Date post: | 15-Apr-2017 |
Category: |
Technology |
Upload: | cisco-emear |
View: | 721 times |
Download: | 0 times |
1© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat-Centric Security for the Digital WorldAdam Philpott Director, Cisco Cyber Security EMEARGartner Symposium 2015 @ARPhilpott
Why Do Cars Have Brakes?
To Go Faster, safely.
Cisco Confidential
Unlocking the $19T Opportunity for Our Customers
TV Music BankingCisco Confidential
Digital Transformation in Every Industry
Retail Transportation
Public Sector
E-Govt
6© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rapid Digital Disruption On a Massive Scale
500BIn 2030
50BIn 202015B
Devices Today
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
7© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rapid Digital Disruption On a Massive Scale
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
More Connections
= More
Opportunity
8© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Rapid Digital Disruption On a Massive Scale
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
…for hackers too!
The Global Hacker Economy is 3x to 5x the size of the security industry.Industrialization of Hacking.
Source: Center for Strategic and International Studies, 2014 9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
If you knew you were going to be compromised would you do security differently?
11© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Challenges
Digitization and Changing
Business Models
Dynamic Threat
Landscape
Complexityand
Fragmentation
Talent Shortage
Cisco Confidential
12© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Next Wave of the Internet Requires
the Next Wave of Security
13© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threat-Centric Security
BEFORE AFTERDURING
ATTACK CONTINUUM
14© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Visibility Context Intelligence
Security Everywhere
Control
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Silos Create Security Complexity
W W W
Context- Aware
FunctionsIPS
FunctionsMalware
Functions
VPNFunctions
Traditional Firewall
Functions
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Visibility: Both Breadth and Depth
Network Endpoint Mobile Virtual Cloud
BREADTH
DEPTHWho What Where When How
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
?
Threat-Focused
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Detect, Understand, and Stop Threats
?
Collective Security Intelligence
Threat Identified
Event History
How
What
Who
Where
When
ISE + Network, Appliances (NGFW/NGIPS)Context
AMP, CWS, Appliances
Recorded
Enforcement
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Continuous Advanced Threat Protection
ISE + Network, Appliances (NGFW/NGIPS)
How
What
Who
Where
When
Collective Security
Intelligence
AMP, CWS, AppliancesEnforcement
Event History
AMP, Threat DefenseContinuous AnalysisContext
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Collective Security Intelligence
IPS Rules
MalwareProtection
ReputationFeeds
Vulnerability Database Updates
AEGIS™ Program
Private and Public
Threat FeedsSandnets FireAMP™
Community Honeypots
Advanced Microsoft and Industry Disclosures
SPARK ProgramSnort and ClamAV
Open Source Communities
Malware Samples(>1,100,000 per
Day)
Cisco Talos(Talos SecurityIntelligence and
Research Group)
SandboxingMachine Learning
Big Data Infrastructure
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Increases Visibility Accelerates Detection Scales Enforcement
Synergies Through IntegrationThe Network and Security
22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
See Once, Protect Everywhere
WWW
HeadquartersBranch
Broad Visibility
Threat Intelligence
Virtual Offices
23© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Security Services Portfolio
Optimization
Migration
Integration
Program Strategy
Architecture & Design
Assessments
Product SupportHosted Security
Managed Security
ManagedServices
Advisory Integration
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Ecosystem
Mobility (MDM), Threat (SIEM), CloudPartner to Deliver Complete Solutions
Open Platform Architecture EnablesDevelop SSP Partner Ecosystem
ISE as “Context Directory Service”Embed Security in Broader IT Solutions
Lancope, Network as a SensorDrive the Value of the Network
Cisco Current Partner Ecosystem
25© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
The Cisco Advantage
Best of Breed PortfolioArchitectural Approach
26© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security Investment
#1 Cybersecurity
Company
Threat-Centric Security
BillionsInvested
5KStrong
CognitiveSourcefire
ThreatGRIDNeohapsisOpenDNS
Broad/Deep Portfolio
Accelerating Customer Adoption
Cisco’s #1 Priority
Expanding Services
Capabilities
SecurityEverywhere
26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
“Cisco Is Going on a Security Push”
Partnering with Cisco = A Smart Investment
Cisco’s Security Everywhere... “that’s pretty brilliant”
Cisco…best traction among security vendors
Cisco’s Network Security Portfolio Finally Stands On Its Own Merit
Security Value Map Leader• Breach Detection • Next-Gen Firewall• Intrusion Prevention
System
#1 Market Share• Network Security• Email (Appliances
and software)• Web (SaaS)
2015 Vendor Rating for Security: Positive
28© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1100001110001110 1001 1101 1110011 0110011 101000 0110 00
Security AdvantageIntelligence Built on Unmatched Collective Security Telemetry
101000 0110 00 0111000 111010011 101 1100001 1101100001110001110 1001 1101 1110011 0110011 101000 0110 00
1001 1101 1110011 0110011 101000 0110 00
100 TBof data received per day
1.1 million+ file samples per day
600+engineers, and researchers
19.6 billionthreats blocked per day
24x7x365 operations
40+languages
101000 0110 00 0111000 111010011 101 1100001 1101100001110001110 1001 1101 1110011 0110011
101000 0110 00
1001 1101 1110011 0110011 101000 0110 00 Cisco® Talos
Email Endpoints Web Networks IPS Devices
WWW
Cisco CollectiveSecurity Intelligence
Policy & Access
Email Web
NGFW/NGIPS
AdvancedThreat
ManagedServices
Advisory Integration
Cisco Breadth, Collaboration and Methodology
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Summary
Consistent Control
ReducedComplexity
Consistent Policies Across the
Network and Data Center
Fits and Adapts to Changing
Business Models
Global Intelligence With the Right
Context
Detects and Stops Advanced Threats
Advanced Threat Protection
UnmatchedVisibility