Cloud-Managed Security for Distributed Networks with Cisco Meraki MX

Size: px
Start display at page:

Download "Cloud-Managed Security for Distributed Networks with Cisco Meraki MX"

Transcription

1

2 Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect

3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#

4 About the Cisco Meraki MX

5 Simplifying IT with cloud management A complete cloud managed IT solution Wireless, switching, security, SD-WAN, communications, EMM, and security cameras Integrated hardware, software, and cloud services Leader in cloud managed IT Among Cisco s fastest growing portfolios Over 140,000 unique customers Over 2 million Meraki network devices online 5

6 The Meraki full stack MR Wireless MX Security and WAN MS Switching Systems Manager EMM MC IP Telephony MV Security Cameras A complete cloud managed IT portfolio Single pane of glass management 6

7 A complete connectivity and threat management solution Security Next generation firewall AES encrypted VPN Intrusion prevention (IPS) Malware protection Geo-IP firewalling Networking 3G / 4G failover Branch routing WAN balancing and failover High Availability Intelligent path control Application Control Bandwidth shaping URL content filtering Quality of Service control 7

8 Why customers choose the Cisco Meraki MX Powerful security that s easy to implement Robust suite of Cisco Security technologies Intuitive GUI-based configuration Seamless updates from the cloud Exceptional scalability Zero-touch provisioning with cloud brokered VPN Easy centralized management with built-in remote troubleshooting tools Multi-location configuration templates Industry-leading visibility Fingerprints users, applications, devices, and threats Monitor one location or an entire deployment Unified monitoring and reporting with other Cisco Meraki technologies 8

9 Ironclad security Next Generation Firewall Intrusion Prevention (IPS) URL Content Filtering Geo-based security Application aware firewalling Based on Cisco Snort With over 80 categories and over 4 billion categorized URLs Allow or block traffic by country Malware Protection Automatic updates PCI compliance Cisco AMP and Threat Grid Software and security updates delivered from the cloud PCI 3.2 certified cloud management backend 9

10 Backed by Cisco Talos threat intelligence Internet-wide scanning 1.5 million malware samples / day 600 billion messages / day 16 billion web requests / day Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Telemetry Honeypots Over 100 threat intelligence partners Internal vulnerability discovery Open source communities Over 1100 threat traps 10

11 Reliable, cost effective connectivity with Meraki SD-WAN Dual uplink ports LTE failover Site to site VPN Intelligent path control Branch Routing High Availability Traffic shaping 2 uplink support on all MX models for load balancing and redundancy USB modem support in all models with automatic failover Cloud orchestrated VPN (Meraki Auto VPN) with load balancing and self-healing capabilities Policy based routing and performance based dynamic path selection Automatic route distribution via Auto VPN OSPF route advertisement BGP support coming soon Active/passive hardware redundancy Application bandwidth limiting and prioritization 11

12 Automated site-to-site VPN (Auto VPN) Simple Automatic Resilient Create VPN tunnels between locations with easy point-and-click interface, or apply configuration templates to enable and configure VPN at many locations at once VPN configuration generated and deployed automatically from the cloud create a mesh or hub-and-spoke topology with only a few clicks Automatically adjusts to changes in order to maintain secure connectivity during an ISP or datacenter outage, hardware failure, or IP address update 12

13 Application-aware intelligent path control Dual active VPN Load balance your VPN traffic over your hybrid WAN Policy based routing Select the preferred path for traffic based on protocol, port, source and destination IP, or even application Dynamic Path Selection Select the best VPN tunnel for traffic automatically based on performance The only solution to combine cutting edge SD-WAN with industry leading security technology 13

14 Extend Auto VPN and Meraki SD-WAN into AWS / Azure Datacenter 1 Branch Auto VPN SD-WAN AWS vmx Datacenter 2 14

15 Network Security use cases Cisco Meraki MX Cisco Firepower & ASA Existing Meraki customer Prizes simplicity first / Lean IT organization Needs high WAN performance with low cost Internet links (SD-WAN) Branch or distributed enterprise deployment Internet edge Enterprise edge deployment Datacenter Needs sophisticated threat investigation Existing Firepower, TrustSec, AMP for Endpoints customer 15

16 What s new

17 MX250 and MX450 Security Appliances Expanding the MX portfolio with new, high performance options High Throughput Flexible Interface types Modular redundant power 17

