Dans le cadre de la 8ème edition des Cyber Security Days 2018, organisée par l'agence nationale de la sécurité informatique, notre partenaire Fortinet-Exclusive Networks a présenté son module "Fortinet Security Fabric".
EMA’s published software-defined wide-area network (SD-WAN) transformation research, based on a survey of 303 enterprise IT professionals, identifies best practices for modernizing the WAN with SD-WAN and other technology.
These slides from the webinar featuring EMA VP of Research Shamus McGillicuddy
- Give results from EMA’s industry-leading research in enterprise WAN strategies by looking at the dos and don’ts of SD-WAN projects
- Explore emerging requirements for secure access service edge (SASE) solutions
- Examine how the COVID-19 pandemic has affected these networks
Dans le cadre de la 8ème edition des Cyber Security Days 2018, organisée par l'agence nationale de la sécurité informatique, notre partenaire Fortinet-Exclusive Networks a présenté son module "Fortinet Security Fabric".
EMA’s published software-defined wide-area network (SD-WAN) transformation research, based on a survey of 303 enterprise IT professionals, identifies best practices for modernizing the WAN with SD-WAN and other technology.
These slides from the webinar featuring EMA VP of Research Shamus McGillicuddy
- Give results from EMA’s industry-leading research in enterprise WAN strategies by looking at the dos and don’ts of SD-WAN projects
- Explore emerging requirements for secure access service edge (SASE) solutions
- Examine how the COVID-19 pandemic has affected these networks
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
The purpose of the session is to ensure security on the rapidly scaled work from Home situations during the COVID-19 outbreak. The objective is to ensure that they can securely and rapidly connect to all of their applications, including SaaS, cloud, and data-center applications.
The session will be delivered by Mohammad Faizan Sheikh, Channel Systems Engineer, India & SAARC for Palo Alto Networks..
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
The network can now learn, adapt, and evolve. Designed to be intuitive, the network can recognize intent, mitigate threats through segmentation and encryption, and learn and change over time. The new network helps your organization unlock opportunities, enhance security, be more agile, and operate more efficiently.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
the IBM Security Intelligence Platform, also known as QRadar®, integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
The purpose of the session is to ensure security on the rapidly scaled work from Home situations during the COVID-19 outbreak. The objective is to ensure that they can securely and rapidly connect to all of their applications, including SaaS, cloud, and data-center applications.
The session will be delivered by Mohammad Faizan Sheikh, Channel Systems Engineer, India & SAARC for Palo Alto Networks..
Cisco ACI: A New Approach to Software Defined NetworkingDebra Jennings
Cisco ACI: A New Approach to Software Defined Networking, presented by Michael Edwards from GTRI. Learn more about Cisco's Application Centric Infrastructure (ACI). As a policy-based automation solution, Cisco ACI is a different approach to Software Defined Networking (SDN). This presentation uncovers what makes it simple, agile and application centric, and how it can reduce errors and accelerate application deployment from weeks to minutes.
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
Replay the live event: http://cs.co/90008z2Ar
Learn how your existing Cisco network can help you to know exactly who is doing what on the network with end-to-end visibility, differentiate anomalies from normal behavior with contextual threat intelligence and stop threats and mitigate risk with one-click containment of users and devices.
It’s time for the network to protect itself. Please make time for this important workshop.
Resources:
Watch the Cisco Stealthwatch and ISE full episode: http://cs.co/90008z24M
Network as a Sensor-Enforcer on CCO:
http://www.cisco.com/c/en/us/solutions/enterprise-networks/enterprise-network-security/net-sensor.html
Cisco ISE Community
http://cs.co/ise-community
The network can now learn, adapt, and evolve. Designed to be intuitive, the network can recognize intent, mitigate threats through segmentation and encryption, and learn and change over time. The new network helps your organization unlock opportunities, enhance security, be more agile, and operate more efficiently.
Watch the replay: http://cs.co/9001DxsKP
Are you getting unrivaled simplicity, end-to-end visibility, hardware reliability, and consistent policies from your WAN? You can get all of these things when you combine SD-WAN software with Cisco IOS XE routing platforms.
Experts from Cisco’s enterprise routing team will be on hand to show you what intent-based networking and software-defined simplicity in the WAN can bring. Powerful new capabilities are possible with a simple software image change.
