Always-on Endpoint Remote Access and Protection with Cisco AnyConnect
|
|
- Cecil Dixon
- 5 years ago
- Views:
Transcription
1
2 Always-on Endpoint Remote Access and Protection with Cisco AnyConnect Dan Stotts, Security Product Marketing Manager PSOSEC-1900
3 Agenda Introduction Works Everywhere Expanded Visibility User Experience Threat Conclusion
4 Enterprise networks are going mobile More users, in more places ~70% of mobile workers will conduct work on personal devices by 2018 More applications, across more devices 15B devices by 2015, with 3 devices per worker More security threats 75% say their mobile devices were targeted by malware in the last 12 months PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 4
5 Putting pressure on every IT department Provide Anytime Access Increase Visibility & Control Improve Usability Impenetrable Security Users want to access their information anytime, anywhere in the world IT departments need full visibility into user behavior and device status Users want a seamless experience Admins need simplified management across users and devices Companies need to ensure every user and device is always protected PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 5
6 What if you could Ensure access from anywhere Gain greater visibility Deliver a solution that s easy to use Keep users and devices secure Enable secure access to the enterprise network for any user, from any device, at any time, in any location Provide IT with full visibility into user behavior and device status across the extended enterprise Provide a seamless user experience across devices, without creating a headache for your IT teams Protect users and devices from threats, no matter where they are, without impacting productivity PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 6
7 You can with Cisco AnyConnect Secure Mobility Client Ensure access from anywhere Enable secure access to the enterprise network for any user, from any device, at any time, in any location Works everywhere Gain greater visibility Provide IT with full visibility into user behavior and device status across the extended enterprise Expands visibility Cisco AnyConnect Deliver a solution that s easy to use Provide a seamless user experience across devices, without creating a headache for your IT teams Easy to use Keep users and devices secure Protect users and devices from threats, no matter where they are, without impacting productivity Protects systematically PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 7
8 Cisco AnyConnect: Way More Than VPN Cisco AnyConnect Features Basic VPN Advanced VPN Endpoint Compliance Inspection Services Enterprise Access Threat Protection Network Visibility Off-Network Protection Cisco AnyConnect Integration with Other Cisco Solutions Adaptive Security Appliance (ASA) Integrated Services Router (ISR) Aggregation and Cloud Services Routers (ASR/CSR) Identity Services Engine (ISE) Web Security Switches and Wireless Controllers NetFlow Collectors Umbrella Services PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 8
9 Manage with one agent that does it all Save time and effort with a flexible, effective solution from a single vendor, reducing the hassles of multi-vendor support Streamline management using a single agent for: VPN Threat detection and Device compliance remediation Web content inspection Contextual behavior data Simple client software deployment and updates both on and off premises Simplify operations through seamless integration with other Cisco solutions and 3 rd party device management offerings Improve control by providing additional context for consistent access and security policies PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 9
10 Cisco AnyConnect Secure Mobility Client Cisco AnyConnect Works everywhere Expands visibility Easy to use Protects systematically PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 10
11 Get simple persistent connectivity Always-On and transparent connectivity with Trusted Network Detection User Off Premise Untrusted VPN Required ASA User On Premise No VPN Required Capabilities Always-On VPN prevents access to Internet resources when not on a trusted network Automatically disconnect or pause a VPN connection when the user is inside the corporate network Auto-reconnect (Session Persistence) transparently recovers VPN session disruptions Benefits Streamline remote and on-prem access management with simple control over client behavior Stay secure by enforcing off-prem VPN connectivity Auto-recover from network disruptions PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 11
