Cloud Managed Security Architecture & Design

Size: px
Start display at page:

Download "Cloud Managed Security Architecture & Design"

Transcription

1

2 BRKSEC-2602 Cloud Managed Security Architecture & Design Michael Geller Principal Engineer, GSAT

3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brksec Cisco and/or its affiliates. All rights reserved. Cisco Public

4 Abstract and Introductory Thoughts The Cloud Managed Security session provides an in depth discussion of the security services available for Managed Security Services Providers (MSSP). We take an architectural approach to show the audience how to find threats faster using the Cloud. Borders and Trust boundaries are always moving We will discuss how to use Managed Security Services to keep up and stay ahead 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

5 My Personal & Professional Life 21 Years in Cisco Distinguished Speaker Principal Engineer Security Other Cisco Live Session: BRKNMS-3043 Focus on Cloud and Service Providers for Security Areas of focus: MSSP, SDN/NFV, SecOPS 2 kids, 1 wife BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 5

6 Agenda Introduction MSS Architecture MSS Service Catalog Orchestration, SOC & Assurance How To Build and Deploy Conclusion

7 Introduction

8 Core Security Principles Visibility See Everything Complete visibility of users, devices, networks, applications, workloads and processes Segmentation Reduce the Attack Surface Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation Threat protection Stop the Breach Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 8

9 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 9

10 MSSP / CSOC Discussion Elements Security Intelligence (inc. threat feeds ) Security Controls Physical, Virtual (VNFs), Cloud Management Applications (Policy & MACDs) Health & Availability Logs, Events and Analytics (SIEM) Portals BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 10

11 Security Leads to Higher Partner Profitability BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 11

12 When it comes to security, a vendor buffet is not a strategy BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 12

13 Security Services Protect your business and customers during digital transformation Stop threats at the edge Control who gets onto your network Find and contain problems fast Protect users wherever they work Simplify network segmentation BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 13

14 Stop threats at the edge Path Forward NGFW/ UTM Firepower/ Meraki Advanced Threat Advanced Malware Protection (AMP) Security Security Appliance with AMP Drive NGFW transition and scale new platforms Build out virtual form factors Extend cloud security Services Migration and Deployment BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 14

15 Protect users wherever they work Path Forward Endpoint Protection from the Cloud Advanced Threat Endpoint Deployment Umbrella AMP for Endpoints AnyConnect Cisco Security Connector AMP for Endpoints go big! Deliver secure internet gateway with Umbrella Services Incident Response Emergency and Proactive Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 15

16 Control who gets onto your network and cloud Policy and Access Control Identity Services Engine (ISE) Key to SD-Access CASB Cloudlock Path Forward Expand IoT visibility Cloudlock + Umbrella Services Security Segmentation Services Deployment Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 16

17 Simplify network segmentation Path Forward Software Defined Segmentation Access Data Center Trustsec SDA Tetration Leverage network for security architecture Closer integration between Tetration and Stealthwatch Services Security Segmentation Services SD-Access Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 17

18 Find and contain problems fast Anomaly Detection AMP Stealthwatch Analytics Encrypted Traffic Analytics Path Forward Stealthwatch Cloud (Observable Networks) Leverage network via ETA Continue to leverage AMP across the portfolio Services Incident Response - Active Threat Analytics Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 18

19 MSS Architecture

20 Design Goal: Unified Security Service Chain Across Access Methods ILL LTE IP Security Service Chain WiFi BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 20

21 Capex Complexity The MSSP Evolution The Security Hub - DC Cloud Managed CPE (ISR, NGFW, SD-WAN) Platform Umbrella Time To Market BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 21

22 Disrupting The Market With Managed Security What It Takes To Build An MSSP Security Service Management & Assurance Security Service Management (inc. Ubiqube) Customer Portal, Operator s Portal, Single Pane of Glass OSS-BSS Integration Service Assurance SOC, Incident Response, Threat Feeds & Analytics Security Service Management as a Service - CMS Orchestration - 1 Use ACI/APIC with KVM/VMWare Orchestration & Security Services Cisco & Partner Security Services FWaaS VPNaaS aaS ContentaaS, Anti-MalwareaaS, CloudSecaaS NGFWaaS Net Number SS7 FWaaS + Others Data Center/Network Layer Group tag management & Policy Automation ACI Data Center Focus: Segmentation, Policy & Analytics Addition of the Next Service to the Portfolio Orchestration - 2 VMS NSO/ESC Linkage to Mobile and Other NSO Orchestrated Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 22

