cisco security accelerating digital transformation › c › dam › m › en_ph › events ›...
Post on 25-Jun-2020
1 Views
Preview:
TRANSCRIPT
Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 1
Cisco Security – Accelerating Digital TransformationStephen DaneManaging Director, Global Security Sales Organisation, Asia Pacific and Japan
March 2017
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Lack Of Cybersecurity Hinders Innovation In The Digital Era
“Cybersecurity risks and threats
hinder innovation in my organization.”
Survey
“My organization halted a
mission-critical initiative
due to cybersecurity fears.”
Survey
Innovations are
moving forward, but
probably at 70%-
80% of what they
otherwise could if
there were better
tools to deal with the
dark cloud of
cybersecurity
threats.
Robert Simmons
CFO
71%
Agree
39%
Agree
1014 respondents
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Security Challenges Globally
RansomwareMobile Work
Force
IoTCloud
Applications
Automation
Cost Complexity People Shortage
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Today,
DATAis where the money is
2.5Quintillion bytes
of data
created
every day
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 6
82%of all consumer Internet traffic
will be connected devices
66%of IP traffic will be Wi-Fi
and mobile devicesAnnual global IP traffic
2.3ZB
Broadband speeds
2x
Increasing Digital Traffic Creates A Greater Attack SurfaceGlobal IP Traffic To Triple 2020
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 7
of organizations investigated
had adware infections
Adware
75%Malvertising
Using brokers (gates) to increase speed
and agility
Switching quickly between servers
without changing redirection
ShadowGate: a cost-effective campaign
Adware And Malvertising Shift Into High Gear
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 8
of spam is malicious
8%65%of email is spam
201620132010
Em
ails
/ S
eco
nd
.5K
1K
1.5K
5K
4.5K
4K
3K
3.5K
2.5K
2K
Spam Comes Roaring BackEmail Is Back In Vogue
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 9
22%of organisations cited
lost customers
23%of organisations cited
lost opportunity
29%of organisations cited
lost revenue
$
Losses After An Attack Are Real
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Firewall
Last 20 years of security:
Got a problem?
Buy a Box
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
The
Existingsecurity stack…
Firewall
VPN
Email Security
Web Security
DLP
SIEM
Replacement Box
Failover
Persistent Threats
IDS
Firewall 2.0
VPN 2.0
Email Security 2.0
Web Security 2.0
DLP 2.0
SIEM 2.0
Replacement Box 2.0
Failover 2.0
Persistent Threats 2.0
IDS 2.0
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 12
Complexity Continues To Accelerate
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 13© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public
The Security Effectiveness GapCisco Security Closes the Gap
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 15
Integrated Architectural Approach
Best of Breed Portfolio
Cisco’s Security Strategy
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Industry’s Most Effective Security Portfolio
– Threat Intelligence
Services
Integrated Threat Defense
Network CloudEndpoint
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Attack ContinuumBefore During After
Security Everywhere Architecture
Web
Network Analytics
Advanced Malware
Secure Internet Gateway
UTMW W W
Policy & Access
NGFW + NGIPS
Cloud Security
17
Branch IOTCloudData CenterEndpoint CampusEdge
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Cisco Leads In Breach Detection
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Cisco
Architectural
Approach
* Final Results
Firewall
VPN
Email Security
Web Security
DLP
SIEM
Replacement Box
Failover
Persistent Threats
IDS
Firewall 2.0
VPN 2.0
Email Security 2.0
Web Security 2.0
DLP 2.0
SIEM 2.0
Replacement Box 2.0
Failover 2.0
Persistent Threats 2.0
IDS 2.0Point
Products
Approach
38%+Return
on Investment*
Cisco Architectural Approach Helps Customers Save Money
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 20
Internet of Everything Security
• IoE Value Chain Assessment• IoE Application Assessment
• IoE DeviceAssessment
Application Security
• Secure ApplicationDesign• Application Assessment
• Enterprise SDLC
Mobile & Cloud Security
• Mobile App & Device Assessment
• Cloud Strategy &Architecture
• Cloud Application Assessment
Strategy, Risk, & Programs
• ITGovernance• Security Strategy & Policy
• IT RiskAssessment
• 3rd Party RiskProgram
• Security Program Development
• Identity & AccessManagement• Incident Readiness &Response
• Proactive Threat Hunt
• CyberRange
Compliance
• PCI DSS & PA DSSAssessment• ISO 27001 / 27002
• HIPAA
Infrastructure Security
• Network Architecture Assessment• Red TeamExercises
• Penetration Testing
• Social Engineering
• SOC Enablement
• Segmentation Service
Integration• Cisco Build Services
• Security Readiness
• Design, Development,
Implementation
• SOC Build & Integration
Assessment
• Test Plan Development &
Execution
• DeviceAssessment• Validation and Testing
• Kick Start Deployment
Optimization
• Custom Reporting
• Cross Integration• Performance Tuning
• Optimization Service
Remote Managed
• Device Health & Welfare• Security Control Management
• Security Event Monitoring
• Collective Security Intelligence
Active ThreatAnalytics• Advanced Threat Detection and
Triage
• Anomaly Detection• Customer-Specific Mitigation
• Collective Security Intelligence
Security Services Portfolio
Optimization
Migration
Integration
Program Strategy
Architecture & Design
Assessments
Hosted SecurityProduct Support Managed Security
Managed Services
Advisory Integration
Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 21
ASEAN Reference Case: FSI Customer
Challenges
Knowledge of external entities with intent
Mandates for compliance
Multiple Security vendors
Solution
Cisco Stealthwatch (NaaS) gave the customer visibility into
foreign threats, internal policy violations and segmentation
faults
Business outcomes achieved
Regulatory mandate compliance and risk reduction
Industry Photo to Be Placed
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Security Architecture in the Digital World
Simple
Open
Automated
Effective
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
#1Cisco Priority
5KPeople Strong
Ongoing
Innovation Integrated Best of breed portfolio
250Threat
Researchers
19.7BThreats Blocked
Daily
100xFaster Finding
Breaches
99%Security
Effectiveness
88%Fortune 100 use Cisco Security
BillionsInvested
Sourcefire
Lancope
Neohapsis
OpenDNS
ThreatGRID
Cognitive
Portcullis
CloudLock
Cisco’s Security Commitment
Thank you.
top related