Using Cisco pxgrid for Security Platform Integration
|
|
- Trevor Parks
- 6 years ago
- Views:
Transcription
1
2 Using Cisco pxgrid for Security Platform Integration Brian Gonsalves Sr. Product Manager Nancy Cam-Winget Distinguished Engineer DEVNET-1010
3 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space Cisco Spark spaces will be available until July 3, cs.co/ciscolivebot#devnet Cisco and/or its affiliates. All rights reserved. Cisco Public
4 Agenda Cisco pxgrid in Summary pxgrid Use-Cases How to Develop Using pxgrid Getting Started pxgrid SECURITY THRU INTEGRATION
5 Context is the Currency of the Solution Integration Realm but it s not easy to execute I have reputation info! I need threat data I have sec events! I need reputation SIO I have application info! I need location & auth-group I have NBAR info! I need identity I have NetFlow! I need entitlement I have threat data! I need reputation I have firewall logs! I need identity We Need But to Integration Share Burden Context is on & IT Take Departments Network Actions I have location! I need identity I have MDM info! I need location I have app inventory info! I need posture I have identity & device-type! I need app inventory & vulnerability DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 5
6 Context is the Currency of the Solution Integration Realm but it s not easy to execute but pxgrid accomplishes this I have reputation info! I need threat data I have sec events! I need reputation SIO I have application info! I need location & auth-group I have NBAR info! I need identity I have NetFlow! I need entitlement I have threat data! I need reputation I have firewall logs! I need identity pxgrid Context Sharing Event Response I have location! I need identity I have MDM info! I need location I have app inventory info! I need posture I have identity & device-type! I need app inventory & vulnerability DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 6
7 Cisco pxgrid Context-Sharing & Network Mitigation Connecting Partners & Cisco Security Platforms, Connecting Partners-to-Partners 1 ISE Makes Customer IT Platforms User/Identity, Device and Network Aware 2 Make ISE a Better Network Policy Platform for Customers 3 Help Customer IT Environments Reach into the Cisco Network ISE ECO-PARTNER ISE ECO-PARTNER ECO-PARTNER ISE CONTEXT CONTEXT ACTION ISE Shares User/Device & Network Context with IT Infrastructure Puts Who, What Device, What Access with Events. Way Better than Just IP Addresses! ISE Receives Context from Eco-Partners to Make Better Network Access Policy BENEFITS Creates a Single Place for Comprehensive Network Access Policy thru Integration MITIGATE CISCO NETWORK Decreases Time, Effort and Cost to Responding to Security and Network Events DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 7
8 USE CASE: Contextual Awareness for Security/Network Event Prioritization, Response and Policy Is it still on the network? Is Where? this event important? I need more info Is this a server? Smartphone? Did this come over VPN? What s their access level? What s their posture? Who is this? What else is on the network? NETWORK ALERT! SRC/ DST/ : HTTP DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 8
9 Application Access Controls Today Operating with Less than Half the Picture Sensitive Asset ACCESS CRITERIA: Who: User, Group Other Asset Sensitive Asset 87% of data breaches involve poor access rules we need to do this better. Verizon Data Breach Report DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 9
10 Application Access Controls Today Operating with Less than Half the Picture Vary this gent s application access privilege based on device enrollment, network-location and access method Financial Reports ACCESS POLICY Critical Data WHO = Exec Group Only WHAT = No Non-Registered Mobile WHERE = US Only WHEN = US Business Hours Only HOW = No VPN Access Data from Cisco ISE Café Menus HR Database Access Criteria Non-Sensitive Sensitive Critical Data DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 10
11 pxgrid Industry Adoption Critical Mass 50 Partner Product Integrations and 12 Technology Areas in 2 Years Since Production Release Net/App Performance UEBA Firewall & Policy Management SIEM & Analytics Cisco ISE IAM & SSO Endpoint & Custom Detection? pxgrid Application Protection Vulnerability Management Forensics and IR Rapid Threat Containment (RTC) CASB EMM/MDM Deception Application Protection: Arxan SIEM and Analytics: HanSight, Hawk*, Huntsman*, LogRhythm*, Micro Focus NetIQ*, Splunk*, TripWire* CASB: Elastica*, NetSkope, Skyhigh Deception: Attivo, illusive*, TrapX* Endpoint and Custom Detection: Invincea*, Redshift*, ThreatTrack Firewall and Policy Management: Bayshore*, Check Point, InfoBlox*, Intelliment, Cisco FMC* Forensics and IR: Cisco Cognitive Threat Analytics*, Lumeta, Endace, Cisco Stealthwatch*, Lemonfish*, TripWire* IAM/SSO: Ping Identity, Secureauth*, Situational Other: Cisco WSA, Ark NSS****, Cisco ISE PIC Threat Intelligence: Infocyte* UEBA: E8*, Exabeam*, Fortscale*, Niara, Greenlight**** Vulnerability Management: Rapid 7*, SAINT*, Tenable*, Tripwire* Solutions * Rapid Threat Containment, ** Regulatory and Compliance Solution ***IoT, ****Regulatory and Compliance DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 11
