Cisco Comstor
|
|
- Mercy Green
- 5 years ago
- Views:
Transcription
1 Cisco Comstor 1
2 Agenda 1. Cisco Security Fundamentals Cyber Security? Cisco Security Solutions - Cisco NGFW - Cisco Umbrella Cisco Meraki, MR, MS, MV and MX Meraki Insight 2
3 1. Cisco Security Fundamentals Cyber Security? why is it critical 3
4 The consequences of insufficient security Identity Theft Equipment Theft Compromised Customer Confidence Loss of Business Compromised Employee Confidence Turnover / Weak Retention of Staff Service Interruption (e.g. and application) Loss of Competitive Advantage Loss of Reputation (e.g. embarrassing media coverage) Legal Penalties fines and other legal action 4
5 Basic Principles Allowing only authorized subjects to access to information Allowing only authorized subjects to modify information Ensuring that information and resources are accessible when needed 5
6 The threat-centric security model BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Cloud Threat Intelligence Point in Time Continuous 6
7 Which dramatically expands what you have to worry about New demands Global collaboration Anywhere access BYOD Access is tougher to manage More things Visibility is more elusive Specialized threats 30 Phishing messages opened by the target across campaigns % Source: 2016 Verizon Data Breach Investigations Report Threats are harder to stop 7
8 1. Cisco Security Fundamentals Cisco NGFW Next Generation Firewalling Beyond packets, Ports and traffic 8
9 Other next-generation firewalls fix some problems but create new ones They re only app-focused Threat Threat They can t help you once you ve been breached Attack Continuum BEFORE DURING AFTER Threat They re another silo to manage IPS Acceptable use NGFW DDoS Sandbox 9
10 Cisco Firepower NGFW is a complete solution Cisco Firepower NGFW Stop more threats Gain more insight Detect earlier, act faster Reduce complexity Get more from your network Threat Focused Fully Integrated 10
11 Offering extensive contextual visibility The more you see, the better you can protect Client applications Operating systems Threats Typical IPS Typical NGFW Users Application protocols File transfers Web applications C & C Servers Malware Routers & switches Network Servers Mobile Devices Printers Cisco Firepower NGFW VOIP phones 11
12 Cisco has an NGFW solution for every business Small and Midsized Business Midrange Enterprise ASA 5525-X/ ASA 5545-X/ ASA 5555-X ASA 5585-X ASA 5506-X / 5506W-X / 5506H-X / 5508-X / 5516-X Firepower 2110/2120 Firepower 2130/2140 Firepower 4110/4120/4140/4150 Firepower 9300 NGFWs for SMBs and distributed enterprises with integrated threat defense, a low TCO, and simplified security management. Enterprise-class security for the internet edge, with superior threat defense, sustained performance, and simple management. From the internet edge to carrier grade security for data centers and other highperformance settings, with multiservice security, flexible architecture, and unified management. 12
13 Choose from four powerful new appliances with industry-best price-performance Models 2110 & 2120 Models 2130 & 2140 Low-cost, high performance 1 RU NGFW, Fixed 16-port 1GbE connectivity High performance 1 RU NGFW Network modularity, up to 24-port 1GbE and up to 12 10GbE connectivity Up to 8.5 Gbps FW+AVC+IPS throughput 13
14 Pack in more value with the Firepower 2100 series Model Form Factor Throughput FW+AVC (1024b) Throughput FW+AVC+IPS (1024b) Firepower RU 1.9 Gbps 1.9 Gbps 2X - 4X throughput increase ASA 5525-X 1RU 1.1 Gbps 650 Mbps Firepower 2120 ASA 5545-X 1RU 1RU 3 Gbps 1.5 Gbps 3 Gbps 1 Gbps Sustained performance as threat functions are enabled Firepower 2130 ASA 5555-X 1RU 1RU 4.75 Gbps 1.75 Gbps 4.75 Gbps 1.25 Gbps Higher connectivity up to 24 1GbE and 12 10GbE ports Firepower 2140 ASA 5585-X SSP 10 1RU 2 RU 8.5 Gbps 4.5 Gbps 8.5 Gbps 2.5 Gbps Space & eco-design packaging / redundancy / network modularity 2X Performance 4X Performance 14
15 1. Cisco Security Fundamentals Threat Defense 15
16 Uncover hidden threats in the environment Advanced Malware Protection (AMP) File Reputation c File & Device Trajectory AMP for Endpoint Log AMP for Network Log? Known Signatures Fuzzy Fingerprinting Indications of compromise Threat Grid Sandboxing Advanced Analytics Dynamic analysis Threat intelligence Threat Disposition Uncertain Safe Risky Sandbox Analysis Enforcement across all endpoints Block known malware Investigate files safely Detect new threats Respond to alerts 16
