Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Presentation cisco secure x and the cloudverse

330 views

Published on

Download & Share Technology
Presentations http://goo.gl/k80oY0
Student Guide & Best http://goo.gl/6OkI77

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Presentation cisco secure x and the cloudverse

  1. 1. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential ACisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1 How Do You Secure A Cloud? Cisco SecureX and the CloudVerse Bill McGee Manager, Security Solutions
  2. 2. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Adoption Curve Cloud Computing Public or Private Traditional Data Centers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
  3. 3. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Economics Agility Experience Security
  4. 4. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Hybrid PublicPrivate Media Healthcare Govt & more Connecting People and Businesses with the World of Many Clouds
  5. 5. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A • Existing Vulnerabilities Amplified By Cloud • Infrastructure • Applications • Internet access • New Technology Challenges • Virtualization • Multi-Tenancy • Service automation, API • Ownership and Responsibilities • Compliance • Liability • Data safety
  6. 6. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Background checks, access monitoring Vulnerability alerts, patching Compliance requirements Disaster recovery IT Security Operations Infrastructure cloud security, plus Secure connection to cloud services Secure B2B communications Data security Platform as a Service (PaaS) Infrastructure and platform cloud security, plus Access to administrative controls App security, code reviews Content monitoring, filtering, and data loss prevention (DLP) Software as a Service (SaaS) Threat defense Multi-tenancy security Protection against distributed denial-of-service (DDoS) attacks Change management, separation of duties (SoD) Infrastructure as a Service (IaaS)
  7. 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A •How many of you are considering (or have already begun) virtualization or cloud services for your networks?
  8. 8. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Cisco SecureX Architecture™ The Difference Is Context Secure Cloud Infrastructure Cloud Security Services Secure Cloud Access and Communications
  9. 9. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A • Cisco Cloud-based Web Security and Filtering • Cisco Cloud, Managed, and Hybrid Email Security • Cisco SIO: - Cisco SensorBase™ - Threat Operations Center - Dynamic updates Cloud Security Services • Secure SaaS access • Cisco AnyConnect • Cisco TrustSec • Cisco Identity Services Engine • VPN Secure Cloud Access and Communications • Cisco ASA 5585-X with firewall and IPS; ASA Services Module • Cisco Nexus 1000V switch • Cisco Virtual Security Gateway • Cisco ASA 1000V Secure Cloud Infrastructure
  10. 10. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Actions • Create transparency and awareness to address customer security concerns • Create a strong security posture • Offer security services in the services portfolio • Use Cisco® cloud security checklist to deliver cloud security Benefits • Business enablement • Liability and loss reduction • Profit growth • Reduced time to market and CapEx
  11. 11. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Actions • Include cloud security in corporate governance • Build cloud security into cloud architecture • Implement accountability and review cycle • Use Cisco® cloud security checklist to implement cloud security Benefits • User awareness and management support • In-depth and integrated cloud security to mitigate threats • Process-oriented diligence and improvement
  12. 12. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Actions • Manage security risk as part of cloud strategy • Collaborate with cloud services provider to understand rights and responsibilities • Share best practices • Use Cisco® cloud security checklist to engage cloud services provider Benefits • Solid foundation for moving to cloud • Better preparedness and execution • Greater likelihood of achieving cloud success
  13. 13. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A • Commitment to customer success • Robust cloud security solution and services offerings • Rich solutions and flexible deployment options • Cisco security differentiation • Cisco SecureX framework with context- aware policy and enforcement • Security Intelligence Operations (SIO) • Unique ability to integrate security within Cisco Cloud Intelligent Network and Cisco Unified Data Center
  14. 14. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A •Do you feel prepared to address security issues related to cloud computing?
  15. 15. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Thank you.

×