SlideShare a Scribd company logo
1 of 47
Download to read offline
Cisco Connect Ottawa
Canada • 2nd October 2018
Global vision.
Local knowledge.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Welcome!!
Benjamin Rossignol
Cybersecurity Systems Engineer, CCIE#23791
October 2018
Cisco’s Architectural Approach
Next-Generation
Datacenter Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Percentage of security team’s time
47%
Servers
29%
Customer data
23%
Endpoints
of the security team’s time
is spent on security in the data center76%
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Center Security… It Takes an Architecture!
Threat
protection
“Stop the breach”
Segmentation
“Reduce the
attack surface”
Visibility
“See everything”
Threat intelligence - Talos
Intent-based
Automation
Analytics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Building a True
Data Center Security
Architecture
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Datacenter Security Solutions –Focus Areas
Network & Application Analytics
• Stealthwatch
• Tetration
Visibility
Stop Attacks and Malware
• NGFW/NGIPS
• Advanced Malware
Protection (AMP)
Threat Prevention
Firewall and Access Control
• NGFW, ACI and Tetration
Policy Orchestration
• FMC and CloudCenter
• APIC and ISE
Segmentation
Integrated
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Architecture
Integrated
Portfolio
Best of breed
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
It Takes an Integrated Architecture
pxGrid
Security
Group
Tag /
EPG
API
Intel
Sharing Automation
Analytics
(Stealthwatch, Tetration)
Advanced
Malware
Policy and Access
o ISE
o NGFW
o Tetration
o ACI
NGFW / NGIPS
Threat Protection
Visibility
Segmentation
Management
o CloudCenter
o APIC
o FMC
o Tetration
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
ISE
Switches Routers Wireless
EndpointsIOT PhonesPrinters
WSA ESAFMC SMC
TALOS AMP/TG UmbrellaCTA
SIEM
VMC
Net Protocols
pxGrid
AMP/TG API
Firepower API
Syslog
Talos API
Cloud Services
Infrastructure & Devices
pxGrid
Generic API
Radius
Netflow
DNS
Legend
10
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Centers are Changing
Cisco Security Grows with You
Application Centric
Infrastructure
ACI Fabric
Virtualization
and Cloud
Traditional
Data Center
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Segmentation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How well do you understand your applications?
Application
Relevant Policy
Perform
Application
Dependency
Mapping
Tested?
Existing
ACL?
Accurate?
Review
Trusted?
No
No
No
No
Yes
Yes
YesIt’s already out
of date
Yes
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
“I have no idea what my segmentation policy
needs to be at any given time!”
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Tetration Connection Manager
Automated Security Policy Recommendation
Step2: Auto-Generation of Whitelist
Policies
Whitelist policy recommendation
• Identifies application intent
• Generates 4 tuple policies
Export into Cisco solutions
• Export in JSON, XML and YAML
• Import into ACI, ASA and NGFW
Step1: Behavior Analysis
Application conversations Conversation details/
process bindings
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Automated Policy Discovery
Audit and Enforcement
• Zero Trust Enforcement
ASA
• Tetration-to-ASA Policy Conversion
• Lifecycle ACL Management
• ACL Audit
Tetration
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Tetration Offerings
17
• VM Virtual Appliance
• DC, Amazon or Azure
• 3 Server Platform
• Turnkey Hadoop Appliances
• SW & HW Sensors
• Highest Performance
On-Prem Software OnlySaaS
• Tetration As A Service
• Cisco Hosted & Managed
• Cloud First Customers
1K to 25K+ Workloads 100 to 1000 Workloads
NEW NEW
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
DB Endpoint Group
NGFW ACI Tetration
Web EPG Database EPG
North / South Course Grain East / West
Fine Grain East / West
AKA Micro Segmentation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
DB Endpoint Group
•
•
•
•
•
•
NGFW ACI Tetration
Web EPG Database EPG
•
•
•
•
