SlideShare a Scribd company logo
1 of 42
Download to read offline
Sourcefire Seminar Series
2014 North American
Roadshow
2© 2014 Cisco and/or its affiliates. All rights reserved.
The	
  Silver	
  Bullet	
  Does	
  Not	
  Exist…	
  
“Self	
  Defending	
  Network”	
  
“It	
  matches	
  the	
  pa8ern”	
  
“No	
  false	
  posi9ves,	
  
no	
  false	
  nega9ves.”	
  
Applica9on	
  
Control	
  
FW/VPN	
  
IDS	
  /	
  IPS	
  
UTM	
  
NAC	
  
AV	
  
PKI	
  
“Block	
  or	
  Allow”	
  
“Fix	
  the	
  Firewall”	
  
“No	
  key,	
  no	
  access”	
  
Sandboxing	
  
“Detect	
  the	
  	
  
Unknown”	
  
3© 2014 Cisco and/or its affiliates. All rights reserved.
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Attack Continuum
Network Endpoint Mobile Virtual Cloud
Detect
Block
Defend
DURING
Point in Time Continuous
The New Security Model
4© 2014 Cisco and/or its affiliates. All rights reserved.
Sourcefire’s Security Solutions
COLLECTIVE
SECURITY
INTELLIGENCE
Management Center
APPLIANCES | VIRTUAL
NEXT-
GENERATION
FIREWALL
NEXT-
GENERATION
INTRUSION
PREVENTION
ADVANCED
MALWARE
PROTECTION
CONTEXTUAL	
  AWARENESS	
   HOSTS	
  |	
  VIRTUAL	
  MOBILE	
  
APPLIANCES	
  |	
  VIRTUAL	
  
5© 2014 Cisco and/or its affiliates. All rights reserved.
Covering the Entire Attack Continuum
Visibility and Context
Firewall
NGFW
NAC + Identity Services
VPN
UTM
NGIPS
Web Security
Email Security
Advanced Malware Protection
Network Behavior Analysis
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Attack Continuum
Detect
Block
Defend
DURING
Sourcefire
NGIPS and NGFW
7© 2014 Cisco and/or its affiliates. All rights reserved.
Leadership
The Path “Up and Right”
Sourcefire has been
a leader in the
Gartner Magic
Quadrant for IPS
since 2006.
As of December 2013
Source: Gartner (December 2013)
8© 2014 Cisco and/or its affiliates. All rights reserved.
2012 NSS Labs IPS SVM
9© 2014 Cisco and/or its affiliates. All rights reserved.
NSS Labs Security Value Map (SVM) for
Breach Detection Systems
SecurityEffectiveness
TCO per Protected-Mbps
10© 2014 Cisco and/or its affiliates. All rights reserved.
FirePOWER™	
  InnovaDons	
  
LCD	
  Display	
  
Quick	
  and	
  easy	
  headless	
  configura3on	
  
Device	
  Stacking	
  
Scale	
  monitoring	
  capacity	
  
through	
  stacking	
  
ConnecDvity	
  Choice	
  
Change	
  and	
  add	
  connec3vity	
  
inline	
  with	
  network	
  requirements	
  
Hardware	
  AcceleraDon	
  
For	
  best	
  in	
  class	
  throughput,	
  
security,	
  Rack	
  size/Mbps,	
  and	
  
price/Mbps	
  
Lights	
  Out	
  Management	
  
Minimal	
  opera3onal	
  impact	
   SSD	
  
Solid	
  State	
  Drive	
  for	
  increased	
  reliability	
  
Configurable	
  Bypass	
  or	
  	
  
Fail	
  Closed	
  Interfaces	
  
For	
  IDS,	
  IPS	
  or	
  Firewall	
  	
  
deployments	
  
11© 2014 Cisco and/or its affiliates. All rights reserved.
IPSPerformanceandScalability
Data CenterCampusBranch OfficeSOHO Internet Edge
FirePOWER 7100 Series
500 Mbps – 1 Gbps
FirePOWER 7120/7125/8120
1 Gbps - 2 Gbps
FirePOWER 8100/8200
2 Gbps - 10 Gbps
FirePOWER 8300 Series
15 Gbps – 60 Gbps
Platforms and Places in the Network
FirePOWER 7000 Series
50 Mbps – 250 Mbps
12© 2014 Cisco and/or its affiliates. All rights reserved.
Collective Security Intelligence
IPS Rules
Malware
Protection
Reputation
Feeds
Vulnerability
Database
Updates
Sourcefire
AEGIS™
Program
Private and
Public
Threat Feeds
Sandnets
FireAMP™
Community
Honeypots
Advanced
Microsoft
and Industry
Disclosures
SPARK
Program
Snort and
ClamAV
Open Source
Communities
File Samples
(>380,000 per
day)
Sourcefire VRT®
(Vulnerability
Research Team)
Sandboxing
Machine Learning
Big Data
Infrastructure
13© 2014 Cisco and/or its affiliates. All rights reserved.
2	
  SEU/SRU,	
  1	
  VDB	
  	
