SlideShare a Scribd company logo
1 of 71
Download to read offline
1
#TEUNOsummit
2
#TEUNOsummit
CONOZCA MAS SOBRE NOSOTROS
3
#TEUNOsummit
NUESTRAS SOLUCIONES TIC
4
#TEUNOsummit
ALGUNOS DE NUESTROS CLIENTES
5
#TEUNOsummit
6
#TEUNOsummit
• Ataques actuales: Wanna Cry, Vulnerabilidades, DDOS, Brikerbot
(IoT), Ataque web Ejercito Argentina, APT, etc.
• Motivos de ataque: político, personal, remuneración.
• Como realizar un ataque?
• Como respondo al ataque?
• Como aprendo del ataque?
• He capacitado a mis usuarios en seguridad?
6
Ataques 2017
7
#TEUNOsummit
No se necesita ser un experto!
7
• Compro Bitcoins ($2747,00) / Etherum ($346,00)
• Compro el ataque.
• Ejecutan el ataque.
• Recibo información de la efectividad ataque.
8
#TEUNOsummit 8
Resultados !
9
#TEUNOsummit
Resultados !
10
#TEUNOsummit
Resultados !
11
#TEUNOsummit
12
#TEUNOsummit
Security
Analytics
Threat
Intelligence
Mobile
Cloud
Mobile
Cloud
Security
Analytics
Threat
Intelligence
Inteligencia
de
seguridad
Anomaly dtection
Vulnerability management Incident response
Log, flow, data analysis
13
#TEUNOsummit
OBSERVAR ORIENTAR
ACTUAR DECIDIR
• Observar todos los
ángulos.
• Aplicar priorizaciones
basada en inteligencia de
amenazas.
• Afinamiento continuo de
herramientas
• Implementación rápida de
remediación en activos
afectados
• Revisión y actualización
de políticas de seguridad
• Revisión y ajuste de
controles de monitoreo
con las lecciones
aprendidas
• Determinar el alcance e
impacto del ataque basado en
inteligencia.
• Revisión en contexto de
actividad de la red para
establecer una línea de tiempo
• Investigar la fuente del ataque
y la inteligencia que permita
tomar decisiones
• Determinar el siguiente
paso en responder al
incidente
• Revisión de los detalles
del active para priorizar la
respuesta
• Documentar tácticas de
remediación para los
activos afectados
RESPUESTA A
INCIDENTES
14
#TEUNOsummit
15
#TEUNOsummit
16
#TEUNOsummit
17
#TEUNOsummit
© 2014 Cisco and/or its affiliates. All rights reserved.
19
#TEUNOsummit
Cisco Meraki: a complete cloud-managed networking solution
-Wireless, switching, security, and MDM, centrally managed over the
web
-Built from the ground up for cloud management
-Integrated hardware, software, and cloud services
Leader in cloud-managed networking
-Tens of thousands of customers across all industries, over 100%
annual growth
-Operating in the cloud since 2006
Recognized for innovation
-Gartner Magic Quadrant, InfoWorld Technology of the Year, CRN
Coolest Technologies
Trusted by thousands of customers worldwide:
© 2014 Cisco and/or its affiliates. All rights reserved. 20
Why cloud managed
networking?
21
#TEUNOsummit
• Turnkey installation and management
• Integrated, always up to date features
• Scales from small branches to large networks
• Reduces operational costs
Manageability Scalability Cost Savings
© 2014 Cisco and/or its affiliates. All rights reserved. 22
Bringing the cloud to enterprise networks
Cisco Meraki MR
Wireless LAN
Cisco Meraki MX
Security Appliances
Cisco Meraki MS
Ethernet Switches
Cisco Meraki SM
Mobile Device
Management
23
#TEUNOsummit
1 billion iOS &
Android devices
Integrated
mobile device
management
HD video and
rich media
Layer 7
application
shaping
New business
opportunities
Analytics
and user
engagement
A complete solution out of the-box:
No extra hardware, software, or complexity
© 2014 Cisco and/or its affiliates. All rights reserved. 24
Cloud architecture
25
#TEUNOsummit
• Secure out-of-band
management: No user traffic
flows through the cloud
• Reliable: Network stays up if
connection to cloud is lost
