Post on 02-Aug-2018
transcript
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Cisco IronPort Security Appliances
Cisco IronPort
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2
Corporate Border
Branch Office
Applications and Data
Corporate Office
Policy
Limites traditionnelles de l‘entreprise
Attackers CustomersPartners
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
Corporate Border
Branch Office
Applications and Data
Corporate Office
Policy
Mobilité and Collaborationdissolvent les frontières d‘Internet
Attackers Customers
Home Office
Coffee Shop
Airport
Mobile User Partners
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
Corporate Border
Branch Office
Applications and Data
Corporate Office
Policy
Le Cloud Computing dissoutles limites du Data Center
Attackers
Home Office
Coffee ShopCustomers
Airport
Mobile User Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5
Un Business Sans Frontières
Corporate Border
Branch Office
Applications and Data
Corporate Office
Policy
Attackers
Home Office
Coffee ShopCustomers
Airport
Mobile User Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
L‘architecture Cisco pour la Sécurité Réseau
Policy
Corporate Border
Branch Office
Applications and Data
Corporate Office
Policy(Access Control, Acceptable Use, Malware, Data Security)
AttackersCoffee Shop
Customers
Airport
Mobile User Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
Home Office
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
Sécurité Email - Cisco Ironport Série C
Appliances sur site
En mode ‗hosted‘
Modèle Hybrid
Leader reconnu
99% renouvellement et de satisfaction
Infrastructure dédié pour chacun de nos clients dans le cloud
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8
Gartner Magic QuadrantSecure Email Gateway, 2010
The Magic Quadrant is copyrighted 2009 by
Gartner, Inc. and is reused with permission.
The Magic Quadrant is a graphical
representation of a marketplace at and for a
specific time period. It depicts Gartner‟s
analysis of how certain vendors measure
against criteria for that marketplace, as
defined by Gartner. Gartner does not endorse
any vendor product or service depicted in the
Magic Quadrant, and does not advise
technology users to select only those vendors
placed in the "Leaders” quadrant. The Magic
Quadrant is intended solely as a research
tool, and is not meant to be a specific guide
to action. Gartner disclaims all warranties,
express or implied, with respect to this
research, including any warranties of
merchantability or fitness for a particular
purpose.
This Magic Quadrant graphic was published
by Gartner, Inc. as part of a larger research
note and should be evaluated in the context
of the entire report. The Gartner report is
available upon request from Cisco.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9
Architecture de sécurité E-MailCisco IronPort Série C
Ma
nag
em
en
tDéfense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
RELAIS DE
MESSAGERIE
Défense
Anti-Spam
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10
Bounce Verification
Elimine les faux messages d‟erreur
DKIM Signing & Verification
Vérification de l‟émetteur
Vérification SPF
Vérification de la conformitéde la provenance de l‟e-
HTML Sanitization
Elimine les URL usurpées
Validation Destinataires
Elimine les messages envoyés aux adresses e-mail invalides
Protection contre le vol d‟annuaire
Chiffrement TLS
Chiffrement passerelle à passerelle
Cisco IronPort AsyncOSRelais de messagerie robuste — Outils de sécurité intégrés
Listes utilisateur―Allow‖ et ―Block‖ / Quarantaine de
spam
Contrôles utilisateur
FonctionnalitésLDAP
LDAP referrals, annuairesLDAP multiples, assistant
d‟installation
Performances
10 000 connexionssimultannées
Files d‟attentes par domaines de destination
Réémission intelligente
Utilisation complète des possibilités matérielles
Virtual Gateway
Protection de la réputationclient
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
Sécurité Multi-couchesPréventive + Réactive = “Defense in Depth”
Préventive : Réputation
Réaction immédiate aux menaces
Très haute performance
1ère ligne de défense
Bloque ou limite le débit
Réactive : Moteur d‘analyse
S‟adapte avec le temps
CPU intensive
Couche plus fine
Détruit ou Quarantaine
Ma
nag
em
en
tDéfense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
Défense
Anti-Spam
Objectif :
Taux de capture important
ET
Le moins de faux positifs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
IronPort Reputation Filters
85% des messages indésirables éliminés…
• Bonne note :
les mails sont délivrés
• Note intermédiaire :
limiter le débit puis
filtrer par l‘anti-spam
• Très mauvais:
rejetés à la connexion
• IronPort utilise l‟identité et la réputation de l‟émetteur
pour appliquer une politique
• Réponse efficace aux pics indésirables de trafic
Moteur
Anti-Spam
Mail entrants
Bons, mauvais, et
inconnus / suspicieux
Filtrage par
réputation
… avant qu‟ils n‟arrivent !
