Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
www.utgsolutions.com
@utgsolutions 205.413.4274
B u s i n e s s • Dr i ve n • Te c h n o l o g y
Agenda
•Intro
•Game Planning for Success
UTG -Derrick Helms, CISSP
•Cisco AMP
Cisco – Chris Robb
•Q&A
•Drawing for ASA 550...
CyberSecurity -
Game Planning for Success
Derrick Helms, CISSP
Headlines
There is a multi-billion dollar global industry
targeting your prized assets
$450 Billion
to
$1 Trillion
Social
Security
$...
Cisco Advanced Malware
Protection
Chris Robb - Cisco
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Spyware &
Rootkits
2010
Viruses
2000
Worms
2...
In the news…what do these all have in common?
Home
Depot
Over 50 UPS Franchises hit by data breach
4.5M Records stolen fro...
What Can We Learn From Sony
12/04/2014: What has happened at Sony Pictures
Entertainment over the past week reads like a b...
What Can We Learn From Traditional
Point in Time Solutions
We Tested all of These Solutions
“Captive portal”
“It matches the pattern”
“No false positives,
no false negatives”
Applic...
Even Sandboxing Has Holes
Antivirus
Sandboxing
Initial Disposition =
Clean
Actual Disposition =
Bad Too Late!!
Not
100%
An...
Recap of Issues that need to be fixed by security providers
• Targeted attacks / advanced persistent threats are hard to d...
AMP goes beyond point-in-time detection
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Reme...
Continuous Protection when advanced malware evades
point-in-time detection
Antivirus
Sandboxing
Initial Disposition = Clea...
AMP Everywhere Strategy
AMP
CONTINUOUSLY
RECORD ACTIVITY
REGARDLESS OF
DISPOSITION
Data we are sending to AMP Cloud
AMP CLOUD
RECORDING
PRIVATE CLOUD
AMP for Endpoint: Device Trajectory / Incident
Analysis
AMP for Endpoint: Vulnerability Detection
Low Prevalence
Speed Matters: Time to Detection (TTD)
The current industry TTD rate of 100 to 200 days is not acceptable.
17.5200 VS
HOUR...
Cisco Advanced Malware Protection
Built on Unmatched Collective Security Intelligence
1.6 million
global sensors
100 TB
of...
AMP Offers Point-in-Time and Retrospective
Protection
Point-in-Time Protection
File Reputation & Sandboxing
Dynamic
Analys...
How Cisco Made a Better Sandbox
Allow you to Interact with Malware with Glove Box Outside Looking In approach no Hooks
Pri...
SAMPLE Glove Box ThreatGrid Video
Sample ThreatGrid Report
THREAT INTELLIGENCE
Visibility, Analytics, People.
Private
WAN
FW
FW
Secure
Web
IPS
ISE
AMP
AMP
AMP
AMPVP
N
ISE
Endpoints
...
Sample AMP for Endpoints Reports
Introducing Threat Grid Everywhere
Suspicious
file
Analysis
report
Edge
Endpoints
Firewalls
& UTM
Email
Security
Security
...
Automatically submit suspicious files
Automated analysis, from edge to endpoint
Submission
Analyst or system (API)
submits...
Easily integrate with partner solutions
Security Analytics NessusXPSEnCaseEnterprise 360
API
Our robust REST API streamlin...
AMP Threat Grid: Key Differentiators
Data Fidelity &
Performance
Scalability &
Flexibility
Usability
Context & Data
Enrich...
AMP for Networks
AMP Appliance
NextGen Firewall ,IPS , URL &
AMP
The AMP appliance was designed
to run all fire power feat...
Retrospection in Action
Correlation with AMP for endpoints
would show file was cleaned /
Quarantined
How Cisco AMP Works:
Network File Trajectory Use Case
An unknown file is present on
IP: 10.4.10.183, having been
downloaded from Firefox
At 10:57, the unknown file is from
IP 10.4.10.183 to IP: 10.5.11.8
Seven hours later the file is then
transferred to a third device
(10.3.4.51) using an
SMB application
The file is copied yet again onto a
fourth device (10.5.60.66) through
the same SMB application a half
hour later
The Cisco® Collective Security
Intelligence Cloud has learned this
file is malicious and a retrospective
event is raised f...
At the same time, a device with the
AMP for Endpoints connector
reacts to the retrospective event
and immediately stops an...
Eight hours after the first attack, the
Malware tries to re-enter the system
through the original point of entry
but is re...
© 2014 Cisco and/or its affiliates. All rights reserved. 53
AMP
Threat Intelligence
Cloud
Windows OS Android Mobile Virtua...
© 2014 Cisco and/or its affiliates. All rights reserved. 54
Identify Solution Options
Customer Need Feature WSA, ESA, CWS ...
© 2014 Cisco and/or its affiliates. All rights reserved. 55
Understanding The Different Platforms
• Detect and block malwa...
Cisco Confidential 56C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco AMP is the Leader in Sec...
Cisco Confidential 57C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved.
“So do any network security ve...
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Cisco AMP for Network Options
Helping you c...
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Cisco AMP for Networks Dedicated Appliances...
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Cisco FP/ FirePower Dedicated Appliances
Th...
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Cisco ASA Appliances
ASA Cisco has added th...
Q & A
Derrick Helms – UTG
dhelms@utgsolutions.com
Chris Robb – Cisco
chrrobb@cisco.com
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
Upcoming SlideShare
Loading in …5
×

CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th

495 views

Published on

Did you know that today's cyber threat landscape costs companies BILLIONS in damages each year?

We want to help protect your company, employees and customers from the rising threat landscape!

This presentation includes:

• The state of cybersecurity and the threat landscape

• How a threat-focused approach is changing the ability to detect and respond to breaches

• How to develop a security game plan around a proven process

• How to automatically defend your network with Cisco’s Advanced Malware Protection (AMP)

http://www.utgsolutions.com/solutions/security-compliance

Published in: Technology
  • Be the first to comment

  • Be the first to like this

CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th

  1. 1. www.utgsolutions.com @utgsolutions 205.413.4274 B u s i n e s s • Dr i ve n • Te c h n o l o g y
  2. 2. Agenda •Intro •Game Planning for Success UTG -Derrick Helms, CISSP •Cisco AMP Cisco – Chris Robb •Q&A •Drawing for ASA 5506-X and 2 $100 Visa Cards!
  3. 3. CyberSecurity - Game Planning for Success Derrick Helms, CISSP
  4. 4. Headlines
  5. 5. There is a multi-billion dollar global industry targeting your prized assets $450 Billion to $1 Trillion Social Security $1 Mobile Malware $150 $Bank Account Info >$1000 depending on account type and balance Facebook Accounts $1 for an account with 15 friends Credit Card Data $0.25-$60 Malware Development $2500 (commercial malware) DDoS DDoS as A Service ~$7/hour Spam $50/500K emails Medical Records >$50 Exploits $1000- $300K Industrialization of Hacking
  6. 6. Cisco Advanced Malware Protection Chris Robb - Cisco
  7. 7. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Spyware & Rootkits 2010 Viruses 2000 Worms 2005 APTs Cyberware Today + Anti-virus (Host) IDS/IPS (Network) Anti-malware (Host+Network) Intelligence and Analytics (Host+Network+Cloud) Enterprise Response The World Has Changed: The Industrialization of Hacking
  8. 8. In the news…what do these all have in common? Home Depot Over 50 UPS Franchises hit by data breach 4.5M Records stolen from US Health Giant Goodwill Russian Hackers steal 4.5B records Meet Me Social Network User’s Passwords Stolen Insider breach at Las Vegas Brain and Spine Surgery Center Florida bank notifies roughly 72,000 customers of breech Los Angeles based health system breached Payment cards used on Wireless Emporium website compromised Albertson’s stores CC data hacked $100,000 bitcoin loss due to hack Microsoft’s Twitter Account Hacked Sony’s Twitter Account Hacked Russian PM’s Twitter hacked – “I resign” NRC Computers hacked 3 times Ferguson police offices computers hacked Norwegian oil industry under attack Saudi TV website hacked by Libyan Sony suffer DOS attack Dairy Queen hacked JP Morgan
  9. 9. What Can We Learn From Sony 12/04/2014: What has happened at Sony Pictures Entertainment over the past week reads like a blockbuster screenplay—or a chief executive’s nightmare: Hackers target a major company, disabling its internal systems and leaking documents revealing long-held secrets, from coming products to executive pay. 12/05/2014: The Sony data breach continues to get worse. First, it was exposed budgets, layoffs and 3,800 SSNs, then it was passwords. Now, it's way more social security numbers—including Sly Stallone's. The Wall Street Journal reports that analysis of the documents leaked so far included the Social Security numbers of 47,000 current and former Sony Pictures workers. That included Sylvester Stallone, Rebel Wilson, and Anchorman director, Judd Apatow. The Journal reports that the SSNs are found alongside salary information, home addresses, and contract details.
