3. “Captive Portal”
“It matches the pattern”
“No false positives,
no false negatives.”
Application
Control
FW/VPN
IDS / IPS
UTM
NAC
AV
PKI
“Block or Allow”
“Fix the Firewall”
“No key, no access”
Sandboxing
“Detect the
Unknown”
There
is
no
Silver
bullet
5. Organiza4ons
are
more
confident
but
increasingly
vulnerable
90%
of
companies
are
confident
about
their
policies
But
54%
admit
to
having
faced
public
scru?ny
following
a
security
breach.
6. Countries
with
higher
block
ra4os
have
many
Web
servers
and
compromised
hosts
on
networks
within
their
borders.
Russia
0.936
Japan
1.134
China
4.126
Hong
Kong
6.255
France
4.197
Germany
1.277
Poland
1.421
Canada
0.863
U.S.
0.760
Brazil
1.135
Malware
on
a
Global
Scale
Malicious
actors
do
not
respect
country
boundaries.
Malware
Traffic
Expected
Traffic
15. Game
Console
/
eCommerce
77M
Accounts
Hacked
Cloud
Service
5M
Customer
Email
Records
Stolen
Through
Phishing
WiFi
45M
Customer
Records
Stolen
SCADA
Control
Water
U4lity
Disrup4on
by
Pump
Shutdown
Springfield
Water
Light
&
Power
Social
Engineering
40M
Secure
Tokens
Stolen
POS
110M
Credit
Cards
and
Personal
Info
Stolen
16. 100%
of top 500 companies with
malicious connection
detected
60%
“collected”
in hours
54%
of new
Threats Discovered
after months
34. Detect,
Understand,
and
Stop
Threats
?
Collective Security
Intelligence
Threat
Identified
Event History
How
What
Who
Where
When
ISE
+
Network,
Appliances
(NGFW/NGIPS)
Context
AMP,
CWS,
Appliances
Recorded
Enforcement
35. Con4nuous
Advanced
Threat
Protec4on
ISE
+
Network,
Appliances
(NGFW/NGIPS)
How
What
Who
Where
When
Collective Security
Intelligence
AMP,
CWS,
Appliances
Enforcement
Event History
AMP,
Threat
Defense
Continuous AnalysisContext
42. Start
with
the
hardware
op4on
that
fits
best
All with built-in Application Visibility and Control (AVC), network firewalling, and VPN capabilities
Desktop
5506-X
Wireless AP
5506W-X
Ruggedized
5506H-X
Rackmount
5508-X/5516-X
Add
FirePOWER
Services*
for
enhanced
protec4on
*Available as subscriptions
Next-‐GeneraEon
Intrusion
PrevenEon
System
(NGIPS)
URL
Filtering
Advanced
Malware
ProtecEon
(AMP)
Choose
the
appropriate
management
solu4on
Appliance sold
separately
FireSIGHT
Management
Center
On-box manager
comes standard
AdapEve
Security
Device
Manager
(ASDM)
43. Cisco ASA with FirePOWER
Identity-Policy
Control & VPN
URL Filtering
(Subscription)
FireSIGHT
Analytics &
Automation
Advanced
Malware
Protection
(Subscription)
Application
Visibility &
Control
Network Firewall
Routing |
Switching
Clustering &
High Availability
WWW
Cisco Collective Security Intelligence Enabled
Built-in Network
Profiling
Intrusion
Prevention
(Subscription)
World’s
most
widely
deployed,
enterprise-‐
class
ASA
stateful
firewall
Granular
Cisco®
Applica4on
Visibility
and
Control
(AVC)
Industry-‐leading
FirePOWER
next-‐genera4on
IPS
(NGIPS)
Reputa4on-‐
and
category-‐based
URL
filtering
Advanced
malware
protec4on
44. Deployment
OpEons
Virtual
Appliance
MulE-‐device
Support
Desktop
Tablet
Laptop
Mobile
Cloud
Managed
Hybrid
Hybrid
On-‐Premises
Cloud
45. AMP
Advanced Malware
Protection
AMP
for
Networks
AMP
on
Web
and
Email
Security
Appliances
AMP
on
Cisco®
ASA
Firewall
with
FirePOWER
Services
AMP
for
Endpoints
AMP
for
Cloud
Web
Security
and
Hosted
Email
AMP
Private
Cloud
Virtual
Appliance
MAC OS
Windows OS
Android Mobile
Virtual
CWS
AMP
Threat
Grid
Malware
Analysis
+
Threat
Intelligence
Engine
Appliance
or
Cloud
*AMP for Endpoints can be
launched from AnyConnect
46. Employee Tag
PCI POS Tag
Partner Tag
Non-Compliant Tag
Voice Tag
Employee Non-Compliant
Campus Core
Data Center
Data VLAN 20
( PCI Segmenta4on within the same VLAN)
Non-Compliant
Access Layer
Voice Employee PCI POS Partner
SSL
VPN
ISE
ASA
Lancope/Nenlow
(SMC/FC)
Data
VLAN
20
Quaran4ne
ClassificaEon
Results:
Device
Type:
Apple
iPAD
User:
Mary
Group:
Employee
Corporate
Asset:
Yes
Malware
Detected
Yes
Data Center
Firewall
47. PROTECTION
Integrated Security and Consistent Policy Enforcement (Physical & Virtual)
Active Monitoring & Comprehensive Diagnostics for Threat Mitigation
PROVISIONING
Simplified Service Chaining
Dynamic Policy Management
Rapid Instantiation
PERFORMANCE
On Demand Scalability
Increased Clustering Size
Multi-Site Clustering