12 Enterprise network connection from anywhere Connect through VPN with full-tunneling, split-tunneling or per-app Per App VPN Corporate Connection Social Media App Z Video Streaming App B Internal App X External App Y Internet Split Tunneling External Resource (IP, App, Etc.) Internal DNS / IP Address Full Tunneling Internal Resource ASA Capabilities Leverage per app policy by creating per-app VPN policies using the dedicated app selector Expand mobile platform support including: Windows macos Linux Chrome OS Apple ios full and per-app VPN Android Windows 10 Mobile Blackberry 10 Samsung Knox Benefits Provide highly secure remote access from mobile endpoints Extend narrow remote access for partners and contractors PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 12
13 Cisco AnyConnect Secure Mobility Client Cisco AnyConnect Works everywhere Expands visibility Easy to use Protects systematically PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 13
14 Gain a comprehensive view across the network Issue Data silos prevent a full view of the network Solution AnyConnect s Network Visibility Module helps you leverage endpoint and user context to address range of different use cases Identity store Network policy Device management Impairing visibility and limiting security operations VPN/Split Tunnel Activity SaaS Use Exfiltration Application Troubleshooting? Users? Devices? Applications For example, with split-tunnel activity You can collect flow data about what's going down a split tunnel as well as the data outside the tunnel. Enabling visibility as well as cost savings on bandwidth PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 14
15 Drive greater business insight With the AnyConnect Network Visibility Module (NVM) Endpoint Context IPFIX-Based Record (Source, Destination IP, etc) Unique Device ID (correlate records from same endpoint device) Device Name (bsmith-win) and OS Version (Window 7) Domain\User Name (Amer\bsmith) Local DNS (starbucks.com) Target DNS ( amceco.box.com) Interface (Intel Dual Band Wireless) Process/Container Name (iexplorer.exe) Process ID (hash) Parent Process Name (foobar.exe) Parent ID (hash) Netflow Collector Collection & Analytics Services Capabilities Benefits Granular app visibility including common containers running Windows and OS X (srvhost, java, etc) Lockdown ensures NVM is always working Caching flexibility for admins to define the off net capacity amount for visibility Extensive endpoint details include SSID for detailed pictures of endpoint behavior Anonymization with unique hashes for tracking data while maintaining end-user privacy Deep insight into user behavior from a holistic view Effective security with richer forensic information Streamlined network operations with contextdriven analysis PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 15
16 Policy Option ParentProcessHash DestinationHostname Flexible Collection Policy DNSSuffix L4ByteCountIn L4ByteCountOut VirtualStationName OSName OSVersion OSEdition SystemType SystemManufacturer ModuleNameList ModuleNameHash InterfaceIndex InterfaceIndexType InterfaceIndexName Anonymization Options Complete Attribute List PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 16
17 Gain greater visibility across all applications Configure AnyConnect with ISE for superior security and visibility Identity Services Engine (ISE) Leverage ISE to automatically configure your system and deliver superior: Visibility Posture capabilities Threat response Across the entire network Capabilities Integrated visibility across all endpoints enables detailed analysis of software inventory App report delivers a complete list of running and installed apps on PCs Continuously update application inventory including collecting applications installed when disconnected from network Benefits Simplified IT with all-in-one endpoint inventory functionality Expanded security controls driven by greater endpoint assessment data Reduced exposure via endpoint compliance enforcement or network policy actions PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 17
18 Cisco AnyConnect Secure Mobility Client Cisco AnyConnect Works everywhere Expands visibility Easy to use Protects systematically PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 18
19 Provide a hassle-free user experience Other SaaS And many more Secure mobile Recognize roaming users or endpoints and automatically extend mobile security services Streamline access Simplify user and device authentication, removing the need to remember credentials Minimize disruption Decrease disruption to users with automatic reconnection whenever network access is lost or transitioned Enable flexibility Give users more options with support for multiple devices and platforms PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 19
20 Get the right solution to the right user type AnyConnect flexible deployment and operations Off-Prem Deploy On-Prem Deploy Pre-Deploy App Stores Adaptive Security Appliance (ASA) Identity Services Engine (ISE) Identity Services Engine (ISE) Capabilities Distribute across user roles at time of access using AnyConnect from ASA and ISE Deploy with enterprise software management systems to govern software endpoints Utilize OS-specific installers to download manually across different devices, or Install directly from mobile app stores Benefits Deploy flexibly across a range of platforms and users Activate quickly with customized packages preconfigured to specific modules Dynamically update endpoint software and policies PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 20
