cloud-managed security appliances€¦ · backed by cisco talos threat intelligence over 250 full...

34
Cloud-Managed Security & SD-WAN Appliances August 2018

Upload: others

Post on 17-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Cloud-Managed Security & SD-WAN Appliances

August 2018

Page 2: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Simplifying IT with Cloud Management

A complete cloud-managed IT solution

Wireless, switching, security, SD-WAN, communications, unified endpoint management (UEM), and security cameras

Integrated hardware, software, and cloud services

Leader in cloud-managed IT

Among Cisco’s fastest growing portfolios

250k+Unique customers

3.5M+Meraki devices

online

5.5M+Active Meraki

dashboard users

Cloud-Managed Security & SD-WAN Appliances

Page 3: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Benefits of a cloud-managed solution

WAN / Internet

Management Data User Traffic

Security Appliances

Switches

Access Points Systems Manager

Security Cameras

RELIABILITY

SECURITY

SCALABILITY

FUTURE-PROOFING

Cloud-Managed Security & SD-WAN Appliances

Page 4: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

A complete connectivity and threat management solution

Security

● Next generation firewall● AES encrypted VPN● Intrusion prevention (IPS)● Malware protection

Geo-IP firewalling

Networking

● 3G / 4G failover● Branch routing● WAN balancing and failover● High Availability● Intelligent path control

Application Control

● Bandwidth shaping● URL content filtering● Quality of Service control

Cloud-Managed Security & SD-WAN Appliances

Page 5: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Why customers choose the Cisco Meraki MX

Powerful security that’s easy to implement• Robust suite of Cisco Security technologies• Intuitive GUI-based configuration• Seamless updates from the cloud

Exceptional scalability• Zero-touch provisioning with cloud brokered VPN• Easy centralized management with built-in remote

troubleshooting tools• Multi-location configuration templates

Industry-leading visibility• Fingerprints users, applications, devices, and threats• Monitor one location or an entire deployment• Unified monitoring and reporting with other Cisco Meraki

technologies

Cloud-Managed Security & SD-WAN Appliances

Page 6: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Security made simple

Cloud-Managed Security Appliances

Page 7: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

URL Content FilteringWith over 80 categories and over 4 billion categorized URLs

Next Generation Firewall Application aware firewalling

Intrusion Prevention (IPS) Based on Cisco Snort

Geo Based Security Allow or block traffic by country

Malware Protection Cisco AMP and Threat Grid

Automatic UpdatesSoftware and security updates delivered from the cloud.

PCI CompliancePCI 3.2 certified cloud management backend

Ironclad security

Cloud-Managed Security & SD-WAN Appliances

Page 8: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

1.5 million malware

samples / day

600 billion email

messages / day

16 billion web

requests / day

Honeypots

Open source

communitiesInternal

vulnerability discovery

Telemetry

Internet-wide

scanning

Backed by Cisco Talos threat intelligence

Over 250 full timethreat researchers

Millions of telemetry agents

4 global data centers

Over 100 threat intelligence partners

Over 1100 threat traps

Cloud-Managed Security & SD-WAN Appliances

Page 9: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Advanced Malware Protection for Meraki MX

Enhanced Threat Defense Contextual Visibility Rapid Detection Ease of Management

Automatic protection against

an ever-growing list of known

malicious files, plus malware

sandboxing with Threat Grid

Security Center makes it easy

to ensure you have the latest

information about attacks on

your network

Automatic alerting when a

downloaded file is found to be

malicious after the fact

Enable best-in-class malware

protection with just two clicks

▪ 220 million known malicious files

▪ 407 million known clean files

▪ 1.5 million new incoming malware samples per day

▪ 1.6 million devices using AMP globally

▪ 3.1 billion lookup requests per day

Cloud-Managed Security & SD-WAN Appliances

Page 10: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Easy to read threat report with threat scores to help speed up incident response

Prioritize Threats

Threat Grid Cloud – Malware Analysis

Cloud-Managed Security & SD-WAN Appliances

Page 11: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Meraki

Interoperability

Meraki

Integrations

Cisco ISE

How It All Fits Together

Meraki MX

Cloud-Managed Security & SD-WAN Appliances

Page 12: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Connectivity and WAN

Cloud-Managed Security Appliances

Page 13: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Dual uplink ports

2 uplink support on all MX models for load balancing and redundancy

LTE failover Integrated LTE modem, as well as USB modem support with automatic failover