12 How pxgrid Works: Partners Connecting to Cisco Security Platforms and to Other Partners Publisher: Authenticate Authorize Publish Subscriber: Authenticate Authorize Discover Subscribe Query Cisco ISE as pxgrid Controller CISCO ISE I have location! I need app & identity Publish Continuous Publish Flow Directed pxgrid Query Discover Continuous TopicDiscover Context Flow Topic Directed Sharing Query I have application info! I need location & device-type I have sec events! I need identity & device I have identity & device! I need geo-location & MDM I have MDM info! I need location DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 12
13 How pxgrid Works: Partners Connecting to Cisco Security Platforms and to Other Partners Publisher: Authenticate Authorize Publish Subscriber: Authenticate Authorize Discover Subscribe Query I have location! I need app & identity ISE as pxgrid Controller CISCO ISE Traditional APIs have many limitations - pxgrid addresses these issues: Single-purpose function = need for many APIs/dev (and lots of testing) I have sec events! I need identity & device Publish Continuous Publish Flow Directed pxgrid Query Discover Continuous TopicDiscover Context Flow Topic Directed Sharing Query I have application info! I need location & device-type Not configurable = too much/little info for interface systems (scale issues) Pre-defined data exchange = wait until next release if you need a change I have identity & device! I need geo-location & MDM Polling architecture = can t scale beyond 1 or 2 system integrations Security can be loose I have MDM info! I need location DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 13
14 pxgrid: Adaptive Network Control Makes Cisco Infrastructure a Unified Event Response Network Adaptive Network Control provides the ability to: Quarantine user devices from 3 rd party products, such as SIEM systems Enlist other Cisco infrastructure in the network response such as dynamic ACLs on switches and ASA or increase IPS inspection levels User/Device Quarantine 1-touch network mitigation action from 3 rd party partner console ISE as unified policy point pxgrid ANC API Dynamic ACLs, Increase Inspection DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 14
15 Cisco pxgrid Framework in Summary Bi-directional data-exchange and network services integration framework Any-to-any partner platform integration designed for multiple platforms to share data and call network service functions simultaneously Take only the data you need, share only what you want make changes without software/api revisions Integrate once, re-use with any pxgrid-enabled partner Integrated authentication, privilege authorization, and data encryption Open to entire Cisco Developer community DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 15
16 How to Develop Using pxgrid
17 pxgrid Architecture & Components pxgrid Controller pxgrid Controller Responsible for Control Plane: Establishing the grid instance Authenticating clients on to the grid Authorizing what clients can do on the grid Maintaining directory of context information topics available on the grid pxgrid Client pxgrid Client pxgrid Clients (Eco-Partner Platforms) Responsible for: Utilizing pxgrid Client Libraries (in SDK) to communicate with the pxgrid Controller If sharing contextual information, publishing it to a topic If consuming contextual information, subscribing to appropriate topic Filtering topics to exclude unwanted information Ad-hoc query to topics DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 17
18 Example: Evolution from REST to pxgrid Cisco ISE User/Device Context-Sharing Example Session Context sharing from ISE MnT Issues Periodic polling using REST API pxgrid Solution Publish & Subscribe notification push DB queries causing high I/O usage No DB query with published events caching Bulk download takes more than 3 hours for 200,000 endpoints using REST API Receiving all attributes per session Use of syslog as interim approach - All events are processed No visibility and mechanism to authorize, control who is accessing MnT Other issues: requires opening up firewall ports for reverse web services calls no support for federation Lacks scale with endpoints increase pxgrid provides XML streaming of sessions with pagination Provides semantic filtering capability (ex: location) to download only a subset To only send interested attributes through syntactic filtering Pubsub notification - only relevant events will be sent pxgrid provides single point of authentication and authorization, allowing only authorized systems to access the MnT pxgrid provides visibility into topics, publishers, subscribers XMPP protocol supports bi-directionality with tunneling XMPP supports federation pxgrid scaling and HA is achieved by leveraging XMPP server architecture DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 18
