How to Sell Cisco Trustsec: Network Identity Architecture Solutions. Presenter s Name Date
|
|
- Lambert Tyrone Miller
- 6 years ago
- Views:
Transcription
1 How to Sell Cisco Trustsec: Network Identity Architecture Solutions Presenter s Name Date
2 Session Objectives At the end of the session, the participants should be able to: Understand Cisco TrustSec relevant to Cisco Borderless Network Understand Security market landscape and customers need Understand Cisco TrustSec key offerings and how to position the right solution for customer Understand migration and opportunities 2010 Cisco Systems, Inc. All rights reserved.
3 The Transformation: The World Is Our New Workspace Right Any Resource Right Any Device Right Any Place Right Any Person BORDERLESS NETWORKS A Next Generation Architecture to Deliver the New Workspace Experience 2009 Cisco Systems, Inc. All rights reserved. 3
4 Borderless Network Market Drivers Complex workforce employees, guests, contractors, partners Users Employees demand mobility and device choice External Apps Internal Apps Devices Consumerization of access devices Purpose-built devices becoming network enabled Applications IaaS, SaaS Increased use of virtualization Move to cloud-based access and services 2009 Cisco Systems, Inc. All rights reserved. 4
5 Identity Critical to Borderless Security Security Challenges Who? Identify users and provide differentiated access in a dynamic, borderless environment What? Where? Enforce compliance for proliferating consumer and network capable purposebuilt devices Traditional borders are blurred. Access is possible from anywhere How? Establish, monitor, and enforce consistent global access policies 2009 Cisco Systems, Inc. All rights reserved. 5
6 Announcing Cisco TrustSec Cisco TrustSec rebrands our policy-based access control, identity-aware networking, and data integrity and confidentiality services under a single name The term TrustSec has been expanded from SGT to include both switch infrastructure and appliance-based solutions for securing network access and control, including: Identity-Based Networking Services (IBNS) and 802.1x Network Admission Control Cisco Secure Access Control Server (ACS) 2009 Cisco Systems, Inc. All rights reserved. 6
7 Market Opportunity Gartner predicts the adoption rate of 802.1x for wired networks will be 70% by It bases this on the belief that 802.1x implementation will be made simpler and that demand for NAC to control access of guest PCs will continue grow. Source: Network World, August Cisco Systems, Inc. All rights reserved. 7
8 Customer Challenge in Building an Access Policy in a Borderless Network Common questions customers ask Authorized Access How can I restrict access to my network? Can I manage the risk of using personal PCs? Common access rights when on-premises, at home, on the road? Endpoints are healthy? Guest Access Can I allow guests Internet-only access? How do I easily create a guest account? Can this work in wireless and wired? How do I monitor guest activities? Non-Authenticating Devices How do I discover non-authenticating devices? Can I determine what they are? Can I control their access? Are they being spoofed? 2010 Cisco Systems, Inc. All rights reserved. 8
9 Why Do Customers Care? Enables Secure Collaboration Dynamically authenticate and assign access based on user and device role and location Strengthens Security Enforce consistent security policy, ensure endpoint health, deliver a secure network fabric Supports Compliance Provides real-time access visibility and audit trails for monitoring, auditing and reporting 2010 Cisco Systems, Inc. All rights reserved. 9
10 TrustSec Addresses Customer Concerns 1 Identifies Authorized Users Who are you? An 802.1x-enabled device or a Network Admission Control (NAC) appliance authenticates the user 2 Increases Network Visibility What are you doing? The user s identity, location, and access history are used for compliance & reporting 3 Personalizes The Network What service level do you receive? The user is assigned services based on role and policy ( job, location, device, etc.) 4 Enforces Access Policy Where can you go? Based on authentication data, the user is placed in the correct VLAN 2010 Cisco Systems, Inc. All rights reserved. 10
11 What TrustSec Does NAC Appliances 802.1x/Infrastructure Identity Information Other Conditions Authorization (Controlling Access) Vicky Sanchez Employee, Marketing Wireline 3 p.m. Group: Full-Time Employee Time and Date Broad Access Limited Access Frank Lee Guest Wireless 9 a.m. Group: Contractor + Guest/Internet Quarantine Security Camera G/W Agentless Asset MAC: F5 AB 8B D4 Francois Didier Consultant HQ Strategy Remote Access 6 p.m. Group: Guest Posture Device Type Location Access Type Deny Access Access Compliance Reporting 2009 Cisco Systems, Inc. All rights reserved. 11
12 Guest Access for NAC and 802.1X Deployments NAC Guest Server Now Supports 802.1X Provision: Guest accounts via sponsor portal Manage: Sponsor privileges, guest accounts and policies, guest portal Notify: Guests of account details by print, , or SMS Report: On all aspects of guest accounts 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 12
13 Non-Authenticating Device Policy for NAC and 802.1X Deployments NAC Profiler Device Identification Determine device type Centralized device discovery and inventory Uses network device tables and analyzes endpoint traffic Now Supports 802.1x Control and Audit Authorize based on device role Monitor and audit to prevent spoofing Many endpoint devices are undocumented and cannot authenticate to the network IP Cameras Fax Machines Cash Registers Video Conference Alarm Systems Turnstiles HVAC Systems Printers 50% PCs 50% Other 33% PCs 33% Other 33% IP Phones Enterprises without VoIP Wired Endpoints Distribution Enterprises with VoIP Wired Endpoints Distribution 2010 Cisco Systems, Inc. All rights reserved. 13