21 Cisco AnyConnect Secure Mobility Client Cisco AnyConnect Works everywhere Expands visibility Easy to use Protects systematically PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 21
22 Flexible AAA options Standards based Authentication/Authorization/Accounting OTP RADIUS Mobile User IPsec or SSL VPN SAML 2.0 Customize for your business HTTP Form Kerberos ASA LDAP Single / Multi-Cert Authentication PC User Capabilities Flexible authentication options: Software Certificate or Smart Card User or Machine Certificates or Both Username and Password / One-Time Password Single, Multiple or Mix and Match Simple certificate enrollment protocol (SCEP Proxy) Compatible with LDAP over SSL with most LDAPv3 servers and Native SDI Built-in accounting logs user session statistics and usage information to measure resources consumed by during access Benefits Improved protection and control over remote access Extended use of credentials for access allowing for simple off-premise usability Superior policy controls with fine grain and flexible authentication PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 22
23 Better roaming security Pair Cisco AnyConnect and Umbrella VPN Off User Umbrella VPN Capabilities Intercepts DNS / IP/ Web traffic and redirects to cloud proxies Options for on premises or VPN connected Benefits Extend security to roaming users Defend against malware Safeguard web usage PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 23
24 Streamline endpoint compliance Integrated posture assessment Agent Options AnyConnect OR Deployment Stand-alone VPN with Posture Host Scan SSL VPN Integrated Wired, Wireless and VPN with Posture Adaptive Security Appliance (ASA) Firewall Anti-Malware Anti-Spyware Anti-Virus Assessment Posture condition checks Disk Encryption File check Patch Mgmt. Registry Evaluate Application Service USB Compound Stealth Agent ISE Posture Wired / Wireless Identity Services Engine (ISE) or Non-Compliant Compliant Remediate Automatic or Manual Capabilities Comprehensive posture checks Automatic and manual remediation on Windows and OS X Watermark devices with file, registry, process, service and app checks Ongoing posture libraries are updated by feed with ISE Full app inventory and remediation actions with ISE Benefits Enforce endpoint compliance access methods to reduce security operations load Simplified management from one agent Reduce user impact with behind-the-scenes posturing PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 24
25 Defend across the entire attack continuum Attack Continuum Before Discover Enforce Harden During Detect Block Defend After Scope Contain Remediate Network Endpoint Mobile Virtual Cloud and Web Point in Time Continuous PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 25
26 Only Cisco delivers Enjoy additional value from your investments with Cisco security offerings AnyConnect + Identity Services Engine (ISE) Adaptive Security Appliance (ASA) Umbrella Service Advance Malware Protection (AMP) W SA Lancope Stealthwatch Cloud Web Security (CWS) Web Security Appliance (WSA) Advanced security For every device and every user, everywhere they go PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 26
27 Reduce risk with comprehensive security services Always-on protection Rest assured with constant protection for remote users, including data encryption Deeper visibility into security Enable additional analytics for deeper threat insight by integrating AnyConnect with 3rd-party behavioral tools Proactive threat defense Leverage Cisco AMP for Endpoints for continuous threat monitoring and malware prevention Integrated compliance Validate users and devices and prevent non-compliant devices from accessing the network when used with Cisco ISE Unmatched web protection Filter web threats automatically, and redirect for further inspection when used with Cisco CWS or WSA Multiple access options Control access using multiple authentication options PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 27
