Cloud-Managed Security for Distributed Networks with Cisco Meraki MX
|
|
- Arabella Copeland
- 5 years ago
- Views:
Transcription
1
2 Cloud-Managed Security for Distributed Networks with Cisco Meraki MX Joe Aronow, Product Architect
3 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#
4 About the Cisco Meraki MX
5 Simplifying IT with cloud management A complete cloud managed IT solution Wireless, switching, security, SD-WAN, communications, EMM, and security cameras Integrated hardware, software, and cloud services Leader in cloud managed IT Among Cisco s fastest growing portfolios Over 140,000 unique customers Over 2 million Meraki network devices online 5
6 The Meraki full stack MR Wireless MX Security and WAN MS Switching Systems Manager EMM MC IP Telephony MV Security Cameras A complete cloud managed IT portfolio Single pane of glass management 6
7 A complete connectivity and threat management solution Security Next generation firewall AES encrypted VPN Intrusion prevention (IPS) Malware protection Geo-IP firewalling Networking 3G / 4G failover Branch routing WAN balancing and failover High Availability Intelligent path control Application Control Bandwidth shaping URL content filtering Quality of Service control 7
8 Why customers choose the Cisco Meraki MX Powerful security that s easy to implement Robust suite of Cisco Security technologies Intuitive GUI-based configuration Seamless updates from the cloud Exceptional scalability Zero-touch provisioning with cloud brokered VPN Easy centralized management with built-in remote troubleshooting tools Multi-location configuration templates Industry-leading visibility Fingerprints users, applications, devices, and threats Monitor one location or an entire deployment Unified monitoring and reporting with other Cisco Meraki technologies 8
9 Ironclad security Next Generation Firewall Intrusion Prevention (IPS) URL Content Filtering Geo-based security Application aware firewalling Based on Cisco Snort With over 80 categories and over 4 billion categorized URLs Allow or block traffic by country Malware Protection Automatic updates PCI compliance Cisco AMP and Threat Grid Software and security updates delivered from the cloud PCI 3.2 certified cloud management backend 9
10 Backed by Cisco Talos threat intelligence Internet-wide scanning 1.5 million malware samples / day 600 billion messages / day 16 billion web requests / day Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Telemetry Honeypots Over 100 threat intelligence partners Internal vulnerability discovery Open source communities Over 1100 threat traps 10
11 Reliable, cost effective connectivity with Meraki SD-WAN Dual uplink ports LTE failover Site to site VPN Intelligent path control Branch Routing High Availability Traffic shaping 2 uplink support on all MX models for load balancing and redundancy USB modem support in all models with automatic failover Cloud orchestrated VPN (Meraki Auto VPN) with load balancing and self-healing capabilities Policy based routing and performance based dynamic path selection Automatic route distribution via Auto VPN OSPF route advertisement BGP support coming soon Active/passive hardware redundancy Application bandwidth limiting and prioritization 11
12 Automated site-to-site VPN (Auto VPN) Simple Automatic Resilient Create VPN tunnels between locations with easy point-and-click interface, or apply configuration templates to enable and configure VPN at many locations at once VPN configuration generated and deployed automatically from the cloud create a mesh or hub-and-spoke topology with only a few clicks Automatically adjusts to changes in order to maintain secure connectivity during an ISP or datacenter outage, hardware failure, or IP address update 12
13 Application-aware intelligent path control Dual active VPN Load balance your VPN traffic over your hybrid WAN Policy based routing Select the preferred path for traffic based on protocol, port, source and destination IP, or even application Dynamic Path Selection Select the best VPN tunnel for traffic automatically based on performance The only solution to combine cutting edge SD-WAN with industry leading security technology 13
