Converged World. Martin Capurro

Similar documents
Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Transform your network and your customer experience. Introducing SD-WAN Concierge

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

Transform your network and your customer experience. Introducing SD-WAN Concierge

Cisco Self Defending Network

Cato Cloud. Global SD-WAN with Built-in Network Security. Solution Brief. Cato Cloud Solution Brief. The Future of SD-WAN. Today.

Network. Arcstar Universal One

90 % of WAN decision makers cite their

Cisco Exam Questions & Answers

Network Automation and Branch Agility The Network Helps Enable Digital Business. Rajinder Singh Product Sales Specialist June 2016

Understanding Cisco Unified Communications Security

NETWORK THREATS DEMAN

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Logical Network Design (Part II)

Klaudia Bakšová System Engineer Cisco Systems. Cisco Clean Access

Simplifying the Branch Network

Symantec Network Access Control Starter Edition

The New Enterprise Network In The Era Of The Cloud. Rohit Mehra Director, Enterprise Communications Infrastructure IDC

E-companion. Quiz for IT-knowledge

Selling the Total Converged Solution Module #1: Nortel Enterprise Networking Overview of the 4 Pillars and Why Nortel Tom Price Nortel HQ Sales

Introducing Campus Networks

Cisco SR 520-T1 Secure Router

VeloCloud Cloud-Delivered WAN Fast. Simple. Secure. KUHN CONSULTING GmbH

Campus Network Design

Cisco Exam Questions & Answers

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

SSL VPNs or IPsec VPNs The Challenges of Remote Access. February 2 nd, 2007 Chris Witeck- Director of Product Marketing

Symantec Network Access Control Starter Edition

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Chapter 1: Enterprise Campus Architecture. Course v6 Chapter # , Cisco Systems, Inc. All rights reserved. Cisco Public

Symantec Network Access Control Starter Edition

Business Strategy Theatre

Reviewer s guide. PureMessage for Windows/Exchange Product tour

Reaping the Full Benefits of a Hybrid Network

Wireless and Network Security Integration Solution Overview

Resilient WAN and Security for Distributed Networks with Cisco Meraki MX

Threat Control and Containment in Intelligent Networks. Philippe Roggeband - Product Manager, Security, Emerging Markets

Security Assessment Checklist

Bright House Networks Enterprise Solutions. FINAL Proposal for: WE RE WIRED DIFFERENTLY. Voice Data Cloud Managed Services. Proposal Date: 4/14/2016

Connectivity to Cloud-First Applications

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

MANAGED CLOUD SERVICES

: Designing for Cisco Internetwork Solutions (DESGN) v2.1

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Cisco Network Admission Control (NAC) Solution

IPsec VPN. Quick Guide 3/19/ EarthLink. Trademarks are property of their respective owners. All rights reserved.

Deployment Scenarios Microsoft TMG Standard, TMG Enterprise, TMG Branch Office series Appliances

Understanding Network Access Control: What it means for your enterprise

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Network Service Description

Juniper Networks Switching: EX & QFX Series

Retail Stores & Restaurant Chains

Hands-On VPLS: Virtual Private LAN Service

A Unified Threat Defense: The Need for Security Convergence

Security for SIP-based VoIP Communications Solutions

Ethernet Wide Area Networking, Routers or Switches and Making the Right Choice

Securing the Empowered Branch with Cisco Network Admission Control. September 2007

Cisco Systems Korea

Intelligent WAN: Leveraging the Internet Secure WAN Transport and Internet Access

Y O UR BUS I N E SS IS ONL Y A S S TR ON G A S YO U R CONNEC T I O N T HE I M P ORTANCE OF R ELI ABLE CO NNECTIVITY W HAT S IN SIDE:

IP & DCN Planning for Microwave Networks

SD-WAN Deployment Guide (CVD)

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Delivering the Wireless Software-Defined Branch

Global IP Network (GIN) Connects You to the World

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cisco Systems Korea Cisco Systems, Inc. All rights reserved. 1

Process System Security. Process System Security

CTS2134 Introduction to Networking. Module 08: Network Security

PassTorrent. Pass your actual test with our latest and valid practice torrent at once

Chapter 1. Cisco SONA and the Cisco Enterprise Architecture

Cisco Exam Questions & Answers

Deployment Scenarios

Virtual Private Networks (VPNs)

Introducing Avaya SDN Fx with FatPipe Networks Next Generation SD-WAN

Exam: : VPN/Security. Ver :

Implementing Cisco Network Security (IINS) 3.0

MANAGED WAN SERVICE GENERAL Service Definition Standard Service Features. Monitor and Notify Service Level Monitoring Notification

Mobile Devices prioritize User Experience

Hardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012

Security Vendor Line Card

NETWORKING GLOBAL ACCESS ONE SOURCE SERENUS NETWORK SERVICES NEXT GENERATION CLOUD

Windows Server Network Access Protection. Richard Chiu

Choosing the Right. Ethernet Solution. How to Make the Best Choice for Your Business

Chapter 5. Security Components and Considerations.