Sensorbase
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
IronPort Anti-Spam (IPAS)4 questions pour une protection > à 97%
IronPort
Anti-Spam
Solutions
Concurrentes
Quoi? Contenu du Message
Comment? Structure du message
Qui? Réputation Email
Où? Réputation Web
• Taux de Capture à 97% pour un taux de faux positifs < à 1/ 1 million
Source : Test Labs Octobre 2006, une étude de Messaging Media
• Pas de charge administrative
• Technologie MPR (Multi Pattern Recognition) contre le spam image
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14
Défense multi-couches contre les virus
Préventive :
Virus Outbreak Filters
stoppe les attaques virales
avant la réception des
signatures anti-virus
Réactive :
Sophos Anti-Virus,
McAfee Anti-Virus
Man
ag
em
en
tDéfense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
Défense
Anti-Spam
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
Comment les Virus Outbreak Filters fonctionnent Quarantaine Dynamique en Action
T = 0–zip (exe) files
T = 5 mins-zip (exe) files
-taille 50 à 55 KB.
T = 10 mins–zip (exe) files
–taille 50 à 55KB
–“Prix” dans le nom
du fichier
T = 8 heures–Libérer les messages
si la signature
a été mise à jour
Messages
Scanned &
Deleted
Temps moyen de protection additionnelle …………… + de 13 heures
Sur un total d’attaques bloquées de ………………….. 248 alertes
Protection totale incrémentale ………………………… + de 134 jours
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16
Anti-Virus traditionnels (signatures):
Sophos - McAfee
Moteurs intégrésHaute performance
Facile à déployer et à administrerInterface d‟administration intuitive
Vue unifiée via Mail Flow Monitor
Mises à jour automatiques
Coût total réduit grâce à la consolidation des fonctions
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
Protection des données
Man
ag
em
en
tDéfense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
Défense
Anti-Spam
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
Protection des données native
HautePerformance
Flexible
Granularité
Multi-critères
IronPort Content
Scanning Engine
Chiffrement
Archivage
BCC
Notiffication légale (disclaimer)
Suppression pièces jointes
Notification émetteur
Bounce Email
Suppression Email
Quarantaine
Interrogations
LDAP Filtres spécifiques au client
Conformité législation (HIPAA, SOX…)
Fuite d‟information
Pièces jointes non autorisées
Contenu illicite
Mails entrants/sortants
Actions
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
Protection des données
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
Couverture globale et mondiale
Adaptabilité
Plus d‟une centaine de profils de politiques prédéfinis
Politiques personnalisées
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
Facile d‘administration et d‘activation
Activation : un click suffit
Flux entrants/sortant, DLP une même interface
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
Rapports intégrés
Rapports par niveau de sévérité et politiques
Rapports en temps réels et ordonnancés
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
Facilité de recherche dans le détail
Recherche intuitive
Violation de la politique en
détail avec la localisation
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24
Défense Anti-Phishing
Le filtre de Réputation Web
contenu dans IronPort Anti-
Spam offre une première
protection aux utilisateurs
contre le phishing.
DomainKeys (DKIM) permet
ensuite d‘authentifier les e-
mails en provenance de
l‘extérieur, comme de signer
les e-mails sortants.
SPF valide les domaines
ayant émis les messages.
Chiffrement de messages
pour une confidentialité
totale.
Ma
na
ge
me
nt
Défense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
Défense
Anti-Spam
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25
Outils d‘administration Pour une réduction du coût total de possession
Message Tracking –
recherche de message
E-Mail Security Manager –
tableau de bord de politiques de
sécurité par groupe d‟utilisateurs
E-Mail Security Monitor –
nouveau système de rapports en
temps réel par boîtier
Série M – statistiques, reporting,
et tracking centralisés
Ma
na
ge
me
nt
Défense
Anti-Virus
CISCO IRONPORT ASYNCOS™
POUR EMAIL
Protection
des donnéesMessagerie
sécurisée
Défense
Anti-Spam
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26
Tracking des messagesPour plus de visibilité
Qu‘est-il arrivé au mail que j‘ai
envoyé il y a 2 heures ?
Trace les messages individuels
Qui d‘autre a reçu des messages
similaires ?