14 Extend Auto VPN and Meraki SD-WAN into AWS / Azure Datacenter 1 Branch Auto VPN SD-WAN AWS vmx Datacenter 2 14
15 Network Security use cases Cisco Meraki MX Cisco Firepower & ASA Existing Meraki customer Prizes simplicity first / Lean IT organization Needs high WAN performance with low cost Internet links (SD-WAN) Branch or distributed enterprise deployment Internet edge Enterprise edge deployment Datacenter Needs sophisticated threat investigation Existing Firepower, TrustSec, AMP for Endpoints customer 15
16 What s new
17 MX250 and MX450 Security Appliances Expanding the MX portfolio with new, high performance options High Throughput Flexible Interface types Modular redundant power 17
18 MX250 and MX450 Security Appliances MX250 MX450 Interfaces WAN 2 x 10G SFP+ 2 x 10G SFP+ LAN 8 x 1G RJ45 8 x 1G SFP 8 x 10G SFP+ 8 x 1G RJ45 8 x 1G SFP 8 x 10G SFP+ Firewall Throughput 4 Gbps 6 Gbps Recommended Clients 2,000 10,000 VPN Throughput 1 Gbps 2 Gbps 18
19 Z3 Teleworker Gateway Meraki Z1 Meraki Z3 New WAN 1 x 1GbE 1 x 1GbE LAN 4 x 1GbE 4 x GbE (1 x PoE) WLAN n ac wave 2 Firewall Throughput 50 Mbps 100 Mbps VPN Throughput 10 Mbps 50 Mbps 802.1x port authentication No Yes Vertical desktop mount No Yes Recommended clients
20 vmx100 for Azure Virtual MX now available for Microsoft Azure 500 Mbps VPN throughput Available in Azure Marketplace Full SD-WAN capabilities Same license 20
21 New release candidate firmware: MX Security Threat Grid FQDN/hostname firewall rules Syslog export of AMP events DNS-based Google safesearch and Youtube restriction (Google s recommended method) Full list URL filtering cloud lookups for HTTPS flows based on cert request Connectivity Layer 7 SD-WAN policies OSPF advertisement on LAN of NAT mode MX 1:Many NAT over AutoVPN BGP for VPN route redistribution Uplink IP configuration from Dashboard MX load monitoring Loss and Latency reporting (Uplink SLA) capabilities now enabled in Passthrough mode 21
22 Introducing Meraki Insight
23 Sound familiar? This is IT. How can I help? The network is slow My Wi-Fi is broken My Internet is down 22
24 External Internal What contributes to poor end user experience? LAN congestion Rogue actors Network design Network capacity limits WAN congestion Deploy Meraki Dashboard Tools (Traffic shaping, QoS, Air Marshal) Address with training, more infrastructure Application errors Application server processing time Authentication / DNS server response time Apply Meraki Insight 23
25 Meraki Insight Provides end-to-end visibility into how your end-users are experiencing their SaaS applications. Assists with application performance management and troubleshooting. QUESTION: How does this differ from what is built in? This offers data for external factors, including the entire Wide Area Network, ISPs and SaaS applications like Office 365, Salesforce.com, etc Similar to 3 rd party tools such as SolarWinds, Netscout, ThousandEyes 24
26 Meraki Insight in the dashboard 25
27 Meraki Insight in the dashboard Insight into both the network and application layers 26
28 Meraki Insight in the dashboard 27
29 Our first probe for Meraki Insight Meraki MX 28
30 Cisco Security Integrations and portfolio positioning
31 Analytics and Insights Threat Intelligence Cloud and Web Security Posture and Policy Security Architecture Network Infrastructure Malware Firewall Meraki MX Cisco ISE and TrustSec Remote Access Intrusion Prevention Endpoint Management = Limited integration or interoperability = Deeper integration = Active development or beta 31
32 Current integrations - Stealthwatch Integration details NetFlow export from MX can be consumed by Stealthwatch or Stealtwatch Cloud Key limitations No Flexible NetFlow No NAT flow stitching 32
33 Network-wide > General 33
34 Current integrations - ISE Integration details RADIUS authentication using ISE for wired connections on all MX64/MX65/Z3 models RADIUS authentication using ISE for wireless connections on MX64W/MX65W Key limitations No TrustSec capability on MX 34
35 ISE / Meraki feature compatibility matrix 35