18 MX250 and MX450 Security Appliances MX250 MX450 Interfaces WAN 2 x 10G SFP+ 2 x 10G SFP+ LAN 8 x 1G RJ45 8 x 1G SFP 8 x 10G SFP+ 8 x 1G RJ45 8 x 1G SFP 8 x 10G SFP+ Firewall Throughput 4 Gbps 6 Gbps Recommended Clients 2,000 10,000 VPN Throughput 1 Gbps 2 Gbps 18

19 Z3 Teleworker Gateway Meraki Z1 Meraki Z3 New WAN 1 x 1GbE 1 x 1GbE LAN 4 x 1GbE 4 x GbE (1 x PoE) WLAN n ac wave 2 Firewall Throughput 50 Mbps 100 Mbps VPN Throughput 10 Mbps 50 Mbps 802.1x port authentication No Yes Vertical desktop mount No Yes Recommended clients

20 vmx100 for Azure Virtual MX now available for Microsoft Azure 500 Mbps VPN throughput Available in Azure Marketplace Full SD-WAN capabilities Same license 20

21 New release candidate firmware: MX Security Threat Grid FQDN/hostname firewall rules Syslog export of AMP events DNS-based Google safesearch and Youtube restriction (Google s recommended method) Full list URL filtering cloud lookups for HTTPS flows based on cert request Connectivity Layer 7 SD-WAN policies OSPF advertisement on LAN of NAT mode MX 1:Many NAT over AutoVPN BGP for VPN route redistribution Uplink IP configuration from Dashboard MX load monitoring Loss and Latency reporting (Uplink SLA) capabilities now enabled in Passthrough mode 21

22 Introducing Meraki Insight

23 Sound familiar? This is IT. How can I help? The network is slow My Wi-Fi is broken My Internet is down 22

24 External Internal What contributes to poor end user experience? LAN congestion Rogue actors Network design Network capacity limits WAN congestion Deploy Meraki Dashboard Tools (Traffic shaping, QoS, Air Marshal) Address with training, more infrastructure Application errors Application server processing time Authentication / DNS server response time Apply Meraki Insight 23

25 Meraki Insight Provides end-to-end visibility into how your end-users are experiencing their SaaS applications. Assists with application performance management and troubleshooting. QUESTION: How does this differ from what is built in? This offers data for external factors, including the entire Wide Area Network, ISPs and SaaS applications like Office 365, Salesforce.com, etc Similar to 3 rd party tools such as SolarWinds, Netscout, ThousandEyes 24

26 Meraki Insight in the dashboard 25

27 Meraki Insight in the dashboard Insight into both the network and application layers 26

28 Meraki Insight in the dashboard 27

29 Our first probe for Meraki Insight Meraki MX 28

30 Cisco Security Integrations and portfolio positioning

31 Analytics and Insights Threat Intelligence Cloud and Web Security Posture and Policy Security Architecture Network Infrastructure Malware Firewall Meraki MX Cisco ISE and TrustSec Remote Access Intrusion Prevention Endpoint Management = Limited integration or interoperability = Deeper integration = Active development or beta 31

32 Current integrations - Stealthwatch Integration details NetFlow export from MX can be consumed by Stealthwatch or Stealtwatch Cloud Key limitations No Flexible NetFlow No NAT flow stitching 32

33 Network-wide > General 33

34 Current integrations - ISE Integration details RADIUS authentication using ISE for wired connections on all MX64/MX65/Z3 models RADIUS authentication using ISE for wireless connections on MX64W/MX65W Key limitations No TrustSec capability on MX 34

35 ISE / Meraki feature compatibility matrix 35

36 Current integrations - Umbrella Integration details Use Umbrella resolvers for DNS resolution when serving DHCP from MX Key limitations No edns forwarding capability No visibility into applied Umbrella policies in Meraki Dashboard 36

37 Security Appliance > DHCP 37

38 Current integrations - AMP Integration details AMP for Networks with Threat Grid sandboxing on MX Native malware event visibility in Meraki Dashboard via Security Center Retrospective alerting via Dashboard and alerts Key limitations No correlation/trajectory between AMP on MX and AMP for Endpoints Only files downloaded via HTTP are inspected on MX 38

39 AMP and Threat Grid integration with MX Service File Reputation File Analysis File Retrospection Function Blocking of known malicious files Behavior analysis of unknown files Retrospective alerting upon disposition change Powered by AMP Cloud Threat Grid AMP Cloud *Trigger 39