  
updates	
  per	
  week	
  
2	
  
380,000	
  
samples	
  per	
  day	
  
>300,000	
  sandbox	
  
convic3ons	
  per	
  month	
  
4,310	
  new	
  IPS	
  
rules	
  	
  
100%	
  
Same-­‐day	
  
protec3on	
  for	
  	
  
MicrosoL	
  vulnerabili3es	
  	
  
99.4%	
  
Vulnerability	
  
coverage	
  per	
  NSS	
  Labs	
  IPS	
  
group	
  test*	
  
Protecting Your Network
2013 Output
* Source: NSS Labs Data Center IPS Comparative Analysis, 2014
14© 2014 Cisco and/or its affiliates. All rights reserved.
Robust Partner Ecosystem
Combined API Framework
BEFORE
Policy and
Control
AFTER
Analysis and
Remediation
Identification
and Block
DURING
Infrastructure & Mobility
NACVulnerability Management Custom Detection Full Packet
Capture
Incident Response
SIEMVisualizationNetwork Access Taps
15© 2014 Cisco and/or its affiliates. All rights reserved.
FireSIGHT™ Visibility
CATEGORIES EXAMPLES
SOURCEFIRE
FireSIGHT
TYPICAL
IPS
TYPICAL
NGFW
Threats Attacks, Anomalies ✔ ✔ ✔
Users AD, LDAP, POP3 ✔ ✗ ✔
Web Applications Facebook Chat, Ebay ✔ ✗ ✔
Application Protocols HTTP, SMTP, SSH ✔ ✗ ✔
File Transfers PDF, Office, EXE, JAR ✔ ✗ ✔
Malware Conficker, Flame ✔ ✗ ✗
Command & Control Servers C&C Security Intelligence ✔ ✗ ✗
Client Applications Firefox, IE6, BitTorrent ✔ ✗ ✗
Network Servers Apache 2.3.1, IIS4 ✔ ✗ ✗
Operating Systems Windows, Linux ✔ ✗ ✗
Routers & Switches Cisco, Nortel, Wireless ✔ ✗ ✗
Mobile Devices iPhone, Android, Jail ✔ ✗ ✗
Printers HP, Xerox, Canon ✔ ✗ ✗
VoIP Phones Avaya, Polycom ✔ ✗ ✗
Virtual Machines VMware, Xen, RHEV ✔ ✗ ✗
Contextual
Awareness
Information Superiority
FireSIGHT Demo
17© 2014 Cisco and/or its affiliates. All rights reserved.
Save Money and Improve Security
IT	
  Insight	
  
Spot	
  rogue	
  hosts,	
  anomalies,	
  policy	
  
violaDons,	
  and	
  more	
  
Impact	
  Assessment	
  
Threat	
  correlaDon	
  reduces	
  
acDonable	
  events	
  by	
  up	
  to	
  99%	
  
Automated	
  Tuning	
  
Adjust	
  IPS	
  policies	
  automaDcally	
  	
  
based	
  on	
  network	
  change	
  
User	
  Iden9fica9on	
  
Associate	
  users	
  with	
  security	
  
and	
  compliance	
  events	
  
18© 2014 Cisco and/or its affiliates. All rights reserved.
One of the world’s 3
largest credit
reporting agencies:
•  20,000 nodes
•  7,500 employees
Generic Work Rate:
$75/hour
FireSIGHT™ Operational Savings
Source:	
  SANS	
  "Calcula3ng	
  TCO	
  on	
  Intrusion	
  Preven3on	
  Technology“	
  whitepaper,	
  December	
  2013	
  