Statistiques pour vérifier la
conformité
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27
IronPort Email Security Manager™
Définir ses politiques de sécurité par groupes
• Marquer et distribuer le spam
• Effacer les exécutables
• Archiver les messages
• Virus Outbreak Filters désacrivé pour les .doc
• Autoriser les fichiers audio
• Mettre en quarantaine les .exe
Catégories: par domaine,
utilisateur, ou groupe LDAP
IT
SALES
LEGAL
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
• Volumes e-mail
Compteurs spam
Violations de politiques
Rapports viraux
Données sur les e-mails
sortants
Rapports sur l‘état du
système
Une seule vuepour toute
l‟organisation
Analyse en temps réel du trafic e-mail et
des menaces de sécurité
Plusieurs niveaux de
détail possibles
Do
nn
ée
s m
ult
iple
s
Rapports consolidés
Cisco IronPort E-Mail Security MonitorUn système de reporting avancé
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
Des options de déploiment flexiblesAppliances ou services hébergés
SITECLIENT
Politiques Communes | Reporting Centralisé | Sécurité Cohérente
Appliances Série C
Hosted Email Security (SaaS)
HybridHosted Email
Security
VIAINTERNET
HybridHosted Email
Security
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30
Sécurité Web–
Cisco Ironport WSA & Scansafe
Appliances sur site
En mode ‗hosted‘
Modèle Hybrid
Leader reconnu
Le meilleur des mondes
Une implication réelle – la sécurité des nomades
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31
Gartner Magic QuadrantSecure Web Gateway, 2010
The Magic Quadrant is copyrighted 2009 by
Gartner, Inc. and is reused with permission.
The Magic Quadrant is a graphical
representation of a marketplace at and for a
specific time period. It depicts Gartner‟s
analysis of how certain vendors measure
against criteria for that marketplace, as
defined by Gartner. Gartner does not endorse
any vendor product or service depicted in the
Magic Quadrant, and does not advise
technology users to select only those vendors
placed in the "Leaders” quadrant. The Magic
Quadrant is intended solely as a research
tool, and is not meant to be a specific guide
to action. Gartner disclaims all warranties,
express or implied, with respect to this
research, including any warranties of
merchantability or fitness for a particular
purpose.
This Magic Quadrant graphic was published
by Gartner, Inc. as part of a larger research
note and should be evaluated in the context
of the entire report. The Gartner report is
available upon request from Cisco.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32
ChoixSupport d‘un grand
nombre de plateformes
SécuritéSécurité riche, granulaire,
intégrée à l‘infrastructure
ExpérienceConnexion intelligente,
automatique, always-on
Usage acceptable
Contrôle d‘accès
Intranet
Corporate File
Sharing
Accès autorisé
Prévention Fuite Info.
Prévention des
menaces
Sécurité Nomade –
Cisco AnyConnect Secure Mobility
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33
Le Nouveau Web
Branch Office
Applications and Data
Corporate Office
AttackersCoffee Shop
Customers
Airport
Mobile User Partners
Home Office
wWwWorld Wide Web
HTTP Is the New TCP
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34
Les Défis Business sur le Web
Acceptable Use Control
MalwareProtection
Data LossPrevention
Politique
SaaS Access Control
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
Control
Security
Acceptable Use Controls
Malware Protection
Data Security
SaaS Access Controls
Centralized Management and Reporting
InternetSecure Mobility
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 36
OptimisationMulti-Coeur
Authentification intégrée
NTLM/Active Directory
LDAP
Secure LDAP
Diminue la latence induite par l‟analyseanti-virale
Permet une analyse multi-moteuraugmentant la sécurité
Optimisé pour un contenu Web riche
Politiques par Identitées
Transparent, single sign-on (SSO) authentification Active Directory/LDAP
Guest, Re-Auth
Proxy Haute Performance, Authentification intégrée
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
80% of the web is uncategorized, highly dynamic or unreachable by web crawlers
80% du Web est non catégorisé,
hautement dynamique et innaccessible
par les moteurs de recherche
• Botnets
• Contenu dynamique
• Sites protégés par mot de passe
• Sites à faible durée de vie
Le Web ConnuCouvert à 20% par les listes
d‟URL
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38
Control
Acceptable Use Controls
Data Security
SaaS Access Controls
Centralized Management and Reporting
InternetSecure Mobility
Security
Malware Protection
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
La Menace Malware Continue de croître
237% d‟augmentation en „09
Plus de 70% des sites compromis sontlégitimes
Vulnérabilités Adobe PDF et Flash
54% des malwares s‟insère par iframes ou exploits
Cross-Site Scripting et Injection SQL Injection sont les attaques les plus utilisées
83% des sites web ont au moins unevulnérabilité sérieuse
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Défense Anti-Malware en profondeur
Clients Infectés
Layer 4Traffic Monitor
Clients Web
Analyse par Réputation
Analyse par Signature
AnalyseComportementale
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Cisco Network and Content Security Deployments
Analyse par Réputation et ComportementaleProtection J-zéro
Cisco SensorBase
Threat Operations Center
AdvancedAlgorithms
Web Reputation Scores-10 to +10
Cisco Security Intelligence Operations
Threat Telemetry
Threat Telemetry
Outbreak Intelligence
External Feeds
Identifying Malware Lurking in the Dark Web
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Protection pour un monde 2.0Visibilité au delà de la menace initiale
Web pages are made up of objects coming from different sources
Objects can be images, executables, JavaScript…
Trusted Web SiteClient PCWeb servers not affiliated with
the trusted web site
(e.g. ad servers)
Web Reputation Filters Scan
each object, not just the initial
request
Compromised websites often grab malicious objects from external sources
Security means looking at each object individually, not just the initial request
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
La Réputation en ActionNew York Times: Victime d‟une attaque par publicité!