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
APIC configures FMC 6.2.3, using REST-APIs to manage the following devices:
 Pre-registered FTD devices in either Stand-alone, HA or Cluster mode
APIC configures the following features:
• Interfaces in Routed, Switched, or Inline mode. Defines VLAN sub-interfaces
(including Port-Channels) for Routed and Transparent firewall mode, including IRB.
Static routes can be added under interface configuration.
• Security Zones, Interface Names, Inline Sets, as specified in function profile
parameters. FMC names are prefixed with APIC Tenant and registered FTD device
name. EPG learning feature is supported with FMC.
• Assignment of the Security Zones to pre-configured ACP Rule(s).
FTD FI Device Package Version 1.0.3
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
FTD FI Device Package for ACI
Policy Creation:
Security Admin uses FMC to create an appropriate policy
Fabric Insertion:
Network Admin uses APIC to program Fabric Insertion of FTD
Security team configures via FMC
SECURITY NETWORK
DBApp
FMC 6.2
FMC GUI API API / GUI
Firepower NGFW
(FTD 6.2.3 image)
Registered to FMC
APIC Imports
FTD Device Package
To Program FMC
Managed Service Graph
Hybrid – Service Manager Model
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Center Security Working Together
CloudCenter
Tetration
ISE
AMP
Tetration
sensor
EPG
App
AMP
FTD
External Internal
FMC Manager
fire
EPG
DB
Tetration
sensor
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Simplifying Security
Orchestration
• Automated workload deployment
• Hybrid Cloud
CloudCenter
• Deploy EPG and contract
• Deploy service graph
ACI
• Deploy AMP for Endpoints
• Deploy Tetration Software Sensor
• Deploy ASA Firewall
Security Solutions
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Consistent access
policy from users to
servers
• pxGrid
ISE/TrustSec
• Contextual awareness
ACI/Endpoint Group
• Group based policy
NGFW
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
From Campus to Data Center
ACI Policy DomainTrustSec Policy Domain
Switch Router Router Firewall Nexus9000 Nexus9000 ServersUser
SGT
over
Ethernet
IPSec / DMVPN /
GETVPN / SXP
Classification
ISE creates matching SGTs for EPGs
ISE exchanges IP-SGT/EPG ‘Name bindings’
IP-ClassId, VNI bindings
IP-Security Group bindings
exchanged with network
Spine Leaf
Cisco ISE Cisco APIC-DC
Security Groups End Point Groups
ACI: Application Centric Infrastructure
WAN
(GETVPN
DMVPN IPSEC)
ASR 1K
Policy plane integration
Firewall
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced
Threat Protection
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Applications and services
Mitigating threats, risks and vulnerabilities
Users zone Server zone 1 Server zone 2 Outside world
business partners
Perimeter
firewall
Segment Datacenter Architecture
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Need for Advanced Threat Protection
TECDCT-2609
Segmentation
Threat
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Advanced Threat solutions
• DNS Security
• Command and
Control and
Malware Blocking
• Content Control
• Protection against
exploitation of app
vulnerabilities
• Impact-assessment
and IoC
• Auto-tuning of policy
• File based malware
protection
• Sandboxing to find
zero-day malware
• Retrospective
remediation of malware
Umbrella NGFW/NGIPS AMP
TECDCT-2609
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
96.8%
100%
90.1%
0.6%
67%
6.5%
2.9%
91.8%
17.1%
6.5%
96.3%
27%
Cisco:
Undisputed Leader in Stopping Threats Fast
-------Efficacy-------
--------------Time-----------------
74.7%
95.3% 97.1%
18.5%
39.9%
70.8%
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What is a Quarantine?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rapid Threat Containment (RTC)
Initial compromise Detection
Protect critical data, by stopping attacks faster, based on real-time threat intelligence
Internet
Enterprise
Network
Monetize theft
Problem
Infection spread
Data hoarding
Data exfiltration
100 – 200 days Initial compromise Containment
Internet
Solution
PxGrid
Enterprise
Network
Sensor
- AMP/