23 Unified Security Service Chain Across Access Methods LTE and SIM-Based WiFi LTE PCRF / SCEF UE1 (APN1: Intel) UE1 (APN1: BMW) CORE + IMS Security Service Chain Ex: FW, Content, IPS, rules Internet 1. UE with APN 1 requests session to PGW 2. PGW opens Gx communication with PCRF 3. PCRF applies the rule 4. PGW chooses next hop 5. UE with APN 1 has the session with the security rule applied Note: If a specific IMSI needs a special rule, it can also be done by PCRF BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 23

24 Unified Security Service Chain Across Access Methods With SAMOG WiFi - SAMOG PCRF / SCEF UE1 (APN1: Intel) UE1 (APN1: BMW) SaMOG S2a Non LBO Traffic LBO Traffic PGW Security rules GW Security Service Chain Ex: FW, Content, IPS, rules Internet 1. SaMOG communicates with PGW for non LBO traffic (Sec rule applies - same as option with PGW) 2. For LBO SaMOG uses the IP address from its IP pool 3. The LBO hop IP address should be configured to a Security rule GW, which would apply the security rules 4. UE has the session with the security rule applied BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 24

25 Play to the Market Sweetspots 2. Secure Internet Gateway Logs, Events and Analytics 1. Security 3. Network Security FW, VPN, IPS NaaS & NaaE End-Point BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 25

26 MSS Service Catalog

27 What Your Customers Will Buy Power of the Cisco Architecture BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 27

28 What Your Customers Will Buy Unrivaled global threat research and intelligence BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 28

29 Premiere portfolio in the industry Best of breed and integrated architecture Network Analytics UTM Cloud Access Secure Internet Gateway Advanced Malware Threat Intelligence Policy and Access NGFW/NGIPS www Web BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 29

30 Cisco s Unfair Advantage: AMP Everywhere AMP Threat Intelligence Cloud Remote Endpoints AMP for Endpoints AMP for Networks (AMP on Firepower NGIPS Appliance bundle) Threat Grid Malware Analysis + Threat Intelligence Engine AMP Private Cloud Virtual Appliance AMP on Cisco NGFW Firewalls and Meraki MX AMP for Endpoints AMP on Web and Security Appliances AMP on ISR with Firepower Services Windows OS Android Mobile Virtual MAC OS AMP for Endpoints can be launched from AnyConnect CentOS, Red Hat Linux for servers and datacenters SIG / CTA AMP on Umbrella SIG and Hosted BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 30

31 The Architectural Advantage in Action 1 AMP Cloud 2 Threat Grid Network Endpoint Cloud Threat Endpoint AMP for Endpoint 3 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 31

32 There s STILL Something About Ransomware and STILL 99% Effective Against it! BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 32

33 Gartner: The Secure Internet Gateway (SIG) Service Platform BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 33

34 Cisco s Secure Internet Gateway Vision Threat intelligence, cross-product analytics, APIs, and integrations DNS-Layer Proxy File Sandbox 3 rd -Party CASB App visibility Inbound New inspection controls and control* inspection* product* Leveraging Cisco s global footprint *Future 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

35 Continue Innovating.trying to solve the hard problems Finding malicious activity in encrypted traffic New Catalyst 9K* * Other devices will be supported soon NetFlow Telemetry for encrypted malware detection and cryptographic compliance Cisco Stealthwatch Metadata Cognitive Analytics Malware detection and cryptographi c compliance Enhanced NetFlow Leveraged network Faster investigation Higher precision Stronger protection Enhanced NetFlow from Cisco s newest switches and routers Enhanced analytics and machine learning Global-to-local knowledge correlation Continuous Enterprise-wide compliance BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 35

36 Solution Component 1: Cisco Umbrella

37 UMBRELLA HIGHLIGHTS Built into foundation of the internet Malware C2 Callbacks Phishing Destinations Original destination or block page Safe Original destinations Blocked Modified destination Security controls DNS and IP enforcement Risky domain inspection through proxy SSL decryption available Intelligent proxy Deeper inspection Internet traffic On and off-network 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

38 User Experience Company Logo Network Operations Consumer Experience BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 38