36 Current integrations - Umbrella Integration details Use Umbrella resolvers for DNS resolution when serving DHCP from MX Key limitations No edns forwarding capability No visibility into applied Umbrella policies in Meraki Dashboard 36
37 Security Appliance > DHCP 37
38 Current integrations - AMP Integration details AMP for Networks with Threat Grid sandboxing on MX Native malware event visibility in Meraki Dashboard via Security Center Retrospective alerting via Dashboard and alerts Key limitations No correlation/trajectory between AMP on MX and AMP for Endpoints Only files downloaded via HTTP are inspected on MX 38
39 AMP and Threat Grid integration with MX Service File Reputation File Analysis File Retrospection Function Blocking of known malicious files Behavior analysis of unknown files Retrospective alerting upon disposition change Powered by AMP Cloud Threat Grid AMP Cloud *Trigger 39
40 Architecture? File Threat Analysis Grid File Analysis File AMP Reputation Cloud File Reputation Threat Intelligence Threat Intelligence NGFW NGIPS ISR ESA / CES WSA / Umbrella Endpoint Web Host ISE Stealthwatch Meraki MX Network Attached Controls 40
41 Meraki Security Center events Aggregated view of security events: File Analysis and Disposition Changes Quick drill into file analysis results Event filtering capabilities 41
42 Meraki Security Center events Aggregated view of security events Quick drill into file analysis results Identify clients and networks that are potentially infected 42
43 Current integrations Snort IPS Integration details Three curated IPS rulesets for detection or prevention Native IDS/IPS event visibility in Meraki Dashboard via Security Center Key limitations No customization of IPS rule sets Single-packet flows will not be blocked due to Snort not being run in-line 43
44 Organization > Security Center 44
45 Security Appliance > Threat protection 45
46 Two way communication with Talos Inbound Talos threat research and intelligence informs Snort signatures and the AMP malware database used on the MX Outbound Snort IPS telemetry data is provided back to Talos to inform threat research activities AMP lookup data from MXes is available to Talos, just like with other platforms 46
47 Demo
48 MX Product Portfolio
49 Simple, use case driven licensing Enterprise License Advanced Security License Next Generation Firewall Site-to-site and client VPN Intelligent path control Link bonding and failover Bandwidth shaping and QoS Branch routing All enterprise features, plus Content filtering (with Google SafeSearch enforcement) Cisco Advanced Malware Protection Snort IDS/IPS Threat Grid integration* Geo-based firewall rules Web caching Active/Passive high availability *additional Threat Grid subscription required 49
50 MX portfolio Teleworker Small Branch Medium Branch New Z1 Z3 ~5 users ac Wireless & PoE MX64 MX65 ~50 users ac wireless & PoE MX84 ~200 users FW throughput: 500 Mbps MX100 ~500 users FW throughput: 750 Mbps FW throughput: Mbps FW throughput: 250 Mbps Large Branch, Campus or Concentrator New New Virtual New MX250 MX400 MX450 MX600 vmx100 for AWS & Azure ~2,000 users FW throughput: 4 Gbps ~2,000 users FW throughput: 1 Gbps ~10,000 users FW throughput: 6 Gbps ~10,000 users FW throughput: 1 Gbps FW throughput: 750 Mbps VPN & SD-WAN features All MX devices support 3G/4G 50
51 Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click Join the Discussion 3. Install Spark or go directly to the space 4. Enter messages/questions in the space cs.co/ciscolivebot#
52 Please complete your Online Session Evaluations after each session Complete 4 Session Evaluations & the Overall Conference Evaluation (available from Thursday) to receive your Cisco Live T-shirt All surveys can be completed via the Cisco Live Mobile App or the Communication Stations Complete Your Online Session Evaluation Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at
53 Continue Your Education Demos in the Cisco campus Walk-in Self-Paced Labs Tech Circle Meet the Engineer 1:1 meetings Related sessions 53
54 Thank you
55
Ciprian Stroe Senior Presales Consultant, CCIE# Cisco and/or its affiliates. All rights reserved.