14 New TrustSec Capabilities Enhanced Switch Features: More authentication options: FlexAuth, WebAuth Additional deployment capabilities: Open Mode, IP Telephony Cisco ACS 5.1: Improve operations with monitoring and troubleshooting Cisco NAC Guest and Profiler: Lower the cost of managing identity and policy in both a 802.1X and NAC appliance environment MACsec: Addresses compliance by providing an encrypted link from the Catalyst 3750-X, 3560-X, and Nexus 7000 to the endpoint Security Group Tagging (SGT) and Security Group ACLs (SGACL) : Reduces OPEX and provides topology independence access and enforcement TrustSec for 802.1X is a long-term, multiphase opportunity: 1. Migrate the customer to an 802.1X infrastructure to secure their access layer 2. Create user and device posture with ACS, Guest, and Profiler appliances 3. Introduce SGTs and SGACLs to reduce OPEX and extend enforcement 2010 Cisco Systems, Inc. All rights reserved. 14
15 Two TrustSec Options for Any Customer NAC Appliances NAC overlay solution for quick deployment and/or heterogeneous environments 802.1X/Infrastructure Robust integrated enforcement solution for 802.1X-enabled infrastructures What s Right For Me? Immediate need for posture assessment? Largely non-cisco access infrastructure? NAC NAC NAC Manager Admin, Reporting, and Policy Store NAC Server Posture, Services, and Enforcement **Cisco 2900/3560/3700/4500/6500 and Nexus 7000 switches, Wireless and Infrastructure 802.1x or industry standard mandate over next 1-2 years? Infrastructure NAC Agent Web Agent No-Cost Persistent & Temporal Clients for Authentication, Posture, & Remediation SSC 802.1x Supplicant CSSC or OS- Embedded Supplicant ACS 5.1 Identity & 802.1x Access Policy System Have or plan to deploy a serviceenabled infrastructure? Infrastructure Note Guest Server and Profiler can be deployed with both NAC and ACS NAC Guest Full-Featured Guest Provisioning Server NAC Profiler Profiles Non-Authenticating Devices **First Switches targeted to support SGT Cisco 2900/3560/3700/4500/ Cisco Systems, Inc. All rights reserved. 15
16 Cisco NAC Appliance Advantages NAC Appliances Verify User and Device Identity Check Compliance Complete Posture Lifecycle Remediate Quarantine Non-Compliant Devices Complete Posture Lifecycle Offers endpoint compliance verification and remediation Agents for managed & unmanaged PCs Automated updates simplify compliance for 350+ security apps Comprehensive NAC Solution Flexible deployment options: in-band and out-of-band Covers all use cases: wired, wireless, and VPN Includes authentication, authorization, guest, profiling, posture Market Leadership customers Leading NAC vendor: Gartner, IDC, Infonetics, Frost & Sullivan 2010 Cisco Systems, Inc. All rights reserved. 16
17 NAC Appliance in Action A Conceptual View NAC Appliances THE GOAL 1 End user attempts to access network Initial access is blocked Single-sign-on or web login Authentication Server NAC Manager 2 NAC Server gathers and assesses user/device information NAC Server Intranet/ Network Username and password Device configuration and vulnerabilities 3a Quarantine Noncompliant device or incorrect login Access denied Placed to quarantine for remediation 3b Device is compliant Placed on certified devices list Network access granted 2010 Cisco Systems, Inc. All rights reserved. 17
18 Cisco 802.1X/Infrastructure Advantages 802.1X/Infrastructure Consistent Infrastructure Simplifies Rollout Web Auth 1X Impact Modes MAB Consistent functionality across Cisco switch platforms Broad use-case support for device authentication & enforcement Flexible deployment options: monitor-mode, low-impact, highsecurity Monitoring, Troubleshooting & Reporting Correlates access log data from multiple network enforcement sources Customized queries Centralized dashboard Integrated diagnostics Reporting Security Group Access Control Operationally simplified access control deployment Infrastructure-based, spans campus to data center Deployed independent of topology & network design Secure Network Fabric Provides consistent confidentiality and integrity across wireless, VPN, and now wired Ethernet Open standards based 802.1AE MACsec & 802.1X Network Edge Authentication Topology (NEAT): Only legitimate network devices join the fabric 2010 Cisco Systems, Inc. All rights reserved. 18
19 802.1X/Infrastructure in Action A Conceptual View 802.1X/Infrastructure Users, Endpoints Supplicant 802.1X Guest User 2 Policy Servers evaluate identity information NAC Profiler evaluates agentless device Guest Server manages temporary guest access ACS evaluates overall policy and returns authorization back to NAD Network-Attached Device IP Phones NAC Guest Server Directory Service NAC Profiler Server Cisco Catalyst Switch Campus Network 1 End user / Endpoint attempts to access network 802.1X Authentication for registered user MAC Authentication Bypass for agentless device Web Authentication for Guest Nexus 7000 Switch ACS 3 Access Control based on policies Catalyst switch to enforce access control based on policy (VLAN Assignment, dacl, SGT) Nexus 7000 to apply SGACL based on SGT mapped to role Protected Resources Control Plane: RADIUS 2010 Cisco Systems, Inc. All rights reserved. 19
20 Consistent Infrastructure Simplifies Rollout 802.1x/Infrastructure 1 Monitor Mode 2 Authenticated Access Mode/Low Impact 3 Differentiated Access Mode/High Impact What does it do? Open mode enables readiness assessment for 802.1X enforcement Discovers users and devices How does it do it? Monitor-only, no access restrictions Tracks user authentications Identifies non-802.1x capable devices and creates a device list What does it do? Low impact security mode provides two levels of access for all users and devices limited and normal How does it do it? Limited network access permitted by default for all users and devices Normal access granted based on user and device authorization via dacls What does it do? High impact security mode provides access control based on user and device group membership How does it do it? Traditional 802.1X Role-based access control: Dynamic VLANs, dacls, SGACL Consistent functionality across Cisco s switch platforms: Flexible Authentication Multiple Authentication Open Access Multi-Domain Access MAC Move/Replace 802.1X Cisco Systems, Inc. All rights reserved. 20
21 Differentiated Access Security Group Access Control (SGACL) 802.1x/Infrastructure Security Group Access Control Concept Define Roles for users in organization Authenticate user (802.1x) at access layer Assign Role to user Network enforces role-based access policy Benefits Significant OPEX savings! Reduces thousands of ACLs to pre-defined set Simplifies traffic management, add/change/move Immediate Opportunities Compliance Issue LAN Access to the Data Center Available NOW! (SXP* + Nexus ACS) *Technical Note: Upon 802.1X authentication, SXP (Security Exchange Protocol) binds the user s IP address to the user s role (defined by the ACS) on switches that do not yet support SG tagging. This SXP information is processed by the Nexus 7000 switch the same as an SGT. More robust SGT functions will be available as SGT rolls out across more switch devices Cisco Systems, Inc. All rights reserved. 21