39 ENFORCEMENT MSSP organization Centralized settings MSP admins Centralized reports Customer 1 Customer 20K Subscription Admin and settings Reports Subscription Admin and settings Reports BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 39

40 Solution Component 2: Security Services Chain

41 Solution Flow ILL Threat Sandboxing Service AMP Threatgrid LTE WiFi App Optimization Required? Yes, Add CSR to Front of Service Chain ASA+NGFW deployed next. FW, VPN (RA/S2S), IPS, URL filtering, AVC & app signatures, Anti-X (Malware) Full Proxy Required? Yes, WCCP connection to WSAv End Point Policy AMP for Endpoints Cisco + Partner Services: SIEM -Exabeam/Cisco AS LOG Management - Exabeam/Cisco AS WAF-FTDv or Partner DLP Partner (Digital Guardian) BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 41

42 Virtual Appliance Models Firewall as a Service and VPN as a Service NGFWv Model Disk Mem(GB) vcpu NGFWv ASAv Model Disk(GB) Mem(GB) vcpu ASAv ASAv ASAv ASAv Web Security as a Service Model Disk (GB) WSAv Mem(GB ) vcpu S000V S100V S300V S600V 2.4 TB CSR1000v SEC Throughput Disk(GB) vcpu Mem(GB) vcpu Mem(GB) 10 Mbps Mbps Mbps Mbps Mbps Gbps Gbps Gbps AMP Private Cloud AMPv Mode Disk (GB) Mem(GB) vcpu Cloud Mode Air Gap Mode AX BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 42

43 Uncover hidden threats in the environment Advanced Malware Protection (AMP) File Reputation c File & Device Trajectory AMP for Endpoint Log AMP for Network Log? Known Signatures Fuzzy Fingerprinting Indications of compromise Threat Grid Sandboxing Advanced Analytics Dynamic analysis Threat intelligence Threat Disposition Uncertain Safe Risky Sandbox Analysis Enforcement across all endpoints Block known malware Investigate files safely Detect new threats Respond to alerts BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 43

44 AMP FOR ENDPOINTS HIGHLIGHTS Protection across endpoints Network Endpoint Content The endpoint platform has device trajectory, elastic search, and outbreak control, which in this example is shown quarantining recently detected malware on a device that has the AMP for Endpoints connector installed 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

45 Meraki and Stealthwatch/ETA

46 Cisco Meraki Cloud Managed UTM ++ WAN Optimization Next-Generation Firewall Device Management All Managed from the Cloud Content Filtering Switching User Management Intrusion Prevention V Wireless Auto VPN Bonjour Gateway Application Management Routing Network Infrastructure Unified Threat Management Mobile Management BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 46

47 Solution Highlights (continued) Wired + wireless Instant search Client fingerprints Location analytics Application QoS 24 Real-time control Intuitive Web-Based Dashboard BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 47

48 Stealthwatch in a Nutshell BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 48

49 Stealthwatch NaaS/NaaE Portfolio Security and Network Monitoring Stealthwatch Management Console Stealthwatch Learning Agent Manager (aka SCA) Flow Collector UDP Director Cisco ISE NetFlow, syslog, SNMP FlowSensor VMware ESX with FlowSensor VE NetFlow enabled infrastructure AWS Cloud Stealthwatch Cloud License ISR 4K w/ios XE Stealthwatch Learning Agent (aka DLA) User and Device Information New Additions to portfolio Feeds of emerging threat information SLIC / Talos BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 49

50 Orchestration, SOC & Assurance

51 Automated Security Service Delivery To DC & To CPE ILL OpenAPIs Service Catalog Service Interfaces Service Interface VMS Service Creation Platform Service Offers Service Infrastructure Data Platforms LTE NSO Orchestrator NSO Core Function Packs Security Service Chain VBranch Service Pack ENCS Service Dashboard VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Security Service Chain WiFi ENCS BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 51

52 Onboarding of CPE Device Cisco VMS Ordering Portal OpenAPIs Service Interfaces Service Interface VMS Service Creation Platform Service Offers Service Infrastructure Data Platforms NSO Orchestrator NSO Core Function Packs VBranch Service Pack ENCS Service Dashboard vbranch CPE Service VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Onboard NFV-IS Infrastructure to ENCS Onboard ENCS/NFVI ENCS Or ISR BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 52

