Cloud Managed Security Architecture & Design
|
|
- Ami Nash
- 6 years ago
- Views:
Transcription
1
2 BRKSEC-2602 Cloud Managed Security Architecture & Design Michael Geller Principal Engineer, GSAT
3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brksec Cisco and/or its affiliates. All rights reserved. Cisco Public
4 Abstract and Introductory Thoughts The Cloud Managed Security session provides an in depth discussion of the security services available for Managed Security Services Providers (MSSP). We take an architectural approach to show the audience how to find threats faster using the Cloud. Borders and Trust boundaries are always moving We will discuss how to use Managed Security Services to keep up and stay ahead 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
5 My Personal & Professional Life 21 Years in Cisco Distinguished Speaker Principal Engineer Security Other Cisco Live Session: BRKNMS-3043 Focus on Cloud and Service Providers for Security Areas of focus: MSSP, SDN/NFV, SecOPS 2 kids, 1 wife BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 5
6 Agenda Introduction MSS Architecture MSS Service Catalog Orchestration, SOC & Assurance How To Build and Deploy Conclusion
7 Introduction
8 Core Security Principles Visibility See Everything Complete visibility of users, devices, networks, applications, workloads and processes Segmentation Reduce the Attack Surface Prevent attackers from moving laterally east-west with application whitelisting and micro-segmentation Threat protection Stop the Breach Quickly detect, block, and respond to attacks before hackers can steal data or disrupt operations BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 8
9 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 9
10 MSSP / CSOC Discussion Elements Security Intelligence (inc. threat feeds ) Security Controls Physical, Virtual (VNFs), Cloud Management Applications (Policy & MACDs) Health & Availability Logs, Events and Analytics (SIEM) Portals BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 10
11 Security Leads to Higher Partner Profitability BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 11
12 When it comes to security, a vendor buffet is not a strategy BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 12
13 Security Services Protect your business and customers during digital transformation Stop threats at the edge Control who gets onto your network Find and contain problems fast Protect users wherever they work Simplify network segmentation BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 13
14 Stop threats at the edge Path Forward NGFW/ UTM Firepower/ Meraki Advanced Threat Advanced Malware Protection (AMP) Security Security Appliance with AMP Drive NGFW transition and scale new platforms Build out virtual form factors Extend cloud security Services Migration and Deployment BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 14
15 Protect users wherever they work Path Forward Endpoint Protection from the Cloud Advanced Threat Endpoint Deployment Umbrella AMP for Endpoints AnyConnect Cisco Security Connector AMP for Endpoints go big! Deliver secure internet gateway with Umbrella Services Incident Response Emergency and Proactive Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 15
16 Control who gets onto your network and cloud Policy and Access Control Identity Services Engine (ISE) Key to SD-Access CASB Cloudlock Path Forward Expand IoT visibility Cloudlock + Umbrella Services Security Segmentation Services Deployment Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 16
17 Simplify network segmentation Path Forward Software Defined Segmentation Access Data Center Trustsec SDA Tetration Leverage network for security architecture Closer integration between Tetration and Stealthwatch Services Security Segmentation Services SD-Access Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 17
18 Find and contain problems fast Anomaly Detection AMP Stealthwatch Analytics Encrypted Traffic Analytics Path Forward Stealthwatch Cloud (Observable Networks) Leverage network via ETA Continue to leverage AMP across the portfolio Services Incident Response - Active Threat Analytics Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 18
19 MSS Architecture
20 Design Goal: Unified Security Service Chain Across Access Methods ILL LTE IP Security Service Chain WiFi BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 20
21 Capex Complexity The MSSP Evolution The Security Hub - DC Cloud Managed CPE (ISR, NGFW, SD-WAN) Platform Umbrella Time To Market BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 21