22 Security Group Access Control 802.1X/Infrastructure Individuals Authz Rules Source Security Groups Destination Security Groups Resources Authz Rules Access Rules Employee Internet Confidential Guest/Unknown Special Projects Authz Rules Contractor Access Rules Print/Copy Authz Rules SGTs SGACLs Security group based access control allows customers: VLANs, ACLs, and Subnets are topology dependent and operationally intensive TrustSec To keep is existing topology logical independent design at and the streamlines access layer network segmentation To Security dynamically Group Tags change (SGTs) / apply are assigned policy to users, meet devices, today s or business VMs based on role requirements Security Group ACLs (SGACLs) enforce access policy based on SGTs To SGTs distribute and SGACLs policy can from replace a central multiple management ACLs, thereby server reducing OPEX 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 22
23 Cisco Secure ACS Policy Control Cisco Secure ACS is the world s most popular enterprise access and policy platform ACS delivers a centralized identity and access policy solution that seamlessly enables an enterprise grade network access policy and identity strategy for both large and small organizations 35,000+ ACS Installed Base Used by 95% of Cisco Top 100, 90% of Cisco Top 500, 85% of Cisco Top % 70% 86% S&P of Standard & Poors 100 Russell 1000 Fortune Cisco Systems, Inc. All rights reserved. Cisco Public 23
24 Cisco Secure ACS Monitoring, Troubleshooting, and Reporting 802.1X/Infrastructure Simplify operations with a centralized system dashboard Real-time network access visibility and monitoring Compliance reporting Diagnostics and failure analysis Custom query response and troubleshooting Alarms and alerts Tracks events from switches & ACS 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 24
25 Selling TrustSec 2010 Cisco Systems, Inc. All rights reserved. 25
26 Sales Tactics Low-hanging fruit Enterprise (500+ users) Security-conscious Regulatory compliance Internal mandates for 802.1X Key decision influencers Network decision-maker Security decision-maker Compliance officer IT director 2010 Cisco Systems, Inc. All rights reserved. 26
27 Sales Tactics: Drive ACS and Legacy Switch Migrations NOW: Accelerate switch migration to 802.1x Secure access layer with 802.1x infrastructure Identify existing legacy switch install base and migrate to 802.1x-enabled switch infrastructure NOW: Ensure account control with Access Control Seed ACS 5.1 in account by selling new features, including enhanced monitoring and troubleshooting, and flexible rules based policies Upgrade existing ACS devices to 5.1 to manage and control 802.1x access control policy NOW: Position Guest Access and Device Profiler appliances 2010 Cisco Systems, Inc. All rights reserved. 27
28 Sales Tactics (cont d): Drive ACS and Legacy Switch Migrations NEXT: Extend Cisco value by leveraging new TrustSec solutions for 802.1x Upgrade ACS/Guest Access/Device Posture devices to Positron Showcase competitive advantages of Cisco switches with hop-by-hop encryption and Security Group Tags and Security Group ACLs ONGOING: Add value-added professional services for migrations 2010 Cisco Systems, Inc. All rights reserved. 28
29 Sales Process Presentation and demo Assessment Proof of Concept Deployment Tools Available: Sales and technical presentations Infrastructure assessment guidelines Configuration guides for POCs Design and deployment guides 2010 Cisco Systems, Inc. All rights reserved. 29
30 Partner Program Opportunities and Incentives Partner Opportunities Migration: Use TrustSec features to drive switch upgrades Install Base Lifecycle Management (IBLM) Network Assessments Security Assessments Technology Migration Program (TMP) Trade in Accelerator Program (TAP) Insert either a bulleted list or graphic here. (Ref. SME note) Placeholder Specifications: Image size can range from 2-4 in. wide and in. high., dpi, RGB, png format (necessary for transparent backgrounds similar to slide 6) or jpg (if rectangular image) Other Incentives: Value Incentive Program (VIP) Opportunity Incentive Program (OIP) 2010 Cisco Systems, Inc. All rights reserved. 30
31 TrustSec Sales Opportunities 1. Create migration opportunities 2. Include security technology 3. Add high-margin professional services 2010 Cisco Systems, Inc. All rights reserved. 31
32 Migration Opportunity: Total Market 2K 3K 4K 6K 2010 Cisco Systems, Inc. All rights reserved. 32
33 Catalyst Migration Opportunity: Optimal Path Legacy Migration Plan Catalyst 2940, , 2960-S Catalyst , 2960-S, IE 3100 Catalyst , 3750, 3560E, 3750E, 3560X, 3750X Catalyst 400x & 4500 non-e Series (SUP1, SUPII, SUPII+TS, SUPII+, SUPII+10G, SUPIII, SUP-IV, SUPV ) 4500 E Series (with Sup6-E, Sup6L-E, 4500 with SupV-10GE) Catalyst 6K Sup 1, Sup 2 Sup 32 or Sup Cisco Systems, Inc. All rights reserved. 33
34 Switch Technical Differentiators Flexible Authentication Sequencing Rolling authentication with a flexible sequence (.1x, Mac Auth Bypass, and web authentication) Most flexible authentication in the market: automates the port configuration to accommodate all endpoint devices necessary to support the most enterprise use cases Monitor Mode Gathers information about device/user access without adverse impact Critical to deploying network-based identity without locking out users or devices Unified Guest Access Unified guest access with local web authentication on the switch Same infrastructure for wired and wireless guest access same premiere user experience 2010 Cisco Systems, Inc. All rights reserved. 34