40 Architecture? File Threat Analysis Grid File Analysis File AMP Reputation Cloud File Reputation Threat Intelligence Threat Intelligence NGFW NGIPS ISR ESA / CES WSA / Umbrella Endpoint Web Host ISE Stealthwatch Meraki MX Network Attached Controls 40

41 Meraki Security Center events Aggregated view of security events: File Analysis and Disposition Changes Quick drill into file analysis results Event filtering capabilities 41

42 Meraki Security Center events Aggregated view of security events Quick drill into file analysis results Identify clients and networks that are potentially infected 42

43 Current integrations Snort IPS Integration details Three curated IPS rulesets for detection or prevention Native IDS/IPS event visibility in Meraki Dashboard via Security Center Key limitations No customization of IPS rule sets Single-packet flows will not be blocked due to Snort not being run in-line 43

44 Organization > Security Center 44

45 Security Appliance > Threat protection 45

46 Two way communication with Talos Inbound Talos threat research and intelligence informs Snort signatures and the AMP malware database used on the MX Outbound Snort IPS telemetry data is provided back to Talos to inform threat research activities AMP lookup data from MXes is available to Talos, just like with other platforms 46

47 Demo

48 MX Product Portfolio

49 Simple, use case driven licensing Enterprise License Advanced Security License Next Generation Firewall Site-to-site and client VPN Intelligent path control Link bonding and failover Bandwidth shaping and QoS Branch routing All enterprise features, plus Content filtering (with Google SafeSearch enforcement) Cisco Advanced Malware Protection Snort IDS/IPS Threat Grid integration* Geo-based firewall rules Web caching Active/Passive high availability *additional Threat Grid subscription required 49

50 MX portfolio Teleworker Small Branch Medium Branch New Z1 Z3 ~5 users ac Wireless & PoE MX64 MX65 ~50 users ac wireless & PoE MX84 ~200 users FW throughput: 500 Mbps MX100 ~500 users FW throughput: 750 Mbps FW throughput: Mbps FW throughput: 250 Mbps Large Branch, Campus or Concentrator New New Virtual New MX250 MX400 MX450 MX600 vmx100 for AWS & Azure ~2,000 users FW throughput: 4 Gbps ~2,000 users FW throughput: 1 Gbps ~10,000 users FW throughput: 6 Gbps ~10,000 users FW throughput: 1 Gbps FW throughput: 750 Mbps VPN & SD-WAN features All MX devices support 3G/4G 50

51 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#

52 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at

53 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions 53

54 Thank you

55

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.

Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved. Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,

More information

JURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN

JURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN JURUMANI CLOUD MANAGED SECURITY & SD-WAN SECURITY BY DESIGN OVERVIEW Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed

More information

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief

More information

Cisco Comstor

Cisco Comstor Cisco Security @ Comstor 1 Agenda 1. Cisco Security Fundamentals Cyber Security? Cisco Security Solutions - Cisco NGFW - Cisco Umbrella Cisco Meraki, MR, MS, MV and MX Meraki Insight 2 1. Cisco Security

More information

Cisco Meraki Cloud Managed IT Solution Derrick Phua. May 12, 2017

Cisco Meraki Cloud Managed IT Solution Derrick Phua. May 12, 2017 Cisco Meraki Cloud Managed IT Solution Derrick Phua May 12, 2017 Why cloud managed IT? On-Demand scalability The cloud increases IT efficiency Manageability Scalability Cost Savings Turnkey installation

More information

Cisco Meraki Cloud-Managed Networking. George Carlan

Cisco Meraki Cloud-Managed Networking. George Carlan Cisco Meraki Cloud-Managed Networking George Carlan Cisco Networking Portfolio Cisco Enterprise Portfolio Cisco Cloud Managed Prime ISE Cloud Management & Policy Systems Manager Systems Manager WLAN Controllers

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

We re ready. Are you?

We re ready. Are you? We re ready. Are you? Deploying Scalable, Resilient WAN Architectures with Meraki MX and IWAN Joe Aronow - Product Specialist, Meraki MX Agenda Introduction: Cloud networking Meraki MX Security Appliances

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

Meraki MX Family Cloud Managed Security Appliances

Meraki MX Family Cloud Managed Security Appliances DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,

More information

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab

Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?