19 Cisco pxgrid SDK Components & Function Component Function Grid Client Library (GCL) in C and Java Software libraries for embedding in partner system Connects partner system to the pxgrid Sample pxgrid Data Output Sample data from Cisco ISE across a pxgrid connection to test with Sample Data Generator pxgrid Controller Virtual Machine for Testing Hosted Testing Sandbox pxgrid Documentation: Tutorials, Development Guides, testing guides, Generates live session data across a pxgrid connection Uses Cisco ISE user/device session data ISO of bundled Cisco ISE and pxgrid Controller for local testing in your lab Enables developer to connect to an already setup test environment Complete documentation to guide the developer from concept to implementation to verification testing DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 19
20 A Closer Look at the pxgrid Connection Library Connection to pxgrid Server Multiple pxgrid servers Round-robin auto retries Reports connection status Client certificate based authentication A root cert is installed in pxgrid server pxgrid server verifies client certs are signed by the root cert Added Pre-Shared Key (PSK) authentication in ISE 2.1 Capability subscription and publishing Capability is a set of queries and notifications supported pxgrid provides discovery of Capability Notifications are sent to XMPP pub/sub Queries are directly sent to Capability provider DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 20
21 How to Get Only the Context You Need pxgrid Message Filtering Allows subscriber to filter/restrict messages based on filter criteria specified by the Publisher Two kinds of filters: Content Based Filters Restrict messages based on the content of the message e.g. an ASA device interested in receiving session information from ISE only for end points belonging to a subnet Schema Based Filter Allows clients to receive only a subset of attributes instead of the full message object Not supported in this phase DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 21
22 Topic Extensibility with Dynamic Topics PxGrid Topic Extensibility feature allows a pxgrid client to programmatically setup a topic for sharing information and providing actions as part of the service. This allows a partner system to become of producer of context. Setting up the topic In order for the grid clients to participate in a service, the topic needs to be setup with appropriate operations and authorizations. Any pxgrid client can send a request to the pxgrid controller to setup a topic by giving the metadata that describes the service. The Administrator (ISE) will approve / deny the request As the Administrator takes an action (approves / denies), a topic status change notification will be sent to the grid clients with appropriate status. DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 22
23 Topic Extensibility with Dynamic Topics Once the topic is approved, three authorization groups will be available for the Administrator to assign the privileges for the clients whether they will be allowed for publish, subscribe / query and send action requests. dynamictopic_publish Gives permission for publishing messages dynamictopic_subscribe Gives permission to subscribe to the events and send query requests dynamictopic_action Gives permission to send action requests Once the topic is created and Administrator assigns the subscriber group to a client, it can send query requests and subscribe to the topic. DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 23
24 How to Install and Test Using the pxgrid SDK 1. Install pxgrid Controller: Install Cisco ISE 2.x ISO on a VM. 2. Setup pxgrid Controller/Client Key-stores and Trust-stores: Import samples certificates from SDK. These certificates will be used by the pxgrid client for mutual authentication to the pxgrid controller 3. Enable pxgrid Controller: Enable pxgrid persona in Cisco ISE 4. Setup pxgrid Test Client: Download SDK onto pxgrid client. This can be installing client libraries in your platform or hosting on an external test client (Linux box, e.g. CentOS) 5. Authenticate pxgrid Client: Import the ISE identity sample cert into your platform or the Linux client, and add to key store 6. Test with SDK Scripts: Run pxgrid sample scripts included in the SDK DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 24
25 pxgrid Sample Scripts Currently Available in the SDK Sample pxgrid scripts provide development partners with executable example code for how to use the API These scripts can also be useful in demos with customers Most commonly used pxgrid API scripts on Cisco ISE: Register: registers pxgrid client to the pxgrid controller to an authorized session or ANC/EPS group. Session Subscribe: pxgrid client subscribes to capability Identity Group download: Downloads user identity information such as the user and profiled group information from active sessions in ISE Session Query by IP: retrieves all active session from ISE based on IP address Session Download: downloads all active sessions from ISE ANC/EPS Quarantine: executes the Adaptive Network Control (ANC) quarantine action on ISE for a given IP address ANC/EPS Unquarantine: executes the ANC/EPS unquarantine action on ISE for a given IP address Capability: queries the registered pxgrid client name for available topic provided by the publisher (ISE in this case) DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 26