- NGIPS/
- ASA
(wFirePOWER)
EPS: Quarantine
(over PxGrid)
COA
Minutes
FMC
ISE
TrustSec
segmentation
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Firepower Remediation Subsystem Components
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Tetration Inventory – Contextual Visibility and
Policy
App Server
10.66.237.5
ISE/PxGrid
CMDB CI
IPAM/DNS
Hypervisor/Cloud
Security Ecosystem
Network
ISE Integration via PxGrid - Beta
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multi-Layered
threat prevention
architecture in
action
• Command & Control prevention
• Rapid threat containment
NGFW/NGIPS
• Tetration software sensor enforcement
• Automation NGFW to Tetration
Tetration
• Zero Day Protection
• Malware protection – from network, to
endpoint, to cloud
AMP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rapid threat
containment with
ACI micro-
segmentation
• Indicators of compromise
• Rapid threat containment
NGFW/NGIPS
• Micro-segmentation/uEPG
• Automation NGFW to APIC
ACI
• Network AMP
• Malware protection – from network, to
endpoint, to cloud
AMP
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
FMC to APIC Rapid Threat Containment
FMC Remediation Module for APIC
DB EPG
ACI Fabric
App EPG
Infected App1
Step 4: APIC Quarantines infected App1
workload into an isolated uSeg EPG
Step 1: Infected End Point launches an attack
that NGFW(v), FirePOWER Services in ASA,
or FirePOWER appliance blocks the attack
Step 2: Event is generated to FMC about an
attack blocked from infected host
Step 3: Attack event is configured to trigger
remediation module for APIC and quarantine
infected host using APIC NB API
1
FMC
App2
2
34
See demo on http://cs.co/rtc-with-apic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
FMC Remediation Module for ACI on Cisco.com
TECDCT-2609
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visibility
& Analytics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
• Comprehensive,
contextual network flow
visibility
• Real-time situational
awareness of traffic
Monitor
• Detect anomalous
network behavior
• Detect network
behaviors indicative of
threats: worms, insider
threats, DDoS and
malware
Detect
• Quickly scope an incident
• Network troubleshooting
• One click quarantine
Respond
See and detect more threats in your DC
Cisco Stealthwatch
Analyze
• Holistic network audit trail
• Threat hunting and
forensic investigations
Switch Router Router Firewall Data Center
Switch
ServerUser
WAN
ServerDevice
End-to-
End
Network
Visibility
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat
detection and hunting
Application traffic
modeling &
visibility
Access control
policy and audit
Anomalous
behavior
Integrated with other security solutions 1+1=3
Greater Visibility and Security Together
Cisco Tetration and Stealthwatch
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
42TECDCT-2609
Forensic Search
Flow Search by any attribute
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Monitoring Unified SGT-ACI Policy
TrustSec Domain
ACI Domain
pci_users
SGT: 16
EV_appProfile_LOB2_App1EPG
SGT: 10005
ACI Domain
Stealthwatch Deployment
Cisco ISE
APIC-DC
syslog
NetFlow
SGT
Definitions
EPG
Definitions
Policy Plane
Integration
Tetration
Analytics
SPAN
Policy
Push
Tetration
Telemetry
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Behavior and app
modeling and
threat analytics
• Threat detection
• Data exfiltration protection
• Tetration integration
Stealthwatch
• Security policy analysis
• Network flow to server process
Tetration
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Summary
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Data Center Security
Visibility
“See Everything”
Complete visibility of users,
devices, networks, applications,
workloads and processes
Threat Protection
“Stop the Breach”
Quickly detect, block, and respond to
attacks before hackers can steal data
or disrupt operations
Segmentation
“Reduce the Attack Surface”
Prevent attackers from moving
laterally east-west within the DC
with application whitelisting
Cisco Connect Ottawa 2018 data centre security