22 Disrupting The Market With Managed Security What It Takes To Build An MSSP Security Service Management & Assurance Security Service Management (inc. Ubiqube) Customer Portal, Operator s Portal, Single Pane of Glass OSS-BSS Integration Service Assurance SOC, Incident Response, Threat Feeds & Analytics Security Service Management as a Service - CMS Orchestration - 1 Use ACI/APIC with KVM/VMWare Orchestration & Security Services Cisco & Partner Security Services FWaaS VPNaaS aaS ContentaaS, Anti-MalwareaaS, CloudSecaaS NGFWaaS Net Number SS7 FWaaS + Others Data Center/Network Layer Group tag management & Policy Automation ACI Data Center Focus: Segmentation, Policy & Analytics Addition of the Next Service to the Portfolio Orchestration - 2 VMS NSO/ESC Linkage to Mobile and Other NSO Orchestrated Services BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 22
23 Unified Security Service Chain Across Access Methods LTE and SIM-Based WiFi LTE PCRF / SCEF UE1 (APN1: Intel) UE1 (APN1: BMW) CORE + IMS Security Service Chain Ex: FW, Content, IPS, rules Internet 1. UE with APN 1 requests session to PGW 2. PGW opens Gx communication with PCRF 3. PCRF applies the rule 4. PGW chooses next hop 5. UE with APN 1 has the session with the security rule applied Note: If a specific IMSI needs a special rule, it can also be done by PCRF BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 23
24 Unified Security Service Chain Across Access Methods With SAMOG WiFi - SAMOG PCRF / SCEF UE1 (APN1: Intel) UE1 (APN1: BMW) SaMOG S2a Non LBO Traffic LBO Traffic PGW Security rules GW Security Service Chain Ex: FW, Content, IPS, rules Internet 1. SaMOG communicates with PGW for non LBO traffic (Sec rule applies - same as option with PGW) 2. For LBO SaMOG uses the IP address from its IP pool 3. The LBO hop IP address should be configured to a Security rule GW, which would apply the security rules 4. UE has the session with the security rule applied BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 24
25 Play to the Market Sweetspots 2. Secure Internet Gateway Logs, Events and Analytics 1. Security 3. Network Security FW, VPN, IPS NaaS & NaaE End-Point BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 25
26 MSS Service Catalog
27 What Your Customers Will Buy Power of the Cisco Architecture BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 27
28 What Your Customers Will Buy Unrivaled global threat research and intelligence BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 28
29 Premiere portfolio in the industry Best of breed and integrated architecture Network Analytics UTM Cloud Access Secure Internet Gateway Advanced Malware Threat Intelligence Policy and Access NGFW/NGIPS www Web BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 29
30 Cisco s Unfair Advantage: AMP Everywhere AMP Threat Intelligence Cloud Remote Endpoints AMP for Endpoints AMP for Networks (AMP on Firepower NGIPS Appliance bundle) Threat Grid Malware Analysis + Threat Intelligence Engine AMP Private Cloud Virtual Appliance AMP on Cisco NGFW Firewalls and Meraki MX AMP for Endpoints AMP on Web and Security Appliances AMP on ISR with Firepower Services Windows OS Android Mobile Virtual MAC OS AMP for Endpoints can be launched from AnyConnect CentOS, Red Hat Linux for servers and datacenters SIG / CTA AMP on Umbrella SIG and Hosted BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 30
31 The Architectural Advantage in Action 1 AMP Cloud 2 Threat Grid Network Endpoint Cloud Threat Endpoint AMP for Endpoint 3 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 31
32 There s STILL Something About Ransomware and STILL 99% Effective Against it! BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 32
33 Gartner: The Secure Internet Gateway (SIG) Service Platform BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 33
34 Cisco s Secure Internet Gateway Vision Threat intelligence, cross-product analytics, APIs, and integrations DNS-Layer Proxy File Sandbox 3 rd -Party CASB App visibility Inbound New inspection controls and control* inspection* product* Leveraging Cisco s global footprint *Future 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
35 Continue Innovating.trying to solve the hard problems Finding malicious activity in encrypted traffic New Catalyst 9K* * Other devices will be supported soon NetFlow Telemetry for encrypted malware detection and cryptographic compliance Cisco Stealthwatch Metadata Cognitive Analytics Malware detection and cryptographi c compliance Enhanced NetFlow Leveraged network Faster investigation Higher precision Stronger protection Enhanced NetFlow from Cisco s newest switches and routers Enhanced analytics and machine learning Global-to-local knowledge correlation Continuous Enterprise-wide compliance BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 35
36 Solution Component 1: Cisco Umbrella
37 UMBRELLA HIGHLIGHTS Built into foundation of the internet Malware C2 Callbacks Phishing Destinations Original destination or block page Safe Original destinations Blocked Modified destination Security controls DNS and IP enforcement Risky domain inspection through proxy SSL decryption available Intelligent proxy Deeper inspection Internet traffic On and off-network 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