Site to site VPNCloud orchestrated VPN (Meraki Auto VPN) with load balancing and self-healing capabilities

Intelligent path control

Policy based routing and performance based dynamic path selection

Branch Routing

Automatic route distribution via Auto VPN

OSPF route advertisement

BGP support coming soon

High Availability Active/passive hardware redundancy

Traffic shaping Application bandwidth limiting and prioritization

Reliable, cost effective connectivity with Meraki SD-WAN

Cloud-Managed Security & SD-WAN Appliances

Page 14: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Augment MPLS

• Supplement an existing

MPLS network with

broadband for

increased bandwidth

• Offload critical traffic

from MPLS to

broadband with policy

based routing dynamic

path selection

• Automatic 3G/4G

failover offers an extra

layer of redundancy

Internet + Internet

• Load balance critical

traffic based on

policy or link

performance

• Reduce costs by

offering dual high

speed broadband

connections

• Rapidly detect and

mitigate link

degradation

Flexible deployment options

Cloud-Managed Security & SD-WAN Appliances

Page 15: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Simple Create VPN tunnels between locations with easy point-and-click interface, or apply

configuration templates to enable and configure VPN at many locations at once

Automatic VPN configuration generated and deployed automatically from the cloud – create a

mesh or hub-and-spoke topology with only a few clicks

Resilient Automatically adjusts to changes in order to maintain secure connectivity during an

ISP or datacenter outage, hardware failure, or IP address update

Automated site-to-site VPN (Auto VPN)

Cloud-Managed Security & SD-WAN Appliances

Page 16: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Dual active VPN

Load balance your VPN traffic over your

hybrid WAN

Policy based routing

Select the preferred path for traffic based on

protocol, port, source and destination IP, or

even application

Dynamic Path Selection

Select the best VPN tunnel for traffic

automatically based on performance

The only solution to combine cutting edge

SD-WAN with industry leading security

technology

Application-aware intelligent path control

Cloud-Managed Security & SD-WAN Appliances

Page 17: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

SIM & LTE MODEM INTEGRATED

Limit downtime

Connect Remote

Sites

Simplification with Integrated LTE

Cloud-Managed Security & SD-WAN Appliances

Page 18: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

In-depth Visibility

Cloud-Managed Security Appliances

Page 19: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

View bandwidth usage by application or by client

Highlight an application or a client to see their portion of total network bandwidth

See a client’s active time for specific applications

Easily create policies to limit bandwidth for problematic users or applications

Traffic monitoring and analytics

Cloud-Managed Security & SD-WAN Appliances

Page 20: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

See VPN connection status between locations

Monitor VPN bandwidth usage

Track performance of VPN tunnels using built-in loss, latency, jitter, and MOS voice score reporting

Live updating log of traffic flows and path decisions

Compare historical performance to configured performance policies

VPN health, bandwidth, and performance monitoring

Cloud-Managed Security & SD-WAN Appliances

Page 21: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Configure, monitor, and troubleshoot cellular uplink and LTE modem

Monitor and track live uplink traffic and historical performance

View signal quality of LTE connections

Reference IP, DNS, and gateway settings for WAN uplinks

Monitor & Configure Uplinks

Cloud-Managed Security & SD-WAN Appliances

Page 22: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Fully integrated alerting - no need for an email server

Customizable alerting – only get emails about the things you need to know about

Get alerts if critical network clients go offline

Configure alerting for all Cisco Meraki devices in one simple interface

Send alerts to network administrators or custom recipients

Email alerts from the cloud

Cloud-Managed Security & SD-WAN Appliances

Page 23: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Customer Case Studies

Cloud-Managed Security Appliances

Page 24: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Artisan coffee roaster and specialty tea retailer, founded 1966 in Berkeley, CA

193 locations, ~4,000 employees

Branches using AutoVPN for site-to-site connectivity and control

Client monitoring, traffic analytics, Live Tools give complete visibility

Centralized control via Meraki dashboard dramatically reduces IT support load

Case study: Peet’s Coffee & Tea

Cloud-Managed Security Appliances

Page 25: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Largest diversified provider of post-acute care services in the United States

