Upload
felipe-lamus
View
947
Download
1
Embed Size (px)
DESCRIPTION
Cisco Live Cancun, Security press conference
Citation preview
Intelligent Cybersecurity for the Real World
Francisco Ramirez Ghassan Dreibi
Nov 5, 2014
Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Session 1
Francisco Ramirez – Security Managing Director
Ghassan Dreibi – Strategic & Planning BDM
Session 2 Carlo Davila – IDC LATAM Analyst
Agenda
Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Industrialization of Hacking
2000 1990 1995 2005 2010 2015 2020 Viruses 1990–2000
Worms 2000–2005
Spyware and Rootkits 2005–Today
APTs Cyberware Today +
Hacking Becomes an Industry
Sophisticated Attacks, Complex Landscape
Phishing, Low Sophistication
Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Threat Landscape Demands more than Application Control
100% of companies connect to domains that host
malicious files or services
54% of breaches
remain undiscovered for months
60% of data is stolen in hours
avoids detection and attacks swiftly
It is a Community that hides in plain sight
Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Pervasiveness of Malicious Traffic
High-Threat Malware
Hijacked Infrastructure
Sites without Content
Suspect FTP
Suspect VPN
Inappropriate Content
100%
96%
92%
88%
79%
50%
Cisco Confidential 6 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Silver Bullet Does Not Exist
“Captive portal”
“It matches the pattern”
“No false positives, no false negatives”
Application Control
FW/VPN
IDS/IPS UTM
NAC
AV PKI
“Block or Allow”
“Fix the Firewall”
“No key, no access”
Sandboxing
“Detect the Unknown”
GSSO focuses on the totality of defending against threats
Cisco Confidential 7 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
GSSO – Global Security Sales Organization A New Way to Solve Real World Security Issues
Dedicated Security sales force – GSSO
Aligned with Cisco’s Services, Partner and Sales Organization (Cisco) +
Selling market leading technology, services and solutions across the entire attack continuum
+
Unmatched differentiation Market credibility that will amplify loyalty Stronger solutions across all architectures
=
Cisco Confidential 7 ©2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Visibility: See More – Protect More
Network Servers
Operating Systems
Routers and Switches
Mobile Devices
Printers
VoIP Phones
Virtual Machines
Client Applications
Files
Users
Web Applications
Application Protocols
Services
Malware
Command and Control
Servers
Vulnerabilities
NetFlow
Network Behavior
Processes
Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cyber Security Advanced Model
BEFORE Discover Enforce Harden
AFTER Scope Contain
Remediate
Attack Continuum
Detect Block
Defend
DURING
Network Endpoint Mobile Virtual Cloud
Point in Time Continuous
Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Serv
ices Cyber Threat Defense
Manage Security CPE
Solution Implementation
Security Assessment
Strategic Planning
Solution Plan / Design
Managed Threat Defense
Custom Threat Intelligence
Security Optimization
Firewall
NGFW
NAC + Identity Services
VPN
UTM
NGIPS
Web Security
Advanced Malware Protection
Network Behavior Analysis
Prod
ucts
Email Security
Cyber Security Attach Continuum Approach
BEFORE Discover Enforce Harden
AFTER Scope Contain
Remediate
Detect Block
Defend
DURING
Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Strategic Imperatives
Visibility-Driven Threat-Focused Platform-Based
Network Endpoint Mobile Virtual Cloud
Cisco Confidential 12 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cloud Connected Network
Mobile Router Firewall
The Distributed Perimeter
The Security Perimeter in the Cloud
Collective Security Intelligence
Telemetry Data Threat Research Advanced Analytics
3M+ Cloud Web Security Users
6GB Web Traffic Examined, Protected Every Hour
75M Unique Hits Every Hour
10M Blocks Enforced Every Hour
Cisco Confidential 13 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Platform-Based Security Architecture
Management
Security Services and Applications
Security Services Platform
Infrastructure Element Layer
Common Security Policy & Management
Common Security Policy and Management
Orchestration
Security Management APIs
Cisco ONE APIs
Platform APIs
Cloud Intelligence APIs
Physical Appliance Virtual Cloud
Access Control
Context Awareness
Content Inspection
Application Visibility
Threat Prevention
Device API: OnePK™, OpenFlow, CLI
Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider)
Route–Switch–Compute ASIC Data Plane Software Data Plane
APIs APIs
Cisco Security Applications Third-Party Security Applications
Thank you.