Resources:
Watch the related TechWiseTV episode: http://cs.co/9003DvZHt
TechWiseTV: http://cs.co/9009DzrjN
Technical Overview of Cisco Catalyst 9200 Series SwitchesRobb Boyd
TechWiseTV's Cisco Container Platform live workshop took place on July 18th.
For the first time in the industry, a single family of fixed, stackable, and modular switches are running on the same IOS-XE operating system along with a common ASIC.
Cisco’s Catalyst 9200 rounds out the lower end of its incredible Catalyst 9000 family of switches. The 9200 is designed for small, medium, and branch deployments, providing greater modularity, redundancy, and stackability than the Catalyst 2960 it replaces.
Register now.
the IBM Security Intelligence Platform, also known as QRadar®, integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
This session will focus on typical deployment scenarios for the Adaptive Security Appliance family running FirePower Services. Also, a feature overview and comparison of the ASA with Firepower services and the new Firepower Threat Defense (FTD) image will be included with updates on the new Firepower hardware platform. Deployment use cases will include Internet Edge, various segmentation scenarios, and VPN. A configuration walk-through and accepted best practices will be covered. This session is designed for existing ASA customers and targets the security and network engineer. They will learn the benefit of a FirePower NGFW in network edge and Internet use cases
The fourth-generation Cisco ASR 9000 Aggregation Services Routers series is our best yet. Not only does it sport high-density, 100-GE-port line cards; it also offers a flexible, pay-as-you-grow consumption model. Service providers can now use only the bandwidth they need and increase it at any time to meet traffic demands.
Learn the business and technical considerations of our latest ASR 9000, including:
• The pay-as-you-grow consumption model commercial terms
• Software license portability and permitting capacity
• Real-life customer case studies
Resources:
Watch the related TechWiseTV episode: http://cs.co/9008Dfyik
TechWiseTV: http://cs.co/9009DzrjN
Hosted Security as a Service - Solution Architecture DesignCisco Canada
he Hosted Security as a Service session provides in depth discussion on cloud based security services leveraging Cisco security solutions. This session is appropriate for service providers who are interested in delivering managed security services to their customer from their cloud infrastructure. We will provide detailed designs and guidance on: - cloud security services including FW, VPN, web and email services - architecture layers through influence of NfV and SDN - KVM and VMware based solutions - orchestration flexibility and options - Day 0 and Day 1 provisioning - Day 2 monitoring and reporting.
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Many organizations anticipate significant growth in WAN bandwidth and Public Cloud usage. Leveraging the Internet to provide extra WAN bandwidth and to offload Public Cloud traffic is compelling, however network reliability, application performance and security are the primary roadblocks. Cisco IWAN transport solution is the most full featured architecture to support the Software Defined Wide Area Network (SD-WAN) requirements that are emerging in standards bodies like the Open Networking User Group (ONUG) to address these issues. Many enterprises are looking for the benefits these technologies deliver, but without the costs associated with owning and operating those technologies. Here is where VMS for IWAN meets market need. Cisco VMS is a full featured management platform for both virtual and physical devices. This session will cover a full description of the VMS platform and how it can be used to deliver exceptional customer experience when supporting a managed offering of IWAN. The roles of Customer and Resource Facing Services will be covered, along with integration between the IWAN service and SP operations. This session will also cover the topic of how Virtual Network Functions (VNFs) can be placed optimally in the network from the CPE to SP datacenter, along with a demo of the end user and operator experience.
Cisco Powered: Your Trusted Source for Cloud and Managed ServicesCisco Canada
Session: Cisco Powered: Your Trusted Source for Cloud and Managed Services
Presenter: Mohammad Abdel, Sr. Manager, Global Cloud GTM
Date: October 6, 2015
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
Mike Herbet, Principal Engineer, Cisco, Dave Cole, Consulting Systems Engineer, Cisco, Sean Comrie, Technical Solutions Architect, Cisco focused on the application centric infrastructure (ACI) at Cisco Connect Toronto.
Microsoft Azure - Introduction to microsoft's public cloudAtanas Gergiminov
Microsoft Azure is Microsoft's application platform for the public cloud. The goal of this presentation is to give you a foundation for understanding the fundamentals of Azure, even if you don't know anything about cloud computing.
