hardware and Cisco IOS® by providing Cisco IOS updates, advance hardware replacement options, and access to technical support and online knowledgebase. OPTIMIZE As network conditions change, we’ll work with you to perform optimization checks and advise whether your network security infrastructure continues to meet performance objectives. Network Security Optimization - Cisco engineers can assess the ongoing security performance of your network by collecting and analyzing data for trends and security exceptions and can recommend changes to optimize your security design and implementation. Cisco engineers can evaluate and recommend changes to the load distribution and traffic-handling performance of your network security devices keep them tuned on an ongoing basis.
  • SEE-9-6-08

    1. 2. Bank Of The Future & Security Challenges Ashraf Taifour, Pre-sales Manager June 2008 “ We change the way you SEE Technology”
    2. 3. Bank Of The Future
    3. 4. IT Security – Strategic Business Enabler Technology designed and organized to solve real “Business Needs” for Banking Today !
    4. 5. Information Security Challenges
    5. 6. The Evolution of Intent A Shift to Financial Gain Threats Are Becoming Increasingly Difficult to Detect and Mitigate Threat Severity 1990 1995 2000 2005 Financial: Theft and Damage Fame: Viruses and Malware Notoriety: Basic Intrusions and Viruses 2007 2010
    6. 7. Hackers Have The Opportunity
    7. 8. Self-Defending Network The Future of IT Security Prevent Data Leakage and Disclosure Mitigate Targeted Attacks and Malware Propagation Achieve Policy and Regulatory Compliance
    8. 9. Complete Lifecycle Services <ul><li>Security design </li></ul><ul><li>Incident readiness assessment and design </li></ul><ul><li>Security implementation </li></ul><ul><li>HIPS, AV, NAC, IPS and Security Event </li></ul><ul><li>Management deployment </li></ul><ul><li>Security optimization </li></ul><ul><li>Security Posture Assessment (SPA) </li></ul><ul><li>Security architecture review </li></ul><ul><li>Unified communications security review </li></ul><ul><li>Security technology planning </li></ul><ul><li>Enterprise Architecture Consulting </li></ul>Plan Design Implement Operate Optimize Technology support for business objectives; sound financial decisions Alignment of investments to requirements Maintenance of network health; keeping threat management current, proactive Keeping network ahead of changing user demands and corporate policies High availability of network resources <ul><li>Security center </li></ul><ul><li>Intelligent information services </li></ul><ul><li>Security managed services </li></ul><ul><li>Incident response </li></ul>
    9. 10. Security Process <ul><li>Penetration Testing </li></ul><ul><li>Vulnerability Scanning </li></ul><ul><li>Security Remediation. </li></ul><ul><li>Security Design </li></ul><ul><li>Security Implementations </li></ul><ul><li>Perimeter Defense </li></ul><ul><li>Host Defense </li></ul><ul><li>Data Encryption </li></ul><ul><li>Communication Security </li></ul><ul><li>Identity Management </li></ul><ul><li>Training </li></ul><ul><li>Incident Response </li></ul><ul><li>Managed Security Services. </li></ul><ul><li>Security Management </li></ul><ul><li>Security Monitoring </li></ul><ul><li>Security Auditing </li></ul><ul><li>Training </li></ul>
    10. 11. Security Model Management & Administration Security Consulting Physical Security Certification Authorization Logging, Reporting, & Alerting Assessment Cryptography Access Control Enhanced User Authentication Anti-virus Firewalls
    11. 12. Security Challenges Message <ul><li>Start Your Security Process Today Better Than Tomorrow </li></ul><ul><li>Security Is Continues Process </li></ul><ul><li>Carefully Select Your Security Partner </li></ul>
    12. 13. Thank YOU… Together we could SEE the world with different Eyes … !!