2000+ locations in 46 states, 75,000+ staff

Use 3G/4G uplinks to service branch locations when no broadband available

HIPAA compliant architecture

Layer 7 firewall, traffic shaping, and content filtering blocks peer-to-peer traffic and controls users and devices

Case study: Kindred Healthcare

Cloud-Managed Security Appliances

Page 26: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Major American service provider in the United States

1,100+ branch healthcare locations

Zero-touch provisioning with auto-VPN allows Verizon to meet customer’s aggressive deployment schedule of months instead of years

SNMP integration into Verizon backend systems for consolidated monitoring

Meraki dashboard visibility allows Verizon to demonstrate bottlenecks to upsell bandwidth, and give customers full branch visibility

Verizon configures dual VPN paths across customer branches based on traffic protocol, source, destination, or application in a few clicks

Case study: Verizon Healthcare Customer

Cloud-Managed Security Appliances

Page 27: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Case study: McCarthy

American-owned construction company with 2,000+ employees with

building sites nationwide

Challenges

• Previously used expensive MPLS lines taking 6-8 weeks to deploy

• Some locations have limited ISP availability or require costly build-

outs by broadband providers

The Path Forward

• With LTE widely available, construction sites can now use cellular

as primary transport for connectivity

• Can quickly deploy a new cellular networks with up to 20 clients

using Meraki MX & Z, allowing a seamless transition when

broadband circuits are delivered to the site

• Maintain cellular connection as a failover uplink

• Meraki’s integrated LTE appliances used to improve simplicity

“Meraki’s embedded

cellular products can

improve the simplicity

of our network

deployments”- Ben Donaldson, Network

Architect, McCarthy Building

Companies, Inc.

Page 28: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

MX Product Portfolio

Cloud-Managed Security Appliances

Page 29: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Medium Branch

Small Branch

*Available with wireless models(MX64W, MX65W, MX67W, MX68W, MX68CW)

Z3C not available in Japan

Large Branch, Campus or Concentrator Virtual

Teleworker

Z3 Z3C

~5 users802.11ac Wave 2 Wireless & PoEFW throughput: 100 MbpsCAT 3 LTE (Z3C)

MX64/65 MX67/68 MX67C/68CW

~50 users802.11ac Wireless* & PoEFW throughput: 250 Mbps

~50 users802.11ac Wave 2* & PoEFW throughput: 450 Mbps

~50 users802.11ac Wave 2* & PoEFW throughput: 450 MbpsCAT 6 LTE

MX84 MX100

~200 usersFW throughput: 500 Mbps

~500 usersFW throughput: 750 Mbps

MX250 MX450

~2,000 usersFW throughput: 4 Gbps

~10,000 usersFW throughput: 6 Gbps

vMX100 for AWS & Azure

FW throughput: 750 MbpsVPN & SD-WAN features

Meraki Security & SD-WAN Portfolio

Page 30: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Next Generation Firewall

Site-to-site and client VPN

Intelligent path control

Link bonding and failover

Bandwidth shaping and QoS

Branch routing

Web caching

Active/Passive high availability

Enterprise License Advanced Security License

*additional Threat Grid subscription required

All enterprise features, plus

Content filtering (with Google SafeSearch enforcement)

Cisco Advanced Malware Protection

Snort IDS/IPS

Threat Grid integration*

Geo-based firewall rules

Licensing that fits the business’ needs

Cloud-Managed Security Appliances

Page 31: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Cloud-Managed Security Appliances

A complete cloud-managed IT portfolioSingle-pane-of-glass management

Leverage the Meraki full stack for even greater benefits

Wireless Access PointsOptimized for high-density with

802.11ac and bluetooth

Enterprise Mobility ManagementUnified managed and control of thousands

of devices

Security CamerasStreamline deployment and

monitoring of video security cameras

Security AppliancesFeature rich security and unified threat

management platform

SwitchesLayer 2 and layer 3 switches for

mission-critical networks

MIOptimize User Experience,

Accelerate IT

Page 32: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Next Steps

Cloud-Managed Security Appliances

Page 33: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Cloud-Managed Security Appliances

Next steps

Watch a Webinarmeraki.cisco.com/webinars

Join the Communitycommunity.meraki.com

Risk-free evaluationmeraki.cisco.com/eval

Page 34: Cloud-Managed Security Appliances€¦ · Backed by Cisco Talos threat intelligence Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100

Thank you!

Cloud-Managed Security Appliances