26 Getting Started
27 pxgrid on Cisco DevNet Access to Documentation, tutorials, SDKs Developer focused Video series DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 28
28 pxgrid Sandbox Available on Cisco DevNet DevNet Sandbox pxgrid environment allows users to integrate with pxgrid services on Cisco ISE DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 29
29 Complete Your Online Session Evaluation Give us your feedback to be entered into a Daily Survey Drawing. A daily winner will receive a $750 gift card. Complete your session surveys through the Cisco Live mobile app or on Don t forget: Cisco Live sessions will be available for viewing on demand after the event at Cisco and/or its affiliates. All rights reserved. Cisco Public
30 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Lunch & Learn Meet the Engineer 1:1 meetings Related sessions DEVNET Cisco and/or its affiliates. All rights reserved. Cisco Public 31
31 Q & A
32 Thank you
33
Using Cisco pxgrid for Security Platform Integration
Using Cisco pxgrid for Security Platform Integration Brian Gonsalves Sr. Product Manager Syam Appala Principal Engineer DEVNET-1010 Agenda Cisco pxgrid in Summary pxgrid Use-Cases How to Develop Using
More informationUsing Cisco pxgrid for Security Platform Integration
Using Cisco pxgrid for Security Platform Integration Brian Gonsalves, Sr. Product Manager Syam Appala, Principal Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after
More informationUsing Cisco pxgrid for Security Platform Integration
Using Cisco pxgrid for Security Platform Integration Brian Gonsalves Product Manager Nancy Cam-Winget Distinguished Engineer DEVNET-1010 Agenda Cisco pxgrid in Summary pxgrid Use-Cases How to Develop Using
More informationCisco pxgrid: A New Architecture for Security Platform Integration
Cisco pxgrid: A New Architecture for Security Platform Integration Brian Gonsalves Product Manager #clmel Agenda Cisco pxgrid in Summary pxgrid Use-Cases How to Develop Using pxgrid Getting Started Cisco
More informationSecurity? where to? Adrian Aron. Consultant Systems Engineer. 19 Oct
Security? where to? Adrian Aron Consultant Systems Engineer 19 Oct Agenda Industry shift and trends Router security, switch security OpenDNS Integration and automation Q&A Road from task to implementation
More informationStop Threats Before They Stop You
Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts
More informationDevNet Workshop-Learning Cisco platform Exchange Grid (pxgrid) Dynamic Topics
DevNet Workshop-Learning Cisco platform Exchange Grid (pxgrid) Dynamic Topics Syam Appala, Principal Engineer DEVNET-2433 Agenda Introduction to pxgrid pxgrid Operation Lab on Dynamic Topics Contextual
More informationCisco Firepower NGIPS Tuning and Best Practices
Cisco Firepower NGIPS Tuning and Best Practices John Wise, Security Instructor High Touch Delivery, Cisco Learning Services CTHCRT-2000 Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationHow to Control Who Gets Onto Your Network A Large Systemic Bank s Security Case Study
How to Control Who Gets Onto Your Network A Large Systemic Bank s Security Case Study Nikos Mourtzinos, CCIE #9763 Cyber Security Sales Specialist, Cisco nmourtzi@cisco.com Algosystems, 4/2018 Christos
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationPSOACI Tetration Overview. Mike Herbert
Tetration Overview Mike Herbert Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationThreat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ
Threat Containment and Operations Yong Kwang Kek, Director of Presales SE, APJ 2018-07-19 1 1 2017 Infoblox Inc. All Rights 2013 Infoblox Inc. All Reserved. Rights Reserved. Three Aspects of Security #1
More informationInfoblox as Part of the Ecosystem
Infoblox Core Exchange Infoblox Core Exchange is a highly-interconnected set of ecosystem integrations that extend security, increase agility, and provide situational awareness for more efficient operations,
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationAutomation with Meraki Provisioning API
DEVNET-2120 Automation with Meraki Provisioning API Courtney M. Batiste, Solutions Architect- Cisco Meraki Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationNXOS in the Real World Using NX-API REST
NXOS in the Real World Using NX-API REST Adrian Iliesiu Corporate Development Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationSourcefire Network Security Analytics: Finding the Needle in the Haystack