53 Automated Security Service Delivery To DC & To CPE + SD-WAN ILL Service Interfaces Service Interface OpenAPIs VMS Service Creation Platform Service Offers Service Catalog Viptela on AWS vmanage Orchestrator Service Infrastructure Data Platforms LTE NSO Orchestrator NSO Core Function Packs Security Service Chain VBranch Service Pack Viptela Microservic e vsmart Controllers ENCS Service Dashboard Viptela vedge VNF vedge Routers VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Security Service Chain WiFi ENCS BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 53

54 Services are Required to Support The Full Security Lifecycle BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 54

55 Advisory Core Security Services Custom Threat Intelligence Threat Analysis of external DNS and, optionally, internal traffic Rich and Actionable Intelligence Report prepared by Expert Analysts Cybersecurity Assessments Ethical Hacking services to assess Security Posture Advanced Persistent Threat service to test Customer Incident Response and security controls Integration Integration Services Architecture, Plan, and Build Services for Secure Solutions that includes Cisco and Third- Party products Cisco Identity Services Engine (ISE) Plan, Build, and Update Security Optimization Services Enablement of Customer Security and Network Staff with ongoing support from Security Experts Optimize security of architectures, solutions, and products to meet business needs Managed Managed Threat Defense Sophisticated Real-Time Detection and Rapid Threat Response Best-n-Class Technology, and Leading Security Expertise and Analytics Remote Managed Services Managed and Co-Managed Security Service Provider for Cisco and Third-Party Security Products 24/7/365 management and monitoring for changes, advanced analytics, event response, and incident management BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 55

56 How To Build & Deploy

57 Secure Connectivity An Enterprise or SMB Offer BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 57

58 1 + 2 Consolidated Service Chain View Client ISRv ISRv ETA w/ Stealthwatch DNS-based security Web Filtering vedge SD-WAN WAN Internet VPN Termination ASAv vedge NGFWv AMP ETA with Stealthwatch SD-WAN Firewall IPS Malware Protection URL Filtering Public Cloud Internet Private DC AnyConne ct AMP Umbrella VPN Client BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 58

59 Branch to Branch Zero Trust Model Client 4 5 ISRv Umbrell a vedge ETA w/ Stealthwatch DNS-based security Web Filtering SD-WAN Server to Server between DCs WAN Public Cloud vedge NGFWv AMP SD-WAN Firewall IPS Malware Protection ETA with Stealthwatch NGFWv AMP Firewall IPS Malware Protection vedge SD-WAN Private DC WAN vedge SD-WAN ISRv Umbrell a ETA w/ Stealthwatch DNS-based security Web Filtering Client BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 59

60 Services /24 MSSP Topology Mgmt CIMC Mgmt CIMC Mgmt CIMC ISRv.2.1 vedge.1 TC /24.2 ENCS ISRv vedge.1 ENCS2.1 TC / / / / PC PC L4-7 L4-7 Branch A Tenant 1 Branch B Tenant MPLS Internet v /24 Qradar ESX1.1 RW Vision v / / vedge / vedge / ISRv.2.1 NGFWv.5.2 NGFWv vedge.1 ENCS ENCS / / ENCS3 CIMC.3 CIMC /24 Mgmt ASAv Mgmt ASAv Branch C TC PC L4-7 Tenant 2 Mobile User Tenant 1 VLAN CIMC Mgmt CSP1 vsmart vbond CIMC Mgmt.25. CSP2.1 RW DPVA v /24 Services /24.27 vsmart vbond vman age.26 ASR v /24.11 v /24.12 FMC.251 RW DPVA SMC.2 SWFC ASA.18.2 DNS.2.6 WWW / Mgmt CIMC Cloud Layer 3 Switch Private DC Tenant 1 Layer 3 Switch NTP / CIMC.78 Portal.34 VMS Internal HA Portal.35 VMS CP DNS VMS Control Plane Services Public Cloud Private DC PC.100 L4-7 TC PC.100 L4-7 TC Cloud Services (Internet) VLAN 9 SD-WAN Services /24 Lab Services /23 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 60