19© 2014 Cisco and/or its affiliates. All rights reserved.
Customer Testimonial:
Nathan Romine, Western Union
Policy Demo
21© 2014 Cisco and/or its affiliates. All rights reserved.
Benefits of Application Control
Social:
Security and
DLP
Mobile:
Enforce BYOD
Policy
Bandwidth:
Recover Lost
Bandwidth
Security:
Reduce Attack
Surface
22© 2014 Cisco and/or its affiliates. All rights reserved.
Application Control is Cool!
AMP:
Advanced Malware
Protection
24© 2014 Cisco and/or its affiliates. All rights reserved.
In Spite of Layers of Defense
Malware	
  is	
  
geUng	
  
through	
  
control	
  based	
  
defenses	
  
Malware	
  
PrevenDon	
  
is	
  NOT	
  
100%	
  
Breach	
  
ExisDng	
  tools	
  are	
  
labor	
  intensive	
  and	
  require	
  
experDse	
  	
  
Attack Continuum
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Detect
Block
Defend
DURING
Point in Time Continuous
25© 2014 Cisco and/or its affiliates. All rights reserved.
APT / Advanced Malware
A	
  tool	
  for	
  financial	
  gain	
  
•  Uses	
  formal	
  Development	
  Techniques	
  
•  Sandbox	
  aware	
  
•  Quality	
  Assurance	
  to	
  evade	
  detecDon	
  
•  24/7	
  Tech	
  support	
  available	
  
•  Has	
  become	
  a	
  math	
  problem	
  
•  End	
  Point	
  AV	
  Signatures	
  ~20	
  Million	
  
•  Total	
  KNOWN	
  Malware	
  Samples	
  	
  ~100	
  M	
  
•  AV	
  Efficacy	
  Rate	
  ~50%	
  
26© 2014 Cisco and/or its affiliates. All rights reserved.
When Malware Strikes, You Have Questions
Where did it
come from?
Who else is
infected?
What is it
doing?
How do I
stop it?
27© 2014 Cisco and/or its affiliates. All rights reserved.
Visibility and Control
28© 2014 Cisco and/or its affiliates. All rights reserved.
AMP Everywhere
AMP for
Networks
AMP for
Endpoints
ESA
Email
WSA
Web
CWS
Web
AMP for FirePOWER and
FireAMP Demo
31© 2014 Cisco and/or its affiliates. All rights reserved.
When Malware Strikes, Have Answers
Where did it
come from?
Who else is
infected?
What is it
doing?
How do I stop
it?
Device Trajectory File Trajectory
File Analysis Automated
Remediation
32© 2014 Cisco and/or its affiliates. All rights reserved.
Right in the Middle Of…
Better Together
34© 2014 Cisco and/or its affiliates. All rights reserved.
Visibility
FirePower FireAMP IntelligenceSpark
Sensors 20
100 Detections
30 Exploit Kits
595K Lookups
293K New files
6450
Detections
33M Lookups
10K Detections
28M Network
lookups
3K Network
Blocks
600K Files
100K Sandbox
60K IPS
100K
Detections
Retrospective Intelligence
Sourcefire Vulnerability Research
35© 2014 Cisco and/or its affiliates. All rights reserved.
Visibility
FirePower FireAMP IntelligenceSpark
Sensors 20
100 Detections
30 Exploit Kits
595K Lookups
293K New files
6450
Detections
33M Lookups
10K Detections
28M Network
lookups
3K Network
Blocks
600K Files
100K Sandbox
60K IPS
100K
Detections
Retrospective Intelligence
ESA/WSA CWS
93B Messages
4.5B Blocks
20K New Files
80M Web
Blocks
16B Web
Requests
1M Blocks
20K New Files
Sourcefire+Cisco Vulnerability Research
36© 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Security Architecture
SMB / Branch
Campus Data Center
Internet
ASA
ISR
IPS
ASA
Email
Web ISE
ADWireless
Switch
Router
Content Policy
ISR-G2 Integrated Services
CSM
ASA
ASAv ASAvASAv ASAv
Hypervisor
Virtual Data Center
Physical Data Center
Global Threat
Intelligence
Remote
Devices
Access
Cloud Security
Gateway
Cloud Security
Gateway
ASAv in
the
Fabric
(SDN)
37© 2014 Cisco and/or its affiliates. All rights reserved.
Comprehensive Security Portfolio
IPS & NGIPS
•  Cisco IPS 4300 Series
•  Cisco ASA 5500-X
Series integrated IPS
•  FirePOWER NGIPS
•  FirePOWER NGIPS w/
Application Control
•  FirePOWER Virtual
NGIPS
Web Security
•  Cisco Web Security
Appliance (WSA)
•  Cisco Virtual Web Security
Appliance (vWSA)
•  Cisco Cloud Web Security
Firewall & NGFW
•  Cisco ASA 5500-X
Series
•  Cisco ASA 5500-X w/
NGFW license
•  Cisco ASA 5585-X w/
NGFW blade
•  FirePOWER NGFW
Advanced Malware
Protection
•  FireAMP
•  FireAMP Mobile
•  FireAMP Virtual
•  AMP for FirePOWER
license
•  Dedicated AMP
FirePOWER appliance
NAC +
Identity Services