More information

SD-WAN Deployment Guide (CVD)

SD-WAN Deployment Guide (CVD) SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces

More information

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:

Cisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model: MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

Connected Experiences

Connected Experiences Connected Experiences 2017 Bio 7 years at Cisco Meraki Security / SD-WAN / Analytics / SP Launched MX in 2011 500M firewalls and counting Before, PM @ Dell (Wyse) Landscape Connected Experiences Applications

More information

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. 1 Agenda 1. Overview and company presentation 2. Solution presentation 3. Main benefits to show to customers 4. Deployment models 2 VeloCloud Company

More information

Meraki MX Cloud Managed Security & SD-WAN

Meraki MX Cloud Managed Security & SD-WAN Datasheet MX Meraki MX Cloud Managed Security & SD-WAN Overview Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed sites,

More information

Meraki Z-Series Cloud Managed Teleworker Gateway

Meraki Z-Series Cloud Managed Teleworker Gateway Datasheet Z Series Meraki Z-Series Cloud Managed Teleworker Gateway Fast, Reliable Connectivity for the Modern Teleworker The Cisco Meraki Z-Series teleworker gateway is an enterprise class firewall, VPN

More information

Meraki MX Family. Overview

Meraki MX Family. Overview DATASHEET Meraki MX Family Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure, and easy to manage. The world s

More information

MX Cloud Managed Security Appliance Series

MX Cloud Managed Security Appliance Series Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances is ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,

More information

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment

AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features

More information

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN

Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark

More information

MX Cloud Managed Security Appliance Series

MX Cloud Managed Security Appliance Series Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances are ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,

More information

NSG100 Nebula Cloud Managed Security Gateway

NSG100 Nebula Cloud Managed Security Gateway Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive

More information

Meraki MX CLOUD MANAGED SECURITY & SD-WAN

Meraki MX CLOUD MANAGED SECURITY & SD-WAN Datasheet MX Meraki MX CLOUD MANAGED SECURITY & SD-WAN Overview Cisco Meraki MX Security & SD-WAN Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution for distributed

More information

Peter Henry Andersen Cisco SE Ib Hansen Cisco SE Tech Update 04 Maj Cisco and/or its affiliates. All rights reserved.

Peter Henry Andersen Cisco SE Ib Hansen Cisco SE Tech Update 04 Maj Cisco and/or its affiliates. All rights reserved. Peter Henry Andersen Cisco SE Ib Hansen Cisco SE Tech Update 04 Maj 2016 2013 Cisco and/or its affiliates. All rights reserved. Cisco Meraki Cloud - UPDATE Cisco Meraki MR Wireless LAN Cisco Meraki MX

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

MX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)

MX Sizing Guide. 4Gon   Tel: +44 (0) Fax: +44 (0) MX Sizing Guide FEBRUARY 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth

More information

Meraki Solution Brochure

Meraki Solution Brochure Meraki 2016 Solution Brochure Introduction 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With

More information

Design and Deployment of SourceFire NGIPS and NGFWL

Design and Deployment of SourceFire NGIPS and NGFWL Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the

More information

Meraki 2018 Solution Brochure

Meraki 2018 Solution Brochure Meraki 2018 Solution Brochure INTRODUCTION 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With

More information

MX Cloud Managed Security Appliance Series

MX Cloud Managed Security Appliance Series Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances are ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

MR Cloud Managed Wireless Access Points

MR Cloud Managed Wireless Access Points Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise

More information

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.

Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9. Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,

More information

Cisco Meraki Overview. March 21, 2017

Cisco Meraki Overview. March 21, 2017 March 21, 2017 Cisco Meraki: 100% cloud-managed IT Cisco Meraki: a complete cloud-managed IT solution Wireless, switching, security, mobility management, and communications, all centrally managed over

More information

Beyond the network Meraki MC & MV. October 26, 2016

Beyond the network Meraki MC & MV. October 26, 2016 Beyond the network Meraki MC & MV October 26, 2016 Welcome to the 3rd session of the Meraki Cloud Networking webinar series! Use the Q and A panel to ask questions. Use the Chat panel to communicate with

More information

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Threat Centric Network Security

Threat Centric Network Security BRKSEC-2056 Threat Centric Network Security Ted Bedwell, Principal Engineer Network Threat Defence Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this

More information

SEVONE DATA APPLIANCE FOR EUE

SEVONE DATA APPLIANCE FOR EUE Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience. Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.