38 User Experience Company Logo Network Operations Consumer Experience BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 38
39 ENFORCEMENT MSSP organization Centralized settings MSP admins Centralized reports Customer 1 Customer 20K Subscription Admin and settings Reports Subscription Admin and settings Reports BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 39
40 Solution Component 2: Security Services Chain
41 Solution Flow ILL Threat Sandboxing Service AMP Threatgrid LTE WiFi App Optimization Required? Yes, Add CSR to Front of Service Chain ASA+NGFW deployed next. FW, VPN (RA/S2S), IPS, URL filtering, AVC & app signatures, Anti-X (Malware) Full Proxy Required? Yes, WCCP connection to WSAv End Point Policy AMP for Endpoints Cisco + Partner Services: SIEM -Exabeam/Cisco AS LOG Management - Exabeam/Cisco AS WAF-FTDv or Partner DLP Partner (Digital Guardian) BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 41
42 Virtual Appliance Models Firewall as a Service and VPN as a Service NGFWv Model Disk Mem(GB) vcpu NGFWv ASAv Model Disk(GB) Mem(GB) vcpu ASAv ASAv ASAv ASAv Web Security as a Service Model Disk (GB) WSAv Mem(GB ) vcpu S000V S100V S300V S600V 2.4 TB CSR1000v SEC Throughput Disk(GB) vcpu Mem(GB) vcpu Mem(GB) 10 Mbps Mbps Mbps Mbps Mbps Gbps Gbps Gbps AMP Private Cloud AMPv Mode Disk (GB) Mem(GB) vcpu Cloud Mode Air Gap Mode AX BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 42
43 Uncover hidden threats in the environment Advanced Malware Protection (AMP) File Reputation c File & Device Trajectory AMP for Endpoint Log AMP for Network Log? Known Signatures Fuzzy Fingerprinting Indications of compromise Threat Grid Sandboxing Advanced Analytics Dynamic analysis Threat intelligence Threat Disposition Uncertain Safe Risky Sandbox Analysis Enforcement across all endpoints Block known malware Investigate files safely Detect new threats Respond to alerts BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 43
44 AMP FOR ENDPOINTS HIGHLIGHTS Protection across endpoints Network Endpoint Content The endpoint platform has device trajectory, elastic search, and outbreak control, which in this example is shown quarantining recently detected malware on a device that has the AMP for Endpoints connector installed 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
45 Meraki and Stealthwatch/ETA
46 Cisco Meraki Cloud Managed UTM ++ WAN Optimization Next-Generation Firewall Device Management All Managed from the Cloud Content Filtering Switching User Management Intrusion Prevention V Wireless Auto VPN Bonjour Gateway Application Management Routing Network Infrastructure Unified Threat Management Mobile Management BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 46
47 Solution Highlights (continued) Wired + wireless Instant search Client fingerprints Location analytics Application QoS 24 Real-time control Intuitive Web-Based Dashboard BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 47
48 Stealthwatch in a Nutshell BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 48
49 Stealthwatch NaaS/NaaE Portfolio Security and Network Monitoring Stealthwatch Management Console Stealthwatch Learning Agent Manager (aka SCA) Flow Collector UDP Director Cisco ISE NetFlow, syslog, SNMP FlowSensor VMware ESX with FlowSensor VE NetFlow enabled infrastructure AWS Cloud Stealthwatch Cloud License ISR 4K w/ios XE Stealthwatch Learning Agent (aka DLA) User and Device Information New Additions to portfolio Feeds of emerging threat information SLIC / Talos BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 49
50 Orchestration, SOC & Assurance
51 Automated Security Service Delivery To DC & To CPE ILL OpenAPIs Service Catalog Service Interfaces Service Interface VMS Service Creation Platform Service Offers Service Infrastructure Data Platforms LTE NSO Orchestrator NSO Core Function Packs Security Service Chain VBranch Service Pack ENCS Service Dashboard VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Security Service Chain WiFi ENCS BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 51
52 Onboarding of CPE Device Cisco VMS Ordering Portal OpenAPIs Service Interfaces Service Interface VMS Service Creation Platform Service Offers Service Infrastructure Data Platforms NSO Orchestrator NSO Core Function Packs VBranch Service Pack ENCS Service Dashboard vbranch CPE Service VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Onboard NFV-IS Infrastructure to ENCS Onboard ENCS/NFVI ENCS Or ISR BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 52
53 Automated Security Service Delivery To DC & To CPE + SD-WAN ILL Service Interfaces Service Interface OpenAPIs VMS Service Creation Platform Service Offers Service Catalog Viptela on AWS vmanage Orchestrator Service Infrastructure Data Platforms LTE NSO Orchestrator NSO Core Function Packs Security Service Chain VBranch Service Pack Viptela Microservic e vsmart Controllers ENCS Service Dashboard Viptela vedge VNF vedge Routers VNF-Manager (ESC) Network Functions Virtualization Infrastructure Software (NFVIS) Security Service Chain WiFi ENCS BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 53