• Scalable: Supporting customers
with thousands of sites, millions of
clients
• Future-proof: New features
delivered seamlessly from the
cloud
26
#TEUNOsummit
Wired +
wireless
Client
fingerprints
Application
QoS
Instant
search
Location
analytics
Real-time
control
27
#TEUNOsummit
User/device fingerprinting
Application firewall
Content filtering
Network access control WAN optimization
Mobile application deployment
© 2014 Cisco and/or its affiliates. All rights reserved. 28
Solution highlights
29
#TEUNOsummit
Centralized cloud
management scales to
thousands of sites
Multi-site visibility and control Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring and alerts
Zero-touch provisioning Devices automatically provision from the cloud, no staging required; self-configuring site-to-site VPN
Traffic acceleration WAN optimization and web caching accelerates and de-duplicates network traffic; application-aware QoS
prioritizes productivity apps
30
#TEUNOsummit
RF optimization and
application-aware QoS for
high-throughput, high-density
WLAN
Layer 7 application traffic
shaping
Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and group-based
shaping rules
Cloud-base RF optimization Dynamically avoid interference, optimizing channel selection and power levels
Density-optimized WLAN RF platform tuned for airtime fairness and performance in dense performance-critical environments
31
#TEUNOsummit
Out-of-the-box security,
management, and
capacity for BYOD-ready
deployments
Device-aware security Device-aware firewall and access control; Antivirus scan; LAN isolation;
Bonjour Gateway; Content and security filtering
Integrated MDM Enforce encryption, passcodes, and device restrictions; Deploy enterprise applications; Remotely lock or
wipe devices
Simplified onboarding Flexible authentication with AD integration, SMS authentication, hosted splash pages, and automatic MDM
enrollment
32
#TEUNOsummit
Built-in location
analytics
dashboard
Optimize marketing and
business operations
Analyze capture rate, dwell time, and new / repeat visitors to measure advertising, promotions, site
utilization, etc.
Built-in analytics Integrated into WLAN, no extra sensors, appliances, or software
Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted real-time
offers
33
#TEUNOsummit
Flexible built-in
authentication
mechanisms
Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for branding and targeted
social marketing; SMS self-service authentication, Lobby Ambassador, and hosted sign-on splash pages
Dynamic access control Assign clients layer 3-7 firewall rules, VLANs, and application-aware quality of service by identity, group,
location, or device type
34
#TEUNOsummit
Enterprise-class security features
for security-conscious
environments
Air Marshal WIDS/WIPS Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics
User and device aware
security
User, device, and group-based firewall rules (layer 3-7) with
Active Directory integration
Complete NG firewall and
content security
Application firewall; content filtering matching 1B+ URLs; antivirus / antimalware filtering; Google safe-
search
© 2014 Cisco and/or its affiliates. All rights reserved. 35
Case studies
36
#TEUNOsummit
• Wireless LAN spanning over 270 restaurants
nationwide
• Customer engagement through guest access,
coupons, promotions
• PCI-compliant solution enables mobile POS
• Restaurants centrally managed over the web
• Deployed without pre-staging or on-site IT
“The Meraki Dashboard makes it easy to manage the WiFi across all the restaurants, and we have