•  Cisco Identity Services
Engine (ISE)
•  Cisco Access Control
Server (ACS)
Email Security
•  Cisco Email Security
Appliance (ESA)
•  Cisco Virtual Email
Security Appliance
(vESA)
•  Cisco Cloud Email
•  Cisco
•  Sourcefire
UTM
•  Meraki MX
VPN
•  Cisco AnyConnect VPN
38© 2014 Cisco and/or its affiliates. All rights reserved.
ASA 5500-X Advantages
Up to 4X faster than legacy ASA
Integrated security acceleration hardware
NG Services: Application control (AVC),
Web security (WSE), Sourcefire (NGIPS -
FireSIGHT)
Technology Migration Program (TMP)
•  10% off ASA-X Firewalls
•  15% off NGFW Services
ASA 5512-X
1 Gbps FW Throughput
ASA 5515-X
1.2 Gbps FW Throughput
ASA 5525-X
2 Gbps FW Throughput
ASA 5545-X
3 Gbps FW Throughput
ASA 5555-X
4 Gbps FW Throughput
Cisco ASA 5585-X Firewall for Data Centers
•  World’s fastest firewall solution – up
to 640 Gbps clustered
•  16 chassis clustering can be
managed as a single device and
across multiple data centers
•  Purpose-built data center security
supports traditional, SDN, and ACI
data center environments
Market-leading DC Firewall
40© 2014 Cisco and/or its affiliates. All rights reserved.
Real-Time ProtectionNetwork / Security Devices
Cisco Unified Threat Intelligence
Actionable Intelligence
Vendor, Industry
and Agency
Alliances
Managed
Honeypots,
Mantraps
1100101001001011100110100111 0100010 01001001011100101001001011100110100111 01001001001011100101001001011100110100111 0100010 0100100101110010100100101
0010111001010010010111001101001110010 00010 01001001011100101001001011100110100111 0100010 01001001011100101001000100010 01001001011100101001001011100
•  Multiple, non-integrated intelligence
sources
•  Limited Intelligence footprint
•  Slow, inconsistent threat updates
•  No consistency between security
solutions
Challenge
•  Largest unified threat database
•  Global intelligence from millions of
devices, billions of websites, emails/day
•  Threat updates every 3-5 minutes
•  Unified intelligence: (Cisco + Sourcefire)
ASA, IPS, CWS, ESA, WSA, ISE
Solution
Global Threat Operations
41© 2014 Cisco and/or its affiliates. All rights reserved.
Local and Global Threat Intelligence
Integrated and Centralized Policy
Embedding Security in the Infrastructure
Comprehensive Visibility and Scalable Enforcement
NETWORK
Sees All Traffic
Routes All RequestsSources All Data
Controls All Flows
Handles All Devices
Touches All Users
Shapes All Streams
Visibility
Enforcement
Behavioral Analysis
EncryptionIdentity Awareness
Device Visibility
Policy Enforcement
Access Control
Threat Defense
42© 2014 Cisco and/or its affiliates. All rights reserved.
Risk	
  Reports	
  
•  Samples	
  
•  Eval	
  Output	
  
•  ExecuDve	
  focus	
  

More Related Content

What's hot

Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CKArpan Raval
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security OverviewAllen Brokken
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat ProtectionThierry DEMAN
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory ProposalMJ Ferdous
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...MITRE - ATT&CKcon
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkSqrrl
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityMarketingArrowECS_CZ
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhAurélie Henriot
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxBenAissaTaher1
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 

What's hot (20)

Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
 
Microsoft Threat Protection
Microsoft Threat ProtectionMicrosoft Threat Protection
Microsoft Threat Protection
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
How to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your NetworkHow to Hunt for Lateral Movement on Your Network
How to Hunt for Lateral Movement on Your Network
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Tenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud SecurityTenable Solutions for Enterprise Cloud Security
Tenable Solutions for Enterprise Cloud Security
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
 
Microsoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptxMicrosoft Defender for Endpoint Overview.pptx
Microsoft Defender for Endpoint Overview.pptx
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowCompTIA CySA+ certification (CS0-003) changes: Everything you need to know
CompTIA CySA+ certification (CS0-003) changes: Everything you need to know
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 

Viewers also liked

Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web securityxKinAnx
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Portfolio Solutions-Enterprise Security Management
Portfolio Solutions-Enterprise Security ManagementPortfolio Solutions-Enterprise Security Management
Portfolio Solutions-Enterprise Security ManagementVasu Surabhi
 
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...Cisco Russia
 
Безопасность Центров Обработки Данных
Безопасность Центров Обработки ДанныхБезопасность Центров Обработки Данных
Безопасность Центров Обработки ДанныхCisco Russia
 
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)Andrey Klyuchka
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 
Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style GuideBluetext
 
NGIPS Market Trends and Group Test Results
NGIPS Market Trends and Group Test ResultsNGIPS Market Trends and Group Test Results
NGIPS Market Trends and Group Test ResultsNSS Labs
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco Canada
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringCisco Russia
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceAlfredo Boiero Sanders
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product familyxKinAnx
 

Viewers also liked (20)

Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Presentation cisco iron port email & web security
Presentation   cisco iron port email & web securityPresentation   cisco iron port email & web security
Presentation cisco iron port email & web security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Portfolio Solutions-Enterprise Security Management
Portfolio Solutions-Enterprise Security ManagementPortfolio Solutions-Enterprise Security Management
Portfolio Solutions-Enterprise Security Management
 
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...
Решения ImpervaWeb Application Firewall на базе платформы Cisco Nexus – перед...
 
Безопасность Центров Обработки Данных
Безопасность Центров Обработки ДанныхБезопасность Центров Обработки Данных
Безопасность Центров Обработки Данных
 
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)
Cisco Connect Almaty 2014 - Security Solutions for Data Centers (russian)
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style Guide
 
Cisco Catalyst Poster
Cisco Catalyst PosterCisco Catalyst Poster
Cisco Catalyst Poster
 
NGIPS Market Trends and Group Test Results
NGIPS Market Trends and Group Test ResultsNGIPS Market Trends and Group Test Results
NGIPS Market Trends and Group Test Results
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
Cisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s RealityCisco IWAN – Intelligent Connectivity for Today’s Reality
Cisco IWAN – Intelligent Connectivity for Today’s Reality
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For Customers
 
Отказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA ClusteringОтказоустойчивость с использованием Cisco ASA Clustering
Отказоустойчивость с использованием Cisco ASA Clustering
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
Presentation cisco iron port product family
Presentation   cisco iron port product familyPresentation   cisco iron port product family
Presentation cisco iron port product family
 

Similar to Cisco Security Architecture

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...Chrysostomos Christofi
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services Felipe Lamus
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueCisco Canada
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIARobb Boyd
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsCisco Canada
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 

Similar to Cisco Security Architecture (20)

Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 

Cisco Security Architecture

  • 1. Sourcefire Seminar Series 2014 North American Roadshow
  • 2. 2© 2014 Cisco and/or its affiliates. All rights reserved. The  Silver  Bullet  Does  Not  Exist…   “Self  Defending  Network”   “It  matches  the  pa8ern”   “No  false  posi9ves,   no  false  nega9ves.”   Applica9on   Control   FW/VPN   IDS  /  IPS   UTM   NAC   AV   PKI   “Block  or  Allow”   “Fix  the  Firewall”   “No  key,  no  access”   Sandboxing   “Detect  the     Unknown”  
  • 3. 3© 2014 Cisco and/or its affiliates. All rights reserved. BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Network Endpoint Mobile Virtual Cloud Detect Block Defend DURING Point in Time Continuous The New Security Model
  • 4. 4© 2014 Cisco and/or its affiliates. All rights reserved. Sourcefire’s Security Solutions COLLECTIVE SECURITY INTELLIGENCE Management Center APPLIANCES | VIRTUAL NEXT- GENERATION FIREWALL NEXT- GENERATION INTRUSION PREVENTION ADVANCED MALWARE PROTECTION CONTEXTUAL  AWARENESS   HOSTS  |  VIRTUAL  MOBILE   APPLIANCES  |  VIRTUAL  
  • 5. 5© 2014 Cisco and/or its affiliates. All rights reserved. Covering the Entire Attack Continuum Visibility and Context Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web Security Email Security Advanced Malware Protection Network Behavior Analysis BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING
  • 7. 7© 2014 Cisco and/or its affiliates. All rights reserved. Leadership The Path “Up and Right” Sourcefire has been a leader in the Gartner Magic Quadrant for IPS since 2006. As of December 2013 Source: Gartner (December 2013)
  • 8. 8© 2014 Cisco and/or its affiliates. All rights reserved. 2012 NSS Labs IPS SVM
  • 9. 9© 2014 Cisco and/or its affiliates. All rights reserved. NSS Labs Security Value Map (SVM) for Breach Detection Systems SecurityEffectiveness TCO per Protected-Mbps
  • 10. 10© 2014 Cisco and/or its affiliates. All rights reserved. FirePOWER™  InnovaDons   LCD  Display   Quick  and  easy  headless  configura3on   Device  Stacking   Scale  monitoring  capacity   through  stacking   ConnecDvity  Choice   Change  and  add  connec3vity   inline  with  network  requirements   Hardware  AcceleraDon   For  best  in  class  throughput,   security,  Rack  size/Mbps,  and   price/Mbps   Lights  Out  Management   Minimal  opera3onal  impact   SSD   Solid  State  Drive  for  increased  reliability   Configurable  Bypass  or     Fail  Closed  Interfaces   For  IDS,  IPS  or  Firewall     deployments  
  • 11. 11© 2014 Cisco and/or its affiliates. All rights reserved. IPSPerformanceandScalability Data CenterCampusBranch OfficeSOHO Internet Edge FirePOWER 7100 Series 500 Mbps – 1 Gbps FirePOWER 7120/7125/8120 1 Gbps - 2 Gbps FirePOWER 8100/8200 2 Gbps - 10 Gbps FirePOWER 8300 Series 15 Gbps – 60 Gbps Platforms and Places in the Network FirePOWER 7000 Series 50 Mbps – 250 Mbps
  • 12. 12© 2014 Cisco and/or its affiliates. All rights reserved. Collective Security Intelligence IPS Rules Malware Protection Reputation Feeds Vulnerability Database Updates Sourcefire AEGIS™ Program Private and Public Threat Feeds Sandnets FireAMP™ Community Honeypots Advanced Microsoft and Industry Disclosures SPARK Program Snort and ClamAV Open Source Communities File Samples (>380,000 per day) Sourcefire VRT® (Vulnerability Research Team) Sandboxing Machine Learning Big Data Infrastructure
  • 13. 13© 2014 Cisco and/or its affiliates. All rights reserved. 2  SEU/SRU,  1  VDB     updates  per  week   2   380,000   samples  per  day   >300,000  sandbox   convic3ons  per  month   4,310  new  IPS   rules     100%   Same-­‐day   protec3on  for     MicrosoL  vulnerabili3es     99.4%   Vulnerability   coverage  per  NSS  Labs  IPS   group  test*   Protecting Your Network 2013 Output * Source: NSS Labs Data Center IPS Comparative Analysis, 2014
  • 14. 14© 2014 Cisco and/or its affiliates. All rights reserved. Robust Partner Ecosystem Combined API Framework BEFORE Policy and Control AFTER Analysis and Remediation Identification and Block DURING Infrastructure & Mobility NACVulnerability Management Custom Detection Full Packet Capture Incident Response SIEMVisualizationNetwork Access Taps