54 Services are Required to Support The Full Security Lifecycle BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 54
55 Advisory Core Security Services Custom Threat Intelligence Threat Analysis of external DNS and, optionally, internal traffic Rich and Actionable Intelligence Report prepared by Expert Analysts Cybersecurity Assessments Ethical Hacking services to assess Security Posture Advanced Persistent Threat service to test Customer Incident Response and security controls Integration Integration Services Architecture, Plan, and Build Services for Secure Solutions that includes Cisco and Third- Party products Cisco Identity Services Engine (ISE) Plan, Build, and Update Security Optimization Services Enablement of Customer Security and Network Staff with ongoing support from Security Experts Optimize security of architectures, solutions, and products to meet business needs Managed Managed Threat Defense Sophisticated Real-Time Detection and Rapid Threat Response Best-n-Class Technology, and Leading Security Expertise and Analytics Remote Managed Services Managed and Co-Managed Security Service Provider for Cisco and Third-Party Security Products 24/7/365 management and monitoring for changes, advanced analytics, event response, and incident management BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 55
56 How To Build & Deploy
57 Secure Connectivity An Enterprise or SMB Offer BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 57
58 1 + 2 Consolidated Service Chain View Client ISRv ISRv ETA w/ Stealthwatch DNS-based security Web Filtering vedge SD-WAN WAN Internet VPN Termination ASAv vedge NGFWv AMP ETA with Stealthwatch SD-WAN Firewall IPS Malware Protection URL Filtering Public Cloud Internet Private DC AnyConne ct AMP Umbrella VPN Client BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 58
59 Branch to Branch Zero Trust Model Client 4 5 ISRv Umbrell a vedge ETA w/ Stealthwatch DNS-based security Web Filtering SD-WAN Server to Server between DCs WAN Public Cloud vedge NGFWv AMP SD-WAN Firewall IPS Malware Protection ETA with Stealthwatch NGFWv AMP Firewall IPS Malware Protection vedge SD-WAN Private DC WAN vedge SD-WAN ISRv Umbrell a ETA w/ Stealthwatch DNS-based security Web Filtering Client BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 59
60 Services /24 MSSP Topology Mgmt CIMC Mgmt CIMC Mgmt CIMC ISRv.2.1 vedge.1 TC /24.2 ENCS ISRv vedge.1 ENCS2.1 TC / / / / PC PC L4-7 L4-7 Branch A Tenant 1 Branch B Tenant MPLS Internet v /24 Qradar ESX1.1 RW Vision v / / vedge / vedge / ISRv.2.1 NGFWv.5.2 NGFWv vedge.1 ENCS ENCS / / ENCS3 CIMC.3 CIMC /24 Mgmt ASAv Mgmt ASAv Branch C TC PC L4-7 Tenant 2 Mobile User Tenant 1 VLAN CIMC Mgmt CSP1 vsmart vbond CIMC Mgmt.25. CSP2.1 RW DPVA v /24 Services /24.27 vsmart vbond vman age.26 ASR v /24.11 v /24.12 FMC.251 RW DPVA SMC.2 SWFC ASA.18.2 DNS.2.6 WWW / Mgmt CIMC Cloud Layer 3 Switch Private DC Tenant 1 Layer 3 Switch NTP / CIMC.78 Portal.34 VMS Internal HA Portal.35 VMS CP DNS VMS Control Plane Services Public Cloud Private DC PC.100 L4-7 TC PC.100 L4-7 TC Cloud Services (Internet) VLAN 9 SD-WAN Services /24 Lab Services /23 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 60
61 Services /24 Mgmt CIMC Mgmt CIMC Mgmt CIMC /24 ETA VPN.1 ISRv.2.1 vedge.1 Umbrella / /24 VPN ETA ISRv vedge /24.2 ENCS1 ENCS / Umbrella.101 TC Branch A Tenant 1 Branch B Tenant 1 Branch C Tenant 2.1 Mobile User Tenant 1 VLAN CIMC Mgmt CSP1 VLAN MPLS Internet.2 vsmart vbond MSSP Topology CIMC Mgmt.25. CSP2 SD-WAN Services / RW DPVA v / Services /24.27 vsmart vbond vman age.26 ASR Qradar ESX v /24 RW Vision v /24 v /24 TC PC L4-7 VPN IPS Web VPN IPS Web / vedge / vedge /24 ETA VPN Security Security ISRv.2.1 NGFWv.5.2 NGFWv vedge.1 ENCS4.90 AMP.2 FW.95 ENCS5 AMP FW / / ENCS3 CIMC.3 CIMC.3 Umbrella /24 Mgmt ASAv Mgmt ASAv TC RA VPN AMP PC PC L4-7 L4-7 Umbrella Where are Security Functions Enabled? DDOS ETA v /24 RA VPN.12 FMC.251 RW DPVA SMC ETA.2 SWFC RA VPN AS A DNS.2.6 WWW / Mgmt CIMC Cloud Layer 3 Switch Private DC Tenant 1 Layer 3 Switch NTP /24.2 CIMC.78 Portal.34 HA Portal.35 VMS Control Plane Services Public Cloud Private DC Cloud Services (Internet) Lab Services /23 BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 61.1 VMS Internal VMS CP DNS PC.100 L4-7 TC PC.100 L4-7 TC Umbrella AMP ThreatGrid
62 Conclusion
63 Please Complete Your Online Session Evaluation BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 63
64 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#brksec Cisco and/or its affiliates. All rights reserved. Cisco Public
65 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at Cisco and/or its affiliates. All rights reserved. Cisco Public