61 Services /24 Mgmt CIMC Mgmt CIMC Mgmt CIMC /24 ETA VPN.1 ISRv.2.1 vedge.1 Umbrella / /24 VPN ETA ISRv vedge /24.2 ENCS1 ENCS / Umbrella.101 TC Branch A Tenant 1 Branch B Tenant 1 Branch C Tenant 2.1 Mobile User Tenant 1 VLAN CIMC Mgmt CSP1 VLAN MPLS Internet.2 vsmart vbond MSSP Topology CIMC Mgmt.25. CSP2 SD-WAN Services / RW DPVA v / Services /24.27 vsmart vbond vman age.26 ASR Qradar ESX v /24 RW Vision v /24 v /24 TC PC L4-7 VPN IPS Web VPN IPS Web / vedge / vedge /24 ETA VPN Security Security ISRv.2.1 NGFWv.5.2 NGFWv vedge.1 ENCS4.90 AMP.2 FW.95 ENCS5 AMP FW / / ENCS3 CIMC.3 CIMC.3 Umbrella /24 Mgmt ASAv Mgmt ASAv TC RA VPN AMP PC PC L4-7 L4-7 Umbrella Where are Security Functions Enabled? DDOS ETA v /24 RA VPN.12 FMC.251 RW DPVA SMC ETA.2 SWFC RA VPN AS A DNS.2.6 WWW / Mgmt CIMC Cloud Layer 3 Switch Private DC Tenant 1 Layer 3 Switch NTP /24.2 CIMC.78 Portal.34 HA Portal.35 VMS Control Plane Services Public Cloud Private DC Cloud Services (Internet) Lab Services /23 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 61.1 VMS Internal VMS CP DNS PC.100 L4-7 TC PC.100 L4-7 TC Umbrella AMP ThreatGrid

62 Conclusion

63 Please Complete Your Online Session Evaluation BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 63

64 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brksec Cisco and/or its affiliates. All rights reserved. Cisco Public

65 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at Cisco and/or its affiliates. All rights reserved. Cisco Public

66 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 66

67 Thank you

68

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9. Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Next generation branch with SD-WAN and NFV

Next generation branch with SD-WAN and NFV Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark

More information

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption

How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New

More information

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017 Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope

More information

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug

More information

Cisco Security Enterprise License Agreement

Cisco Security Enterprise License Agreement Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves

More information

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience. Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.

More information

Cloud-Managed Security for Distributed Networks with Cisco Meraki MX

Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this

More information

Routing Underlay and NFV Automation with DNA Center

Routing Underlay and NFV Automation with DNA Center BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability

More information

Global vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year

Global vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year Global vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year Firepower Next Generation Firewall Subtitle goes here William Young Security Solutions Architect, Global Security Architecture Team

More information

Cisco Advanced Malware Protection against WannaCry

Cisco Advanced Malware Protection against WannaCry Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced

More information

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private

More information

Service Provider Security Architecture

Service Provider Security Architecture Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven

More information

Threat Centric Network Security

Threat Centric Network Security BRKSEC-2056 Threat Centric Network Security Ted Bedwell, Principal Engineer Network Threat Defence Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this

More information

Cisco Ransomware Defense The Ransomware Threat Is Real

Cisco Ransomware Defense The Ransomware Threat Is Real Cisco Ransomware Defense The Ransomware Threat Is Real Seguridad Integrada Abril 2018 Ransomware B Malicious Software Encrypts Critical Data Demands Payment Permanent Data Loss Business Impacts Ramifications

More information

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any

More information

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark

More information

DNA Automation Services Offerings

DNA Automation Services Offerings DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session

More information

Cisco Comstor

Cisco Comstor Cisco Security @ Comstor 1 Agenda 1. Cisco Security Fundamentals Cyber Security? Cisco Security Solutions - Cisco NGFW - Cisco Umbrella Cisco Meraki, MR, MS, MV and MX Meraki Insight 2 1. Cisco Security

More information

Cisco Security Exposed Through the Cyber Kill Chain

Cisco Security Exposed Through the Cyber Kill Chain Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE

More information

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric

More information

AMP for Endpoints & Threat Grid

AMP for Endpoints & Threat Grid AMP for Endpoints & Threat Grid Response & Prevention Dean De Beer & Eric Hulse BRKSEC-2029 AMP Threat Grid Malware Analysis Engines & Techniques A little background Malware Analysis & Threat Intelligence

More information

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco

PSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?