CTO PoV: Enterprise Networks (Part 2) Security for IoT & Cloud

USG2110 Unified Security Gateways

SaaS Flyer for Trend Micro

VPN value bundle express

Gigabit SSL VPN Security Router

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Campus Network Design. 2003, Cisco Systems, Inc. All rights reserved. 2-1

Features. HDX WAN optimization. QoS

Cisco Borderless Networks Value Proposition

HikCentral V1.3 for Windows Hardening Guide

Campus Network Design

SteelConnect. The Future of Networking is here. It s Application-Defined for the Cloud Era. SD-WAN Cloud Networks Branch LAN/WLAN

Future-ready security for small and mid-size enterprises

ULTRA BROADBAND NETWORKS

MPLS SOLUTION How to Make the Best Choice for Your Business

Transcription:

Information Management in a Converged World Martin Capurro Qwest Product Management

Agenda I. Changes In Information Technology II. III. IV. Exploring Technology Trends vs. Needs What is the Buying Opportunity Recommendations 2

The Perimeterless Enterprise The Day Extender Office with Fixed and Wireless Access Branch Offices Free Hotel Internet Mobile Computing Smart Phones Wifi Hotspots LANs with Endpoint Enforcement The Teleworker 3

Trends in Enterprise Information Technology IT Budgets Flat to Declining Compliance Requirement Enforcement (but little improvement in definitions) Additional Pro-sumer Technology Leaking into the Enterprise Security is Expected but Increasingly Harder to Integrate and Deliver Convergence Driving WAN Complexity 4

The Intelligent Network Utility Optimization Control Measurement Augmentation 1. Optimization Ability to optimize performance Caching, WAN Optimization, Compression, App Spoofing 2. Control Ability to modify fabric characteristics, service quality and flow shaping at a granular level l Rate Shaping, Bandwidth on Demand Policy Enforcement & Security 3. Augmentation Core network upgrade of raw network capacity Lambda Augments, Router Upgrades, Peering Capacity, impls/vpls Interconnects 4. Measurement Ability to measure application performance end to end End 2 End Application Reporting, Layer 2/3 Reporting, In Line and Passive, DPI

Service Utility Evolution Solution Creation Components Optimization Dedicated Virtualized Shared Application Utility Compute Utility Network Utility Measurement Control Augmentation Maturation Elements Optimization Measurement Control Augmentation Optimization Measurement Control Augmentation l Managed Elements Traditiona Voice / VoIP Seibel Exchange OS Instances Disks Arrays Servers Security HW Private Line See Dedicated Virtual Unix Boxes Virtual Disk Processing Utility Virtual SOC VPLS Hosted VoIP Salesforce.com Hosted Exchange Storage Capacity Shared Hosting Net Firewall/IPS MPLS Internet Costly Scalable

Contrasting L2 & L3 Services Customer Enterprise LAN Service Provider Serv Prov Enterprise LAN Layer 3 Routing Coordinated Routing Routing Routing Coordinated Routing Ethernet Layer 2 Ethernet Ethernet Switching Layer 3 Routing Routing Routing Routing Routing Routing SERVICE PROVIDER TRANSPARENT TO ROUTING Layer 2 Ethernet Ethernet Switching Ethernet

Teleworking is Good But Sometimes Bad Things Happen to Good People Your Company Network Is Here You are here Hacker with hotspot locator Don t let mobile computer users access your corporate network without properp security controls, including: Physically secure unattended computers Rely on industry best practices to secure wireless networks Deploy disk encryption software Use SSL or IPsec VPN technology when connecting to corporate resources Install anti-spyware, anti-virus, and antispam software locally or via network gateways Configure personal firewalls Use automated version and patch management software to remain up to date. 8

Secure the People smart clients enforce at the endpoint CONNECTIVITY FINDER KEEP AUDITORS HAPPY FIX WHAT S BROKEN Connection Manager Hotspot Locator Version Manager App Monitor Auto Remediation PROTECT SENSITIVE DATA LOW COST INSURANCE @$5 PER USER PER MONTH Smart Client Personal Firewall VPN Client Data Leak Prevention Disk Encryption 9

DDoS Mitigation Steps 1. Detect the DDoS Event 2. Activate Scrubber 3. Scrubber updates route on core router 4. Identify and filter traffic 5. Forward legitimate traffic 6. Non-target traffic flows freely Arbor Backbone Monitoring 1 4 Core Router 5 Core Router 3 2 Edge Router Diverts only the target s traffic via route update on core router Cisco Anomaly Guard Data Scrubber 10 Customer Edge Router

Learn From Others Top Five VoIP Threats for 2008* Unauthorized snoopings Beware automated calls from your bank Can t e-mail, make phone calls, message 1. DoS attack on VoIP network 2. VoIP eavesdropping 3. Microsoft Office Communications Server 4. Vishing (VoIP phishing) 5. VoIP attacks on service providers Microsoft will always be a Ask how your provider secures their infrastructure favorite target 11 *As reported in Forbes Magazine, Jan 2008

Managed Services = Simplified Solutions Traditional Managed Services Element Element Application Monitoring Element monitoring configuration management & Management Solve real customer business challenges Simplified Solutions The New Managed Services Self Contained & E2E Managed Solution Business-Relevant SLAs Simplified Offerings from Qwest Office Connect Integrated Access Managed IP Communication Contact Center Conferencing Managed Services Evolution Tired Simple Element Management Wired Cost Effective Simplified Solutions 12

Takeaways & Lessons Learned Do More With Less Decide what is CORE and what you can outsource efficiently for LESS Embrace Compliance Leverage New Technology Have Security Plans in Place Understand WAN Needs Generally requirements are lower than mature standards Make sure you meet your needs FIRST Setting Policy Proactively is less effort than resisting change and change can be good Work with Service Provider on Roles & Responsibilities Buy based on where you want to take your infrastructure Know your long-term requirements FIRST 13