17 Get real-time protection against global threats Talos Threat Intelligence Security Coverage Research Response 1.5 million daily malware samples WWW Endpoints Web 250+ Researchers 600 billion daily messages Networks NGIPS Jan 24 x 7 x 365 Operations 16 billion daily web requests Devices Identify advanced threats Get specific intelligence Catch stealthy threats Stay protected with updates 17
18 The results speak for themselves 17.5 hours Average time to detection with Cisco security 100 days Industry average time to detection Source: Cisco Annual Security Report
19 1. Cisco Security Fundamentals Management Options 19
20 Cisco offers management designed for the user On-box, web-based management Firepower Device Manager Centralized management for multiple devices Firepower Management Center Cloud-based policy orchestration for multiple sites Cisco Defense Orchestrator Consolidated management Enhanced control Easy set-up Unified insight Scalable management Intelligent automation Simple interface Efficient management Streamlined user experience 20
21 1. Cisco Security Fundamentals Cisco Umbrella Protecting from daily attacks 21
22 Cisco Umbrella and where does it fit? Malware C2 Callbacks Phishing Network and endpoint First line It all starts with DNS NGFW Netflow Proxy Sandbox Network and endpoint Router/UTM Endpoint Precedes file execution and IP connection Used by all devices AV AV AV AV AV Port agnostic HQ BRANCH ROAMING 22
23 How It Works Security Both On and Off the VPN 23
24 Why Umbrella: 1. Protection against malware, phishing and C&C 2. Security without adding appliances or extra latency 3. Protects on and OFF network 4. 92% of Ransomware is dependent on DNS to work How does it work: 1. Umbrella sees over 5% of the global DNS traffic 2. Security Research team analyze and models all data to predict attacks 3. Umbrella uses DNS to stop threats over all ports and protocols 24
25 1. Cisco Security Fundamentals Cisco Meraki Cloud Managed IT 25
26 What is Meraki? Scalable no bottlenecks Add devices or sites inminutes Reliable Highly available cloud with multiple datacenters Network functions even if connection to cloud is interrupted Secure No user traffic passes through cloud Fully HIPAA / PCI compliant (level 1 certified) meraki.cisco.com/trust Future-proof New features pushed through firmware, Automatic firmware and security updates (user-scheduled) MR Wireless LAN MS Ethernet Switches MX Security Appliances Systems Manager EMM MV Security Cams 2 6
27
28 Secure Access Guest access Enterprise security WIDS / WIPS Location Embedded location analytics Heatmaps Application Control Application traffic shaping MR Wireless LAN MS Ethernet Switches MX Security Appliances Systems Manager EMM MV Security Cams
29
30 Tools Remote Live Tools Network Topology L3 Scalability Stack Virtual Stacking Physical Stacking L7 Application and control Application visibility Voice and Video QoS Enterprise Security MR Wireless LAN MS Ethernet Switches MX Security Appliances Systems Manager EMM MV Security Cams 30
31 31
32 Security NG Firewall, Client VPN, Site to Site VPN, IDS/IPS, Malware Protection, Geo-Firewall Networking NAT/DHCP, 3G/4G Cellular, SD-WAN Application Control Web Caching, Traffic Shaping, Content Filtering MR Wireless LAN MS Ethernet Switches MX Security Appliances Systems Manager EMM MV Security Cams 32
33 MX Portfolio Teleworker Small Branch Medium Branch New Z1 ~5 users Z3 MX64 ~50 users MX65 MX84 ~200 users MX100 ~500 users ac Wireless & PoE ac wireless & PoE FW throughput: 500 Mbps FW throughput: 750 Mbps FW throughput: Mbps FW throughput: 250 Mbps Large Branch, Campus or Concentrator Virtual New New New MX250 ~2,000 users FW throughput: 4 Gbps MX400 ~2,000 users FW throughput: 1 Gbps MX450 ~10,000 users FW throughput: 6 Gbps MX600 ~10,000 users FW throughput: 1 Gbps vmx100 for AWS &Azure FW throughput: 750 Mbps VPN & SD-WAN features All MX devices support 3G/4G 33
34 Security Cameras The MV family brings Meraki magic to the video security world. MR Wireless LAN MS Ethernet Switches MX Security Appliances Systems Manager EMM MV Security Cams 34
35 MV Security Cameras Hardware Features IR Illumination On-Device 128GB solid state storage 720p HD recording with H.264 encoding (5 Megapixel sensor) Automatic DSCP marking IP66 and IK10 rated (MV71) MV21 Indoor MV71 Outdoor Mounting kits available indoor and outdoor security 3 year hardware replacement warranty 35
36 Introducing MV12 *Wireless Functionality (Software Update) & Power Converter Available Fall SKUs 256GB and 128GB storage models High definition 1080p Microphone Wireless capable* Compact form factor Qualcomm Snapdragon processor Advanced on-board analytics and machine learning A family of indoor mini dome cameras designed with more than just security in mind 36