the visibility we wanted.”
Leslie McMasters, Network Administrator, Apple American Group
37
#TEUNOsummit
• California school district with 14 schools,
10,000 students
• Deployed cloud-managed firewall, 500
wireless APs (indoor + outdoor), and 100
Ethernet switches
• Enabled 1:1 Google Chromebook
deployment and BYOD policy
• Application visibility and control
optimizes bandwidth across 10k+ clients
“The Dashboard, the traffic shaping, and the MDM were real advantages. We can see the traffic
and devices on the fly.”
Chin Song, Director of Technology, Milpitas Unified School District
38
#TEUNOsummit
• Healthcare and services provider with 5,000
employees, 40 facilities across 11 states
• Deployed 350 cloud-managed wireless APs,
switches, and security appliances
• HIPAA-compliant WiFi for electronic medical
records and guest access
• Centrally managed by small IT staff
“The Meraki solution has provided us with a secure, centrally managed distributed network.”
Daniel McDonald, Systems Integration Manager, Mosaic
© 2014 Cisco and/or its affiliates. All rights reserved. 39
Product Families
40
#TEUNOsummit
Feature
highlights
BYOD policies
Application traffic shaping
Guest access
Enterprise security
WIDS / WIPS
Mesh routing
6 models including indoor/outdoor, high performance (802.11ac) and value-priced
Enterprise-class silicon including PoE, voice/video optimization
Lifetime warranty on indoor APs
41
#TEUNOsummit
Feature highlights
Zero-touch site-to-site VPN
WAN optimization
NG firewall
Content filtering
WAN link bonding
Intrusion detection/prevention
6 models scaling from small branch to large campus
Complete networking and security in a single appliance
42
#TEUNOsummit
Feature
highlights
Zero-touch site to site VPN
WAN optimization
NG firewall
Content filtering
WAN link bonding
Intrusion detection/prevention
6 models scaling from small branch to campus / datacenter
Complete networking and security in a single appliance
43
#TEUNOsummit
Gigabit access switches in 8, 24, and 48 port configurations, PoE available on all
ports
10 Gigabit SFP+ aggregation switches in 24 and 48 port configurations
Enterprise-class performance and reliability including non-blocking performance,
voice/video QoS, and a lifetime warranty
Voice and video QoS
Layer 7 app visibility
Virtual stacking
PoE / PoE + on all ports
Remote packet capture, cable
testing
Feature
highlights
44
#TEUNOsummit
Scalable
- Unlimited throughput, no bottlenecks
- Add devices or sites in minutes
Reliable
- Highly available cloud with multiple datacenters
- Network functions even if connection to cloud is interrupted
- 99.99% uptime SLA
Secure
- No user traffic passes through cloud
- Fully HIPAA / PCI compliant (level 1 certified)
- 3rd party security audits, daily penetration testing
- Automatic firmware and security updates (user-scheduled)
Reliability and security information at meraki.cisco.com/trust
Management
data (1 kb/s)
WAN
45
#TEUNOsummit
Device Management controls iOS, Android, Mac, and Windows devices
Cloud-based: no on-site appliances or software, works with any vendor’s network
Free: available at no cost to any organization, sign up at meraki.cisco.com/sm
Feature
highlights
Centralized app deployment
Device security
Rapid provisioning
Backpack™ file sharing
Asset management
46
#TEUNOsummit
• Try Meraki on your network
• Sets up in 15 minutes
• Technical support available at no cost
Free trials available at meraki.cisco.com/eval
Thank you.
48
#TEUNOsummitFranklin	Pilapanta,	Te Uno,		Preventa Microsoft
49
#TEUNOsummit
Números en este momento
750
millón
194 billón