Speaker Notes Format
Why is this slide covered? – a high level overview to show Cisco has a wide breadth of platforms – we are not just a End Point, or Firewall, or IPS, or Email, Web, DNS, Analytics …….. We have proven evidence we are leaders in all of these
What are the 2 or 3 specific points we must get across on this slide? – It takes contextual knowledge of the entire eco system to provide those last few percentage points of confidence in stopping threats. Blended Advanced Persistent Threats that are very stealthy and try to get past point in time solutions can be uncovered quicker when we have visibility across all of these. Customers don’t need to purchase all of Cisco’s solutions to get all of these benefits because Talos correlates and consolidates data globally from customers to leverage specific data locally to all customers.
Is this a competitive positive for Cisco?
13 x4 ==52
Talos is the threat intelligence group at Cisco. We are here to fight the good fight — we work to keep our customers, and users at large, safe from malicious actors.
Defense in depth even within a firewall is a key design goal for any security policy. FTD has a variety controls to ensure the tightest security layer as well as enforce acceptable use policies.
The flexibility in place includes inspection and controls across the L4-7 packet information. FTD can be configured to pull in feeds from Talos in the form of Security intelligence. This feed allows the NGFW to intelligently block or allow flows based on IP, URLs and FQDN.
Application control is also a critical requirement. What apps are end users allowed to use and from which zone in your network? Are they allowed to interact with all the micro apps on a website? Can they even use the app in the first place? We have over 4000 pre-defined apps at your control. But we know apps are always changing and you may have your own app you want to control, so AVC and OpenAppID can be easily customized to meet your specific application control needs
Yet another layer of security control fall under the URL categories. Based on Cisco’s Talos intelligence, administrators can define the processing of DNS layer requests. Do you want to block certain categories? Or just report the end user visiting those sites? Do you want to block on the reputation of a specific site based on the possibility of a site being compromised?
Combining all of these controls within the very easy to understand and control policy definition process provides a superior defense in depth layer of security.
Speaker Notes Format
Why is this slide covered? This is a critical value that addresses a significant pain point for our customers. Encrypted traffic causes a blind spot to our customers. This blind spot can be for good reasons because the stream should not be investigated, maybe it’s an employees banking information or HR data. BUT – what about the malicious traffic now also hiding in the encrypted flows. We must provide the ability to intelligently chose what to decrypt and analyze and more importantly not severely impact the performance of the solution.
What are the 2 or 3 specific points we must get across on this slide? We provide industry leading performance and control capabilities around how we handle encrypted traffic. We can do this in software and in purpose built hardware. We also provide very detailed logging information around these sessions.
Is this a competitive positive for Cisco?
Encryption can be used for good, we secure our banking information, we like to see that lock on the website when we do our online shopping. But it is also used for the questionable and in many cases used by the criminal actors. With today’s networks becoming more and more blind to the ever increasing percentage of encrypted traffic, we can no longer take it for granted. Your firewall must be able to understand what is going on. This is usually done by decrypting the flow as a man in the middle. We then scan and understand what is going on with our access policy rules. The firewall, for the allowed/good traffic then needs to re-encrypt the traffic on and send it on its way. This, when done in SW only, imposes a significant inspection tax. Your firewall slows down. You end up tuning or turning off engines in your firewall in order to maintain performance. Many times you are forced to buy a much larger firewall to just support this inspection.
Not with Cisco’s NGFW architecture. Imbedded in our hardware we have architected TLS decrypt and encrypt with HW assistance. This greatly reduces the performance impact of understanding what is flowing over those encrypted conversations. With over 80% of your traffic being encrypted, you also require a method to enforce what type of encryption is used for the traffic you want to allow. FTD can enforce the version of TLS encryption as well as the cipher strength. We can allow or block if the cert is self signed or not, what cypher suites are allowed or not allowed.
The combination of these controls allows our customers to enforce the policies around what types of encryption is used as well as what flows over or is allowed to pass. We provide detailed an extensive tracking and logging the TLS sessions themselves.
Speaker Notes Format
Why is this slide covered? While this may not be a significant differentiation for a NGFW, it is required for many deployments. We support the majority of the VPN architectures.
What are the 2 or 3 specific points we must get across on this slide?
Is this a competitive positive for Cisco?
Speaker’s Notes:
Your firewall in many cases is also the termination point for your VPN connections as well. These connections can be site to site or end user vpn tunnels. FTD has inherited much of the VPN technology from our long history with ASA. We have added in enhanced configuration and reporting tools to make deployment easier. These VPN architectures can be defined as point to point, hub and spoke or full mesh. We provide an easy to understand graphical representation of these deployments to reduce the potential of errors and decrease the amount of time to setup, enforce and trouble-shoot VPN configurations.