  • 15. 15© 2014 Cisco and/or its affiliates. All rights reserved. FireSIGHT™ Visibility CATEGORIES EXAMPLES SOURCEFIRE FireSIGHT TYPICAL IPS TYPICAL NGFW Threats Attacks, Anomalies ✔ ✔ ✔ Users AD, LDAP, POP3 ✔ ✗ ✔ Web Applications Facebook Chat, Ebay ✔ ✗ ✔ Application Protocols HTTP, SMTP, SSH ✔ ✗ ✔ File Transfers PDF, Office, EXE, JAR ✔ ✗ ✔ Malware Conficker, Flame ✔ ✗ ✗ Command & Control Servers C&C Security Intelligence ✔ ✗ ✗ Client Applications Firefox, IE6, BitTorrent ✔ ✗ ✗ Network Servers Apache 2.3.1, IIS4 ✔ ✗ ✗ Operating Systems Windows, Linux ✔ ✗ ✗ Routers & Switches Cisco, Nortel, Wireless ✔ ✗ ✗ Mobile Devices iPhone, Android, Jail ✔ ✗ ✗ Printers HP, Xerox, Canon ✔ ✗ ✗ VoIP Phones Avaya, Polycom ✔ ✗ ✗ Virtual Machines VMware, Xen, RHEV ✔ ✗ ✗ Contextual Awareness Information Superiority
  • 17. 17© 2014 Cisco and/or its affiliates. All rights reserved. Save Money and Improve Security IT  Insight   Spot  rogue  hosts,  anomalies,  policy   violaDons,  and  more   Impact  Assessment   Threat  correlaDon  reduces   acDonable  events  by  up  to  99%   Automated  Tuning   Adjust  IPS  policies  automaDcally     based  on  network  change   User  Iden9fica9on   Associate  users  with  security   and  compliance  events  
  • 18. 18© 2014 Cisco and/or its affiliates. All rights reserved. One of the world’s 3 largest credit reporting agencies: •  20,000 nodes •  7,500 employees Generic Work Rate: $75/hour FireSIGHT™ Operational Savings Source:  SANS  "Calcula3ng  TCO  on  Intrusion  Preven3on  Technology“  whitepaper,  December  2013  
  • 19. 19© 2014 Cisco and/or its affiliates. All rights reserved. Customer Testimonial: Nathan Romine, Western Union
  • 21. 21© 2014 Cisco and/or its affiliates. All rights reserved. Benefits of Application Control Social: Security and DLP Mobile: Enforce BYOD Policy Bandwidth: Recover Lost Bandwidth Security: Reduce Attack Surface
  • 22. 22© 2014 Cisco and/or its affiliates. All rights reserved. Application Control is Cool!
  • 24. 24© 2014 Cisco and/or its affiliates. All rights reserved. In Spite of Layers of Defense Malware  is   geUng   through   control  based   defenses   Malware   PrevenDon   is  NOT   100%   Breach   ExisDng  tools  are   labor  intensive  and  require   experDse     Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING Point in Time Continuous
  • 25. 25© 2014 Cisco and/or its affiliates. All rights reserved. APT / Advanced Malware A  tool  for  financial  gain   •  Uses  formal  Development  Techniques   •  Sandbox  aware   •  Quality  Assurance  to  evade  detecDon   •  24/7  Tech  support  available   •  Has  become  a  math  problem   •  End  Point  AV  Signatures  ~20  Million   •  Total  KNOWN  Malware  Samples    ~100  M   •  AV  Efficacy  Rate  ~50%  
  • 26. 26© 2014 Cisco and/or its affiliates. All rights reserved. When Malware Strikes, You Have Questions Where did it come from? Who else is infected? What is it doing? How do I stop it?
  • 27. 27© 2014 Cisco and/or its affiliates. All rights reserved. Visibility and Control
  • 28. 28© 2014 Cisco and/or its affiliates. All rights reserved. AMP Everywhere AMP for Networks AMP for Endpoints ESA Email WSA Web CWS Web
  • 29. AMP for FirePOWER and FireAMP Demo
  • 30.
  • 31. 31© 2014 Cisco and/or its affiliates. All rights reserved. When Malware Strikes, Have Answers Where did it come from? Who else is infected? What is it doing? How do I stop it? Device Trajectory File Trajectory File Analysis Automated Remediation
  • 32. 32© 2014 Cisco and/or its affiliates. All rights reserved. Right in the Middle Of…
  • 34. 34© 2014 Cisco and/or its affiliates. All rights reserved. Visibility FirePower FireAMP IntelligenceSpark Sensors 20 100 Detections 30 Exploit Kits 595K Lookups 293K New files 6450 Detections 33M Lookups 10K Detections 28M Network lookups 3K Network Blocks 600K Files 100K Sandbox 60K IPS 100K Detections Retrospective Intelligence Sourcefire Vulnerability Research