66 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions BRKSEC Cisco and/or its affiliates. All rights reserved. Cisco Public 66
67 Thank you
68
Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationCisco SD-WAN and DNA-C
Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationNext generation branch with SD-WAN and NFV
Next generation branch with SD-WAN and NFV Kiran Ghodgaonkar, Senior Manager, Enterprise Marketing Mani Ganeson, Senior Product Manager PSOCRS-2004 @ghodgaonkar Cisco Spark How Questions? Use Cisco Spark
More informationHow to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption
How to Predict, Detect & Stop threats at the Edge and Behind the Perimeter even in encrypted traffic without decryption Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist April 2018 New
More informationCisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017
Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationCisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.
Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.
More informationCloud-Managed Security for Distributed Networks with Cisco Meraki MX
Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationRouting Underlay and NFV Automation with DNA Center
BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationCisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer
Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability
More informationGlobal vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year
Global vision. Local knowledge. Cisco Forum Kyiv Country Day Month Year Firepower Next Generation Firewall Subtitle goes here William Young Security Solutions Architect, Global Security Architecture Team
More informationCisco Advanced Malware Protection against WannaCry
Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced
More informationIntelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access
Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private
More informationService Provider Security Architecture
Service Provider Security Architecture Andrew Turner Technical Marketing, Security Business Group April 12 th 2017 Digitization is disrupting the SP business The world has gone mobile Traffic growth, driven
More informationThreat Centric Network Security
BRKSEC-2056 Threat Centric Network Security Ted Bedwell, Principal Engineer Network Threat Defence Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationCisco Ransomware Defense The Ransomware Threat Is Real
Cisco Ransomware Defense The Ransomware Threat Is Real Seguridad Integrada Abril 2018 Ransomware B Malicious Software Encrypts Critical Data Demands Payment Permanent Data Loss Business Impacts Ramifications
More informationEvolution of Data Center Security Automated Security for Today s Dynamic Data Centers
Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers Speaker: Mun Hossain Director of Product Management - Security Business Group Cisco Twitter: @CiscoDCSecurity 2 Any
More informationCloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN
BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark
More informationDNA Automation Services Offerings
DNA Automation Services Offerings Jamie Owen, Solutions Architect, Cisco Advanced Services Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session
More informationCisco Comstor
Cisco Security @ Comstor 1 Agenda 1. Cisco Security Fundamentals Cyber Security? Cisco Security Solutions - Cisco NGFW - Cisco Umbrella Cisco Meraki, MR, MS, MV and MX Meraki Insight 2 1. Cisco Security
More informationCisco Security Exposed Through the Cyber Kill Chain
Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE
More informationMAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER
MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER Bret Hartman Cisco / Security & Government Group Session ID: SPO1-W25 Session Classification: General Interest 1 Mobility Cloud Threat Customer centric
More informationAMP for Endpoints & Threat Grid
AMP for Endpoints & Threat Grid Response & Prevention Dean De Beer & Eric Hulse BRKSEC-2029 AMP Threat Grid Malware Analysis Engines & Techniques A little background Malware Analysis & Threat Intelligence
More informationPSOACI Why ACI: An overview and a customer (BBVA) perspective. Technology Officer DC EMEAR Cisco
PSOACI-4592 Why ACI: An overview and a customer (BBVA) perspective TJ Bijlsma César Martinez Joaquin Crespo Technology Officer DC EMEAR Cisco Lead Architect BBVA Lead Architect BBVA Cisco Spark How Questions?
More informationCisco SD-Access Hands-on Lab
LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:
More informationCisco Virtual Managed Services
Data Sheet Cisco Virtual Managed Services SD-WAN Made Simple for Service Providers Cisco Virtual Managed Services (VMS) is a cloud native solution for service providers to automate, innovate and accelerate
More informationCisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab
Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?