37 37
38 1. Cisco Security Fundamentals Meraki Insight 38
39 Sound familiar? This is IT. How can I help? The network s slow My Wi-Fi is broken My Internet is down 39
40 External Internal What are Contributors to poor end-user experience? LAN congestion Rogue actors Network design Network capacity limits WAN congestion Deploy Meraki Dashboard Tools (Traffic shaping, QoS, Air Marshal) Address with training, more infrastructure Application errors Application server processing time Authentication // DNS server response time Apply Meraki Insight 40
41 Meraki Insight in the dashboard 41
42 THANK YOU! For more information contact: Comstor PSE Dan Kumlin
Cisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationCloud-Managed Security for Distributed Networks with Cisco Meraki MX
Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationCiprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.
Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,
More informationCisco Meraki Cloud Managed IT Solution Derrick Phua. May 12, 2017
Cisco Meraki Cloud Managed IT Solution Derrick Phua May 12, 2017 Why cloud managed IT? On-Demand scalability The cloud increases IT efficiency Manageability Scalability Cost Savings Turnkey installation
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationWe re ready. Are you?
We re ready. Are you? Deploying Scalable, Resilient WAN Architectures with Meraki MX and IWAN Joe Aronow - Product Specialist, Meraki MX Agenda Introduction: Cloud networking Meraki MX Security Appliances
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationIntroduction to Cloud Networking. Company and Product Overview
Introduction to Cloud Networking Company and Product Overview About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed - Founded in 2006 at MIT - tradition of innovation
More informationCisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017
Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope
More informationCisco Meraki Overview. March 21, 2017
March 21, 2017 Cisco Meraki: 100% cloud-managed IT Cisco Meraki: a complete cloud-managed IT solution Wireless, switching, security, mobility management, and communications, all centrally managed over
More informationJURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN
JURUMANI CLOUD MANAGED SECURITY & SD-WAN SECURITY BY DESIGN OVERVIEW Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationCisco Meraki Cloud-Managed Networking. George Carlan
Cisco Meraki Cloud-Managed Networking George Carlan Cisco Networking Portfolio Cisco Enterprise Portfolio Cisco Cloud Managed Prime ISE Cloud Management & Policy Systems Manager Systems Manager WLAN Controllers
More informationCisco Ransomware Defense The Ransomware Threat Is Real
Cisco Ransomware Defense The Ransomware Threat Is Real Seguridad Integrada Abril 2018 Ransomware B Malicious Software Encrypts Critical Data Demands Payment Permanent Data Loss Business Impacts Ramifications
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationInnovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security
Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security Sven Kutzer Consulting Systems Engineer GSSO - CYBERSECURITY SALES Mittwoch, 7. März 2018 Challenges 2017
More informationCisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer
Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability
More informationFirePower 2100 NGFW. Elodie Heurtevent Security BDM Commercial. 21 March 2017
FirePower 2100 NGFW Elodie Heurtevent Security BDM Commercial 21 March 2017 Capture the NGFW Opportunity "Less than 40% of enterprise Internet connections today are secured using nextgeneration firewalls
More informationMeraki 2014 Solution Brochure
Meraki 2014 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
More informationAby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationIntelligent Cyber Security for Real World
Intelligent Cyber Security for Real World Simone Posti Security Account Manager Cisco GSSO June 2016 The Security Challenges Without integrated security, our data is at risk 60% of data is stolen in HOURS
More informationCisco Security Exposed Through the Cyber Kill Chain
Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE
More informationPrepare Your Network for BYOD. Meraki Webinar Series
Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product
More informationCisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.
Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,
More informationMeraki Solution Brochure
Meraki 2016 Solution Brochure Introduction 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With
More informationCisco Advanced Malware Protection. May 2016
Cisco Advanced Malware Protection May 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious traffic 100% Cybercrime is lucrative, barrier
More informationMeraki 2018 Solution Brochure
Meraki 2018 Solution Brochure INTRODUCTION 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With
More informationIntroduction. Trusted by Thousands of Customers Worldwide. Recognized for Innovation
2013 Company Brochure Introduction 100% Cloud Managed Enterprise Networks Meraki s cloud managed edge and branch networking solutions bring simplicity to enterprise-class networks. With wireless, switching,
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationMR Cloud Managed Wireless Access Points
MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise environments, the
More informationA New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization
A New Security Model for the IoE World Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization Internet of Everything The Internet of Everything brings together people, process, data and
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationEasy Setup Guide. Cisco ASA with Firepower Services. You can easily set up your ASA in this step-by-step guide.
Cisco ASA with Firepower Services Easy Setup Guide You can easily set up your ASA in this step-by-step guide. Connecting PC to ASA Installing ASDM 3 Configuring ASA 4 Using Umbrella DNS Connecting PC to
More informationGlobal vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year
Global vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year Firepower Next Generation Firewall Subtitle goes here William Young Security Solutions Architect, Global Security Architecture Team
More informationCisco ASA with FirePOWER Services
Cisco ASA with FirePOWER Services TDM Thomas Jankowsky Consulting Systems Engineer May 2015 Introduction Industry s First Threat-Focused Next-Generation Firewall (NGFW) Proven Cisco ASA firewalling Industry-leading
More informationCloud Managed Networking with Meraki
Cloud Managed Networking with Meraki Peter Stephan Cloud Networking Systems Engineer #clmel 3 Cisco Meraki Cloud Networking About Cisco Cloud-managed Networking Cisco Meraki: a complete cloud-managed networking
More informationFully Integrated, Threat-Focused Next-Generation Firewall
Cisco Firepower NGFW Fully Integrated, Threat-Focused Next-Generation Firewall Fuat KILIÇ, fkilic@cisco.com, +905339284608 Security Consulting Systems Engineer, CCIE #21150 September 2016 Get ahead of
More informationCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking Cloud Networking Architecture. An integrated networking platform built for management. Cloud Managed Wireless. 100% cloud managed for faster deployment, simplified
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationModern attacks and malware
Modern attacks and malware Everything starts with an email and web Dragan Novakovic Cisco Systems New Cyber Threat Reality Your environment will get breached You ll most likely be infected via email Hackers
More informationCisco ASA 5500-X NGFW
Cisco ASA 5500-X NGFW Sieťová ochrana pre malé a stredné podniky pred modernými hrozbami Peter Mesjar CCIE 17428, Systémový Inžinier, Cisco What are we going to talk about Problem is THREATS How today
More informationCisco Firepower Thread Defence. Claudiu Boar
Cisco Firepower Thread Defence Claudiu Boar Security everywhere Stop threats at the edge Control who gets onto your network Find and contain problems fast Protect users wherever they work Simplify network
More informationSecurity Vendor Line Card
Security Essential security controls required for complete security visibility Helps secure the world s largest Enterprise and provider networks from DDoS and advanced targeted attacks Deliver visibility
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationCisco 2100 Series Wireless LAN Controller
Cisco 2100 Series Wireless LAN Controller Overview Q. What is the Cisco 2100 Series Wireless LAN Controllers? A. The Cisco 2100 Series Wireless LAN Controllers are part of the Cisco Wireless Controller
More informationBusiness Resiliency Through Superior Threat Defense
Business Resiliency Through Superior Threat Defense Firepower 2100 Series/ Cisco Identity Services Engine Andre Lambertsen, Consulting Systems Engineer ala@cisco.com Cisco Firepower NGFW Fully Integrated
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationFirewall nové generace na platformě SF, přístupové politiky, analýza souborů, FireAMP a trajektorie útoků