More Related Content

What's hot

What's hot (20)

Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Cisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attackCisco Connect Toronto 2017 - Anatomy-of-attack
Cisco Connect Toronto 2017 - Anatomy-of-attack
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018   accelerating incident response in organizations...Cisco connect winnipeg 2018   accelerating incident response in organizations...
Cisco connect winnipeg 2018 accelerating incident response in organizations...
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...Cisco connect winnipeg 2018   stealthwatch whiteboard session and cisco secur...
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformationCisco Connect 2018 Malaysia - SDNNFV telco data center transformation
Cisco Connect 2018 Malaysia - SDNNFV telco data center transformation
 
Cisco amp for meraki
Cisco amp for merakiCisco amp for meraki
Cisco amp for meraki
 
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
Cisco Connect Vancouver 2017 - Cloud and on premises collaboration security e...
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 

Similar to Cisco Connect Ottawa 2018 data centre security

Similar to Cisco Connect Ottawa 2018 data centre security (20)

Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
 
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
Cisco Connect 2018 Vietnam - Software-defined access-a transformational appro...
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
Cisco Connect 2018 Malaysia - software-defined access-a transformational appr...
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...[Cisco Connect 2018 - Vietnam] Cisco connect 2018   sanjay - cisco sda v1.0-h...
[Cisco Connect 2018 - Vietnam] Cisco connect 2018 sanjay - cisco sda v1.0-h...
 
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...Cisco Connect Ottawa 2018 dna automation   the evolution to intent-based netw...
Cisco Connect Ottawa 2018 dna automation the evolution to intent-based netw...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
Cisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloudCisco Connect Ottawa 2018 multi cloud
Cisco Connect Ottawa 2018 multi cloud
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
Cisco Connect 2018 Thailand - Next generation hyperconverged infrastructure-s...
 
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud   connect, protect, and consumeCisco Connect Ottawa 2018 multi cloud   connect, protect, and consume
Cisco Connect Ottawa 2018 multi cloud connect, protect, and consume
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 

More from Cisco Canada

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhere
 
Cisco Connect Toronto 2018 consuming public and private clouds
Cisco Connect Toronto 2018   consuming public and private cloudsCisco Connect Toronto 2018   consuming public and private clouds
Cisco Connect Toronto 2018 consuming public and private clouds
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Cisco Connect Ottawa 2018 data centre security

