SlideShare a Scribd company logo
1© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco IronPort
Web Usage Controls
Industry-leading visibility
and protection from Web
acceptable use violations
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Web: Huge, Growing and Transient
NumberofWebpages
Static Web
Traditional Content Publishers
Legacy URL Filtering Focus
Dynamic Web
User Generated &
Web 2.0 Content
1998
28 Million
webpages
2000
1 Billion
webpages
2008
1 Trillion
webpages
Huge
1 Trillion
unique URLs
Growing
1 Billion
new pages added
every day
Transient
30%
domain-level churn
every year
2005: Web 2.0
tipping point
Source: Multiple, including Cisco SIO, Google, Wikipedia
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
 Legacy URL filtering
primarily focuses on
crawling and manual
review/classification
 Databases add
thousands of new
URLs per day…while
the web adds a Billion
 95% of the web will be
uncategorized by 2015
The Dark Web Challenge
Legacy URL Filtering Effectiveness is Decreasing
URL Lookup in Database
www.sportsbook.com/
Gambling
URL Database
Uncategorized
OBSCENE
PORN
ADULT
GAMBLING
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
URL Lookup in Database
www.sportsbook.com/
Gambling
URL Database
 Legacy URL filtering
primarily focuses on
crawling and manual
review/classification
 Databases add
thousands of new
URLs per day…while
the web adds a Billion
 95% of the web will be
uncategorized by 2015
The Dark Web
Invisible risks:
•Compliance violations
•Legal liabilities
•Acceptable use evasion
The Dark Web Challenge
Legacy URL Filtering Effectiveness is Decreasing
Uncategorized
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
URL Keyword Analysis
www.casinoonthe.net/
Gambling
Introducing Cisco IronPort Web Usage Controls
A Spotlight for the Dark Web
 Industry-leading URL
database efficacy
• 65 categories
• Updated every 5 minutes
• Powered by Cisco SIO
 Real-time Dynamic
Content Analysis
Engine accurately
identifies over 90% of
Dark Web content in
commonly blocked
categories
Uncategorized
Dynamic Content Analysis Engine
GamblingAnalyze Site Content
Real-time Dynamic
Content Analysis
URL Lookup in Database
www.sportsbook.com/
Gambling
URL Database
Uncategorized
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Dynamic Content Analysis (DCA) Engine
Identifies 90% of Objectionable Dark Web Content
High performance
• Optimized verdict pipeline
• Categorization verdicts in
less than 10 milliseconds
• Imperceptible to user
Tuned for commonly
blocked content
• Pornography and Adult
• Hate
• Gambling
• Proxy Avoidance
Analyzes content in
human terms
• Advanced heuristic analysis
based on content concept
modeling
• Improved accuracy vs.
simplistic keyword approach
Stops 50% more objectionable content*
*Source: Cisco SIO, based on data from customer production traffic
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
How Does the DCA Engine Work?
1. User requests
unknown webpage.
2. HTTP response received. Scan
response to identify relevant text.
3. Calculate content vector. Each
dimension is a score of the document’s
relevance to a particular category.
Adult
Health
Finance
5. Closest category
match is returned.
Gambling
Health
Finance
6. Policy for category
match is enforced:
Block / Allow / Warn.
4. Calculate proximity of
document’s vector to the vectors
of model documents.
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Dynamic Categorization in Action
Amateur Pornography Website BLOCKED
URL List Verdict: Uncategorized
URL Keyword Verdict: Uncategorized
Concept Vector: Top Matches
Model Doc Confidence Category
001357 67.84% Pornography
001511 57.65% Adult
000613 54.90% Pornography
Terms Identified in Concept Vector:
“Amateur Porn”
“erotic materials”
“FEDERAL LAW”
“laws”
Verdict: PORNOGRAPHY
Action: BLOCK
Dynamic Content Analysis Engine
PORN
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Cisco IronPort Web Security Appliances
on Customer Premises
Cisco Security Intelligence Operations (SIO)
Unmatched Visibility Drives Unparalleled Efficacy
Crowd Sourcing
Manual
Categorization
Web
Crawlers
External Feeds
Traffic Data from
Cisco IronPort Email
Security Appliances,
Cisco IPS, and Cisco
ASA sensors
Customer
Administrators
Analysis and Processing
Uncategorized
URLs
URL Categorization
Requests
Crawler Targeting
Master URL
Database
Updates
published
every 5
minutes
Cisco SIO
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Anti-Malware
Real-Time
Categorization
Application
Identification
Content Aware Security and Control
Ability to Analyze Web Content is Increasingly Important
 Cisco IronPort DVS: Content Aware Malware Protection
 Cisco IronPort Web Usage Controls: Content Aware Acceptable
Use Enforcement
Efficacy
Time
List-Based
URL Filtering
Content-Based
Analysis
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Control
• Per user, per group
policies
• Multiple actions:
block, warn, monitor
• Time-based policies
• Unlimited custom
categories
• Custom end-user
notifications
Visibility
• Easy to understand
reports
• Extensive logging
• Comprehensive
alerting
Efficacy
• 200+ countries
• 50+ languages
• 65 categories
• Less than 1 in 1
million false positives
Cisco IronPort Web Usage Controls
Leading Efficacy, Rich Controls, Comprehensive Visibility
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Cisco IronPort S-Series
Next Generation Secure Web Gateway
Cisco IronPort S-Series
Cisco IronPort
Web Reputation
Filters
 Proactive protection
against emerging threats
 Blocks 70% of malware
traffic at the connection
level
Cisco IronPort DVS
Anti-Malware
Engine
 Blocks malware based on
deep content analysis
 Multiple anti-malware and
anti-virus technologies
running in parallel
Data Security
 Integrated data security
for easy enforcement of
common sense policies
 Integration with external
products for advanced
DLP
Cisco IronPort
Web Usage Controls
 Industry-leading visibility and
protection
 Real-Time Dynamic Content
Analysis for the Dark Web
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Summary
Request a free evaluation today!
 Industry-leading visibility and
protection from Web acceptable
use violations
•Backed by Cisco SIO
•Dynamic categorization catches
90% of objectionable content in the
Dark Web
•Comprehensive protection against
anonymizing proxies
 Rich Policy Controls & Reporting
 Integrated into S-Series for a full
SWG solution
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