Ciprian Stroe Senior Presales Consultant, CCIE#45766 2015 Cisco and/or its affiliates. All rights reserved. Complete cloud-managed networking solution Wireless, switching, security, MDM Integrated hardware,
More informationJURUMANI MERAKI CLOUD MANAGED SECURITY & SD-WAN
JURUMANI CLOUD MANAGED SECURITY & SD-WAN SECURITY BY DESIGN OVERVIEW Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed
More informationResilient WAN and Security for Distributed Networks with Cisco Meraki MX
Resilient WAN and Security for Distributed Networks with Cisco Meraki MX Daghan Altas, Director of Product Management BRKSEC-2900 Agenda Problem Cisco CNG Live network creation demo (45m) Product Brief
More informationCisco Comstor
Cisco Security @ Comstor 1 Agenda 1. Cisco Security Fundamentals Cyber Security? Cisco Security Solutions - Cisco NGFW - Cisco Umbrella Cisco Meraki, MR, MS, MV and MX Meraki Insight 2 1. Cisco Security
More informationCisco Meraki Cloud Managed IT Solution Derrick Phua. May 12, 2017
Cisco Meraki Cloud Managed IT Solution Derrick Phua May 12, 2017 Why cloud managed IT? On-Demand scalability The cloud increases IT efficiency Manageability Scalability Cost Savings Turnkey installation
More informationCisco Meraki Cloud-Managed Networking. George Carlan
Cisco Meraki Cloud-Managed Networking George Carlan Cisco Networking Portfolio Cisco Enterprise Portfolio Cisco Cloud Managed Prime ISE Cloud Management & Policy Systems Manager Systems Manager WLAN Controllers
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationWe re ready. Are you?
We re ready. Are you? Deploying Scalable, Resilient WAN Architectures with Meraki MX and IWAN Joe Aronow - Product Specialist, Meraki MX Agenda Introduction: Cloud networking Meraki MX Security Appliances
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationMeraki MX Family Cloud Managed Security Appliances
DATASHEET Meraki MX Family Cloud Managed Security Appliances Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure,
More informationCisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab
Cisco SD-WAN (Viptela) Migration, QoS and Advanced Policies Hands-on Lab Ali Shaikh Technical Leader Faraz Shamim Sr. Technical Leader Mossaddaq Turabi Distinguished ENgineer Cisco Spark How Questions?
More informationSD-WAN Deployment Guide (CVD)
SD-WAN Deployment Guide (CVD) All Cisco Meraki security appliances are equipped with SD-WAN capabilities that enable administrators to maximize network resiliency and bandwidth efficiency. This guide introduces
More informationCisco Meraki MX products come in 6 models. The chart below outlines MX hardware properties for each model:
MX Sizing Guide AUGUST 2016 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationConnected Experiences
Connected Experiences 2017 Bio 7 years at Cisco Meraki Security / SD-WAN / Analytics / SP Launched MX in 2011 500M firewalls and counting Before, PM @ Dell (Wyse) Landscape Connected Experiences Applications
More informationVeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH
VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. 1 Agenda 1. Overview and company presentation 2. Solution presentation 3. Main benefits to show to customers 4. Deployment models 2 VeloCloud Company
More informationMeraki MX Cloud Managed Security & SD-WAN
Datasheet MX Meraki MX Cloud Managed Security & SD-WAN Overview Cisco Meraki MX Security Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution, for distributed sites,
More informationMeraki Z-Series Cloud Managed Teleworker Gateway
Datasheet Z Series Meraki Z-Series Cloud Managed Teleworker Gateway Fast, Reliable Connectivity for the Modern Teleworker The Cisco Meraki Z-Series teleworker gateway is an enterprise class firewall, VPN
More informationMeraki MX Family. Overview
DATASHEET Meraki MX Family Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure, and easy to manage. The world s
More informationMX Cloud Managed Security Appliance Series
Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances is ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,
More informationAlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment
BRKPAR-2488 AlgoSec: How to Secure and Automate Your Heterogeneous Cisco Environment Edy Almer How to Secure and Automate Your Heterogeneous Cisco Environment Yogesh Kaushik, Senior Director Cisco Doug
More informationNSG50/100/200 Nebula Cloud Managed Security Gateway
NSG50/100/200 Managed The Zyxel Managed is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive suite of security features
More informationCloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN
BRKCRS-2113 Cloud-Ready WAN For IAAS & SaaS With Cisco s Next- Gen SD-WAN Sumanth Kakaraparthi Product Leader SD-WAN Manan Shah Director Of Product Management Cisco Spark How Questions? Use Cisco Spark
More informationMX Cloud Managed Security Appliance Series
Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances are ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,
More informationNSG100 Nebula Cloud Managed Security Gateway
Managed Security Gateway The Zyxel Nebula Cloud Managed Security Gateway is built with remote management and ironclad security for organizations with growing numbers of distributed sites. With the extensive
More informationMeraki MX CLOUD MANAGED SECURITY & SD-WAN
Datasheet MX Meraki MX CLOUD MANAGED SECURITY & SD-WAN Overview Cisco Meraki MX Security & SD-WAN Appliances are ideal for organizations considering a Unified Threat Managment (UTM) solution for distributed
More informationPeter Henry Andersen Cisco SE Ib Hansen Cisco SE Tech Update 04 Maj Cisco and/or its affiliates. All rights reserved.
Peter Henry Andersen Cisco SE Ib Hansen Cisco SE Tech Update 04 Maj 2016 2013 Cisco and/or its affiliates. All rights reserved. Cisco Meraki Cloud - UPDATE Cisco Meraki MR Wireless LAN Cisco Meraki MX
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More informationMX Sizing Guide. 4Gon Tel: +44 (0) Fax: +44 (0)
MX Sizing Guide FEBRUARY 2015 This technical document provides guidelines for choosing the right Cisco Meraki security appliance based on real-world deployments, industry standard benchmarks and in-depth
More informationMeraki Solution Brochure
Meraki 2016 Solution Brochure Introduction 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationMeraki 2018 Solution Brochure
Meraki 2018 Solution Brochure INTRODUCTION 100% Cloud Managed IT Cisco Meraki cloud managed edge, branch, and enterprise-class campus IT solutions bring simplicity to organizations of every size. With
More informationMX Cloud Managed Security Appliance Series
Datasheet MX MX Cloud Managed Security Appliance Series Overview Cisco Meraki MX Security Appliances are ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed,
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationAby se z toho bezpečnostní správci nezbláznili Cisco security integrace. Milan Habrcetl Cisco CyberSecurity Specialist Mikulov, 5. 9.
Aby se z toho bezpečnostní správci nezbláznili aneb Cisco security integrace Aby se z toho bezpečnostní správci nezbláznili Cisco security integrace Milan Habrcetl Cisco CyberSecurity Specialist Mikulov,
More informationCisco Meraki Overview. March 21, 2017
March 21, 2017 Cisco Meraki: 100% cloud-managed IT Cisco Meraki: a complete cloud-managed IT solution Wireless, switching, security, mobility management, and communications, all centrally managed over
More informationBeyond the network Meraki MC & MV. October 26, 2016
Beyond the network Meraki MC & MV October 26, 2016 Welcome to the 3rd session of the Meraki Cloud Networking webinar series! Use the Q and A panel to ask questions. Use the Chat panel to communicate with
More informationCisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer
Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationThreat Centric Network Security
BRKSEC-2056 Threat Centric Network Security Ted Bedwell, Principal Engineer Network Threat Defence Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationSEVONE DATA APPLIANCE FOR EUE
Insight for the Connected World Data Appliance for EUE [ DataSheet ] SEVONE DATA APPLIANCE FOR EUE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationCisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.
Cisco Securely connect any user to any application across any platform, all with a consistent user experience. Introduction Moving applications to the cloud requires faster, more reliable connectivity.