188 billón
340 billón
>90%
De la lista Fortune
500 usa Microsoft
Cloud
50
#TEUNOsummit
Transformación	
Digital
51
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
52
#TEUNOsummit
Previene
Detecta
Responde
53
#TEUNOsummit
HIPAA	/	
HITECH	Act
Moderate
JAB	P-ATO
FIPS	140-2
FERPA
DoD	DISA
SRG	Level	2
ITAR CJIS
GxP
21	CFR	Part	11
IRS	1075Section	
508	VPAT
ISO	27001 SOC	1
Type	2
ISO	27018 CSA	STAR
Self-Assessment
Singapore
MTCS
UK	
G-Cloud
Australia
IRAP/CCSL
FISC
Japan
China
DJCP
New	
Zealand	
GCIO
China
GB	18030
EU
Model	Clauses
ENISA
IAF
Argentina	
PDPA
Japan	CS	
Mark	Gold
SP	800-171
China
TRUCS
Spain
ENS
PCI	DSS
Level	1
CDSA Shared
Assessments
MPAA
Japan	
My
Number	
Act
FACT
UK
High
JAB	P-ATO
GLBA
DoD	DISA
SRG	Level	4
MARS-E FFIEC
ISO	27017 SOC	2
Type	2
SOC	3
India
MeitY
Canada
Privacy
Laws
Privacy
Shield
ISO	22301
Germany	IT
Grundschutz
workbook
Spain
DPA
CSA	STAR
Certification
CSA	STAR
Attestation
HITRUST IG	Toolkit
UK
La nube más confiable y compatible
GLOBALUS	GOVINDUSTRIAREGIONAL
54
#TEUNOsummit
Retos de hoy
Entre la innovación empresarial y los requisitos de seguridad cibernética
Innovación Empresarial
55
#TEUNOsummit
Partner de Seguridad
Amplio ecosistema de soluciones de socios
56
#TEUNOsummit
Privacidad de Datos
• Cumplimiento y certificados con estándares de privacidad
a nivel mundial
Más información de certificación está
disponible en la Azure Trust Center.
Microsoft	Azure
ISO/IEC 27018 ü
SAS 70/ SSAE / SOC 1 / SOC 2 ü
FedRAMP ü
HIPAA BAA ü
EU-Model Clauses / Safe
Harbor
ü
UK G-Cloud/IL2 ü
PCI DSS ü
57
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
58
#TEUNOsummit
Crear	y	
ejecutar	
soluciones	de	
código	abierto
Implementar	la	
nube	en	
on-premises
Identidad	
consistente,	
aplicaciones,	
datos	y	gestión
59
#TEUNOsummit
60
#TEUNOsummit
Azure	Active	
Directory
SQL	ServerActive	
Directory
Azure	
data	services
Azure	services
Azure	Stack
Azure	administración	y	
seguridad
Una	sola	
Identidad
Gestión	
Integrada	de	
Seguridad
Plataforma	de	
datos	
coherente
Desarrollo	
Unificado	y	
DevOps
Infraestructura
On-premises
Nube
On-Premises
61
#TEUNOsummit
Azure	Site
Recovery
Azure	
StorSimple
SQL	Server	
Stretch DB
Azure	Active	
Directory
App	Service
Web	|	Mobile	
Logic Apps	|	API	Apps
Azure	
Backup Operations
Management	
Suite
NubeUsuarios
Datos Administración
Apps
Infrastructure
62
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
63
#TEUNOsummit
64
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
65
#TEUNOsummit
Apoyar la
estrategia de
negocio con
información
Aprender con
inteligencia
artificial
Predecir y
responder
proactivament
e
66
#TEUNOsummit
Datos	
Tradicionales
Datos	Web
Big	data
67
#TEUNOsummit
Recuperación
Organizar	la	reparación	de	sus	aplicaciones	para	una	
recuperación	de	desastres	simplificada
Mejore	los	Objetivos	de	Tiempo	de	Recuperación	(RTO)	y	
los	Objetivos	de	Recuperación	(RPO)	para	las	
interrupciones	planificadas	y	no	planificadas
Lograr	instrucciones	de	recuperación	de	desastres	de	
impacto	cero
Minimizar	errores	de	aplicación	y	pérdida	de	datos	con	
puntos	de	recuperación	de	aplicaciones	consistentes
Replicación	para	entornos	heterogéneos:	Hyper-V,	
VMware y	dispositivos	físicos
Azure
68
#TEUNOsummit
Economía de escala ▪ Escalamiento ágil ▪ Pago por uso
Azure Fortalezas
69
#TEUNOsummit
Socio de Negocios estratégicos
*operated by 21Vianet	
Chicago
Cheyenne
Dublin
Amsterdam
Hong	Kong
Singapore
Japan
San	Antonio
Boydton
Shanghai*
Quincy
Des	Moines
Brazil
Australia
Beijing*
70
#TEUNOsummit
Confianza de grandes cadenas empresariales
70
TEUNO Summit - Presentaciones