More Related Content

What's hot

Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
Cisco Canada
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
Kyle Lai
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Adam Levithan
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
Kaspersky
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
David De Vos
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
Sylvain Martinez
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
David De Vos
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
Zscaler
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
Zscaler
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
Allessandra Negri
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
Splunk
 

What's hot (20)

Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @TowsonImportance of Identity Management in Security - Microsoft Tech Tour @Towson
Importance of Identity Management in Security - Microsoft Tech Tour @Towson
 
Developing A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response ProgramDeveloping A Cyber Security Incident Response Program
Developing A Cyber Security Incident Response Program
 
Kaspersky Lab Transparency Principles
Kaspersky Lab Transparency PrinciplesKaspersky Lab Transparency Principles
Kaspersky Lab Transparency Principles
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Data Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud eraData Protection & Shadow IT in a cloud era
Data Protection & Shadow IT in a cloud era
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
Top 5 predictions webinar
Top 5 predictions webinarTop 5 predictions webinar
Top 5 predictions webinar
 
Secure remote work
Secure remote workSecure remote work
Secure remote work
 
Detection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEyeDetection and Response with Splunk+FireEye
Detection and Response with Splunk+FireEye
 

Viewers also liked

Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive HealthToxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
v2zq
 
Initial location reconnaissance report by tom ross
Initial location reconnaissance report by tom rossInitial location reconnaissance report by tom ross
Initial location reconnaissance report by tom ross
AlexNesbit
 
El gran circo de las emociones
El gran circo de las emocionesEl gran circo de las emociones
El gran circo de las emociones
Salvador Zapata Sánchez
 
Prodotti agroalimentari tradizionali:un’opportunità da valorizzare
Prodotti agroalimentari tradizionali:un’opportunità da valorizzareProdotti agroalimentari tradizionali:un’opportunità da valorizzare
Prodotti agroalimentari tradizionali:un’opportunità da valorizzare
Daniele Vergari
 
