Cisco SecureX


© 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
Рост                                       Соответствие
                                                             Внимание
                                                                   ИТ
                   Глобализация                                                     Риск-менеджмент

                                                           Разрешить Защитить
                   Соответствие                                                       Регулирование

                                                                      Внимание
                                                                      ИБ
                                        Привлечение людей                          Персданные

                                                            Внимание руководства

© 2011 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   2
Организационно – КТО?

                                                           Compliance Ops.    Endpoint Team

                                                            Network Ops.       Security Ops.

                               Политика                    Application Team         HR


                                                              Технологически – ЧТО?
                 Не пустить плохих
                 Пустить хороших                          Контроль доступа       Endpoint

                 Соответствовать                            Identity Mgmt      Вторжения

                 Учесть BYOD                               Соответствие        Управления
                 Разрешить виртуализацию
                 Быть готовым к облакам                        Операционно – КАК?

                                                            Проводное            В сети

                                                           Беспроводное       Поверх сети

                                                               VPN            На устройстве
© 2011 Cisco and/or its affiliates. All rights reserved.                                  Cisco Confidential   3
ОТ           К

              # ! %
                                             Поэтапный дизайн       Координация систем



                                                                    Унифицированные точки
                                             Точечные решения
                                                                    применения политик


                                                                    Всесторонний контроль
                                             Ограничение обзора
                                                                    на 360



                                             Проверка на «кошках»   Проверенный дизайн


© 2011 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   4
Маршрутизация всех запросов
                    Источники всех данных
                                                           Управление всеми устройствами



                                                           СЕТЬ
Контроль всех потоков

                                                                                 Контроль всех потоков
                                Видимость всего трафика             Контроль всех пользователей




© 2011 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   6
Исследования в области ИБ (SIO)

                                                 Защищенный
                                                                    Защищенный        Защищенный ЦОД и
                                                универсальный
                                                                  филиал и периметр        облако
                                                    доступ




                                              Косьюмеризация      Депериметризация     Виртуализация

                                                                      Политика
                                                                     Управление

                                                                Точки приложения сил

                                                                       Сеть




© 2011 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   7
Объединить людей и информацию... Безопасно



                                                           Исследования в области ИБ


                                                                   Политика
         Устройства &
         Пользователи                                                                  Активы & Информация

                                                                  Управление


                                                             Точки приложения сил



                                                                     Сеть

© 2011 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   8
Политика

                                                        Кто               Что         Как           Где/откуда       Когда



Анализ
угроз
                                                             SensorBase         Operations Center         Dynamic Updates




Внедрение на                                                Интегрированная     Высокоскоростная              Облачные
уровне сети                                                 инфраструктура       навесная защита             вычисления


 © 2011 Cisco and/or its affiliates. All rights reserved.                                                          Cisco Confidential   9
• Сложность

• Операционные затраты

• Число уязвимостей

• Обучение специалистов

• Поддержка

• Эксплуатация и управление

• Мониторинг и устранение неисправностей

• Конфигурация и обновление

• Интеграция



© 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   10
http://www.facebook.com/CiscoRu
                          http://twitter.com/CiscoRussia
                          http://www.youtube.com/CiscoRussiaMedia
                          http://www.flickr.com/photos/CiscoRussia
                          http://vkontakte.ru/Cisco


© 2011 Cisco and/or its affiliates. All rights reserved.             Cisco Confidential   11
Спасибо!




                                                           security-request@cisco.com

© 2011 Cisco and/or its affiliates. All rights reserved.                                Cisco Confidential   12

Краткое введение в Cisco SecureX

  • 1.
    Cisco SecureX © 2011Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2.
    Рост Соответствие Внимание ИТ Глобализация Риск-менеджмент Разрешить Защитить Соответствие Регулирование Внимание ИБ Привлечение людей Персданные Внимание руководства © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3.
    Организационно – КТО? Compliance Ops. Endpoint Team Network Ops. Security Ops. Политика Application Team HR Технологически – ЧТО?  Не пустить плохих  Пустить хороших Контроль доступа Endpoint  Соответствовать Identity Mgmt Вторжения  Учесть BYOD Соответствие Управления  Разрешить виртуализацию  Быть готовым к облакам Операционно – КАК? Проводное В сети Беспроводное Поверх сети VPN На устройстве © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4.
    ОТ К # ! % Поэтапный дизайн Координация систем Унифицированные точки Точечные решения применения политик Всесторонний контроль Ограничение обзора на 360 Проверка на «кошках» Проверенный дизайн © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 6.
    Маршрутизация всех запросов Источники всех данных Управление всеми устройствами СЕТЬ Контроль всех потоков Контроль всех потоков Видимость всего трафика Контроль всех пользователей © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7.
    Исследования в областиИБ (SIO) Защищенный Защищенный Защищенный ЦОД и универсальный филиал и периметр облако доступ Косьюмеризация Депериметризация Виртуализация Политика Управление Точки приложения сил Сеть © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8.
    Объединить людей иинформацию... Безопасно Исследования в области ИБ Политика Устройства & Пользователи Активы & Информация Управление Точки приложения сил Сеть © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9.
    Политика Кто Что Как Где/откуда Когда Анализ угроз SensorBase Operations Center Dynamic Updates Внедрение на Интегрированная Высокоскоростная Облачные уровне сети инфраструктура навесная защита вычисления © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10.
    • Сложность • Операционныезатраты • Число уязвимостей • Обучение специалистов • Поддержка • Эксплуатация и управление • Мониторинг и устранение неисправностей • Конфигурация и обновление • Интеграция © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11.
    http://www.facebook.com/CiscoRu http://twitter.com/CiscoRussia http://www.youtube.com/CiscoRussiaMedia http://www.flickr.com/photos/CiscoRussia http://vkontakte.ru/Cisco © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12.
    Спасибо! security-request@cisco.com © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

Editor's Notes

  • #5 Just the facts…Sergeant Joe Friday is a LAPD detective with Dragnet.
  • #8 Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security.  - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc.  - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.
  • #9 Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security.  - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc.  - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.