WWT: Tanium and Cisco Solutions Presentation from Cisco Live 2017

Post on 22-Jan-2018

268 views 0 download

transcript

Tanium & CiscoCombining Powerhouse InnovatorsFor Maximum Security

KENT.NOYES@WWT.COM314-520-9357

Kent NoyesPrincipal Architect - Security

• 25 Years in the Industry

• BS Computer Science

• CCIE #8226

• Has held nearly every engineering position at WWT

FUN FACT

Lead Singer for a Rock Band

What is Tanium?

15-Second Visibility and Control.

Over Every Endpoint.

Even Across the Largest Global Networks.

SCALABILITYSPEED SIMPLICITY

Incredible ROI PotentialFinancials are based on a large Fortune 500 organization with 50,000 employees

ROI is within 1 year of implementation

Use Case Description Est. Savings Est. ROI

Windows 10

Migration

Seamless migration to Windows 10 pairing CPMigrator and Tanium – optimize

security, enable zero-touch migration, reduce risk and complexity

$2.0M 25%

Software License

Reclamation

Identify and reduce unused licensing entitlements (MS, Adobe, etc.)

Tanium estimates over 20% of endpoints have unused licenses

$900K 12%

Security Tool

Consolidation

Consolidate a splintered security landscape by reducing the need for multiple,

individual point solutions

$660K 9%

Infrastructure

Consolidation

Research shows 10-15% of servers are unused – despite efforts to consolidate

datacenters

$945K 13%

IT Personnel

Optimization

Complete endpoint visibility, speed to act at scale and a unified, extensible platform –

security and ops teams are optimized to focus on more critical tasks

$910K 12%

Unmanaged Asset

Identification

Research shows TCO for unmanaged end-user devices (i.e. PC) increases

significantly each year when networks are unmanaged or poorly managed

$2.1M 29%

Security Breach

Mitigation

Efficiency in threat identification and remediation allows organizations to reduce

exposure to reputation and direct costs tied to a security breach

$500K-$5M 30-150%

Tanium-Cisco Integration to Automate Endpoint Security

Challenges: Network Hygiene - starts at the endpoint Lacking near real-time policy enforcement on connect Port security inconsistent, static, manufactured Responding in days or weeks instead of minutes or hours Inefficient lifecycle for connected endpoints

Endpoint Security Lifecycle

Compromised Endpoint

IdentityServicesEngine

1. Detect

2. Notify

3. Network

Quarantine

4. Remediate

Endpoint Security Automation

Non-Compliant Endpoint

IdentityServicesEngine

2. Compliant?

3. Notify

4. Network

Quarantine

5. Update

1. Connect

PRESENTATION TAKEAWAYS

Tanium manages endpoints with unmatched speed

Tanium and Cisco ISE can work together to quarantine & remediate

Tanium can hunt on behalf of Cisco’s extensive Threat Intel

THANK YOUAUDIENCE Q&A

REFERENCES

www.tanium.comwww.cisco.com/go/threatgridwww.cisco.com/go/isehttps://www2.wwt.com/solution/security/