Ambag ng ehipto sa daigdig
Ambag ng ehipto sa daigdigAmbag ng ehipto sa daigdig
Ambag ng ehipto sa daigdig
Dennis Algenio
 
CV Vincent Fetzer - Ingénieur matériaux
CV Vincent Fetzer - Ingénieur matériauxCV Vincent Fetzer - Ingénieur matériaux
CV Vincent Fetzer - Ingénieur matériauxVincent Fetzer
 
Ensayo cap iii
Ensayo cap iiiEnsayo cap iii
Ensayo cap iii
Rosario Camacho
 
Ensayo cap ii
Ensayo cap iiEnsayo cap ii
Ensayo cap ii
Rosario Camacho
 
Will Ford: Un futuro más allá del embotellamiento
Will Ford: Un futuro más allá del embotellamientoWill Ford: Un futuro más allá del embotellamiento
Will Ford: Un futuro más allá del embotellamiento
Rosario Camacho
 
Ciudades para un Pequeño Planeta Capítulo III
Ciudades para un Pequeño Planeta Capítulo IIICiudades para un Pequeño Planeta Capítulo III
Ciudades para un Pequeño Planeta Capítulo III
Rosario Camacho
 
Ang Imperyong Islam
Ang Imperyong IslamAng Imperyong Islam
Ang Imperyong Islam
Angelyn Lingatong
 
The Digital Advertising Guide
The Digital Advertising GuideThe Digital Advertising Guide
The Digital Advertising Guide
exclusivevocati84
 
Mga pamana ng sinaunang kabihasnan ng roma
Mga pamana ng sinaunang kabihasnan ng romaMga pamana ng sinaunang kabihasnan ng roma
Mga pamana ng sinaunang kabihasnan ng romaJeddie Ann Panguito
 

Viewers also liked (13)

Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive HealthToxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
Toxic Combination - Fact Sheet on Toxic Chemicals and Reproductive Health
 
Initial location reconnaissance report by tom ross
Initial location reconnaissance report by tom rossInitial location reconnaissance report by tom ross
Initial location reconnaissance report by tom ross
 
El gran circo de las emociones
El gran circo de las emocionesEl gran circo de las emociones
El gran circo de las emociones
 
Prodotti agroalimentari tradizionali:un’opportunità da valorizzare
Prodotti agroalimentari tradizionali:un’opportunità da valorizzareProdotti agroalimentari tradizionali:un’opportunità da valorizzare
Prodotti agroalimentari tradizionali:un’opportunità da valorizzare
 
Ambag ng ehipto sa daigdig
Ambag ng ehipto sa daigdigAmbag ng ehipto sa daigdig
Ambag ng ehipto sa daigdig
 
CV Vincent Fetzer - Ingénieur matériaux
CV Vincent Fetzer - Ingénieur matériauxCV Vincent Fetzer - Ingénieur matériaux
CV Vincent Fetzer - Ingénieur matériaux
 
Ensayo cap iii
Ensayo cap iiiEnsayo cap iii
Ensayo cap iii
 
Ensayo cap ii
Ensayo cap iiEnsayo cap ii
Ensayo cap ii
 
Will Ford: Un futuro más allá del embotellamiento
Will Ford: Un futuro más allá del embotellamientoWill Ford: Un futuro más allá del embotellamiento
Will Ford: Un futuro más allá del embotellamiento
 
Ciudades para un Pequeño Planeta Capítulo III
Ciudades para un Pequeño Planeta Capítulo IIICiudades para un Pequeño Planeta Capítulo III
Ciudades para un Pequeño Planeta Capítulo III
 
Ang Imperyong Islam
Ang Imperyong IslamAng Imperyong Islam
Ang Imperyong Islam
 
The Digital Advertising Guide
The Digital Advertising GuideThe Digital Advertising Guide
The Digital Advertising Guide
 