More informationServiceability of SD-WAN
BRKCRS-2112 Serviceability of SD-WAN Chandrabalaji Rajaram & Ali Shaikh Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live
More informationCisco Advanced Malware Protection against WannaCry
Cisco Advanced Malware Protection against WannaCry "A false sense of security is worse than a true sense of insecurity" Senad Aruc Consulting Systems Engineer Advanced Threats Group Nils Roald Advanced
More informationRouting Underlay and NFV Automation with DNA Center
BRKRST-1888 Routing Underlay and NFV Automation with DNA Center Prakash Rajamani, Director, Product Management Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationSteelConnect. The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN
Data Sheet SteelConnect The Future of Networking is here. It s Application- Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming
More informationImplementing and Configuring Meraki Technologies (ICMT-CT)
Implementing and Configuring Meraki Technologies (ICMT-CT) COURSE OVERVIEW: This 5-day Cisco course provide students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students
More informationCisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018
Cisco SD-WAN Intent-based networking for the branch and WAN Carlos Infante PSS EN Spain March 2018 Aug-12 Oct-12 Dec-12 Feb-13 Apr-13 Jun-13 Aug-13 Oct-13 Dec-13 Feb-14 Apr-14 Jun-14 Aug-14 Oct-14 Dec-14
More informationCisco SD-WAN and DNA-C
Cisco SD-WAN and DNA-C SD-WAN Cisco SD-WAN Intent-based networking for the branch and WAN 4x Improved application experience Better user experience Deploy applications in minutes on any platform with consistent
More informationCisco Security. Advanced Malware Protection. Guillermo González Security Systems Engineer Octubre 2017
Cisco Security Advanced Malware Protection Guillermo González Security Systems Engineer Octubre 2017 The New Security Model Attack Continuum Before During After Before Discover During Detect After Scope
More informationCisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339
Cisco ASA with FirePOWER services Eric Kostlan, Technical Marketing Engineer Security Technologies Group, Cisco Systems LABSEC-2339 Agenda Introduction to Lab Exercises Platforms and Solutions ASA with
More informationMR Cloud Managed Wireless Access Points
MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise environments, the
More informationDeploying Intrusion Prevention Systems
Deploying Intrusion Prevention Systems Gary Halleen Consulting Systems Engineer II Agenda Introductions Introduction to IPS Comparing Cisco IPS Solutions IPS Deployment Considerations Migration from IPS
More informationImplementing Cisco Edge Network Security Solutions ( )
Implementing Cisco Edge Network Security Solutions (300-206) Exam Description: The Implementing Cisco Edge Network Security (SENSS) (300-206) exam tests the knowledge of a network security engineer to
More informationIpswitch: The New way of Network Monitoring and how to provide managed services to its customers
BRKPAR-2333 Ipswitch: The New way of Network Monitoring and how to provide managed services to its customers Paolo Ferrari, Senior Director Sales Southern Europe, Ipswitch, Inc. WhatsUp Gold Jan 2018 Agenda
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationEnhanced Threat Detection, Investigation, and Response
Enhanced Threat Detection, Investigation, and Response What s new in Cisco Stealthwatch Enterprise Release 6.10.2 Cisco Stealthwatch Enterprise is a comprehensive visibility and security analytics solution
More informationCato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief
Cato Cloud Software-defined and cloud-based secure enterprise network Solution Brief Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise Cato Networks: Software-defined and Cloud-based
More informationCisco SD-Access Building the Routed Underlay
Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationIntroduction to Cloud Networking. Company and Product Overview
Introduction to Cloud Networking Company and Product Overview About Meraki, part of Cisco Leader in cloud networking: 20,000+ customer networks deployed - Founded in 2006 at MIT - tradition of innovation
More informationCisco Meraki solution overview Cisco and/or its affiliates. All rights reserved.