28 AnyConnect Continuing to Evolve 1HCY16 2HCY16 Release & Commit Status AnyConnect 4.3 (Ironman) AnyConnect 4.4 (Justice League) Technology Leadership & Innovation Network Visibility Module (NVM) Phase 2 Umbrella Roaming Security & Cloud downloader (Encrypted DNS, DNS Content / Malware protection / IP Blocking Windows) Network Visibility Module (NVM) Phase 3 Umbrella Roaming Security Phase II (IP Blocking Mac OS) Common Criteria Certification (W and Android 4.0.x on Samsung Galaxy S7) FIPS Re-cert Advanced VPN Ease of Use and Enhancements Split tunneling 1000 networks (req. ASA Nov 2016) Posture enhancements (USB, OPSWAT v4) OCSP for Android Host exclusion (CWS) ios 10 Per App VPN (network extension client) ios/android Touch ID VPN security ios Force touch Double Certificate Auth (ASA dependent) Prompt prior to max connect timeout (ASA dependent) Android Always On (Android N) Posture enhancements (Installed/Running Apps, FW) Simplified AnyConenct onboarding and interactions with ISE Headless AnyConnect for posture Endpoint Compliance Network Visibility Future Releases Architecture & Solution Integration Updated platform support (inc, but not limited to Windows 10, Linux, Android, ios, etc) Public IPv6 ios Continuation of IPv6 & DSCP gaps Updated Platform Support: Windows 10, Android N SAML 2.0 Clientless & AnyConnect Inspection & Protection PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 28
29 Licensing model Offers greater flexibility Plus License* Apex License* Endpoint licensing portable across any hardware platforms, simplifying transfer Two-tiered licensing structure to allow customers to grow based on new enterprise mobility needs VPN Perpetual or term-based Mobile per-app VPN Web and roaming security** Network access manager Encryption Plus License + Term-based Compliance** Clientless Simple migration Essentials to Plus Premium to Apex *Per user (with their multiple devices) **Requires additional licensing when using ISE PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 29
30 Join the thousands of customers worldwide who rely on Cisco AnyConnect 150+ million endpoints delivering the most comprehensive set of security services to more than 80,000customers worldwide PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 30
31 Complete Your Online Session Evaluation Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 31
32 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Lunch & Learn Meet the Engineer 1:1 meetings Related sessions Deploying AnyConnect SSL VPN with ASA5500 Technical Level: Intermediate Session ID: BRKSEC-2501 Hakan Nohre, CSE, Cisco Distinguished Speaker PSOSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 32
33 Q & A
34 Thank You
35
Cisco Secure Access Control
Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security
More information2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Cisco AnyConnect as a Service György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationPartner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014
Partner Webinar AnyConnect 4.0 Rene Straube Cisco Germany December 2014 Agenda Introduction to AnyConnect 4.0 New Licensing Scheme for AnyConnect 4.0 How to migrate to the new Licensing? Ordering & Migration
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationCisco AnyConnect. Ordering Guide. June For further information, questions, and comments, please contact
Ordering Guide Cisco AnyConnect Ordering Guide June 2016 For further information, questions, and comments, please contact anyconnect-pricing@cisco.com. 2016 Cisco and/or its affiliates. All rights reserved.
More informationYes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com
Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com Endpoint Footprint Problem: TOO MANY AGENTS! Anti-Virus/Anti-Spyware agent IPSec/SSLVPN agent Host IPS/FW
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationGEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:
Advanced Compliance Enforcement for Healthcare Presented by: December 16, 2014 Adam Winn GEARS Product Manager OPSWAT Kevin Mayer Product Manager ForeScout Agenda Challenges for the healthcare industry
More informationCisco Stealthwatch Endpoint License with Cisco AnyConnect NVM
Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM How to implement the Cisco Stealthwatch Endpoint License with the Cisco AnyConnect Network Visibility Module Table of Contents About This Document...
More informationCisco AnyConnect Secure Mobility Solution. György Ács Regional Security Consultant
Cisco AnyConnect Secure Mobility Solution György Ács Regional Security Consultant Mobile User Challenges Mobile and Security Services Web Security Deployment Methods Live Q&A 2011 Cisco and/or its affiliates.
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationContents. Introduction
Contents Introduction Prerequisites Requirements Components Used Background Information Cisco Anyconnect Secure Mobility Client Internet Protocol Flow Information Export (IPFIX) IPFIX Collector Splunk
More informationSecure Mobility. Klaus Lenssen Senior Business Development Manager Security
Secure Mobility Klaus Lenssen Senior Business Development Manager Security KL Secure Mobility 2008 Cisco Systems, Inc. All rights reserved. Cisco public 1 Complete Your Online Session Evaluation Please
More informationCisco Advanced Malware Protection. May 2016
Cisco Advanced Malware Protection May 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious traffic 100% Cybercrime is lucrative, barrier
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationBYOD Business year of decision!