35 Migration Opportunities ACS NAC Strategy Secure account control with customers who want posture with 8021.x, by preparing their base networking infrastructure. Migrate existing ACS 4.x customers to ACS 5.1 (SKUs and migration tools are available utility in ACS 5.1 to migrate data) Sell professional services required to facilitate the policy migration Strategy maximize customer satisfaction / minimize ongoing support by migrating existing NAC customers to Migrate existing SW-only customers to For customers on non-cisco HW, migration to latest appliance (33x5) is mandatory (program and SKUs are available) Migrate existing Profiler customers to 3.x UI and stability enhancements Upsell NAC Guest Server 2010 Cisco Systems, Inc. All rights reserved. 35
36 Product Evolution ACS Migration - Value and Migration Detail SW migration from ACS 5.1 to ACS 5.2 SW / HW migration from ACS 4.x to ACS 5.1 SW migration from ACS 5.0 to ACS 5.1 ACS 5.1 ACS 5.2 Customer Value - Enhanced support for GOV installations requiring FIPS compliance ACS 4.x Customer Value - Integrated View functionality, c/w extensive reporting templates - Simplified policy creation with enhanced policy monitoring - Improved visibility into network access and device admin specifics - Support for Cisco identity-enabled networks, with.1x and SGT support Time 2010 Cisco Systems, Inc. All rights reserved. 36
37 ACS 5.1 Upgrade and Migration From Any Previous Release To the latest 5.1 Release Upgrade part numbers available with special pricing (refer to ACS migration matrix) Upgrade from appliance or software to 1121 appliance or VMware versions Example 1 - Go from ACS 3.3 on Windows to 1121 Appliance Example 2 - Go from 1111 Appliance to 5.2 VMware Migration utility in 5.1 to migrate existing data Comes with all previous versions needed to perform a complete data migration 2010 Cisco Systems, Inc. All rights reserved. 37
38 ACS Migration Tools Category Education Migration Process Components ACS-specific collateral updates (BDM, TDM) ACS 5.1 Overview and Value Proposition presentation 5 Things You Need To Know about ACS 5 (short presentation) Archived Webinar series ACS What s In It For Me? (ACS value proposition, ACS Migration Strategy) Migration Workload Estimating Tool Migration Guide Migration Deep Dive webinar Migration Utility (in ACS 5.1) Offers 40% Upgrade discount for existing customers 2010 Cisco Systems, Inc. All rights reserved. 38
39 ACS 5.1 Summary Sell ACS 5.1 for the following customer benefits: - Compliance & Audit through integrated reporting across the entire deployment - Troubleshooting capabilities lower operational expenditure - Enable infrastructure services identity, TrustSec Sell ACS 5.1 to - Seed the account to prevent competition from switch vendors such as HP and Juniper - Position infrastructure upgrades by enabling advanced services like identity and TrustSec - Bundle additional products like NAC Guest and NAC Profiler 2010 Cisco Systems, Inc. All rights reserved. 39
40 Product Evolution NAC Migration - Value and Migration Detail SW migration from NAC 4.7.x to NAC 4.8 NAC Pre-4.5 to via SW / HW migration program SW migration from NAC 4.5x to NAC 4.6x NAC 4.5.x SW migration from NAC 4.6.x to NAC 4.7.x Separate FIPS HW module (note FIPS module supported on 33x5 platform only) NAC 4.6.x Customer Value - Enhanced agent side reporting - Improved user experience - Reduced client footprint - Easy NAC Agent Management - Simplified Troubleshooting NAC 4.7.x Customer Value - Dedicated FIPS certified HW Security Module, which handles cryptographic operations - Higher-scalability (5000 user) HW option - Support for Windows 7 and Mac Snow Leopard NAC 4.8 (Planned) Customer Value - Improved reporting capability - Faster response to AV / AS - Post-admission NAC for ongoing device posture Time 2010 Cisco Systems, Inc. All rights reserved. 40
41 NAC Migration Opportunities Details Migrate existing software-only customers to For customers on non-cisco hardware, migration to latest appliance (IBM Platform) is mandatory These customers can take advantage of 80% discount on new appliances Note that customers on Cisco hardware will only require a software upgrade. Upsell NAC Guest Server Add value added professional services 2010 Cisco Systems, Inc. All rights reserved. 41
42 NAC Migration Tools and Offers NAC Appliance Migrations Step by Step Migration Guide for Software-Only Customers Migration Deep Dive Webinar (archived version available) Migration Offer Pre-discounted NAC appliances (IBM Platform) Up to 80% off 2010 Cisco Systems, Inc. All rights reserved. 42
43 ACS and NAC - Migration Overview Today ACS 5.1 (1121 HW) ACS pre-5.x to 5.x migration - dedicated VMWare / appliance SKUs ACS 5.0 to 5.1 migration - SW migration NAC Pre-4.5 to NAC SW / HW migration program NAC 4.5 / 4.6 to SW migration NAC (33x5 HW) Mid-Year 2010 ACS 5.2 (1121 HW) ACS 5.1 to ACS FIPS Compliance migration (SW) NAC 4.5 / 4.6 to SW migration NAC 4.8 (33x5 HW) Q4CY 10 ACS 5.1 / 52 to Consolidated Platform - SW cross-grade, HW migration for pre-1121 HW Consolidated Platform (1121 / 33x5 HW) NAC 4.8 to Consolidated Platform - SW cross-grade, HW migration for pre-33x5 HW 2010 Cisco Systems, Inc. All rights reserved. 43
44 Sales Opportunity: Attach Security Discuss enhanced capabilities of ACS 5.1 to drive migration (35,000 + customers) NEW! Demonstrate the best-in-class guest access management of NAC Guest Server Position the ease of deployment with NAC Profiler All technologies provided by the proven leader in Network Security and Network Admission Control Cisco Systems 2010 Cisco Systems, Inc. All rights reserved. 44
45 Sales Opportunity: Data Center and SGACL Opportunity: Data center growth is exploding! Compliance mandates require appropriate access control for data center resources Huge opportunity to migrate not only access switches but data center switches TrustSec Relevance: Begin data center access control discussions with Security Group ACL Position Nexus 7000 and SXP Demonstrate how authentication for LAN users can be enforced easily in the data center 2010 Cisco Systems, Inc. All rights reserved. 45
46 Example TrustSec Deal Size Large enterprise network Switch Migration: 50 Catalyst 6500 Series 50 Catalyst 3750 Series 2000 Catalyst 2960 Series Mid-sized network Switch Migration: 15 Catalyst 6500 Series 50 Catalyst 3750 Series 125 Catalyst 4500E Series Attached Security: 14 Access Control Systems 3 Profilers (up to 40,000 MAC addresses each) 3 Guest Servers $24M (List) Attached Security: 5 Access Control Systems 1 Profiler (up to 40,000 MAC addresses) 1 Guest Server $7M (List) 2010 Cisco Systems, Inc. All rights reserved. 46