More information

Cisco SD-Access Hands-on Lab

Cisco SD-Access Hands-on Lab LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:

More information

Cisco Virtual Managed Services

Cisco Virtual Managed Services Data Sheet Cisco Virtual Managed Services SD-WAN Made Simple for Service Providers Cisco Virtual Managed Services (VMS) is a cloud native solution for service providers to automate, innovate and accelerate

More information

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?

More information

CloudCenter for Developers

CloudCenter for Developers DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

Več kot SDN - SDA arhitektura v uporabniških omrežjih

Več kot SDN - SDA arhitektura v uporabniških omrežjih Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements

More information

Enterprise Network Compute System (ENCS)

Enterprise Network Compute System (ENCS) Enterprise Network Compute System (ENCS) Cisco vbranch Architecture Per Jensen, per@cisco.com Sept 2017 Agenda: Tech Update september-2017 1. ENCS update + demo v/per 2. Viptela update + demo v/dr Søren

More information

Cisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017

Cisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017 Cisco AMP Solution Rene Straube CSE, Cisco Germany January 2017 The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense AMP Threat Intelligence Cloud

More information

Build a Software-Defined Network to Defend your Business

Build a Software-Defined Network to Defend your Business Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks

More information

Agile Security Solutions

Agile Security Solutions Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization

More information

Hidden Figures: Securing what you cannot see

Hidden Figures: Securing what you cannot see Hidden Figures: Securing what you cannot see TK Keanini, Distinguished Engineer Stealthwatch, Advanced Threat Solutions CID-0006 Hello My Name is TK Keanini Keanini (Pronounced Kay-Ah-Nee-Nee) TK: The

More information

Cisco ONE Software Overview. October 2017

Cisco ONE Software Overview. October 2017 Cisco ONE Software Overview October 2017 Agenda Why Cisco ONE Software and the Outcome Offers and Use Case Access (Wireless and Switching) WAN Cloud and Compute DC Networking Smart Accounts Resources Cisco

More information

SAFE Architecture Guide. Places in the Network: Secure Campus

SAFE Architecture Guide. Places in the Network: Secure Campus SAFE Architecture Guide Places in the Network: Secure Campus January 2018 SAFE Architecture Guide Places in the Network: Secure Campus Contents January 2018 Contents 3 5 8 9 13 15 21 22 25 Overview Business

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

Serviceability of SD-WAN

Serviceability of SD-WAN BRKCRS-2112 Serviceability of SD-WAN Chandrabalaji Rajaram & Ali Shaikh Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live

More information

How to build a multi-layer Security Architecture to detect and remediate threats in real time

How to build a multi-layer Security Architecture to detect and remediate threats in real time How to build a multi-layer Security Architecture to detect and remediate threats in real time Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist March 2018 Agenda Cisco Strategy Umbrella

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

The Internet of Everything is changing Everything

The Internet of Everything is changing Everything The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device

More information

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview Organizations today are under the constant threat of cyber attack, and security breaches happen every day. Cisco Advanced Malware

More information

Cisco ASA 5500-X NGFW

Cisco ASA 5500-X NGFW Cisco ASA 5500-X NGFW Sieťová ochrana pre malé a stredné podniky pred modernými hrozbami Peter Mesjar CCIE 17428, Systémový Inžinier, Cisco What are we going to talk about Problem is THREATS How today

More information

Delivering the Wireless Software-Defined Branch

Delivering the Wireless Software-Defined Branch Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,

More information

Data Center Security. Fuat KILIÇ Consulting Systems

Data Center Security. Fuat KILIÇ Consulting Systems Data Center Security Fuat KILIÇ Consulting Systems Engineer @Security Data Center Evolution WHERE ARE YOU NOW? WHERE DO YOU WANT TO BE? Traditional Data Center Virtualized Data Center (VDC) Virtualized

More information

Cisco Advanced Malware Protection. May 2016

Cisco Advanced Malware Protection. May 2016 Cisco Advanced Malware Protection May 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious traffic 100% Cybercrime is lucrative, barrier

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

Encrypted Traffic Analytics

Encrypted Traffic Analytics Encrypted Traffic Analytics Introduction The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using

More information

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016 Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent

More information

Applied Advanced Network Telemetry: ETA and Beyond

Applied Advanced Network Telemetry: ETA and Beyond BRKSEC-2809 Applied Advanced Network Telemetry: ETA and Beyond TK Keanini, Principal Engineer Blake Anderson, Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker

More information

Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com

Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com Endpoint Footprint Problem: TOO MANY AGENTS! Anti-Virus/Anti-Spyware agent IPSec/SSLVPN agent Host IPS/FW

More information

Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM

Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM How to implement the Cisco Stealthwatch Endpoint License with the Cisco AnyConnect Network Visibility Module Table of Contents About This Document...