Mga pamana ng sinaunang kabihasnan ng roma
Mga pamana ng sinaunang kabihasnan ng romaMga pamana ng sinaunang kabihasnan ng roma
Mga pamana ng sinaunang kabihasnan ng roma
 

Similar to Presentation cisco iron port web usage controls

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
Alert Logic
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
Inductive Automation
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
Cloudflare
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseThe New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
Inductive Automation
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
Harry Gunns
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
vfmindia
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
MarketingArrowECS_CZ
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
Cisco Canada
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
Niels Groeneveld
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
BCS ProSoft
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
Jason Edelstein
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
Mike Spaulding
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
Amazon Web Services
 
Journey to Cloud-Native: Making Sense of Your Service Interactions
Journey to Cloud-Native: Making Sense of Your Service InteractionsJourney to Cloud-Native: Making Sense of Your Service Interactions
Journey to Cloud-Native: Making Sense of Your Service Interactions
VMware Tanzu
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
Gaurav Srivastav
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOps
Red Gate Software
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
James Sutter
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 

Similar to Presentation cisco iron port web usage controls (20)

CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseThe New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Cloud Security Primer - F5 Networks
Cloud Security Primer - F5 NetworksCloud Security Primer - F5 Networks
Cloud Security Primer - F5 Networks
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Secure webl gate way
Secure webl gate waySecure webl gate way
Secure webl gate way
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
 
Journey to Cloud-Native: Making Sense of Your Service Interactions
Journey to Cloud-Native: Making Sense of Your Service InteractionsJourney to Cloud-Native: Making Sense of Your Service Interactions
Journey to Cloud-Native: Making Sense of Your Service Interactions
 
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_230 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
30 it securitythreatsvulnerabilitiesandcountermeasuresv1_2
 
Don't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOpsDon't think DevOps think Compliant Database DevOps
Don't think DevOps think Compliant Database DevOps
 
Cloud computing present
Cloud computing presentCloud computing present
Cloud computing present
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 

More from xKinAnx

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
xKinAnx
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
xKinAnx
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
xKinAnx
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
xKinAnx
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
xKinAnx
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
xKinAnx
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
xKinAnx
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
xKinAnx
 

More from xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Recently uploaded

"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 

Recently uploaded (20)