  10. 10. What Can We Learn From Traditional Point in Time Solutions
  11. 11. We Tested all of These Solutions “Captive portal” “It matches the pattern” “No false positives, no false negatives” Application Control FW/VPN IDS/IPS UTM NAC A V PKI “Block or Allow” “Fix the Firewall” “No key, no access” Sandboxing “Detect the Unknown” Threat Analytics “Outside looking in” The Best Point in Time Protection Protects you 90 + % of the time
  12. 12. Even Sandboxing Has Holes Antivirus Sandboxing Initial Disposition = Clean Actual Disposition = Bad Too Late!! Not 100% Analysis Stops EventHorizon Sleep Techniques Unknown Protocols Encryption Polymorphism Blind to scope of compromise
  13. 13. Recap of Issues that need to be fixed by security providers • Targeted attacks / advanced persistent threats are hard to detect • Malware’s has an ecosystem of components and it’s important to understand what that ecosystem is and which part of any solution addresses those ecosystem components. • Malware’s intensions are nefarious in nature, but the components are built just like standard software so it can easily hide in your environment • Don’t get caught up in the catch rate game because no security solution protects you 100%. what about the files they missed? The industry average to find a file that got by your defenses is 200 days . • Do traditional point in time solutions like Email ,Content ,Next Gen Firewall, IPS, AV and Sandbox solution give you the visibility you need? Be honest with yourself do they allow you to proactively reduce your attack surface • Regardless of your security solutions always back up your data because no one is 100% !!!!!!!
  14. 14. AMP goes beyond point-in-time detection BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Email & Web ContinuousPoint-in-time Attack Continuum Cloud
  15. 15. Continuous Protection when advanced malware evades point-in-time detection Antivirus Sandboxing Initial Disposition = Clean Point-in-time Detection Initial Disposition = Clean AMP Actual Disposition = Bad = Too Late!! Not 100% Analysis Stops Sleep Techniques Unknown Protocols Encryption Polymorphism Retrospective Detection, Analysis Continues
  16. 16. AMP Everywhere Strategy AMP CONTINUOUSLY RECORD ACTIVITY REGARDLESS OF DISPOSITION
  17. 17. Data we are sending to AMP Cloud AMP CLOUD RECORDING PRIVATE CLOUD
  18. 18. AMP for Endpoint: Device Trajectory / Incident Analysis
  19. 19. AMP for Endpoint: Vulnerability Detection
  20. 20. Low Prevalence
  21. 21. Speed Matters: Time to Detection (TTD) The current industry TTD rate of 100 to 200 days is not acceptable. 17.5200 VS HOURSDAYS Industry Cisco Cisco 2015 Midyear Security Report • Speed of Innovation > ~40% Efficacy • Point products >> weak defenses • Integrated Threat Defense is needed Cisco Minimizes the Time to Detect Breaches
  22. 22. Cisco Advanced Malware Protection Built on Unmatched Collective Security Intelligence 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints 600 engineers, technicians, and researchers 35% worldwide email traffic 13 billion web requests 24x7x365 operations 4.3 billion web blocks per day 40+ languages 1.1 million incoming malware samples per day AMP Community Private/Public Threat Feeds Talos Security Intelligence AMP Threat Grid Intelligence AMP Threat Grid Dynamic Analysis 10 million files/month Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities AEGIS Program Email Endpoints Web Networks IPS Devices WWW Automatic updates in real time 101000 0110 00 0111000 111010011 101 1100001 110 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 1001 1101 1110011 0110011 101000 0110 00 101000 0110 00 0111000 111010011 101 1100001 1100001110001110 1001 1101 1110011 0110011 10100 1001 1101 1110011 0110011 101000 0110 00 Cisco® Collective Security Intelligence Cisco Collective Security Intelligence Cloud AMP Advanced Malware Protection 3.5 BILLION SEARCHES TODAY 19.6 BILLION THREATS BLOCKED TODAY