Sourcefire Network Security Analytics: Finding the Needle in the Haystack Mark Pretty Consulting Systems Engineer #clmel Agenda Introduction The Sourcefire Solution Real-time Analytics On-Demand Analytics
More informationHands-On with IoT Standards & Protocols
DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationDNA Automation Services Offerings
DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationGet Hands On With DNA Center APIs for Managing Intent
DEVNET-3620 Get Hands On With DNA Center APIs for Managing Intent Adam Radford Distinguished Systems Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationCisco Secure Access Control
Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security
More informationInternet of Things Field Network Director
Internet of Things Field Network Director Prithvi Manduva, IoT Escalation Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationSACM Information Model Based on TNC Standards. Lisa Lorenzin & Steve Venema
SACM Information Model Based on TNC Standards Lisa Lorenzin & Steve Venema Agenda Security Automation with TNC IF-MAP SACM Information Model Based on TNC Standards Graph Model Components Operations SACM
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationIntegrate the Cisco Identity Services Engine
This chapter contains the following sections: Overview of the Identity Services Engine Service, on page 1 Identity Services Engine Certificates, on page 2 Tasks for Certifying and Integrating the ISE Service,
More informationIntelligent Edge Protection
Intelligent Edge Protection Sicherheit im Zeitalter von IoT und Mobility September 26, 2017 Flexible consumption Beacons, sensors and geo-positioning Driven by agile DevOps Mobile users, apps and devices
More informationCisco Next Generation Firewall Services
Toronto,. CA May 30 th, 2013 Cisco Next Generation Firewall Services Eric Kostlan Cisco Technical Marketing 2011 2012 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Objectives At the
More informationHow-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology
How-To Threat Centric NAC Cisco AMP for Endpoints in Cloud and Cisco Identity Service Engine (ISE) Integration using STIX Technology Author: John Eppich Table of Contents About this Document... 3 Introduction
More informationA New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization
A New Security Model for the IoE World Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization Internet of Everything The Internet of Everything brings together people, process, data and
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationMcAfee epolicy Orchestrator
McAfee epolicy Orchestrator Centrally get, visualize, share, and act on security insights Security management requires cumbersome juggling between tools and data. This puts the adversary at an advantage
More informationHow to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption
How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New
More informationCisco Cyber Range. Paul Qiu Senior Solutions Architect
Cisco Cyber Range Paul Qiu Senior Solutions Architect Cyber Range Service A platform to experience the intelligent Cyber Security for the real world What I hear, I forget What I see, I remember What I
More informationChallenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9
HAWK Overview Agenda Contents Slide Challenges 3 HAWK Introduction 4 Key Benefits 6 About Gavin Technologies 7 Our Security Practice 8 Security Services Approach 9 Why Gavin Technologies 10 Key Clients
More informationAn Introduction to Developing for Cisco Kinetic
An Introduction to Developing for Cisco Kinetic Krishna Chengavalli Technical Marketing Engineer IoT Software Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationSECURE NETWORK ACCESS
SECURE NETWORK ACCESS The Security Problem Changing Business Models Dynamic Threat Landscape Complexity & Fragmentation 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confiden5al 3 Mobility
More informationInsights into your WLC with Wireless Streaming Telemetry
Insights into your WLC with Wireless Streaming Telemetry Jeremy Cohoe Technical Marketing Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The
More informationHow to securely connect user endpoints to network access wireless or wired. Gyorgy Acs Consulting Systems Engineer Cisco
How to securely connect user endpoints to network access wireless or wired Gyorgy Acs Consulting Systems Engineer Cisco Agenda Introduction Using ISE in a Security Ecosystem Anomaly, Vulnerability and
More informationKey Security Measures to Enable Next-Generation Data Center Transformation
Key Security Measures to Enable Next-Generation Data Center Transformation Bill McGee Senior Manager, Security Solutions Cisco Systems, Inc. Agenda Data Center Security Challenges Secure DC Strategies
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationRouting Underlay and NFV Automation with DNA Center
BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationMigrating Applications with CloudCenter