More informationCloudCenter for Developers
DEVNET-1198 CloudCenter for Developers Conor Murphy, Systems Engineer Data Centre Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationVeč kot SDN - SDA arhitektura v uporabniških omrežjih
Več kot SDN - SDA arhitektura v uporabniških omrežjih Aleksander Kocelj SE Cisco Agenda - Introduction to Software Defined Access - Brief description on SDA - Cisco SDA Assurance - DEMO 2 New Requirements
More informationEnterprise Network Compute System (ENCS)
Enterprise Network Compute System (ENCS) Cisco vbranch Architecture Per Jensen, per@cisco.com Sept 2017 Agenda: Tech Update september-2017 1. ENCS update + demo v/per 2. Viptela update + demo v/dr Søren
More informationCisco AMP Solution. Rene Straube CSE, Cisco Germany January 2017
Cisco AMP Solution Rene Straube CSE, Cisco Germany January 2017 The AMP Everywhere Architecture AMP Protection Across the Extended Network for an Integrated Threat Defense AMP Threat Intelligence Cloud
More informationBuild a Software-Defined Network to Defend your Business
Build a Software-Defined Network to Defend your Business Filip Vanierschot Systems Engineer fvanierschot@juniper.net Kappa Data 2020 Software Defined Secure Networks Juniper s Innovation in Secure Networks
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationHidden Figures: Securing what you cannot see
Hidden Figures: Securing what you cannot see TK Keanini, Distinguished Engineer Stealthwatch, Advanced Threat Solutions CID-0006 Hello My Name is TK Keanini Keanini (Pronounced Kay-Ah-Nee-Nee) TK: The
More informationCisco ONE Software Overview. October 2017
Cisco ONE Software Overview October 2017 Agenda Why Cisco ONE Software and the Outcome Offers and Use Case Access (Wireless and Switching) WAN Cloud and Compute DC Networking Smart Accounts Resources Cisco
More informationSAFE Architecture Guide. Places in the Network: Secure Campus
SAFE Architecture Guide Places in the Network: Secure Campus January 2018 SAFE Architecture Guide Places in the Network: Secure Campus Contents January 2018 Contents 3 5 8 9 13 15 21 22 25 Overview Business
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationServiceability of SD-WAN
BRKCRS-2112 Serviceability of SD-WAN Chandrabalaji Rajaram & Ali Shaikh Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live
More informationHow to build a multi-layer Security Architecture to detect and remediate threats in real time
How to build a multi-layer Security Architecture to detect and remediate threats in real time Nikos Mourtzinos, CCIE #9763 Cisco Cyber Security Sales Specialist March 2018 Agenda Cisco Strategy Umbrella
More informationSourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationCISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1
CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/
More informationCisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview Organizations today are under the constant threat of cyber attack, and security breaches happen every day. Cisco Advanced Malware
More informationCisco ASA 5500-X NGFW
Cisco ASA 5500-X NGFW Sieťová ochrana pre malé a stredné podniky pred modernými hrozbami Peter Mesjar CCIE 17428, Systémový Inžinier, Cisco What are we going to talk about Problem is THREATS How today
More informationDelivering the Wireless Software-Defined Branch
Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,
More informationData Center Security. Fuat KILIÇ Consulting Systems
Data Center Security Fuat KILIÇ Consulting Systems Engineer @Security Data Center Evolution WHERE ARE YOU NOW? WHERE DO YOU WANT TO BE? Traditional Data Center Virtualized Data Center (VDC) Virtualized
More informationCisco Advanced Malware Protection. May 2016
Cisco Advanced Malware Protection May 2016 The Reality Organizations Are Under Attack and Malware Is Getting in 95% of large companies targeted by malicious traffic 100% Cybercrime is lucrative, barrier
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationEncrypted Traffic Analytics
Encrypted Traffic Analytics Introduction The rapid rise in encrypted traffic is changing the threat landscape. As more businesses become digital, a significant number of services and applications are using
More informationNetwork Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016
Network Automation and Branch Agility The Network Helps Enable Digital Business Rajinder Singh Product Sales Specialist June 2016 Agenda WAN Market Drivers Cisco Intelligent WAN (IWAN) Cisco Intelligent
More informationApplied Advanced Network Telemetry: ETA and Beyond
BRKSEC-2809 Applied Advanced Network Telemetry: ETA and Beyond TK Keanini, Principal Engineer Blake Anderson, Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationYes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com
Yes, You can protect your endpoints! Szilard Csordas, Security Consultant scsordas [at] cisco.com Endpoint Footprint Problem: TOO MANY AGENTS! Anti-Virus/Anti-Spyware agent IPSec/SSLVPN agent Host IPS/FW
More informationCisco Stealthwatch Endpoint License with Cisco AnyConnect NVM
Cisco Stealthwatch Endpoint License with Cisco AnyConnect NVM How to implement the Cisco Stealthwatch Endpoint License with the Cisco AnyConnect Network Visibility Module Table of Contents About This Document...
