Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Secure Internet Gateway- A New Frontier in the Cloud

1,792 views

Published on

As networks become more decentralized and users connect directly to the internet and cloud services, security must evolve. It has to protect users wherever they work, and it has to shift to the cloud. Attend this session to learn about the industry’s first Secure Internet Gateway, Cisco Umbrella, and how it can address the enterprise security challenges of today’s mobile, cloud-era.

Published in: Technology
  • Be the first to comment

The Secure Internet Gateway- A New Frontier in the Cloud

  1. 1. A New Frontier in the Cloud The Secure Internet Gateway June 2017
  2. 2. Workplace desktops Business apps Critical infrastructure How we worked before Internet Headquarters Branch Workplace desktops
  3. 3. Sandbox Replacement Box SIEM DLP Web Security Email Security IDS Firewall VPN Router InternetSecuring the perimeter before the cloud Headquarters Branch Web Security Router/UTM Sandbox ... Workplace desktops Critical infrastructure Business apps Workplace desktops
  4. 4. Workplace desktops Business apps Critical infrastructure Internet Critical infrastructure Amazon, Rackspace, Windows Azure, etc. The way we work changed Business apps Salesforce, Office 365, G Suite, etc. 68% of workloads in public cloud datacenters 70% increase in SaaS usage
  5. 5. Business apps Salesforce, Office 365, DocuSign, etc. Workplace desktops Business apps Critical infrastructure Internet Critical infrastructure Amazon, Rackspace, Windows Azure, etc. The way we work changed 82% admit to not using the VPN 49% of the workforce is mobile Roaming laptops
  6. 6. Roaming laptops Business apps Salesforce, Office 365, DocuSign, etc. Workplace desktops Business apps Critical infrastructure Internet Critical infrastructure Amazon, Rackspace, Windows Azure, etc. 30% of advanced threats target branch offices 70% of branch offices have direct internet access Branch office The way we work changed
  7. 7. Security must evolve too How can the cloud change our approach to security?
  8. 8. Malware C2 Callbacks Phishing SIG Safe access anywhere users go, even off VPN Secure onramp to the internet First line of defense and inspection Protect anywhere users connect First line
  9. 9. On and off the corporate network All ports and protocols Open platform Live threat intelligence Proxy and file inspection Discovery and control of SaaS Your secure onramp to the internet, anywhere users go Secure Internet Gateway
  10. 10. Visibility and protection for all activity, anywhere HQ Mobile Branch Roaming IoT ALL PORTS AND PROTOCOLS ON-NETWORK OFF-NETWORK Umbrella All office locations Any device on your network Roaming laptops Every port and protocol
  11. 11. Enforcement built into the foundation of the internet It all starts with DNS • DNS is the main mechanism used to get traffic to Umbrella • DNS is the first step in internet connections and is used by all devices • Simple to deploy — just point DNS to Umbrella! Malware C2 Callbacks Phishing 208.67.222.222
  12. 12. Intelligent proxy Deeper inspection for risky URLs ...Continued Safe Original destinations Security controls § DNS and IP enforcement § SSL decryption available Blocked Modified destination Internet traffic On and off-network Destinations Original destination or block page
  13. 13. Intelligence to see attacks before launched Data § Cisco Talos feed of malicious domains, IPs, and URLs § Umbrella DNS data — 100B requests per day Security researchers § Industry renown researchers § Build models that can automatically classify and score domains and IPs Models § Dozens of models continuously analyze millions of live events per second § Automatically uncover malware, ransomware, and other threats
  14. 14. Intelligence Statistical models Co-occurrence model Identifies other domains looked up in rapid succession of a given domain Natural language processing model Detect domain names that spoof terms and brands Spike rank model Detect domains with sudden spikes in traffic Predictive IP space monitoring Analyzes how servers are hosted to detect future malicious domains Dozens more models 2M+ live events per second 11B+ historical events
  15. 15. Integrations to amplify existing security Block malicious domains from partner or custom systems Umbrella YOUR CURRENT SECURITY STACK Appliance-based detection + Others Threat intelligence platform + Others AMP Threat GridThreat analysis feed + Others CloudlockCloud Access Security Broker + Others IOCs Custom integrations + OthersPython Script Bro IPS
  16. 16. What sets Umbrella apart Easiest connect-to-cloud deployment Fastest and most reliable cloud infrastructure Broadest coverage of malicious destinations and files Most open platform for integration Most predictive intelligence to stop threats earlier
  17. 17. Umbrella Start blocking in minutes Easiest security product you’ll ever deploy http://signup.umbrella.com1 2 Point your DNS: 208.67.222.222 3 Done

×