More Related Content

What's hot

IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 

What's hot (20)

Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Sprite guard on line brochure
Sprite guard on line brochureSprite guard on line brochure
Sprite guard on line brochure
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 

Similar to TEUNO Summit - Presentaciones

NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration Chris Cavallo
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to TEUNO Summit - Presentaciones (20)

NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

More from TEUNO

Principales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasPrincipales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasTEUNO
 
¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?TEUNO
 
Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017TEUNO
 
9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según GarnerTEUNO
 
Seguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasSeguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasTEUNO
 
Complejidad en infraestructura TI
Complejidad en infraestructura TI Complejidad en infraestructura TI
Complejidad en infraestructura TI TEUNO
 
La complejidad de las redes
La complejidad de las redesLa complejidad de las redes
La complejidad de las redesTEUNO
 
¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?TEUNO
 
El ingeniero de red
El ingeniero de redEl ingeniero de red
El ingeniero de redTEUNO
 
Backup en la nube
Backup en la nubeBackup en la nube
Backup en la nubeTEUNO
 
Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. TEUNO
 
Cableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoCableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoTEUNO
 
Guía de supervivencia contra ataques web
Guía de supervivencia contra ataques webGuía de supervivencia contra ataques web
Guía de supervivencia contra ataques webTEUNO
 
5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nubeTEUNO
 
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la VideoconferenciaTEUNO
 
Evolución de la SIEM moderna
Evolución de la SIEM modernaEvolución de la SIEM moderna
Evolución de la SIEM modernaTEUNO
 
3 pasos para proteger su oficina
3 pasos para proteger su oficina3 pasos para proteger su oficina
3 pasos para proteger su oficinaTEUNO
 
Cloud computing: usos y beneficios
Cloud computing: usos y beneficiosCloud computing: usos y beneficios
Cloud computing: usos y beneficiosTEUNO
 
Esquema del Cableado Estructurado
Esquema del Cableado EstructuradoEsquema del Cableado Estructurado
Esquema del Cableado EstructuradoTEUNO
 
7 ventajas del outsourcing
7 ventajas del outsourcing7 ventajas del outsourcing
7 ventajas del outsourcingTEUNO
 

More from TEUNO (20)

Principales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasPrincipales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresas
 
¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?
 
Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017
 
9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner
 
Seguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasSeguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticas
 
Complejidad en infraestructura TI
Complejidad en infraestructura TI Complejidad en infraestructura TI
Complejidad en infraestructura TI
 
La complejidad de las redes
La complejidad de las redesLa complejidad de las redes
La complejidad de las redes
 
¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?
 
El ingeniero de red
El ingeniero de redEl ingeniero de red
El ingeniero de red
 
Backup en la nube
Backup en la nubeBackup en la nube
Backup en la nube
 
Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo.
 
Cableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoCableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégico
 
Guía de supervivencia contra ataques web
Guía de supervivencia contra ataques webGuía de supervivencia contra ataques web
Guía de supervivencia contra ataques web
 
5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube
 
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
 
Evolución de la SIEM moderna
Evolución de la SIEM modernaEvolución de la SIEM moderna
Evolución de la SIEM moderna
 
3 pasos para proteger su oficina
3 pasos para proteger su oficina3 pasos para proteger su oficina
3 pasos para proteger su oficina
 
Cloud computing: usos y beneficios
Cloud computing: usos y beneficiosCloud computing: usos y beneficios
Cloud computing: usos y beneficios
 
Esquema del Cableado Estructurado
Esquema del Cableado EstructuradoEsquema del Cableado Estructurado
Esquema del Cableado Estructurado
 
7 ventajas del outsourcing
7 ventajas del outsourcing7 ventajas del outsourcing
7 ventajas del outsourcing
 

Recently uploaded

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

TEUNO Summit - Presentaciones