Bucharest, Romania April 24, 2013 BYOD Business year of decision! Cisco on Cisco Christoph Nienhaus IT Leader for EMEAR Central - DACH 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco
More informationDefense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation
Defense-in-Depth Against Malicious Software Speaker name Title Group Microsoft Corporation Agenda Understanding the Characteristics of Malicious Software Malware Defense-in-Depth Malware Defense for Client
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationCisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017
Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope
More informationThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationCisco NAC Network Module for Integrated Services Routers
Cisco NAC Network Module for Integrated Services Routers The Cisco NAC Network Module for Integrated Services Routers (NME-NAC-K9) brings the feature-rich Cisco NAC Appliance Server capabilities to Cisco
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationAby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationCisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics
Solution Overview Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics BENEFITS Gain visibility across all network conversations, including east-west and north-south
More informationToday s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps
Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of
More informationInside Cisco IT: Secure, Simultaneous Access to Trusted and Untrusted Networks using C-Bridge
Inside Cisco IT: Secure, Simultaneous Access to Trusted and Untrusted Networks using C-Bridge Tom Woodard Cisco InfoSec Architect BRKCOC-1900 This solution solves business challenges by securely allowing
More informationIntroducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer
Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?
More informationCisco ASA Next-Generation Firewall Services
Q&A Cisco ASA Next-Generation Firewall Services Q. What are Cisco ASA Next-Generation Firewall Services? A. Cisco ASA Next-Generation Firewall Services are a modular security service that extends the Cisco
More informationCisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions
Data Sheet Cisco Security Manager 4.1: Integrated Security Management for Cisco Firewalls, IPS, and VPN Solutions Security Operations Challenges Businesses are facing daunting new challenges in security
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationNetMotion Mobility and Microsoft DirectAccess Comparison
Product Comparison and Comparison Guidelines for Comparing and optimizes and secures all traffic to mobile devices across any network, application or operating system. It provides IT with root cause detection
More informationDisclaimer CONFIDENTIAL 2
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationPolicing The Borderless Network: Integrating Web Security
Policing The Borderless Network: Integrating Web Security Hrvoje Dogan Consulting Systems Engineer, Security March 16, 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 About Cisco
More informationDNA Assurance. Predict Network Failures Before They Become Issues
PSOEWN-4360 DNA Assurance Predict Network Failures Before They Become Issues Damodar Banodkar, Product Manager, Enterprise Group Bill Rubino, Product Marketing, Enterprise Group Manuel Ortiz, Senior Wireless
More informationVishal Shirodkar Technology Specialist Microsoft India Session Code:
Vishal Shirodkar Technology Specialist Microsoft India Session Code: Session Objectives And Takeaways Explain how DirectAccess differs from a traditional VPN Identify some of the key requirements for installing
More informationCisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1
Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationRouting Underlay and NFV Automation with DNA Center
BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCisco Identity Services Engine
Data Sheet Enterprise networks are more dynamic than ever before, servicing an increasing number of users, devices, and access methods. Along with increased access and device proliferation comes an increased
More informationΟ ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος
Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General
More informationBIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1
BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About
More informationAn Investment Checklist
Next-Generation Addressing Advanced Firewalls: Web Threats Next-Generation Firewalls: What You Will Learn When you buy a next-generation firewall (NGFW), you want to determine whether the solution can
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationRelated Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced)
PRESENTED BY: Related Labs: Introduction to Universal Access and F5 SAML IDP (Self-paced) One of the main problems that customers face with the adoption of SaaS and cloud-based apps is how to deliver the
More informationSpeaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec
SIE3197BE Secure Your Windows 10 and Office 365 Deployment with VMware Security Solutions Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel #VMworld #SIE3197BE Speaker Introduction
More informationCisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
:: Seite 1 von 5 :: Datenblatt zum Produkt Cisco ANYCONNECT ESSENTIALS VPN mit DC# 554678 :: Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2
More informationBMC Remedyforce Discovery and Client Management. Frequently asked questions
BMC Remedyforce Discovery and Client Management Frequently asked questions 1 Table of Contents BMC Remedyforce Discovery and Client Management 4 Overview 4 Remedyforce Agentless Discovery 4 Remedyforce
More informationExam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.
Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationCisco Exam Questions & Answers
Cisco 648-375 Exam Questions & Answers Number: 648-375 Passing Score: 800 Time Limit: 120 min File Version: 22.1 http://www.gratisexam.com/ Cisco 648-375 Exam Questions & Answers Exam Name: Cisco Express
More informationModern attacks and malware
Modern attacks and malware Everything starts with an email and web Dragan Novakovic Cisco Systems New Cyber Threat Reality Your environment will get breached You ll most likely be infected via email Hackers
More informationCisco - ASA Lab Camp v9.0
Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment
More informationImplementing Cisco Edge Network Security Solutions ( )
Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to
More informationSASSL v1.0 Managing Advanced Cisco SSL VPN. 3 days lecture course and hands-on lab $2,495 USD 25 Digital Version
Course: Duration: Fees: Cisco Learning Credits: Kit: 3 days lecture course and hands-on lab $2,495 USD 25 Digital Version Course Overview Managing Advanced Cisco SSL VPN (SASSL) v1.0 is an instructor-led
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationSAS and F5 integration at F5 Networks. Updates for Version 11.6
SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationPassit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers
Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed
More informationONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013
ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today
More informationWindows Server Network Access Protection. Richard Chiu
Windows Server 2008 Network Access Protection Richard Chiu Network Access Protection Solution Overview Policy Validation Determines whether the computers are compliant with the company s security policy.
More informationContents. Introduction. Prerequisites. Requirements. Components Used
Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram ASA ISE Step 1. Configure Network Device Step 2. Configure Posture conditions and policies Step 3. Configure Client
More informationConfigure Client Posture Policies
Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known as posture, of all the endpoints that are connecting to a network for compliance with corporate
More informationEasy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide.
Cisco ASA with Firepower Services Easy Setup Guide You can easily set up your ASA in this step-by-step guide. Connecting PC to ASA Installing ASDM 3 Configuring ASA 4 Using Umbrella DNS Connecting PC to
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationAccess and Policy License Double Click
Access and Policy License Double Click Matt Schmitz April 2015 Agenda License Refresher Positioning Old vs New Renewals Wrap-up Cisco Con!dential 2 Cisco Identity Services Engine (ISE) Delivering Visibility,
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationCisco ISR G2 Management Overview
Cisco ISR G2 Management Overview Introduction The new Cisco Integrated Services Routers Generation 2 (ISR G2) Family of routers delivers the borderless network that can transform the branch office and
More informationP ART 3. Configuring the Infrastructure
P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are
More informationNew Features and Functionality
This section describes the new and updated features and functionality included in Version 6.2.1. Note that only the Firepower 2100 series devices support Version 6.2.1, so new features deployed to devices
More informationRHM Presentation. Maas 360 Mobile device management
RHM Presentation Maas 360 Mobile device management Strong adoption in the enterprise Manufacturing Financial Consumer Healthcare Public Others 2 Trusted by over 9,000 customers Recognized Industry Leadership
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationCisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller
Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationTHE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE
THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE A Clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. Abstract The consumerization
More information2012 Cisco and/or its affiliates. All rights reserved. 1
2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access
More informationSONICWALL SECURITY HEALTH CHECK PSO 2017
SONICWALL SECURITY HEALTH CHECK PSO 2017 Get help in fully utilizing your investment to protect your network Overview SonicWALL Security Health Check provides a customer with a comprehensive review of
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationWireless and Network Security Integration Solution Overview
Wireless and Network Security Integration Solution Overview Solution Overview Introduction Enterprise businesses are being transformed to meet the evolving challenges of today's global business economy.
More informationNew Features for ASA Version 9.0(2)
FIREWALL Features New Features for ASA Version 9.0(2) Cisco Adaptive Security Appliance (ASA) Software Release 9.0 is the latest release of the software that powers the Cisco ASA family. The same core
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationSONICWALL SECURITY HEALTH CHECK SERVICE
SonicWall Partner Service Overview SONICWALL SECURITY HEALTH CHECK SERVICE Ensure your SonicWall Investment is fully optimized to protect your network Overview The SonicWall Security Health Check Service
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationDelivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE
Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013 App Complete Enterprise Mobility Business Apps Productivity and Collaboration
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More information