Cisco Meraki solution overview 2010 Cisco and/or its affiliates. All rights reserved. Cisco Meraki: a complete cloud-managed networking solution - Wireless, switching, security, WAN optimization, and MDM,
More informationSEVONE END USER EXPERIENCE
Insight for the Connected World End User Experience [ DataSheet ] SEVONE END USER EXPERIENCE INSIGHTS FROM THE USER PERSPECTIVE. Software, applications and services running on the network infrastructure
More informationMeraki 2014 Solution Brochure
Meraki 2014 Solution Brochure Introduction 100% Cloud Managed Enterprise Networks Cisco Meraki cloud managed edge, branch, and campus networking solutions bring simplicity to enterprise-class networks.
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationSteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN
Data Sheet SteelConnect The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN The Business Challenge Delivery of applications is becoming more
More informationCompare Security Analytics Solutions
Compare Security Analytics Solutions Learn how Cisco Stealthwatch compares with other security analytics products. This solution scales easily, giving you visibility across the entire network. Stealthwatch
More informationSimplifying WAN Architecture
Simplifying WAN Architecture Migrating without a network forklift upgrade Phased approach with existing environment Architecture and management complexity Automation of deployment, management and maintenance
More informationNSG50/100/200 Nebula Cloud Managed Security Gateway
NSG50/100/200 The Zyxel is built with remote management and ironclad security for organizations with multiple distributed sites. With an extensive suite of security features including ICSAcertified firewall,
More informationVeloCloud SD-WAN Subscription
Enterprise/Premium Subscription Datasheet VeloCloud SD-WAN Subscription VeloCloud Cloud Delivered SD-WAN assures enterprise and cloud application performance over Internet and hybrid WAN while simplifying
More informationCato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN
Cato Cloud Software-defined and Cloud-based Secure Enterprise Network Solution Brief NETWORK + SECURITY IS SIMPLE AGAIN Legacy WAN and Security Appliances are Incompatible with the Modern Enterprise The
More informationPrepare Your Network for BYOD. Meraki Webinar Series
Prepare Your Network for BYOD Meraki Webinar Series 1 Agenda Introduction to Meraki and Cloud Networking BYOD objectives Taming BYOD: capacity, security & management Design considerations Live demos Product
More informationCisco Firepower NGIPS Tuning and Best Practices
Cisco Firepower NGIPS Tuning and Best Practices John Wise, Security Instructor High Touch Delivery, Cisco Learning Services CTHCRT-2000 Cisco Spark How Questions? Use Cisco Spark to communicate with the
More informationBusiness Resiliency Through Superior Threat Defense
Business Resiliency Through Superior Threat Defense Firepower 2100 Series/ Cisco Identity Services Engine Andre Lambertsen, Consulting Systems Engineer ala@cisco.com Cisco Firepower NGFW Fully Integrated
More informationMeraki MS Series Switches
Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising
More informationCisco SD-Access Hands-on Lab
LTRCRS-2810 Cisco SD-Access Hands-on Lab Larissa Overbey - Technical Marketing Engineer, Cisco Derek Huckaby - Technical Marketing Engineer, Cisco https://cisco.box.com/v/ltrcrs-2810-bcn2018 Password:
More informationCisco Security Exposed Through the Cyber Kill Chain
Cisco Forschung & Lehre Forum für Mecklenburg Vorpommern Cisco Security Exposed Through the Cyber Kill Chain Rene Straube CSE, Cisco Advanced Threat Solutions January, 2017 The Cisco Security Model BEFORE
More informationCisco - ASA Lab Camp v9.0
Cisco - ASA Lab Camp v9.0 Code: 0007 Lengt h: 5 days URL: View Online Based on our enhanced SASAC v1.0 and SASAA v1.2 courses, this exclusive, lab-based course, provides you with your own set of equipment
More informationIntelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access
Now a part of Cisco We bought Viptela Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access Branch Hybrid WAN Transport IPsec Secure MPLS (IP-VPN) Private Cloud Virtual Private
More informationIntroduction to Cisco SD- WAN (Viptela)
LTRCRS-2005 Introduction to Cisco SD- WAN (Viptela) Brad Edgeworth, Systems Engineer, CCIE#31574 Dustin Schuemann, Solutions Architect Madhavan Aruanchalam, Technical Marketing Engineer Cisco Spark How