Migrating Applications with CloudCenter Tuan Nguyen, Technical Marketing Engineer, Insieme BU DEVNET-1179 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after the session 1. Find this
More informationFinesse APIs: Getting started with the REST APIs and XMPP events
Finesse APIs: Getting started with the REST APIs and XMPP events Denise Kwan, Software Engineer @ DevNet Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationMagical Chatbots with Cisco Spark and IBM Watson
DEVNET-2321 Magical Chatbots with Cisco Spark and IBM Watson Lauren Ramgattie, Technical Marketing Engineer Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationAby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationEnterprise Recording and Live Streaming Architecture with VBrick
Enterprise Recording and Live Streaming Architecture with VBrick Terry French Technical Manager - International - VBrick Systems Inc BRKCOL-2111 Agenda Enterprise Video Overview VBrick Core Components
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More informationSDN Security BRKSEC Alok Mittal Security Business Group, Cisco
SDN Security Alok Mittal Security Business Group, Cisco Security at the Speed of the Network Automating and Accelerating Security Through SDN Countering threats is complex and difficult. Software Defined
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationIntegrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries
Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries First united and open ecosystem to support enterprise-wide visibility and rapid response The cybersecurity industry needs a more efficient
More informationCloudCenter for Developers
DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationBRKCOC-2399 Inside Cisco IT: Integrating Spark with existing large deployments
Inside Cisco IT: Integrating Spark with existing large deployments Jan Seynaeve, Sr. Collaborations Engineer Luke Clifford, Sr. Collaborations Engineer Cisco Spark How Questions? Use Cisco Spark to communicate
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationAPIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks
APIC-EM / EasyQoS - End to End Orchestration of QoS in Enterprise Networks Saurav Prasad Technical Marketing Engineer CTHNMS-1002 Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after
More informationUnderstanding Perimeter Security
Understanding Perimeter Security In Amazon Web Services Aaron C. Newman Founder, CloudCheckr Aaron.Newman@CloudCheckr.com Changing Your Perspective How do I securing my business applications in AWS? Moving
More informationCisco ISE pxgrid App 1.0 for IBM QRadar SIEM. Author: John Eppich
Cisco ISE pxgrid App 1.0 for IBM QRadar SIEM Author: John Eppich Table of Contents About This Document... 4 Solution Overview... 5 Technical Details... 6 Cisco ISE pxgrid Installation... 7 Generating the
More informationDesigning and Building a Cybersecurity Program
Designing and Building a Cybersecurity Program Based on the NIST Cybersecurity Framework (CSF) Larry Wilson lwilson@umassp.edu ISACA Breakfast Meeting January, 2016 Designing & Building a Cybersecurity
More informationZero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers
Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere How Okta enables a Zero Trust solution for our customers Okta Inc. 301 Brannan Street, Suite 300 San Francisco, CA 94107 info@okta.com
More information2012 Cisco and/or its affiliates. All rights reserved. 1
2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationN. Cam-Winget, Ed. Intended status: Standards Track. October 8, 2015
MILE Internet-Draft Intended status: Standards Track Expires: April 10, 2016 N. Cam-Winget, Ed. S. Appala S. Pope Cisco Systems October 8, 2015 XMPP Protocol Extensions for Use with IODEF draft-appala-mile-xmpp-grid-00
More informationCisco Spark Widgets Technical drill down
DEVNET-1891 Cisco Spark Widgets Technical drill down Adam Weeks, Engineer @CiscoSparkDev Stève Sfartz, API Evangelist @CiscoDevNet Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationVeč kot SDN - SDA arhitektura v uporabniških omrežjih
Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements
More informationCompliance Audit Readiness. Bob Kral Tenable Network Security
Compliance Audit Readiness Bob Kral Tenable Network Security Agenda State of the Market Drifting Out of Compliance Continuous Compliance Top 5 Hardest To Sustain PCI DSS Requirements Procedural support
More informationPresenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe
Presenting the ware NSX ECO System May 2015 Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe Agenda 10:15-11:00 ware NSX, the Network Virtualization Platform 11.15-12.00 Palo Alto
More informationCisco Cyber Threat Defense Solution 1.0
Cisco Cyber Threat Defense Solution 1.0 Contents 1. Introduction to the Cisco Cyber Threat Defense Solution 1.0 2. Technical overview of the Cisco Cyber Threat Defense Solution 1.0 3. Using the Cisco Cyber
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationCloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN
BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark
More informationUser Identity Sources
The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, page 1 The User
More informationBenefits of SDN Modeling and Analytics tool for complex Service Provider Network
Benefits of SDN Modeling and Analytics tool for complex Service Provider Network George Backer, Senior Director, Charter Communications Manish Jani, Senior Architect, Cisco Systems BRKNMS-1010 BRKNMS-1010
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationThe SANS Institute Top 20 Critical Security Controls. Compliance Guide
The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise
More informationHackproof Your Cloud Responding to 2016 Threats
Hackproof Your Cloud Responding to 2016 Threats Aaron Klein, CloudCheckr Tuesday, June 30 th 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Changing Your Perspective Moving
More informationBuilding Applications with IOx
Building Applications with IOx DevNet 1031 Albert Mak, Senior Technical Lead, IOx, Enterprise Engineering DEVNET-1031 Agenda Applications in Fog/Edge Computing Introducing IOx IOx Application Enablement
More informationIntuit Application Centric ACI Deployment Case Study
Intuit Application Centric ACI Deployment Case Study Joon Cho, Principal Network Engineer, Intuit Lawrence Zhu, Solutions Architect, Cisco Agenda Introduction Architecture / Principle Design Rollout Key
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationCLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS
Open third party integration for endpoint controls, policy and threat prevention While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it s a major challenge to ensure
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationCloud-Managed Security for Distributed Networks with Cisco Meraki MX
Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationTransforming Security Part 2: From the Device to the Data Center
SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco ACI App Center Fabrice Servais, Software Engineer, Data Center Networking, Cisco Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationThere are two ways for a sensor device to detect the Security Group Tag (SGT) assigned to the traffic:
Contents Introduction Components Used Overview The User-IP Mapping Method The Inline Tagging Method Troubleshooting From the Restricted Shell of a Firepower Device From the Expert Mode of a Firepower Device
More informationCisco UCS Director and ACI Advanced Deployment Lab
Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container
More informationNetwork Visibility and Segmentation
Network Visibility and Segmentation 2019 Cisco and/ or its affiliates. All rights reserved. Contents Network Segmentation A Services Approach 3 The Process of Segmentation 3 Segmentation Solution Components
More information: Administration of Symantec Endpoint Protection 14 Exam
250-428: of Symantec Endpoint Protection 14 Exam Study Guide v. 2.2 Copyright 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and Altiris are trademarks or registered trademarks
More informationManaging Cisco UCS with the Python SDK
DEVNET-2060 Managing Cisco UCS with the Python SDK John McDonough, Technical Leader Developer Evangelist Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1.
More informationReal time Location Services Overview and Use cases
Real time Location Services Overview and Use cases Ashutosh Malegaonkar, Principal Engineer @amalegaonkar DEVNET-1071 /me Maker Breaker Meditate @amalegaonkar DEVNET-1071 2017 Cisco and/or its affiliates.
More informationNetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures
BRKPAR - 2509 NetBrain Technologies: Achieving Agile Network Operations: How Automation Can Improve Visibility Across Hybrid Infrastructures Jason Baudreau Achieving Agile Network Operations How Automation
More informationOne Management Realized, with Cisco Prime Infrastructure Manage Complexity. Manage Effectively. Manage Intelligently. Closing
One Management Realized, with Cisco Prime Infrastructure Manage Complexity Manage Effectively Manage Intelligently Closing 2 2013 Cisco and/or its affiliates. All rights reserved. Internet of Things 99%
More informationIdentity Management and Access Control for Security CCIE Candidates
Identity Management and Access Control for Security CCIE Candidates Mark Bernard Cisco Spark How Questions? Use Cisco Spark to chat with the speaker after the session 1. Find this session in the Cisco
More informationForeScout Extended Module for Carbon Black
ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent
More informationCHARLES DARWIN, CYBERSECURITY VISIONARY
SESSION ID: SPO1-W12 CHARLES DARWIN, CYBERSECURITY VISIONARY Dan Schiappa SVP and GM, Products Sophos @dan_schiappa It is not the strongest of the species that survives, nor the most intelligent that survives.
More informationGetting Started with AWS Security
Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move
More information