  23. 23. AMP Offers Point-in-Time and Retrospective Protection Point-in-Time Protection File Reputation & Sandboxing Dynamic Analysis Machine Learning Fuzzy Finger-printing Advanced Analytics One-to-One Signature
  24. 24. How Cisco Made a Better Sandbox Allow you to Interact with Malware with Glove Box Outside Looking In approach no Hooks Prioritize threats Context-driven Malware Analytics
  25. 25. SAMPLE Glove Box ThreatGrid Video
  26. 26. Sample ThreatGrid Report
  27. 27. THREAT INTELLIGENCE Visibility, Analytics, People. Private WAN FW FW Secure Web IPS ISE AMP AMP AMP AMPVP N ISE Endpoints Data Centers Offices/Plants Secure Email IPS Internet AMP Cisco’s Threat Defense Strategy 77% email phishing malicious web-download 19% 0.3% Network attack 4% Direct Install 99.2% Block Rate (#1) 17 Hour Detection Time (#1) FW
  28. 28. Sample AMP for Endpoints Reports
  29. 29. Introducing Threat Grid Everywhere Suspicious file Analysis report Edge Endpoints Firewalls & UTM Email Security Security Analytics Web Security Endpoint Security Network Security 3rd Party Integration S E C U R I T Y Security monitoring platforms Deep Packet Inspection Gov, Risk, Compliance SIEM Dynamic Analysis Static Analysis Threat Intelligence AMP Threat Grid Cisco Security Solutions Network Security Solutions Suspicious file Premium content feeds Security Teams
  30. 30. Automatically submit suspicious files Automated analysis, from edge to endpoint Submission Analyst or system (API) submits suspicious sample to Threat Grid. Suspicious file Edge Endpoints ASA w/FPS ESA Next Gen IPS WSA AMP for Endpoints AMP for Networks
  31. 31. Easily integrate with partner solutions Security Analytics NessusXPSEnCaseEnterprise 360 API Our robust REST API streamlines partner integration
  32. 32. AMP Threat Grid: Key Differentiators Data Fidelity & Performance Scalability & Flexibility Usability Context & Data Enrichment Integration & Architecture • Proprietary analysis delivers unparalleled insight into malicious activity • High-speed, automated analysis and adjustable runtimes • Does not expose any tags or indicators that malware can use to detect that it is being observed • 100,000s of samples analyzed daily (6-10 million per month) • SaaS delivery (no hardware) or Appliance (as needed) • Search and correlate all data elements of a single sample against billons of sample artifacts collected and analyzed over years (global and historic context) • Enable the analyst to better understand the relevancy of sample in question to one’s environment • Clearly presented information for all levels of the IT Security team: - Tier 1-3 SOC Analysts, Incident Responders & Forensic Investigators, and Threat Intel Analysts • Web portal, Glovebox (User Interaction), Video Replay, Threat Score, Behavioral Indicators and more • Architected from the ground up with an API to integrate with existing IT security solutions (Automatically receive submissions from other solutions and pull the results into your environment) • Create custom threat intelligence feeds with context or leverage automated batch feeds