47 Sales Opportunity: Offer High-Margin Professional Services Business processes Network discovery Migration services Implementation services Leveraging partner services 2010 Cisco Systems, Inc. All rights reserved. 47
48 Professional Services Service Components Security Policy Review Design Strategy Development Controlled Deployment Full Deployment Training and Knowledge Transfer Activities and Deliverables Security policy review Match compliance to infrastructure Custom design for authentication and access objectives Customized solution for existing network Experienced rollout services Expertise decreases deployment time Training for operation, maintenance, management, and tuning Professional Services from Cisco, or one of our Services Partners, is an Important Component of Any Successful Rollout Cisco Systems, Inc. All rights reserved. 48
49 Next Steps: Determine the Appropriate Solution Engage your SE Clarify Customer s Pain Discuss Pro s and Con s (.1x, NAC, Profiler, GS) Present the BEST solution First, THEN discuss Cost Set Appropriate Expectations: Timeline, Pilot, Needed Customer Resources, etc. Ask for the Order NAC Appliances NAC (OVERLAY) Sell NAC Server Sell NAC Manager Upsell NAC Profiler Upsell NAC Guest 802.1X/Infrastructure ACS & SWITCHES (INFRASTRUCTURE) Upgrade Legacy Switches Sell/Upgrade ACS Sell CSSC Upsell NAC Profiler Upsell NAC Guest 2010 Cisco Systems, Inc. All rights reserved. 49
50 Guiding The Conversation Access control is a critical issue for many organizations, such as regulatory requirements. Access control can also be a key driver in getting customers to migrate to an 802.1xenabled infrastructure Control the Conversation: keep the customer on topic. Table topics such as Data Center, UC, etc. for later. Keep them thinking security. Use the questions on slide 8 to guide the conversation If they wander off topic ask another question to bring them back to Access/Identity Security 2010 Cisco Systems, Inc. All rights reserved. 50
51 Objection Handling Costs a) Be sure to be comparing Apples to Apples b) Emphasize total cost of ownership. Remember this is a solution sale that is part of an integrated, long-term strategy, NOT simply a box. c) Find Pain, Discuss, Provide Solution again Deployment Ease a) Set expectations and spotlight features b) Be sure to appropriately cover SOW Competitive Advantages a) No one else can offer this solution (see next slide) 2010 Cisco Systems, Inc. All rights reserved. 51
52 Sales Differentiators: Defend Against Competitors! Market-leading solution Ease of deployment: Monitoring (open) mode, authenticated (low impact), and differentiated (high-impact) deployment options Flexible: Three ways to authenticate using a single configuration Efficient, consistent, and scalable: Leverage your infrastructure and use a common policy Ease of ongoing management: Security Group Tagging (SGT) and Security Group ACLs (SGACL) enable scalable network access control through simplified network design Complete, single vendor solution 2010 Cisco Systems, Inc. All rights reserved. 52
53 Identity Compliance Requirements Cisco TrustSec addresses mandated access control security requirements Payment Card Industry (PCI) US Department of Defense Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures (Version 1.2.1, July 2009) Information Assurance Officers/Network Security Officers will ensure either MAC security (with profiling) or 802.1X port authentication is used on all network access ports Defense Information Systems Agency Access Control in Support of Information Systems, Security Technical Implementation Guide (26 December 2008) 2010 Cisco Systems, Inc. All rights reserved. 53
54 Case Study University of Montreal Background One of the top 100 universities in the world, with 55,000 students and an annual research budget of CAD$450 million Business Challenges Support collaboration between research groups Differentiated access for students, researchers, and faculties Cisco Solution Benefits Tailored network services with identitybased access Scalable network environment Improves OPEX with network moves, adds, and changes 08/case_study_c html Our new network is more secure, and we can do a better job by giving more specialized service to people. Michel L'Heureux Director of Telecommunications Université de Montréal 2010 Cisco Systems, Inc. All rights reserved. 54
55 Cisco Leadership Advantage The Network Provides Comprehensive Visibility and Control #1 NAC Vendor 41% market share 1 Leading analysts agree customers Info Security s Reader s Choice Gold Award 3 LAN Infrastructure Market Leader Widest range of market-leading switching platforms Widest range of market-leading routing platforms Cisco Innovation Pioneered NAC technology Developed NAC standards First to launch ,000+ ACS Installed Base 95% of Cisco Top % of Cisco Top % of Cisco Top Infonetics, June Gartner Magic Quadrant March 2009, Frost & Sullivan April 2008, Forrester September 2008, IDC Dec 2007, Infonetics June Cisco Systems, Inc. All rights reserved. Cisco Public 55
56 Next Steps Important Resources Resources TrustSec Business Presentations NEW! TrustSec Technical Presentation NEW! TrustSec At-A-Glance NEW! TrustSec Quick Reference Card NEW! TrustSec Alias NEW! Web Sites Partner Central Secure Borderless Networks Launch page Partner Central Borderless Networks Launch page Partner Central Security page Cisco TrustSec external page Cisco Systems, Inc. All rights reserved. 56
57 Next Steps 1. Establish executive sponsor leverage Cisco team to get access to CXO 2. Engage all key decision makers: Network, Data Center, Security teams 3. Create a multi-phase rollout to secure the access layer overlay or infrastructure a) Migrate switch infrastructure to enable 802.1X b) Migrate or upsell centralized access policy control with ACS 5.1 c) Upsell guest and profiler appliances d) Secure Data Center access with Nexus 7000 (SGT and SXP) 2009 Cisco Systems, Inc. All rights reserved. 57
58 2010 Cisco Systems, Inc. All rights reserved. Cisco Public 58
Cisco TrustSec How-To Guide: Phased Deployment Overview
Cisco TrustSec How-To Guide: Phased Deployment Overview For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2
More information2012 Cisco and/or its affiliates. All rights reserved. 1
2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access
More informationSecuring the Empowered Branch with Cisco Network Admission Control. September 2007