"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 

Presentation cisco iron port web usage controls

  • 1. 1© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Cisco IronPort Web Usage Controls Industry-leading visibility and protection from Web acceptable use violations
  • 2. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 Web: Huge, Growing and Transient NumberofWebpages Static Web Traditional Content Publishers Legacy URL Filtering Focus Dynamic Web User Generated & Web 2.0 Content 1998 28 Million webpages 2000 1 Billion webpages 2008 1 Trillion webpages Huge 1 Trillion unique URLs Growing 1 Billion new pages added every day Transient 30% domain-level churn every year 2005: Web 2.0 tipping point Source: Multiple, including Cisco SIO, Google, Wikipedia
  • 3. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3  Legacy URL filtering primarily focuses on crawling and manual review/classification  Databases add thousands of new URLs per day…while the web adds a Billion  95% of the web will be uncategorized by 2015 The Dark Web Challenge Legacy URL Filtering Effectiveness is Decreasing URL Lookup in Database www.sportsbook.com/ Gambling URL Database Uncategorized OBSCENE PORN ADULT GAMBLING
  • 4. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 URL Lookup in Database www.sportsbook.com/ Gambling URL Database  Legacy URL filtering primarily focuses on crawling and manual review/classification  Databases add thousands of new URLs per day…while the web adds a Billion  95% of the web will be uncategorized by 2015 The Dark Web Invisible risks: •Compliance violations •Legal liabilities •Acceptable use evasion The Dark Web Challenge Legacy URL Filtering Effectiveness is Decreasing Uncategorized
  • 5. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5 URL Keyword Analysis www.casinoonthe.net/ Gambling Introducing Cisco IronPort Web Usage Controls A Spotlight for the Dark Web  Industry-leading URL database efficacy • 65 categories • Updated every 5 minutes • Powered by Cisco SIO  Real-time Dynamic Content Analysis Engine accurately identifies over 90% of Dark Web content in commonly blocked categories Uncategorized Dynamic Content Analysis Engine GamblingAnalyze Site Content Real-time Dynamic Content Analysis URL Lookup in Database www.sportsbook.com/ Gambling URL Database Uncategorized
  • 6. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Dynamic Content Analysis (DCA) Engine Identifies 90% of Objectionable Dark Web Content High performance • Optimized verdict pipeline • Categorization verdicts in less than 10 milliseconds • Imperceptible to user Tuned for commonly blocked content • Pornography and Adult • Hate • Gambling • Proxy Avoidance Analyzes content in human terms • Advanced heuristic analysis based on content concept modeling • Improved accuracy vs. simplistic keyword approach Stops 50% more objectionable content* *Source: Cisco SIO, based on data from customer production traffic
  • 7. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 How Does the DCA Engine Work? 1. User requests unknown webpage. 2. HTTP response received. Scan response to identify relevant text. 3. Calculate content vector. Each dimension is a score of the document’s relevance to a particular category. Adult Health Finance 5. Closest category match is returned. Gambling Health Finance 6. Policy for category match is enforced: Block / Allow / Warn. 4. Calculate proximity of document’s vector to the vectors of model documents.
  • 8. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Dynamic Categorization in Action Amateur Pornography Website BLOCKED URL List Verdict: Uncategorized URL Keyword Verdict: Uncategorized Concept Vector: Top Matches Model Doc Confidence Category 001357 67.84% Pornography 001511 57.65% Adult 000613 54.90% Pornography Terms Identified in Concept Vector: “Amateur Porn” “erotic materials” “FEDERAL LAW” “laws” Verdict: PORNOGRAPHY Action: BLOCK Dynamic Content Analysis Engine PORN
  • 9. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 Cisco IronPort Web Security Appliances on Customer Premises Cisco Security Intelligence Operations (SIO) Unmatched Visibility Drives Unparalleled Efficacy Crowd Sourcing Manual Categorization Web Crawlers External Feeds Traffic Data from Cisco IronPort Email Security Appliances, Cisco IPS, and Cisco ASA sensors Customer Administrators Analysis and Processing Uncategorized URLs URL Categorization Requests Crawler Targeting Master URL Database Updates published every 5 minutes Cisco SIO
  • 10. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 Anti-Malware Real-Time Categorization Application Identification Content Aware Security and Control Ability to Analyze Web Content is Increasingly Important  Cisco IronPort DVS: Content Aware Malware Protection  Cisco IronPort Web Usage Controls: Content Aware Acceptable Use Enforcement Efficacy Time List-Based URL Filtering Content-Based Analysis
  • 11. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 Control • Per user, per group policies • Multiple actions: block, warn, monitor • Time-based policies • Unlimited custom categories • Custom end-user notifications Visibility • Easy to understand reports • Extensive logging • Comprehensive alerting Efficacy • 200+ countries • 50+ languages • 65 categories • Less than 1 in 1 million false positives Cisco IronPort Web Usage Controls Leading Efficacy, Rich Controls, Comprehensive Visibility
  • 12. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 Cisco IronPort S-Series Next Generation Secure Web Gateway Cisco IronPort S-Series Cisco IronPort Web Reputation Filters  Proactive protection against emerging threats  Blocks 70% of malware traffic at the connection level Cisco IronPort DVS Anti-Malware Engine  Blocks malware based on deep content analysis  Multiple anti-malware and anti-virus technologies running in parallel Data Security  Integrated data security for easy enforcement of common sense policies  Integration with external products for advanced DLP Cisco IronPort Web Usage Controls  Industry-leading visibility and protection  Real-Time Dynamic Content Analysis for the Dark Web
  • 13. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 Summary Request a free evaluation today!  Industry-leading visibility and protection from Web acceptable use violations •Backed by Cisco SIO •Dynamic categorization catches 90% of objectionable content in the Dark Web •Comprehensive protection against anonymizing proxies  Rich Policy Controls & Reporting  Integrated into S-Series for a full SWG solution
  • 14. © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14