More information

LTRDCN-2100 Cloud networking solutions with Cisco Cloud Services Router (CSR 1000V) on AWS and Azure

LTRDCN-2100 Cloud networking solutions with Cisco Cloud Services Router (CSR 1000V) on AWS and Azure LTRDCN-2100 Cloud networking solutions with Cisco Cloud Services Router (CSR 1000V) on AWS and Azure Fan Yang, Cisco, Engineer, Technical Marketing Raghavendra K S, Cisco, Engineer, Technical Marketing

More information

Design and Deployment of SourceFire NGIPS and NGFWL

Design and Deployment of SourceFire NGIPS and NGFWL Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the

More information

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER Nicky Choo Head, Routes to Market & Business Partners, Asia Pacific, IBM Security & Cloud Jul 2018 Disconnected security capabilities

More information

Cisco Tetration Analytics

Cisco Tetration Analytics Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:

More information

Modern attacks and malware

Modern attacks and malware Modern attacks and malware Everything starts with an email and web Dragan Novakovic Cisco Systems New Cyber Threat Reality Your environment will get breached You ll most likely be infected via email Hackers

More information

Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security

Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security Sven Kutzer Consulting Systems Engineer GSSO - CYBERSECURITY SALES Mittwoch, 7. März 2018 Challenges 2017

More information

Cisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018

Cisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018 Cisco Enterprise Cloud Suite for Service Providers Cisco Knowledge Network Data Center Jan 16, 2018 Agenda Cisco ONE Software Suite Overview Cisco Enterprise Agreement for Cisco ONE Cisco Service Provider

More information

vbranch Introduction and Demo

vbranch Introduction and Demo v Introduction and Demo Innovation@Cisco November, 2015 Bart Van de Velde, Sr. Director, Engineering, Chief Technology & Architecture Office Simon Spraggs, Distinguished Consulting Engineer, Chief Technology

More information

SYMANTEC DATA CENTER SECURITY

SYMANTEC DATA CENTER SECURITY SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information

More information

Cisco Cyber Threat Defense Solution 1.0

Cisco Cyber Threat Defense Solution 1.0 Cisco Cyber Threat Defense Solution 1.0 Contents 1. Introduction to the Cisco Cyber Threat Defense Solution 1.0 2. Technical overview of the Cisco Cyber Threat Defense Solution 1.0 3. Using the Cisco Cyber

More information

Agenda: Insurance Academy Event

Agenda: Insurance Academy Event Agenda: Insurance Academy Event Drs Ing René Pluis MBA MBI Cyber Security Lead, Country Digitization Acceleration program the Netherlands The Hague, Thursday 16 November Introduction Integrated Security

More information

Simplify Technology Deployments

Simplify Technology Deployments Cisco Security Enterprise License Agreement: Simplify Technology Deployments The need for Pervasive Security Coverage Security measures can t be limited to certain areas of your business. Mobility has

More information

UX - User Experience: Multi-Cloud Network Visibility

UX - User Experience: Multi-Cloud Network Visibility Data Sheet UX - User Experience: Multi-Cloud Network Visibility UX - User Experience monitoring User Experience dashboard summary application performance User Experience is a software module available

More information

A Pragmatic Approach to HealthCare Security. Hans Mathys CSE, Cybersecurity, Cisco Switzerland

A Pragmatic Approach to HealthCare Security. Hans Mathys CSE, Cybersecurity, Cisco Switzerland A Pragmatic Approach to HealthCare Security Hans Mathys CSE, Cybersecurity, Cisco Switzerland Referatsabstract A Pragmatic Approach To HealthCare Security - Cyber-Security ist nicht nur eine Herausforderung

More information

Tetration Hands-on Lab from Deployment to Operations Support

Tetration Hands-on Lab from Deployment to Operations Support LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate

More information

Cisco UCS Director and ACI Advanced Deployment Lab

Cisco UCS Director and ACI Advanced Deployment Lab Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container