More informationLTRDCN-2100 Cloud networking solutions with Cisco Cloud Services Router (CSR 1000V) on AWS and Azure
LTRDCN-2100 Cloud networking solutions with Cisco Cloud Services Router (CSR 1000V) on AWS and Azure Fan Yang, Cisco, Engineer, Technical Marketing Raghavendra K S, Cisco, Engineer, Technical Marketing
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationCisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER
Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER Nicky Choo Head, Routes to Market & Business Partners, Asia Pacific, IBM Security & Cloud Jul 2018 Disconnected security capabilities
More informationCisco Tetration Analytics
Cisco Tetration Analytics Real-time application visibility and policy management using advanced analytics Yogesh Kaushik, Sr. Director Product Management PSOACI-2100 Agenda Market context Introduction:
More informationModern attacks and malware
Modern attacks and malware Everything starts with an email and web Dragan Novakovic Cisco Systems New Cyber Threat Reality Your environment will get breached You ll most likely be infected via email Hackers
More informationInnovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security
Innovative Cisco Security- Lösungen für den Endpoint Das Alpha und Omega unsere Next Gen Security Sven Kutzer Consulting Systems Engineer GSSO - CYBERSECURITY SALES Mittwoch, 7. März 2018 Challenges 2017
More informationCisco Enterprise Cloud Suite for Service Providers. Cisco Knowledge Network Data Center Jan 16, 2018
Cisco Enterprise Cloud Suite for Service Providers Cisco Knowledge Network Data Center Jan 16, 2018 Agenda Cisco ONE Software Suite Overview Cisco Enterprise Agreement for Cisco ONE Cisco Service Provider
More informationvbranch Introduction and Demo
v Introduction and Demo Innovation@Cisco November, 2015 Bart Van de Velde, Sr. Director, Engineering, Chief Technology & Architecture Office Simon Spraggs, Distinguished Consulting Engineer, Chief Technology
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationCisco Cyber Threat Defense Solution 1.0
Cisco Cyber Threat Defense Solution 1.0 Contents 1. Introduction to the Cisco Cyber Threat Defense Solution 1.0 2. Technical overview of the Cisco Cyber Threat Defense Solution 1.0 3. Using the Cisco Cyber
More informationAgenda: Insurance Academy Event
Agenda: Insurance Academy Event Drs Ing René Pluis MBA MBI Cyber Security Lead, Country Digitization Acceleration program the Netherlands The Hague, Thursday 16 November Introduction Integrated Security
More informationSimplify Technology Deployments
Cisco Security Enterprise License Agreement: Simplify Technology Deployments The need for Pervasive Security Coverage Security measures can t be limited to certain areas of your business. Mobility has
More informationUX - User Experience: Multi-Cloud Network Visibility
Data Sheet UX - User Experience: Multi-Cloud Network Visibility UX - User Experience monitoring User Experience dashboard summary application performance User Experience is a software module available
More informationA Pragmatic Approach to HealthCare Security. Hans Mathys CSE, Cybersecurity, Cisco Switzerland
A Pragmatic Approach to HealthCare Security Hans Mathys CSE, Cybersecurity, Cisco Switzerland Referatsabstract A Pragmatic Approach To HealthCare Security - Cyber-Security ist nicht nur eine Herausforderung
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationCisco UCS Director and ACI Advanced Deployment Lab
Cisco UCS Director and ACI Advanced Deployment Lab Michael Zimmerman, TME Vishal Mehta, TME Agenda Introduction Cisco UCS Director ACI Integration and Key Concepts Cisco UCS Director Application Container
More informationPrepare for Digital Network Architecture, NFV, and SDN with Cisco ONE Software
Prepare for Digital Network Architecture, NFV, and SDN with Cisco ONE Software Dan Lohmeyer, Bill Hentschell, Liad Ofek PSOSDN-1445 Agenda Digital Network Architecture Intelligent WAN Enterprise NFV Cisco
More informationCisco Container Platform
Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click
More informationSAFE Architecture Guide. Places in the Network: Secure Data Center
SAFE Architecture Guide Places in the Network: Secure Data Center April 2018 SAFE Architecture Guide Places in the Network: Secure Data Center Contents April 2018 Contents 3 5 8 9 14 16 25 26 28 Overview
More informationBusiness Resiliency Through Superior Threat Defense