Pub semblant légitime provoquant3 redirections malicieuses
Destination finale : protection-check07.com
Technique de Scareware
Simulation d‟une analyse AV incitantl‟utilisateur à acheter la version complète pour nettoyer la machine.
Cisco Web Rep Score: -9.3
Action: BLOCK
Site NYT autorisé mais
blocage de la redirection
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Le Moteur Cisco IronPort DVSDynamic Vectoring and Streaming
Analyse par Signature et Heuristique
Couverture étendue par une analyse multi-moteurs
Analyse le trafic chiffréen SSL pour unemeilleure protection
Expérience utilisateurperformante avec l‟analyse parallèlisée des moteurs
Mises à jour automatiques
Détection HeuristiqueAnalyse comportementale
DVS Engine
Analyse Parallèlle et au Fil de l‘eau
SignatureIdentifie les menaces connues
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
ANTI-VIRUS MAGIC QUADRANT
Virus Bulletin feb 2010
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Internet
Users
Cisco IronPort S-Series
Network Layer Analysis
Anti-Malware PuissantPrévention contre le Trafic
―Phone-Home‖
Analyse tout trafic, port et protocole
Détection des malwares contournantle Port 80
Empèche le trafic de Botnet
Mises à jour automatiques
Génération Temps Réel de règlespar “Dynamic Discovery”
Détection des clients infectésLayer 4 Traffic Monitor
Inspection paquets et en-
têtes
Disponible sur ASA comme Botnet Traffic Filter
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 47
Acceptable Use Controls
SaaS Access Controls
Centralized Management and Reporting
InternetSecure Mobility
Security
Malware Defense
Control
Data Security
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 48
Documents
Allow, block, log based on file metadata, URL category, user and web reputation
Multi-protocoles : HTTP(s), FTP, HTTP encapsulé
Documents
On-Box Common Sense Security
DLP Vendor Box
Internet
Partner site
Webmail
Internet
Deep content inspection: Structured and unstructured data matching
Performances : Works in tandem with accelerated on-box policies
Log
Allow
Block
Log
Allow
Block
Off-Box Advanced Data Security
Complete Data Security
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Control
Data Security
Centralized Management and Reporting
InternetSecure Mobility
Security
Malware Defense
Acceptable Use Controls
SaaS Access Controls
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Adapté au contexte
Identité
Job Sites
Instant Message
P2P
Streaming Media
Human Resource
No FileTransfer
All
100 kbps/User
Facebook Lunch hour Temps
Objet
Application
Lieu
Priorité
New
New
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 51
Acceptable Use Controls for Web 2.0Cisco IronPort Web Usage Controls
Enforce Acceptable Use Policies
Reduce productivity loss
Reduce risk of legal liabilities
Control Web 2.0 traffic and web applications
Control bandwidth intensive streaming media traffic
Application Visibilityand Control
Deep application control, e.g., IM, Facebook, WebEx
Bandwidth control for streaming media
Site content ratings
URL Filtering URL database covering over 50M sites worldwide
Real-time on-box dynamic categorization for unknown URLs
Auto update every five minutes
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
Web Application Controls
Granular control over HTTP, HTTP(s), FTP applications
Dynamic signature updates maintained by Cisco SIO
Granular Control over Application Usage
Employee in Finance
Access Control Policy Access Control Violation
Instant Messaging
Facebook: Limited Apps
Video: 512 kbps max
File Transfer over IM
Facebook Chat, Email
P2P
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 53
Control
Acceptable Use Controls
Data Security
Centralized Management and Reporting
InternetSecure Mobility
Security
Malware Defense
SaaS Access Controls
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Visibility | Centralized Enforcement | Single Source Revocation
SaaS Access ControlRegaining Visibility and Control Through Identity
Branch Office
Corporate Office
Home Office
SaaS Single Sign On
AnyConnect Secure Mobility Client
SaaS Single Sign OnRedirect @ Login
User Directory
No Direct Access
X
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 55
Control
Security
Acceptable Use Controls
Malware Defense
Data Security
SaaS Access Controls
Centralized Management and Reporting
InternetSecure Mobility
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 56