Speaker Notes Format
Why is this slide covered? To review with the customer that we have many ways to manage our environment. See if the customer has a requirement or desire for on prem or cloud based management. Explain that we have flexible choice and over time, the power to choose which consumption model required will improve (CDO on 4100 and 9300 coming in 6.5, etc)
What are the 2 or 3 specific points we must get across on this slide? Cisco provides in depth management solutions across the consumption models. These models can be chosen by either where they want to manage their devices OR what group is managing the devices (Security or Network)
Is this a competitive positive for Cisco?
Choosing the correct manager for your next generation firewall is an important step in designing your deployment. it really comes down to your core cases and requirements when you are choosing the right manager for your deployment. Cisco provides several options to its customers, ranging from on-box, to on-prem, to cloud based management. We will dive deeper into each of these in the following slides. The on-box manager which for the Firepower Threat Defense (FTD) is the graphical, intuitive, firepower device manager is a free with the FTD device but limits you to managing devices individually. Firepower Device Manager (FDM) enables easy on box reporting, policy and configuration management of common tasks.
Centralized management is available in two consumption models; on premise and cloud. Lets take a look at on-prem first. The Firepower Management Center (FMC) which provides comprehensive security administration and automation of multiple devices. Customers can leverage FMC to centrally manage both stateful services, configurations and policies and the Firepower firewall features in a single image. In the cloud, we have the Cisco Defense Orchestrator (CDO) which enable centralized cloud-based policy orchestrations and reporting for multiple sites and multiple security products (ASA, FTD, Meraki with more being added over time) from a single cloud based interface.
As we step into achieving a larger GOAL
You can already get a glimpse of it with FDM; our local FTD manager which is supported on low and mid range platforms today, with modern ux and workflows which are optimized for the commercial usecase
And one of the key benefits is that it is made to co-exist with our Cloud Manager CDO
The network operations teams need a solution that can:
Manage Policy Changes Across Many Devices Consistently and Easily: Critical to maintaining your security posture, but is time consuming and prone to human error when doing this across MANY devices. Simple, Efficient and Effective policy management is critical.
Your Business Is Not Static: As your business evolves you need a solution that will scale to meet the needs of your business! Adding devices needs to be easier and consistent. Ongoing management holistically across devices is critical! Running the most optimal, secure environment is required!
We Must Be Ahead of the Threats: Updating a platforms firmware or policy cannot take days when our company is at risk. It MUST happen quickly!
And lastly, Do More With Less: On top of the increased workload, you are often expected to meet growing demands with a team that just isn’t getting any bigger.
Overall, this means you need an integrated security solution that is not only effective, but also simpler and consistent to manage. You need a systematic to improve your security posture and provide robust security policy management across all of your locations.
In addition CDO will soon add, AWS, Umbrella SIG, Meraki MX, and Cisco Secure SD-WAN to its capability set. Write and set policy once, eliminating the chance of human error, and bringing consistency to your security posture across the entire hybrid network
Speaker - FYI
Where are CDO Data Centers?
AWS – US West (Oregon)
AWS – US East (Virginia)
AWS – EU Central (Frankfurt)
Can I sell CDO if out of region?
YES! CDO transactions are low overhead and we have clients all over the world with services out of the US or EMEAR.
ASA (available) - Shared objects, Shared policies, Device management, CLI automation
FTD (June 2019) - Layer 3, 4 and 7, IPS and malware, Objects, policies, Device management
Meraki (June 2019) - Layer 3 rules, NAT Shared objects with ASA and FTD
AWS (August 2019) - Security groups orchestration, VPN topology
SD-WAN (Dec 2019) - Policy management, VPN management
CDO is an open platform leveraging APIs, making it easy for us to extend CDO to additional platforms
Note: Meraki support available August 2019
FTD 6.5 is expected in Fall 2019
Cisco.com/go/cdo
Find details about pricing and demos on Salesconnect
Free CDO with new hardware sales as part of our “Ignite the Firewall” partner program
Slide 21-23: Should clean up, but I can take the lead on this one. I’ll probably incorporate into one or two slides.
Slide 21-23: Should clean up, but I can take the lead on this one. I’ll probably incorporate into one or two slides.
Slide 21-23: Should clean up, but I can take the lead on this one. I’ll probably incorporate into one or two slides.