Securing the Empowered Branch with Cisco Network Admission Control September 2007 Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. 1 Contents 1 The Cisco Empowered Branch 2 Security Considerations
More informationCisco Borderless Networks Value Proposition
Cisco Borderless Networks Value Proposition Enabling the Borderless Organization 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Why Borderless Networks? Cisco s Architectural Approach
More informationCisco Identity Services Engine (ISE) Mentored Install - Pilot
Cisco Identity Services Engine (ISE) Mentored Install - Pilot Skyline Advanced Technology Services (ATS) offers Professional Services for a variety of Cisco-centric solutions. From inception to realization,
More informationCisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1
Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,
More informationPartner Webinar. AnyConnect 4.0. Rene Straube Cisco Germany. December 2014
Partner Webinar AnyConnect 4.0 Rene Straube Cisco Germany December 2014 Agenda Introduction to AnyConnect 4.0 New Licensing Scheme for AnyConnect 4.0 How to migrate to the new Licensing? Ordering & Migration
More informationCisco TrustSec How-To Guide: Monitor Mode
Cisco TrustSec How-To Guide: Monitor Mode For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationCisco Trusted Security Enabling Switch Security Services
Cisco Trusted Security Enabling Switch Security Services Michal Remper, CCIE #8151 CSE/AM mremper@cisco.com 2009 Cisco Systems, Inc. All rights reserved. 1 Enter Identity & Access Management Strategic
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationPortnox CORE. On-Premise. Technology Introduction AT A GLANCE. Solution Overview
Portnox CORE On-Premise Technology Introduction Portnox CORE provides a complete solution for Network Access Control (NAC) across wired, wireless, and virtual networks for enterprise managed, mobile and
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile
More informationCisco Identity Services Engine
Data Sheet Enterprise networks are more dynamic than ever before, servicing an increasing number of users, devices, and access methods. Along with increased access and device proliferation comes an increased
More informationCisco TrustSec How-To Guide: Central Web Authentication
Cisco TrustSec How-To Guide: Central Web Authentication For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 1
More informationCisco ISE Features Cisco ISE Features
Cisco ISE Overview, on page 2 Key Functions, on page 2 Identity-Based Network Access, on page 3 Support for Multiple Deployment Scenarios, on page 3 Support for UCS Hardware, on page 3 Basic User Authentication
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationIntroducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer
Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?
More informationComponent Assessment
4 CHAPTER Component Assessment This chapter discusses the function of each component and how it helps to address PCI DSS 2.0 compliance requirements. Each component was assessed by Verizon Business. This
More informationAdaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia
Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES
More informationCisco Secure Access Control
Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security
More informationThe Cisco BYOD Smart Solution
1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies
More informationKlaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access
Klaudia Bakšová System Engineer Cisco Systems Cisco Clean Access Agenda 1. Securing Complexity 2. NAC Appliance Product Overview and In-Depth 3. NAC Appliance Technical Benefits The Challenge of Securing
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationIntroduction to 802.1X Operations for Cisco Security Professionals (802.1X)
Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) The goal of the course is to provide students with foundational knowledge in the capabilities and functions of the IEEE 802.1x
More informationCisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller
Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table
More informationWelcome to today s Tele Track,
Welcome to today s Tele Track, Cisco's Express Mobility Solution hosted by: Comstor For the audio portion of this event, please call: 1-877-522-7671 Conference ID# 18803143 Conference Features Questions
More informationBorderless Networks - Enabling the Borderless Organization. Michael Rau Vice President, CTO Worldwide Borderless Networks Sales
Borderless Networks - Enabling the Borderless Organization Michael Rau Vice President, CTO Worldwide Borderless Networks Sales Market Transitions Video By 2014 video will be > 91% of global traffic Mission
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationCertKiller q
CertKiller.500-451.28q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 5.3 500-451 Cisco Unified Access Systems Engineer Exam I just passed today with 89%. My sole focus was the VCE.
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationVendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo
Vendor: Cisco Exam Code: 646-206 Exam Name: Cisco Sales Expert Version: Demo QUESTION 1 What are three current business factors that are influencing customer decisions in making technology investments?
More informationRED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE.
RED HAT ENTERPRISE LINUX. STANDARDIZE & SAVE. Is putting Contact us INTRODUCTION You know the headaches of managing an infrastructure that is stretched to its limit. Too little staff. Too many users. Not
More informationCisco Exam Questions & Answers
Cisco 648-385 Exam Questions & Answers Number: 648-385 Passing Score: 800 Time Limit: 120 min File Version: 34.4 http://www.gratisexam.com/ Cisco 648-385 Exam Questions & Answers Exam Name: CXFF - Cisco
More informationIndustrial Defender ASM. for Automation Systems Management
Industrial Defender ASM for Automation Systems Management INDUSTRIAL DEFENDER ASM FOR AUTOMATION SYSTEMS MANAGEMENT Industrial Defender ASM is a management platform designed to address the overlapping
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationRSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief
RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security
More informationISE Primer.
