Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco

239 views

Published on

Presentacion de Jeff Reed de Cisco dentro del RSA Conference 2018

Published in: Technology
  • Be the first to comment

  • Be the first to like this

#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco

  1. 1. Jeff Reed SVP of Product, Security Business Group April 17, 2018 Building an Effective Security Architecture How Can We Change The Security Equation?
  2. 2. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential2 Observed Threats and TTD Cloud-based security technology has been a key factor in helping Cisco maintain a low median despite a significant increase in threat samples Cisco Annual Median TTD (Hours) 37.1 14 4.6 2015 2016 2017 Number of Observed Threat Samples 10x Increase 2016 2017
  3. 3. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential3 Architecture Integrated Portfolio Best of Breed Intelligence
  4. 4. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential4 Stop threats at the edge NGFW / UTM / Web Proxy FirePOWER/Meraki/ WSA Advanced Threat Advanced Malware Protection (AMP) Email Security Email Security Appliance with AMP Security Solutions for Business Outcomes Protect your Business During Digital Transformation Protect users wherever they work Endpoint Protection from the Cloud Umbrella AMP for Endpoints Endpoint Deployment AnyConnect Find and contain problems fast Anomaly Detection AMP Stealthwatch Analytics Encrypted Traffic Analytics Control who gets onto your network Policy and Access Control Identity Services Engine (ISE) (Key to SD-Access) CASB Cloudlock Simplify network segmentation Software Defined Segmentation Trustsec Access SDA Data Center Tetration
  5. 5. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential5 Securing All Endpoints from Laptops to Servers Endpoint Security Malware everywhere demands malware protection everywhere: network, endpoint, cloud. Workload Security Segmentation, network visibility and threat protection for next generation data center deployments
  6. 6. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential6 Endpoint Security
  7. 7. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential7 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential7 #1 Threat Vector…
  8. 8. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential8 MOST CHALLENGING AREAS TO DEFEND *Source: Cisco 2018 Security Capabilities Benchmark Study Endpoint Devices Increasingly Difficult to Defend
  9. 9. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential9 The network and endpoint, working together across all operating systems Continuously monitor, analyze, and protect With retrospective security and threat hunting Cisco AMP for Endpoints Uncovers the Missing 1% !
  10. 10. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential10 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential10 • Simplify and expedite investigations in any AMP-integrated product and Umbrella with Cisco Visibility • Marries external threat intelligence with internal security event, alert data • Quickly see the extent of a compromise • No need to switch between multiple consoles to perform common tasks Introducing Cisco Visibility
  11. 11. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential11 Workload Security
  12. 12. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential12 The Modern Data Center is incredibly complex
  13. 13. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential13 Protect the Workload Everywhere Visibility Segmentation Threat Protection
  14. 14. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential14 Segmentation: Reduce the Attack Surface
  15. 15. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential15 Segmentation: Reduce the Attack Surface
  16. 16. © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI Tetration Next-gen Firewall Threat Protection: Stop the Breach By strategically deploying threat sensors north-south, east-west Multi-Layered Threat Sensors Next-Gen Firewall with AMP Next-Gen IPS with AMP Stealthwatch Next-Gen Firewall with Radware DDoS

×