Business Resiliency Through Superior Threat Defense Firepower 2100 Series/ Cisco Identity Services Engine Andre Lambertsen, Consulting Systems Engineer ala@cisco.com Cisco Firepower NGFW Fully Integrated
More informationSAFE Architecture Guide. Places in the Network: Secure Branch
SAFE Architecture Guide Places in the Network: Secure Branch January 2018 SAFE Architecture Guide Places in the Network: Secure Branch Contents January 2018 Contents 3 5 8 9 13 17 22 23 26 Overview Business
More informationNGFWv & ASAv in Public Cloud (AWS & Azure)
& in Public Cloud (AWS & Azure) Anubhav Swami, CCIE# 21208 Technical Marketing Engineer Your Speaker Anubhav Swami answami@cisco.com Technical Marketing Engineer 5 years in Cisco TAC 2 years in ASA BU
More informationSD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility
SD-WAN / Hybrid WAN : Leveraging SDN-NFV for Networks Agility Laurent Perrin, Director International Product Management, Orange Business Services Sylvain Quartier, SVP Enterprise Products Strategy & Alliances
More informationCybersecurity Roadmap: Global Healthcare Security Architecture
SESSION ID: TECH-W02F Cybersecurity Roadmap: Global Healthcare Security Architecture Nick H. Yoo Chief Security Architect Disclosure No affiliation to any vendor products No vendor endorsements Products
More informationStop Threats Before They Stop You
Stop Threats Before They Stop You Gain visibility and control as you speed time to containment of infected endpoints Andrew Peters, Sr. Manager, Security Technology Group Agenda Situation System Parts
More informationCustomer s journey into the private cloud with Cisco Enterprise Cloud Suite
Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker
More informationCisco SD-Access Building the Routed Underlay
Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationConsumerization. Copyright 2014 Trend Micro Inc. IT Work Load
Complete User Protection Consumerization IT Work Load 2 Then... File/Folder & Removable Media Email & Messaging Web Access Employees IT Admin 3 Now! File/Folder & Removable Media Email & Messaging Web
More informationImplementing Cisco Edge Network Security Solutions ( )
Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to
More informationCisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002
Cisco Cloud Architecture with Microsoft Cloud Platform Peter Lackey Technical Solutions Architect PSOSPG-1002 Agenda Joint Cisco and Microsoft Integration Efforts Introduction to CCA-MCP What is a Pattern?
More informationIntroduction to Cisco SD- WAN (Viptela)
LTRCRS-2005 Introduction to Cisco SD- WAN (Viptela) Brad Edgeworth, Systems Engineer, CCIE#31574 Dustin Schuemann, Solutions Architect Madhavan Aruanchalam, Technical Marketing Engineer Cisco Spark How
More information2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
2018 Cisco and/or its affiliates. All rights reserved. Cisco Public PSODCN-1030 Intent Based Systems Deliver Automation Dave Malik Cisco Fellow and Chief Architect Advanced Services @dmalik2 2018 Cisco
More informationCisco SD WAN for Service Providers
PSOSPG-2048 Cisco SD WAN for Service Providers Chandrodaya Prasad, Senior Director Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find
More informationKey Security Measures to Enable Next-Generation Data Center Transformation
Key Security Measures to Enable Next-Generation Data Center Transformation Bill McGee Senior Manager, Security Solutions Cisco Systems, Inc. Agenda Data Center Security Challenges Secure DC Strategies
More informationThe Future of Threat Prevention
The Future of Threat Prevention Bricata is the leading developer of Next Generation Intrusion Prevention Systems (NGIPS) technology, providing innovative, disruptive, high-speed, high-performance network
More informationCisco Solution Support
Service Definition Cisco Solution Support Security Solutions Service Definition October 2018 2015 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public Information. Page 1 of
More informationChapter 1: Content Security
Chapter 1: Content Security Cisco Cloud Web Security (CWS) Cisco offers Cisco Cloud Web Security (CWS) to protect End Stations and Users devices from infection. Cisco Cloud Web Security (CWS) depends upon
More informationDelivering Integrated Cyber Defense for the Cloud Generation Darren Thomson
Delivering Integrated Cyber Defense for the Generation Darren Thomson Vice President & CTO, EMEA Region Symantec In 2009 there were 2,361,414 new piece of malware created. In 2015 that number was 430,555,582
More information