ISE Primer www.ine.com Course Overview Designed to give CCIE Security candidates an intro to ISE and some of it s features. Not intended to be a complete ISE course. Some topics are not discussed. Provides
More informationSecure Mobility. Klaus Lenssen Senior Business Development Manager Security
Secure Mobility Klaus Lenssen Senior Business Development Manager Security KL Secure Mobility 2008 Cisco Systems, Inc. All rights reserved. Cisco public 1 Complete Your Online Session Evaluation Please
More informationDesktop Virtualization for Higher Education. The Virtual Lab
Desktop Virtualization for Higher Education The Virtual Lab What is the Virtual Lab? WHAT IS THE VIRTUAL LAB? Transformational technology for Higher Ed labs collaboration between Dell & VMware Virtualize
More informationSymbols. Numerics I N D E X
I N D E X Symbols /var/log/ha-debug log, 517 /var/log/ha-log log, 517 Numerics A 3500XL Edge Layer 2 switch, configuring AD SSO, 354 355 access to resources, troubleshooting issues, 520 access VLANs, 54
More informationExam Questions Demo Cisco. Exam Questions
Cisco Exam Questions 300-208 SISAS Implementing Cisco Secure Access Solutions (SISAS) Version:Demo 1. Which functionality does the Cisco ISE self-provisioning flow provide? A. It provides support for native
More informationReviewer s guide. PureMessage for Windows/Exchange Product tour
Reviewer s guide PureMessage for Windows/Exchange Product tour reviewer s guide: sophos nac advanced 2 welcome WELCOME Welcome to the reviewer s guide for NAC Advanced. The guide provides a review of the
More informationCisco Data Center Network Manager 5.1
Cisco Data Center Network Manager 5.1 Product Overview Modern data centers are becoming increasingly large and complex. New technology architectures such as cloud computing and virtualization are adding
More informationSecuring BYOD With Network Access Control, a Case Study
Research G00226207 29 August 2012 Securing BYOD With Network Access Control, a Case Study Lawrence Orans This Case Study highlights how an organization utilized NAC and mobile device management solutions
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationServices for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam
Services for Smart Solutions: Delivering Innovations & Efficiency Surendran Vangadasalam Practice Leader : Borderless Network Architecture APJC Services Agenda Priorities & Smart Solutions Innovation and
More informationWhite Paper. RingCentral. Professional Services Implementation & Onboarding Methodology
White Paper RingCentral Professional Services Implementation & Onboarding Methodology RingCentral Professional Services Implementation & Onboarding Methodology Any technology transition can be challenging;
More informationIBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]
s@lm@n IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] Question No : 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product?
More information802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
White Paper 802.1X: Port-Based Authentication Standard for Network Access Control (NAC) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net
More informationEnterprise & Cloud Security
Enterprise & Cloud Security Greg Brown VP and CTO: Cloud and Internet of Things McAfee An Intel Company August 20, 2013 You Do NOT Want to Own the Data Intel: 15B 2015 Cisco: 50B 2020 2 August 21, 2013
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationCase study: UniCredit Tiriac Bank deploys Cisco Network Admission Control
Case study: UniCredit Tiriac Bank deploys Cisco Network Admission Control Bogdan Zamfir, CISM Head of IT Function, ICT Security, UniCredit Tiriac Bank Victor Alazaroae Presales Consultant, Datanet Systems
More informationCisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services
Service Overview Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services Cisco Service Provider (SP) Wi-Fi is a single, unified architecture for all types of Wi-Fi services and business
More informationMonitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series
Monitor Mode Deployment with Cisco Identity Services Engine Secure Access How -To Guides Series Author: Adrianne Wang Date: December 2012 Table of Contents Monitor Mode... 3 Overview of Monitor Mode...
More informationCisco Self Defending Network
Cisco Self Defending Network Integrated Network Security George Chopin Security Business Development Manager, CISSP 2003, Cisco Systems, Inc. All rights reserved. 1 The Network as a Strategic Asset Corporate
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationCASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER THE CHALLENGE
CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY TenFour is a Premier Service Provider for Red Forge Continuous Infrastructure Service (CIS ). This case study
More informationONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013
ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationNetworks with Cisco NAC Appliance primarily benefit from:
Cisco NAC Appliance Cisco NAC Appliance (formerly Cisco Clean Access) is an easily deployed Network Admission Control (NAC) product that allows network administrators to authenticate, authorize, evaluate,
More informationExam Code: Exam Code: Exam Name: Advanced Borderless Network Architecture Systems Engineer test.