Firewall nové generace na platformě SF, přístupové politiky, analýza souborů, FireAMP a trajektorie útoků Jiří Tesař, CSE Security, jitesar@cisco.com CCIE #14558, SFCE #124266 Mapping Technologies to the
More informationMeraki's Cloud-Managed Networking Solution
Meraki's Cloud-Managed Networking Solution John-Paul Sikking Meraki Specialist Agenda Introduction Wireless Trends Why cloud managed networking? Cloud-managed networking architecture Solution highlights
More informationCloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX John-Paul Sikking Security Specialist Agenda Introduction Why cloud managed networking? Cloud-managed networking architecture Solution highlights Product Families
More informationConnected Experiences
Connected Experiences 2017 Bio 7 years at Cisco Meraki Security / SD-WAN / Analytics / SP Launched MX in 2011 500M firewalls and counting Before, PM @ Dell (Wyse) Landscape Connected Experiences Applications
More informationAdvanced Malware Protection. Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe
Advanced Malware Protection Dan Gavojdea, Security Sales, Account Manager, Cisco South East Europe How would you do security differently if you knew you were going to be hacked? Security Challenges Changing
More informationHow to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption
How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New
More informationHow to build a multi-layer Security Architecture to detect and remediate threats in real time
How to build a multi-layer Security Architecture to detect and remediate threats in real time Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist March 2018 Agenda Cisco Strategy Umbrella
More informationImplementing and Configuring Meraki Technologies (ICMT-CT)
Implementing and Configuring Meraki Technologies (ICMT-CT) COURSE OVERVIEW: This 5-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Next Generation Security John Tzortzakakis Security Solutions Architect, Security Business Group November 2014 Threat Landscape evolution 60% of data is
More informationCisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017
Cisco AMP Solution Rene Straube CSE, Cisco Germany January 2017 The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense AMP Threat Intelligence Cloud
More informationKey Security Measures to Enable Next-Generation Data Center Transformation
Key Security Measures to Enable Next-Generation Data Center Transformation Bill McGee Senior Manager, Security Solutions Cisco Systems, Inc. Agenda Data Center Security Challenges Secure DC Strategies
More informationProtecting Your Digital Business: The Case for Next-Generation Intrusion Prevention
White Paper Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention What You Will Learn Many companies that adopt a next-generation firewall (NGFW) believe that they can t benefit
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationCisco Advanced Malware Protection against WannaCry
Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationNext Generation IPS and Advance Malware Protection. Mahmoud Rabi Consulting Systems Engineer - Security
Next Generation IPS and Advance Malware Protection Mahmoud Rabi Consulting Systems Engineer - Security Threat Landscape and Attack Continuum Today s Real World: Threats are evolving and evading traditional
More informationMeraki MX Cloud Managed Security & SD-WAN
Datasheet MX Meraki MX Cloud Managed Security & SD-WAN Overview Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed sites,
More informationMeraki Z-Series Cloud Managed Teleworker Gateway
Datasheet Z Series Meraki Z-Series Cloud Managed Teleworker Gateway Fast, Reliable Connectivity for the Modern Teleworker The Cisco Meraki Z-Series teleworker gateway is an enterprise class firewall, VPN
More informationSAFE Architecture Guide. Places in the Network: Secure Branch
SAFE Architecture Guide Places in the Network: Secure Branch January 2018 SAFE Architecture Guide Places in the Network: Secure Branch Contents January 2018 Contents 3 5 8 9 13 17 22 23 26 Overview Business
More informationImproving Security with Cisco ASA Firepower Services Claudiu Onisoru, Senior Solutions Engineer Cisco Connect - 18 March 2015
Improving Security with Cisco ASA Firepower Services Claudiu Onisoru, Senior Solutions Engineer Cisco Connect - 18 March 2015 1 Agenda Frontal Communication: Who we are? - Key points - Competencies Areas
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationSOLUTION BRIEF EXTREMEWIRELESS WiNG AZARA AZARA. WiNG RISE TO THE CHALLENGE OF PROVIDING SUPERIOR CONNECTIVITY & WLAN MANAGEMENT
SOLUTION BRIEF WiNG AZARA RISE TO THE CHALLENGE OF PROVIDING SUPERIOR CONNECTIVITY & WLAN MANAGEMENT Freedom from the unpredictability of providing connectivity Today, mobile devices outnumber the total
More informationFIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?