More information

Serviceability of SD-WAN

Serviceability of SD-WAN BRKCRS-2112 Serviceability of SD-WAN Chandrabalaji Rajaram & Ali Shaikh Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live

More information

Cisco Advanced Malware Protection against WannaCry

Cisco Advanced Malware Protection against WannaCry Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced

More information

Routing Underlay and NFV Automation with DNA Center

Routing Underlay and NFV Automation with DNA Center BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

SteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN Data Sheet SteelConnect The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming

More information

Implementing and Configuring Meraki Technologies (ICMT-CT)

Implementing and Configuring Meraki Technologies (ICMT-CT) Implementing and Configuring Meraki Technologies (ICMT-CT) COURSE OVERVIEW: This 5-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students

More information

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018 Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14

More information

Cisco SD-WAN and DNA-C

Cisco SD-WAN and DNA-C Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent

More information

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017

Cisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017 Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope

More information

Cisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339

Cisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339 Cisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339 Agenda Introduction to Lab Exercises Platforms and Solutions ASA with

More information

MR Cloud Managed Wireless Access Points

MR Cloud Managed Wireless Access Points MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise environments, the

More information

Deploying Intrusion Prevention Systems

Deploying Intrusion Prevention Systems Deploying Intrusion Prevention Systems Gary Halleen Consulting Systems Engineer II Agenda Introductions Introduction to IPS Comparing Cisco IPS Solutions IPS Deployment Considerations Migration from IPS

More information

Implementing Cisco Edge Network Security Solutions ( )

Implementing Cisco Edge Network Security Solutions ( ) Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to

More information

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers

Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda

More information

MR Cloud Managed Wireless Access Points

MR Cloud Managed Wireless Access Points Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise

More information

Enhanced Threat Detection, Investigation, and Response

Enhanced Threat Detection, Investigation, and Response Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution

More information

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based

More information

Cisco SD-Access Building the Routed Underlay

Cisco SD-Access Building the Routed Underlay Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

Introduction to Cloud Networking. Company and Product Overview

Introduction to Cloud Networking. Company and Product Overview Introduction to Cloud Networking Company and Product Overview About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed - Founded in 2006 at MIT - tradition of innovation

More information

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.

Cisco Meraki solution overview Cisco and/or its affiliates. All rights reserved. Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,

More information

SEVONE END USER EXPERIENCE

SEVONE END USER EXPERIENCE Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure

More information

Meraki 2014 Solution Brochure

Meraki 2014 Solution Brochure Meraki 2014 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.

More information

Agile Security Solutions

Agile Security Solutions Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization

More information

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN Data Sheet SteelConnect The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming more

More information

Compare Security Analytics Solutions

Compare Security Analytics Solutions Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch

More information

Simplifying WAN Architecture

Simplifying WAN Architecture Simplifying WAN Architecture Migrating without a network forklift upgrade Phased approach with existing environment Architecture and management complexity Automation of deployment, management and maintenance

More information

NSG50/100/200 Nebula Cloud Managed Security Gateway

NSG50/100/200 Nebula Cloud Managed Security Gateway NSG50/100/200 The Zyxel is built with remote management and ironclad security for organizations with multiple distributed sites. With an extensive suite of security features including ICSAcertified firewall,

More information

VeloCloud SD-WAN Subscription

VeloCloud SD-WAN Subscription Enterprise/Premium Subscription Datasheet VeloCloud SD-WAN Subscription VeloCloud Cloud Delivered SD-WAN assures enterprise and cloud application performance over Internet and hybrid WAN while simplifying

More information

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The

More information

Prepare Your Network for BYOD. Meraki Webinar Series

Prepare Your Network for BYOD. Meraki Webinar Series Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product

More information

Cisco Firepower NGIPS Tuning and Best Practices

Cisco Firepower NGIPS Tuning and Best Practices Cisco Firepower NGIPS Tuning and Best Practices John Wise, Security Instructor High Touch Delivery, Cisco Learning Services CTHCRT-2000 Cisco Spark How Questions? Use Cisco Spark to communicate with the

More information

Business Resiliency Through Superior Threat Defense

Business Resiliency Through Superior Threat Defense Business Resiliency Through Superior Threat Defense Firepower 2100 Series/ Cisco Identity Services Engine Andre Lambertsen, Consulting Systems Engineer ala@cisco.com Cisco Firepower NGFW Fully Integrated

More information

Meraki MS Series Switches

Meraki MS Series Switches Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising

More information

Cisco SD-Access Hands-on Lab

Cisco SD-Access Hands-on Lab LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:

More information

Cisco Security Exposed Through the Cyber Kill Chain

Cisco Security Exposed Through the Cyber Kill Chain Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE

More information

Cisco - ASA Lab Camp v9.0

Cisco - ASA Lab Camp v9.0 Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment

More information

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private

More information

Introduction to Cisco SD- WAN (Viptela)

Introduction to Cisco SD- WAN (Viptela) LTRCRS-2005 Introduction to Cisco SD- WAN (Viptela) Brad Edgeworth, Systems Engineer, CCIE#31574 Dustin Schuemann, Solutions Architect Madhavan Aruanchalam, Technical Marketing Engineer Cisco Spark How

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed

More information

SMALL BUSINESS. Model 20/30/50 30 LTE One 210/ BPL-210 BPL-310

SMALL BUSINESS. Model 20/30/50 30 LTE One 210/ BPL-210 BPL-310 BRANCH/SMALL OFFICE SMALL BUSINESS MID-SIZE BUSINESS LARGE ENTERPRISE/CAMPUS Model 20/30/50 30 LTE One 210/310 305 380 580 710 1350 2500 Product Code BPL-021 BPL- BPL- BPL-210 BPL-305 BPL-380 BPL-580 BPL-710

More information

Cisco Security Enterprise License Agreement

Cisco Security Enterprise License Agreement Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves

More information

WHITE PAPER ARUBA SD-BRANCH OVERVIEW

WHITE PAPER ARUBA SD-BRANCH OVERVIEW WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing

More information

Delivering the Wireless Software-Defined Branch

Delivering the Wireless Software-Defined Branch Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,

More information

Meraki MS Series Switches

Meraki MS Series Switches Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising

More information

INNOVATIVE SD-WAN TECHNOLOGY

INNOVATIVE SD-WAN TECHNOLOGY INNOVATIVE SD-WAN TECHNOLOGY Enhance network performance and increase ROI with WANworX TM Many of the WAN deployments today are based on older technology that was acceptable when businesses did not run

More information

Introduction. Trusted by Thousands of Customers Worldwide. Recognized for Innovation

Introduction. Trusted by Thousands of Customers Worldwide. Recognized for Innovation 2013 Company Brochure Introduction 100% Cloud Managed Enterprise Networks Meraki s cloud managed edge and branch networking solutions bring simplicity to enterprise-class networks. With wireless, switching,

More information

DCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018

DCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018 DCCS Business Breakfast Walter Greiner Systems Engineer Sales März 2018 Why Wireless is important? more then since 2016 1 IP Traffic 2020 1 66% 34% Fixed Mobile 1 Source: Cisco Visual Networking Index,

More information

CCNP Switch Questions/Answers Cisco Enterprise Campus Architecture

CCNP Switch Questions/Answers Cisco Enterprise Campus Architecture In its network design, a company lists this equipment: - Two Catalyst 4503 Layer 3 switches - One 5500 security appliance firewall - Two Catalyst 6509 switches - Two Lightweight Access Points - Two Catalyst

More information

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers

More information

Cisco Advanced Malware Protection for Networks

Cisco Advanced Malware Protection for Networks Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)

More information

Tetration Hands-on Lab from Deployment to Operations Support

Tetration Hands-on Lab from Deployment to Operations Support LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate

More information

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Security Requirements Security Requirements, on

More information

Features. HDX WAN optimization. QoS

Features. HDX WAN optimization. QoS May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified

More information

ExtremeWireless WiNG NX 9500

ExtremeWireless WiNG NX 9500 DATA SHEET ExtremeWireless WiNG NX 9500 Integrated Services Platform Series for the Private Cloud FEATURES COMPLETE VISIBILITY OF THE ENTIRE DISTRIBUTED DEPLOYMENT One point of configuration; ExtremeWireless

More information

ISG-600 Cloud Gateway

ISG-600 Cloud Gateway ISG-600 Cloud Gateway Cumilon ISG Integrated Security Gateway Integrated Security Gateway Cumilon ISG-600C cloud gateway is the security product developed by Systrome for the distributed access network

More information

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: About Security, Internet Access, and Communication

More information

Security, Internet Access, and Communication Ports

Security, Internet Access, and Communication Ports Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Overview: Security, Internet Access, and Communication

More information