Exam Code: 700-303 Number: 700-303 Passing Score: 800 Time Limit: 120 min File Version: 41.2 http://www.gratisexam.com/ Exam Code: 700-303 Exam Name: Advanced Borderless Network Architecture Systems Engineer
More informationCISCO EXAM QUESTIONS & ANSWERS
CISCO 700-505 EXAM QUESTIONS & ANSWERS Number: 700-505 Passing Score: 800 Time Limit: 120 min File Version: 18.5 http://www.gratisexam.com/ CISCO 700-505 EXAM QUESTIONS & ANSWERS Exam Name: SMB Specialization
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationCenturyLink for Microsoft
Strategic Partner Alliances CenturyLink for Microsoft EMPOWER REACH AGILITY 2017 CenturyLink. All Rights Reserved. The CenturyLink mark, pathways logo and certain CenturyLink product names are the property
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationBUILD BETTER MICROSOFT SQL SERVER SOLUTIONS Sales Conversation Card
OVERVIEW SALES OPPORTUNITY Lenovo Database Solutions for Microsoft SQL Server bring together the right mix of hardware infrastructure, software, and services to optimize a wide range of data warehouse
More informationSSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing
SSL VPNs or IPsec VPNs The Challenges of Remote Access February 2 nd, 2007 Chris Witeck- Director of Product Marketing Agenda Remote access challenges Drivers for remote access New challenges for IT Remote
More informationNetwork Segmentation Through Policy Abstraction: How TrustSec Simplifies Segmentation and Improves Security Sept 2014
In most organizations networks grow all the time. New stacks of security appliances, new applications hosted on new clusters of servers, new network connections, new subnets, new endpoint platforms and
More informationTHE CUSTOMER SITUATION. The Customer Background
CASE STUDY GLOBAL CONSUMER GOODS MANUFACTURER ACHIEVES SIGNIFICANT SAVINGS AND FLEXIBILITY THE CUSTOMER SITUATION Alliant Technologies is a Premier Service Provider for Red Forge Continuous Infrastructure
More informationSecuring BYOD with Cisco TrustSec Security Group Firewalling
White Paper Securing BYOD with Cisco TrustSec Security Group Firewalling Getting Started with TrustSec What You Will Learn The bring-your-own-device (BYOD) trend can spur greater enterprise productivity
More informationSecurity Models for Cloud
Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More informationVisual TruView Unified Network and Application Performance Management Focused on the Experience of the End User
Visual TruView Unified Network and Application Performance Management Focused on the Experience of the End User BUSINESS CHALLENGE Problems can occur anywhere from the physical layer to wireless, across
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : 300-208 Title : Implementing Cisco Secure Access Solutions Vendor : Cisco Version : DEMO Get Latest & Valid 300-208
More informationDevice Discovery for Vulnerability Assessment: Automating the Handoff
Device Discovery for Vulnerability Assessment: Automating the Handoff O V E R V I E W While vulnerability assessment tools are widely believed to be very mature and approaching commodity status, they are
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationMODERNIZE INFRASTRUCTURE
SOLUTION OVERVIEW MODERNIZE INFRASTRUCTURE Support Digital Evolution in the Multi-Cloud Era Agility and Innovation Are Top of Mind for IT As digital transformation gains momentum, it s making every business
More informationRSA Authentication Manager 8.2
RSA Authentication Manager 8.2 Over 25,000 customers 50 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with
More informationUSP Network Authentication System & MobileIron. Good for mobile security solutions
USP Network Authentication System & MobileIron Good for mobile security solutions Content About United Security Providers Today s network security challenges USP Network Authentication System Access control
More informationVendor: Cisco. Exam Code: Exam Name: Implementing Cisco Secure Access Solutions. Version: Demo
Vendor: Cisco Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access Solutions Version: Demo QUESTION 1 By default, how many days does Cisco ISE wait before it purges the expired guest accounts?
More informationThe Device Has Left the Building
The Device Has Left the Building Mobile Security Made Easy With Managed PKI Christian Brindley Principal Systems Engineer, Symantec Identity and Information Protection Agenda 1 2 3 Mobile Trends and Use
More informationCisco Unified Data Center Strategy
Cisco Unified Data Center Strategy How can IT enable new business? Holger Müller Technical Solutions Architect, Cisco September 2014 My business is rapidly changing and I need the IT and new technologies
More informationNumber: Passing Score: 825 Time Limit: 120 min File Version: Vendor: Cisco. Exam Code:
700-104 Number: 000-000 Passing Score: 825 Time Limit: 120 min File Version: 130705 http://www.gratisexam.com/ Vendor: Cisco Exam Code: 700-104 Exam Name: Business Edition 6000 for Account Managers (BE6KAM)
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationSmart Net Total Care SNTC Deployment, Demo and Features. Hernani Crespi Technical Engagement Manager Oct 2014
Smart Net Total Care SNTC Deployment, Demo and Features Hernani Crespi Technical Engagement Manager Oct 2014 Customer Challenges Smart Net Total Care Service Smart Net Total Care Overview How It Works
More informationThe Road to a Secure, Compliant Cloud
The Road to a Secure, Compliant Cloud The Road to a Secure, Compliant Cloud Build a trusted infrastructure with a solution stack from Intel, IBM Cloud SoftLayer,* VMware,* and HyTrust Technology innovation
More informationEUP2-372 Money Back Guarantee Promotion. EUP2-373 Smartnet 3for2 Services. EUP for2 Services on Fast Track and IP-Phones
EUP2-333 CHALLENGE AND REWARD AT PROMOTION This initiative, leveraging the recruitment power of the distributor to recruit potential resellers ready to develop a commercial AT Practice. Attractive discounts
More informationFor Sales Kathy Hall
IT4E Schedule 13939 Gold Circle Omaha NE 68144 402-431-5432 Course Number Course Name Course Description For Sales Chris Reynolds 402-963-4465 creynolds@it4e.com www.it4e.com SISE v1.1 SKY For Sales Kathy
More informationSECURING THE NEXT GENERATION DATA CENTER. Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011
SECURING THE NEXT GENERATION DATA CENTER Leslie K. Lambert Juniper Networks VP & Chief Information Security Officer July 18, 2011 JUNIPER SECURITY LEADERSHIP Market Leadership Data Center with High-End
More informationImprove productivity with modernized PCs and Windows 10. Christopher Choong, DTM Field Marketing Manager
Improve productivity with modernized PCs and Windows 10 Christopher Choong, DTM Field Marketing Manager Impressive innovation. Inside and out. 3 4 It s an important time to refresh Design Every product
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationAccelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing
Accelerate your Azure Hybrid Cloud Business with HPE Ken Won, HPE Director, Cloud Product Marketing Mega trend: Customers are increasingly buying cloud services from external service providers Speed of
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationREALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware
REALIZE YOUR DIGITAL VISION with Digital Private Cloud from Atos and VMware Today s critical business challenges and their IT impact Business challenges Maximizing agility to accelerate time to market
More information