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationPassit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers
Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed
More informationSMALL BUSINESS. Model 20/30/50 30 LTE One 210/ BPL-210 BPL-310
BRANCH/SMALL OFFICE SMALL BUSINESS MID-SIZE BUSINESS LARGE ENTERPRISE/CAMPUS Model 20/30/50 30 LTE One 210/310 305 380 580 710 1350 2500 Product Code BPL-021 BPL- BPL- BPL-210 BPL-305 BPL-380 BPL-580 BPL-710
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationWHITE PAPER ARUBA SD-BRANCH OVERVIEW
WHITE PAPER ARUBA SD-BRANCH OVERVIEW June 2018 Table of Contents Overview of the Traditional Branch...1 Adoption of Cloud Services...1 Shift to the Internet as a Business Transport Medium...1 Increasing
More informationDelivering the Wireless Software-Defined Branch
Delivering the Wireless Software-Defined Branch By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Cradlepoint Executive Summary Operations at the branch, critical to many distributed organizations,
More informationMeraki MS Series Switches
Family Datasheet MS Series Switches Meraki MS Series Switches FAMILY DATASHEET Overview Cisco Meraki offers a broad range of switches, built from the ground up to be easy to manage without compromising
More informationINNOVATIVE SD-WAN TECHNOLOGY
INNOVATIVE SD-WAN TECHNOLOGY Enhance network performance and increase ROI with WANworX TM Many of the WAN deployments today are based on older technology that was acceptable when businesses did not run
More informationIntroduction. Trusted by Thousands of Customers Worldwide. Recognized for Innovation
2013 Company Brochure Introduction 100% Cloud Managed Enterprise Networks Meraki s cloud managed edge and branch networking solutions bring simplicity to enterprise-class networks. With wireless, switching,
More informationDCCS Business Breakfast. Walter Greiner Systems Engineer Sales März 2018
DCCS Business Breakfast Walter Greiner Systems Engineer Sales März 2018 Why Wireless is important? more then since 2016 1 IP Traffic 2020 1 66% 34% Fixed Mobile 1 Source: Cisco Visual Networking Index,
More informationCCNP Switch Questions/Answers Cisco Enterprise Campus Architecture
In its network design, a company lists this equipment: - Two Catalyst 4503 Layer 3 switches - One 5500 security appliance firewall - Two Catalyst 6509 switches - Two Lightweight Access Points - Two Catalyst
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationCisco Advanced Malware Protection for Networks
Data Sheet Cisco Advanced Malware Protection for Networks Product Overview Fighting malware effectively today requires new approaches, strategies, and technologies. Cisco Advanced Malware Protection (AMP)
More informationTetration Hands-on Lab from Deployment to Operations Support
LTRACI-2184 Tetration Hands-on Lab from Deployment to Operations Support Furong Gisiger, Solutions Architect Lawrence Zhu, Sr. Solutions Architect Cisco Spark How Questions? Use Cisco Spark to communicate
More informationSecurity, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Security Requirements Security Requirements, on
More informationFeatures. HDX WAN optimization. QoS
May 2013 Citrix CloudBridge Accelerates, controls and optimizes applications to all locations: datacenter, branch offices, public and private clouds and mobile users Citrix CloudBridge provides a unified
More informationExtremeWireless WiNG NX 9500
DATA SHEET ExtremeWireless WiNG NX 9500 Integrated Services Platform Series for the Private Cloud FEATURES COMPLETE VISIBILITY OF THE ENTIRE DISTRIBUTED DEPLOYMENT One point of configuration; ExtremeWireless
More informationISG-600 Cloud Gateway
ISG-600 Cloud Gateway Cumilon ISG Integrated Security Gateway Integrated Security Gateway Cumilon ISG-600C cloud gateway is the security product developed by Systrome for the distributed access network
More informationSecurity, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: About Security, Internet Access, and Communication
More informationSecurity, Internet Access, and Communication Ports
Security, Internet Access, and Communication Ports The following topics provide information on system security, internet access, and communication ports: Overview: Security, Internet Access, and Communication
More information