WHAT IS FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT? While firewalls started life simply protecting networks from outside hacks and attacks, the role of the firewall has greatly evolved to take
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationPassit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers
Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationCisco Advanced Malware Protection for Endpoints. Donald J Case BizCare, Inc. Saturday, May 19, 2018
Cisco Advanced Malware Protection for Endpoints Donald J Case, Inc. Saturday, May 19, 2018 Every single attack that an organization experiences is either on an endpoint or it s headed there Malware is
More informationDeploying Intrusion Prevention Systems
Deploying Intrusion Prevention Systems Gary Halleen Consulting Systems Engineer II Agenda Introductions Introduction to IPS Comparing Cisco IPS Solutions IPS Deployment Considerations Migration from IPS
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:
MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationFirepower Techupdate April Jesper Rathsach, Consulting Systems Engineer Cisco Security North April 2017
Firepower 6.2.1 Techupdate April 2017 Jesper Rathsach, Consulting Systems Engineer Cisco Security North April 2017 Firepower 6.2.1 Nr. 1 most important!! Firepower 6.2.1 BUGFIXES!!!!! Alle kendte severity
More informationCisco Wireless Portfolio. Ionut Davidoiu Pre-Sales Engineer Networking
Cisco Wireless Portfolio Ionut Davidoiu Pre-Sales Engineer Networking Ionut.davidoiu@likeit.ro Wireless Network Trends Cisco Enterprise Wireless Portfolio Agenda Meraki Cloud Managed Portfolio Q & A Wireless
More informationThe Cisco BYOD Smart Solution
1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationAgenda: Insurance Academy Event
Agenda: Insurance Academy Event Drs Ing René Pluis MBA MBI Cyber Security Lead, Country Digitization Acceleration program the Netherlands The Hague, Thursday 16 November Introduction Integrated Security
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationCato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.
Cato Cloud Global SD-WAN with Built-in Network Security Solution Brief 1 Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The rise of cloud applications and mobile workforces
More informationMR30H. MR30H and Meraki Cloud Management: A Powerful Combination. Robust Feature Set for Multi-dwelling Wireless. Product Highlights
MR30H Dual-band, 802.11ac Wave 2 2x2:2 Wall Switch Access Point with dedicated security and RF management radio as well as an integrated Bluetooth Low Energy beacon and scanning radio Robust Feature Set
More informationSolution Architecture
2 CHAPTER Introduction The purpose of the Secure Wireless is to provide common security services across the network for wireless and wired users and enable collaboration between wireless and network security
More informationSAFE Architecture Guide. Places in the Network: Secure Campus
SAFE Architecture Guide Places in the Network: Secure Campus January 2018 SAFE Architecture Guide Places in the Network: Secure Campus Contents January 2018 Contents 3 5 8 9 13 15 21 22 25 Overview Business
More informationWireless and Network Security Integration Solution Overview
Wireless and Network Security Integration Solution Overview Solution Overview Introduction Enterprise businesses are being transformed to meet the evolving challenges of today's global business economy.
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationNetwork Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016
Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent
More informationCisco Advanced Malware Protection for Networks
Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)
More information