  33. 33. AMP for Networks AMP Appliance NextGen Firewall ,IPS , URL & AMP The AMP appliance was designed to run all fire power features Nextgen Firewall IPS , URL and Advanced Malware Protection (AMP). The AMP Appliance was built on the FP platform and has had its CPU and memory optimized to run all the security features and maintain performance throughput numbers per the AMP for Networks datasheet. The AMP Appliance also includes a Hardware Storage pack / SSD drive to store files for later analysis must have this for AMP capabilities . Fire Power Appliance NextGEN firewall IPS &URL The Fire Power appliance was designed to run the fire power features Nextgen Firewall IPS & URL filtering If you want to turn on Advanced Malware Protection (AMP) capabilities at a later date you can but you will need to buy and install the hardware Storage pack / SSD drive and the AMP software. Keep in mind when you turn on the AMP features you will see a performance hit so you will need to make sure the FP appliance is sized correctly for the customers environment If a customer wants AMP always try go with the AMP appliance with new purchases ASA X-series with SSD / SW blade Firewall with VPN ,Nextgen Firewall IPS, URL & AMP The ASA X-series with SSD / SW blade was designed to run all fire power features Nextgen Firewall IPS URL and Advanced Malware Protection ( AMP ) you can also run traditional firewall and VPN capabilities Keep in mind when you turn on the more advanced fire power features you will see a performance hit so you will need to size this appliance correctly for the customers environment
  34. 34. Retrospection in Action Correlation with AMP for endpoints would show file was cleaned / Quarantined
  35. 35. How Cisco AMP Works: Network File Trajectory Use Case
  36. 36. An unknown file is present on IP: 10.4.10.183, having been downloaded from Firefox
  37. 37. At 10:57, the unknown file is from IP 10.4.10.183 to IP: 10.5.11.8
  38. 38. Seven hours later the file is then transferred to a third device (10.3.4.51) using an SMB application
  39. 39. The file is copied yet again onto a fourth device (10.5.60.66) through the same SMB application a half hour later
  40. 40. The Cisco® Collective Security Intelligence Cloud has learned this file is malicious and a retrospective event is raised for all four devices immediately.
  41. 41. At the same time, a device with the AMP for Endpoints connector reacts to the retrospective event and immediately stops and quarantines the newly detected malware
  42. 42. Eight hours after the first attack, the Malware tries to re-enter the system through the original point of entry but is recognized and blocked.
  43. 43. © 2014 Cisco and/or its affiliates. All rights reserved. 53 AMP Threat Intelligence Cloud Windows OS Android Mobile Virtual MAC OS CentOS, Red Hat Linux for datacenters AMP on Web & Email Security AppliancesAMP on Cisco® ASA Firewall with Firepower Services AMP Private Cloud Virtual Appliance AMP on Firepower NGIPS Appliance (AMP for Networks) AMP on Cloud Web Security & Hosted Email CWS/CTA Threat Grid Malware Analysis + Threat Intelligence Engine AMP on ISR with Firepower Services TheAMP Everywhere Architecture AMPProtectionacrosstheExtendedNetwork foranIntegratedThreatDefense AMP for Endpoints AMP for Endpoints remote endpoints AMP for Endpoints can be launched from AnyConnect
  44. 44. © 2014 Cisco and/or its affiliates. All rights reserved. 54 Identify Solution Options Customer Need Feature WSA, ESA, CWS Network Endpoint I want to be able to define policies for malware… File Reputation ✔ ✔ ✔ I want to be able to isolate suspected malware for threat analysis… Sandboxing ✔ ✔ ✔ I want to be able to backtrack if malware makes it into my system… Retrospective Security ✔ ✔ ✔ I need to identify compromised devices on my network… Indications of Compromise ✔ ✔ I want to track how a file has been behaving… File Analysis ✔ ✔ I want to track how threats traverse the network… File Trajectory ✔ ✔ I want to see system activities, relationships and events … Device Trajectory ✔ I want to search large sets of data for compromises… Elastic Search ✔ I want to be able to stop the spread of malware with custom tools… Outbreak Control ✔