Predominantly PC-based Client Support
URL-filtering client unable to address key use cases
Not integrated, requiresseparate VPN client
Limited Clients
Limited Security
No Access
Acceptable Use
Access Control
Data Loss Prevention
Threat Prevention
Traditional Mobile Web Security
–
–
No AccessAccess
Intranet
Corporate File Sharing
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 57
Diverse EndpointSupport for Greater
Flexibility
Rich, Granular SecurityIntegrated
into the network
Always-on IntelligentConnection for Seamless
Experience andPerformance
Choice
Security
Experience
Acceptable Use
Access Control
Data Loss Prevention
Threat Prevention
Intranet
Corporate File Sharing
Access Granted
Cisco AnyConnect Secure Mobility Web Security with Next Generation Remote Access
WSA ASA
AnyConnect Client
New
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Control
Security
Acceptable Use Controls
Malware Defense
Data Security
SaaS Access Controls
Centralized Management and Reporting
InternetSecure Mobility
Cisco IronPort Web Security ApplianceIndustry Leading Secure Web Gateway
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 59
Reporting CentraliséManagement Centralisé
PolitiqueCentralisée
Délégationd‟Administration
InsightAcross Threats,
Data and Applications
ControlConsistent Policy Across Offices
and for Remote Users
VisibilityVisibility Across Different Devices,
Services, and Network Layers
Visibilité en Profondeur des
menaces
Capacités d‟analyse à postériori
Web Security ManagementSecurity Management Appliance (M-Series)
New
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 61
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 62
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 63
Philosophie en Action
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 64
A snapshot of client activity
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 65
REFERENCES SERIE S en France
RENAULT /
TOTAL
8 boîtiers pour 100,000 users
Remplacement des boîtiers Netcache
Competition: Blue Coat et TrendMicro/Crossbeam
VINCI
2 boîtiers pour la filiale VINCI Construction pour 8,000 users
Nouvel accès Internet
Competition: Websense
CREDIT
AGRICOLE
4 appliances for 80 000 employees
Remplacement des boîtiers Netcache & ajout de fonctionnalités anti-malware
Competition: Secure Computing et Blue Coat
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 66
REFERENCES SERIE S en France
AIRBUS
20 boîtiers sur 5 pays (45,000 users)
Remplacement des Netcache et ajout des fonctionnalités de sécurité anti virus et anti malware
Competition: Bluecoat
L’OREAL
4 boîtiers pour 50,000 users
Remplacement des boîtiers Bluecoat SG8100 dans la DMZ
Competition: existant Blue Coat
FACTEURS
CLES DE
SUCCES
Des fonctionnalités avancées de sécurité intégrées (Web reputation / WebRoot…)
Performance , pas de latence
Facile à administrer, interface conviviale
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 67
Besoin de SaaS ?
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 68
AVC New Applications OverviewPM Sales UpdateSeptember 2010
© 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 69
Social Networking Controls
Block Malware like ‗Farm Town‘ app ad that
redirects users to fake antivirus software
Allow/Block thousands of
Facebook Apps
Allow/Block
features like Chat,
Messaging, Video
& audio bandwidth
New
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 70
Granular Facebook Controls
Can I block chat? YES!
Can I prevent the user from uploading/ or posting?
YES!
Can I control video? YES!
Can I block email? YES!
Can I block over 50K Facebook application? YES!
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 71
New Application Type: Facebook
Edit
Controls
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 72
Granular Facebook Controls
Facebook Applications
Facebook Utilities
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 73
Facebook Granular Controls“Applications”
Business
Community
Education
Entertainment
Games
Sports
Other
Utilities
Control 50K+ Facebook Applications
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74
Facebook Granular Controls“Utilities”
Chat
Messages (Email)
Events
Notes
Video
3rd Applications
Photos
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 75
Facebook Granular Controls“Places”
New Facebook Features? No Problem.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 76