More information

Prepare for Digital Network Architecture, NFV, and SDN with Cisco ONE Software

Prepare for Digital Network Architecture, NFV, and SDN with Cisco ONE Software Prepare for Digital Network Architecture, NFV, and SDN with Cisco ONE Software Dan Lohmeyer, Bill Hentschell, Liad Ofek PSOSDN-1445 Agenda Digital Network Architecture Intelligent WAN Enterprise NFV Cisco

More information

Cisco Container Platform

Cisco Container Platform Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click

More information

SAFE Architecture Guide. Places in the Network: Secure Data Center

SAFE Architecture Guide. Places in the Network: Secure Data Center SAFE Architecture Guide Places in the Network: Secure Data Center April 2018 SAFE Architecture Guide Places in the Network: Secure Data Center Contents April 2018 Contents 3 5 8 9 14 16 25 26 28 Overview

More information

Business Resiliency Through Superior Threat Defense

Business Resiliency Through Superior Threat Defense Business Resiliency Through Superior Threat Defense Firepower 2100 Series/ Cisco Identity Services Engine Andre Lambertsen, Consulting Systems Engineer ala@cisco.com Cisco Firepower NGFW Fully Integrated

More information

SAFE Architecture Guide. Places in the Network: Secure Branch

SAFE Architecture Guide. Places in the Network: Secure Branch SAFE Architecture Guide Places in the Network: Secure Branch January 2018 SAFE Architecture Guide Places in the Network: Secure Branch Contents January 2018 Contents 3 5 8 9 13 17 22 23 26 Overview Business

More information

NGFWv & ASAv in Public Cloud (AWS & Azure)

NGFWv & ASAv in Public Cloud (AWS & Azure) & in Public Cloud (AWS & Azure) Anubhav Swami, CCIE# 21208 Technical Marketing Engineer Your Speaker Anubhav Swami answami@cisco.com Technical Marketing Engineer 5 years in Cisco TAC 2 years in ASA BU

More information

SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility

SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility Laurent Perrin, Director International Product Management, Orange Business Services Sylvain Quartier, SVP Enterprise Products Strategy & Alliances

More information

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cybersecurity Roadmap: Global Healthcare Security Architecture SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products

More information

Stop Threats Before They Stop You

Stop Threats Before They Stop You Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts

More information

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker

More information

Cisco SD-Access Building the Routed Underlay

Cisco SD-Access Building the Routed Underlay Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R

More information

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load

Consumerization. Copyright 2014 Trend Micro Inc. IT Work Load Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web

More information

Implementing Cisco Edge Network Security Solutions ( )

Implementing Cisco Edge Network Security Solutions ( ) Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to

More information

Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002

Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002 Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002 Agenda Joint Cisco and Microsoft Integration Efforts Introduction to CCA-MCP What is a Pattern?

More information

Introduction to Cisco SD- WAN (Viptela)

Introduction to Cisco SD- WAN (Viptela) LTRCRS-2005 Introduction to Cisco SD- WAN (Viptela) Brad Edgeworth, Systems Engineer, CCIE#31574 Dustin Schuemann, Solutions Architect Madhavan Aruanchalam, Technical Marketing Engineer Cisco Spark How

More information

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco

More information

Cisco SD WAN for Service Providers

Cisco SD WAN for Service Providers PSOSPG-2048 Cisco SD WAN for Service Providers Chandrodaya Prasad, Senior Director Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find

More information

Key Security Measures to Enable Next-Generation Data Center Transformation

Key Security Measures to Enable Next-Generation Data Center Transformation Key Security Measures to Enable Next-Generation Data Center Transformation Bill McGee Senior Manager, Security Solutions Cisco Systems, Inc. Agenda Data Center Security Challenges Secure DC Strategies

More information

The Future of Threat Prevention

The Future of Threat Prevention The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network

More information

Cisco Solution Support

Cisco Solution Support Service Definition Cisco Solution Support Security Solutions Service Definition October 2018 2015 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public Information. Page 1 of

More information

Chapter 1: Content Security

Chapter 1: Content Security Chapter 1: Content Security Cisco Cloud Web Security (CWS) Cisco offers Cisco Cloud Web Security (CWS) to protect End Stations and Users devices from infection. Cisco Cloud Web Security (CWS) depends upon

More information

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582

More information