  45. 45. © 2014 Cisco and/or its affiliates. All rights reserved. 55 Understanding The Different Platforms • Detect and block malware attempting to enter through email or web gateways • Receive extensive reporting, URL/Message tracking and remediation prioritization • Add-on to an existing appliance or in the cloud AMP for Content • Detect and block malware attempting to enter the network • Detect breaches using multi-source indications of compromise • Contain malware and its communications AMP for Networks • Detect breaches by analyzing indications of compromise • Uncover an infection, trace its path, analyze its behavior • Remediate the threat quickly and eliminate the risk of reinfection AMP for Endpoints
  46. 46. Cisco Confidential 56C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco AMP is the Leader in Security Effectiveness Cisco AMP offers superior security effectiveness, excellent performance, and provides security across more attack vectors than any other vendor • 99.2% Security Effectiveness rating in BDS testing, the highest of all vendors tested. • Only vendor to block 100% of evasion techniques during testing. • Excellent performance with minimal impact on network, endpoint, or application latency.
  47. 47. Cisco Confidential 57C97-732872-00 © 2014 Cisco and/or its affiliates. All rights reserved. “So do any network security vendors understand data center and what’s needed to accommodate network security? Cisco certainly does.” “Cisco is disrupting the advanced threat defense industry.” “… AMP will be one of the most beneficial aspects of the [Sourcefire] acquisition.” “Based on our (Breach Detection Systems) reports, Advanced Malware Protection from Cisco should be on everyone’s short list.” 2014 Vendor Rating for Security: Positive RecognitionMarket “The AMP products will provide deeper capability to Cisco's role in providing secure services for the Internet of Everything (IoE).”
  48. 48. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Cisco AMP for Network Options Helping you choose the correct appliance for your environment For more info Click the following Link
  49. 49. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Cisco AMP for Networks Dedicated Appliances The AMP appliance was purpose built to run to run the following software on one appliance . Nextgen Firewall, Sourcefire IPS and AMP ( advanced malware protection) AMP Appliance + AMP Subscription Bundles http://www.cisco.com/c/en/us/products/collateral/security/amp-appliances/datasheet-c78- 733182.html For more info Click the following Link
  50. 50. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Cisco FP/ FirePower Dedicated Appliances The FP Appliance was purpose built to run to run the following software on one appliance . Nextgen Firewall, and Sourcefire IPS ***If you want to run AMP (Advanced Malware Protection) on a New purchase you should always position the AMP Appliance *** AMP Appliance + AMP Subscription Bundles http://www.cisco.com/c/en/us/products/collateral/security/firepower-8000-series- appliances/datasheet-c78-732955.pdf For more info Click the following Link
  51. 51. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Cisco ASA Appliances ASA Cisco has added the capability to run Nextgen Firewall, Sourcefire IPS and AMP ( advanced malware protection) make sure you have the bandwidth conversation with your customers and what they can expect with full functionality turned on ASA + AMP Subscription Bundles http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/datasheet-c78-733916.html
  52. 52. Q & A Derrick Helms – UTG dhelms@utgsolutions.com Chris Robb – Cisco chrrobb@cisco.com

×