  • 1. Cisco Connect Ottawa Canada • 2nd October 2018 Global vision. Local knowledge.
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Welcome!!
  • 3. Benjamin Rossignol Cybersecurity Systems Engineer, CCIE#23791 October 2018 Cisco’s Architectural Approach Next-Generation Datacenter Security
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Percentage of security team’s time 47% Servers 29% Customer data 23% Endpoints of the security team’s time is spent on security in the data center76%
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Center Security… It Takes an Architecture! Threat protection “Stop the breach” Segmentation “Reduce the attack surface” Visibility “See everything” Threat intelligence - Talos Intent-based Automation Analytics
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Building a True Data Center Security Architecture
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Datacenter Security Solutions –Focus Areas Network & Application Analytics • Stealthwatch • Tetration Visibility Stop Attacks and Malware • NGFW/NGIPS • Advanced Malware Protection (AMP) Threat Prevention Firewall and Access Control • NGFW, ACI and Tetration Policy Orchestration • FMC and CloudCenter • APIC and ISE Segmentation Integrated
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Architecture Integrated Portfolio Best of breed
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential It Takes an Integrated Architecture pxGrid Security Group Tag / EPG API Intel Sharing Automation Analytics (Stealthwatch, Tetration) Advanced Malware Policy and Access o ISE o NGFW o Tetration o ACI NGFW / NGIPS Threat Protection Visibility Segmentation Management o CloudCenter o APIC o FMC o Tetration
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ISE Switches Routers Wireless EndpointsIOT PhonesPrinters WSA ESAFMC SMC TALOS AMP/TG UmbrellaCTA SIEM VMC Net Protocols pxGrid AMP/TG API Firepower API Syslog Talos API Cloud Services Infrastructure & Devices pxGrid Generic API Radius Netflow DNS Legend 10
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Centers are Changing Cisco Security Grows with You Application Centric Infrastructure ACI Fabric Virtualization and Cloud Traditional Data Center
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Segmentation
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential How well do you understand your applications? Application Relevant Policy Perform Application Dependency Mapping Tested? Existing ACL? Accurate? Review Trusted? No No No No Yes Yes YesIt’s already out of date Yes
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential “I have no idea what my segmentation policy needs to be at any given time!”
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Tetration Connection Manager Automated Security Policy Recommendation Step2: Auto-Generation of Whitelist Policies Whitelist policy recommendation • Identifies application intent • Generates 4 tuple policies Export into Cisco solutions • Export in JSON, XML and YAML • Import into ACI, ASA and NGFW Step1: Behavior Analysis Application conversations Conversation details/ process bindings
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Automated Policy Discovery Audit and Enforcement • Zero Trust Enforcement ASA • Tetration-to-ASA Policy Conversion • Lifecycle ACL Management • ACL Audit Tetration
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Tetration Offerings 17 • VM Virtual Appliance • DC, Amazon or Azure • 3 Server Platform • Turnkey Hadoop Appliances • SW & HW Sensors • Highest Performance On-Prem Software OnlySaaS • Tetration As A Service • Cisco Hosted & Managed • Cloud First Customers 1K to 25K+ Workloads 100 to 1000 Workloads NEW NEW
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential DB Endpoint Group NGFW ACI Tetration Web EPG Database EPG North / South Course Grain East / West Fine Grain East / West AKA Micro Segmentation
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential DB Endpoint Group • • • • • • NGFW ACI Tetration Web EPG Database EPG • • • •
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential APIC configures FMC 6.2.3, using REST-APIs to manage the following devices:  Pre-registered FTD devices in either Stand-alone, HA or Cluster mode APIC configures the following features: • Interfaces in Routed, Switched, or Inline mode. Defines VLAN sub-interfaces (including Port-Channels) for Routed and Transparent firewall mode, including IRB. Static routes can be added under interface configuration. • Security Zones, Interface Names, Inline Sets, as specified in function profile parameters. FMC names are prefixed with APIC Tenant and registered FTD device name. EPG learning feature is supported with FMC. • Assignment of the Security Zones to pre-configured ACP Rule(s). FTD FI Device Package Version 1.0.3
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FTD FI Device Package for ACI Policy Creation: Security Admin uses FMC to create an appropriate policy Fabric Insertion: Network Admin uses APIC to program Fabric Insertion of FTD Security team configures via FMC SECURITY NETWORK DBApp FMC 6.2 FMC GUI API API / GUI Firepower NGFW (FTD 6.2.3 image) Registered to FMC APIC Imports FTD Device Package To Program FMC Managed Service Graph Hybrid – Service Manager Model
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Data Center Security Working Together CloudCenter Tetration ISE AMP Tetration sensor EPG App AMP FTD External Internal FMC Manager fire EPG DB Tetration sensor
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Simplifying Security Orchestration • Automated workload deployment • Hybrid Cloud CloudCenter • Deploy EPG and contract • Deploy service graph ACI • Deploy AMP for Endpoints • Deploy Tetration Software Sensor • Deploy ASA Firewall Security Solutions
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Consistent access policy from users to servers • pxGrid ISE/TrustSec • Contextual awareness ACI/Endpoint Group • Group based policy NGFW