  • 35. 35© 2014 Cisco and/or its affiliates. All rights reserved. Visibility FirePower FireAMP IntelligenceSpark Sensors 20 100 Detections 30 Exploit Kits 595K Lookups 293K New files 6450 Detections 33M Lookups 10K Detections 28M Network lookups 3K Network Blocks 600K Files 100K Sandbox 60K IPS 100K Detections Retrospective Intelligence ESA/WSA CWS 93B Messages 4.5B Blocks 20K New Files 80M Web Blocks 16B Web Requests 1M Blocks 20K New Files Sourcefire+Cisco Vulnerability Research
  • 36. 36© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Security Architecture SMB / Branch Campus Data Center Internet ASA ISR IPS ASA Email Web ISE ADWireless Switch Router Content Policy ISR-G2 Integrated Services CSM ASA ASAv ASAvASAv ASAv Hypervisor Virtual Data Center Physical Data Center Global Threat Intelligence Remote Devices Access Cloud Security Gateway Cloud Security Gateway ASAv in the Fabric (SDN)
  • 37. 37© 2014 Cisco and/or its affiliates. All rights reserved. Comprehensive Security Portfolio IPS & NGIPS •  Cisco IPS 4300 Series •  Cisco ASA 5500-X Series integrated IPS •  FirePOWER NGIPS •  FirePOWER NGIPS w/ Application Control •  FirePOWER Virtual NGIPS Web Security •  Cisco Web Security Appliance (WSA) •  Cisco Virtual Web Security Appliance (vWSA) •  Cisco Cloud Web Security Firewall & NGFW •  Cisco ASA 5500-X Series •  Cisco ASA 5500-X w/ NGFW license •  Cisco ASA 5585-X w/ NGFW blade •  FirePOWER NGFW Advanced Malware Protection •  FireAMP •  FireAMP Mobile •  FireAMP Virtual •  AMP for FirePOWER license •  Dedicated AMP FirePOWER appliance NAC + Identity Services •  Cisco Identity Services Engine (ISE) •  Cisco Access Control Server (ACS) Email Security •  Cisco Email Security Appliance (ESA) •  Cisco Virtual Email Security Appliance (vESA) •  Cisco Cloud Email •  Cisco •  Sourcefire UTM •  Meraki MX VPN •  Cisco AnyConnect VPN
  • 38. 38© 2014 Cisco and/or its affiliates. All rights reserved. ASA 5500-X Advantages Up to 4X faster than legacy ASA Integrated security acceleration hardware NG Services: Application control (AVC), Web security (WSE), Sourcefire (NGIPS - FireSIGHT) Technology Migration Program (TMP) •  10% off ASA-X Firewalls •  15% off NGFW Services ASA 5512-X 1 Gbps FW Throughput ASA 5515-X 1.2 Gbps FW Throughput ASA 5525-X 2 Gbps FW Throughput ASA 5545-X 3 Gbps FW Throughput ASA 5555-X 4 Gbps FW Throughput
  • 39. Cisco ASA 5585-X Firewall for Data Centers •  World’s fastest firewall solution – up to 640 Gbps clustered •  16 chassis clustering can be managed as a single device and across multiple data centers •  Purpose-built data center security supports traditional, SDN, and ACI data center environments Market-leading DC Firewall
  • 40. 40© 2014 Cisco and/or its affiliates. All rights reserved. Real-Time ProtectionNetwork / Security Devices Cisco Unified Threat Intelligence Actionable Intelligence Vendor, Industry and Agency Alliances Managed Honeypots, Mantraps 1100101001001011100110100111 0100010 01001001011100101001001011100110100111 01001001001011100101001001011100110100111 0100010 0100100101110010100100101 0010111001010010010111001101001110010 00010 01001001011100101001001011100110100111 0100010 01001001011100101001000100010 01001001011100101001001011100 •  Multiple, non-integrated intelligence sources •  Limited Intelligence footprint •  Slow, inconsistent threat updates •  No consistency between security solutions Challenge •  Largest unified threat database •  Global intelligence from millions of devices, billions of websites, emails/day •  Threat updates every 3-5 minutes •  Unified intelligence: (Cisco + Sourcefire) ASA, IPS, CWS, ESA, WSA, ISE Solution Global Threat Operations
  • 41. 41© 2014 Cisco and/or its affiliates. All rights reserved. Local and Global Threat Intelligence Integrated and Centralized Policy Embedding Security in the Infrastructure Comprehensive Visibility and Scalable Enforcement NETWORK Sees All Traffic Routes All RequestsSources All Data Controls All Flows Handles All Devices Touches All Users Shapes All Streams Visibility Enforcement Behavioral Analysis EncryptionIdentity Awareness Device Visibility Policy Enforcement Access Control Threat Defense
  • 42. 42© 2014 Cisco and/or its affiliates. All rights reserved. Risk  Reports   •  Samples   •  Eval  Output   •  ExecuDve  focus