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential From Campus to Data Center ACI Policy DomainTrustSec Policy Domain Switch Router Router Firewall Nexus9000 Nexus9000 ServersUser SGT over Ethernet IPSec / DMVPN / GETVPN / SXP Classification ISE creates matching SGTs for EPGs ISE exchanges IP-SGT/EPG ‘Name bindings’ IP-ClassId, VNI bindings IP-Security Group bindings exchanged with network Spine Leaf Cisco ISE Cisco APIC-DC Security Groups End Point Groups ACI: Application Centric Infrastructure WAN (GETVPN DMVPN IPSEC) ASR 1K Policy plane integration Firewall
  • 26. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Advanced Threat Protection
  • 27. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Applications and services Mitigating threats, risks and vulnerabilities Users zone Server zone 1 Server zone 2 Outside world business partners Perimeter firewall Segment Datacenter Architecture
  • 28. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Need for Advanced Threat Protection TECDCT-2609 Segmentation Threat
  • 29. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Advanced Threat solutions • DNS Security • Command and Control and Malware Blocking • Content Control • Protection against exploitation of app vulnerabilities • Impact-assessment and IoC • Auto-tuning of policy • File based malware protection • Sandboxing to find zero-day malware • Retrospective remediation of malware Umbrella NGFW/NGIPS AMP TECDCT-2609
  • 30. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96.8% 100% 90.1% 0.6% 67% 6.5% 2.9% 91.8% 17.1% 6.5% 96.3% 27% Cisco: Undisputed Leader in Stopping Threats Fast -------Efficacy------- --------------Time----------------- 74.7% 95.3% 97.1% 18.5% 39.9% 70.8%
  • 31. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential What is a Quarantine?
  • 32. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Rapid Threat Containment (RTC) Initial compromise Detection Protect critical data, by stopping attacks faster, based on real-time threat intelligence Internet Enterprise Network Monetize theft Problem Infection spread Data hoarding Data exfiltration 100 – 200 days Initial compromise Containment Internet Solution PxGrid Enterprise Network Sensor - AMP/ - NGIPS/ - ASA (wFirePOWER) EPS: Quarantine (over PxGrid) COA Minutes FMC ISE TrustSec segmentation
  • 33. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Firepower Remediation Subsystem Components
  • 34. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Tetration Inventory – Contextual Visibility and Policy App Server 10.66.237.5 ISE/PxGrid CMDB CI IPAM/DNS Hypervisor/Cloud Security Ecosystem Network ISE Integration via PxGrid - Beta
  • 35. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Multi-Layered threat prevention architecture in action • Command & Control prevention • Rapid threat containment NGFW/NGIPS • Tetration software sensor enforcement • Automation NGFW to Tetration Tetration • Zero Day Protection • Malware protection – from network, to endpoint, to cloud AMP
  • 36. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Rapid threat containment with ACI micro- segmentation • Indicators of compromise • Rapid threat containment NGFW/NGIPS • Micro-segmentation/uEPG • Automation NGFW to APIC ACI • Network AMP • Malware protection – from network, to endpoint, to cloud AMP
  • 37. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FMC to APIC Rapid Threat Containment FMC Remediation Module for APIC DB EPG ACI Fabric App EPG Infected App1 Step 4: APIC Quarantines infected App1 workload into an isolated uSeg EPG Step 1: Infected End Point launches an attack that NGFW(v), FirePOWER Services in ASA, or FirePOWER appliance blocks the attack Step 2: Event is generated to FMC about an attack blocked from infected host Step 3: Attack event is configured to trigger remediation module for APIC and quarantine infected host using APIC NB API 1 FMC App2 2 34 See demo on http://cs.co/rtc-with-apic
  • 38. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential FMC Remediation Module for ACI on Cisco.com TECDCT-2609
  • 39. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Visibility & Analytics
  • 40. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential • Comprehensive, contextual network flow visibility • Real-time situational awareness of traffic Monitor • Detect anomalous network behavior • Detect network behaviors indicative of threats: worms, insider threats, DDoS and malware Detect • Quickly scope an incident • Network troubleshooting • One click quarantine Respond See and detect more threats in your DC Cisco Stealthwatch Analyze • Holistic network audit trail • Threat hunting and forensic investigations Switch Router Router Firewall Data Center Switch ServerUser WAN ServerDevice End-to- End Network Visibility
  • 41. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Threat detection and hunting Application traffic modeling & visibility Access control policy and audit Anomalous behavior Integrated with other security solutions 1+1=3 Greater Visibility and Security Together Cisco Tetration and Stealthwatch
  • 42. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42TECDCT-2609 Forensic Search Flow Search by any attribute
  • 43. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Monitoring Unified SGT-ACI Policy TrustSec Domain ACI Domain pci_users SGT: 16 EV_appProfile_LOB2_App1EPG SGT: 10005 ACI Domain Stealthwatch Deployment Cisco ISE APIC-DC syslog NetFlow SGT Definitions EPG Definitions Policy Plane Integration Tetration Analytics SPAN Policy Push Tetration Telemetry
  • 44. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Behavior and app modeling and threat analytics • Threat detection • Data exfiltration protection • Tetration integration Stealthwatch • Security policy analysis • Network flow to server process Tetration
  • 45. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Summary
  • 46. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Data Center Security Visibility “See Everything” Complete visibility of users, devices, networks, applications, workloads and processes Threat Protection “Stop the Breach” Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations Segmentation “Reduce the Attack Surface” Prevent attackers from moving laterally east-west within the DC with application whitelisting