partner summit 2014: christopher young general session

12
Cisco Confidential 1 © 2013-2014 Cisco and/or its affiliates. All rights reserved. From the Browser to the Boardroom Browser Mobile Work Office Small Group Spaces Larger Spaces Boardrooms

Upload: cisco

Post on 20-Aug-2015

1.046 views

Category:

Technology


4 download

TRANSCRIPT

Cisco Confidential 1 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

From the Browser to the Boardroom

Browser Mobile Work Office Small Group Spaces

Larger Spaces

Boardrooms

Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

From the Browser to the Boardroom

Browser Mobile Work Office Small Group Spaces

Larger Spaces

Boardrooms

Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Any Device to Any Cloud

Public Cloud Private Cloud

Public Cloud

Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Proliferation of Attack Vectors

Cloud/SaaS Applications | Off-net Users | Explosion of Data | Internet of Things

Public Cloud Private Cloud

Public Cloud

Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Internet of Things…and Everything EVERY COMPANY BECOMES A TECHNOLOGY COMPANY,

EVERY COMPANY BECOMES A SECURITY COMPANY

(2 of 3)

Cisco Confidential 6 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

APTs Cyberware

Spyware & Rootkits Worms Viruses

2010 2000 2005 Today +

The Industrialization of Hacking

Anti-virus (Host)

IDS/IPS (Network)

Anti-malware (Host+Network)

Intelligence and Analytics (Host+Network+Cloud)

Enterprise Response

Cisco Confidential 7 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The Problem is THREATS

Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The New Security Model

BEFORE Discover Enforce Harden

AFTER Scope Contain

Remediate

Attack Continuum

Detect Block

Defend

DURING

Network Endpoint Mobile Virtual Cloud

Point in Time Continuous

Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

The New Security Model

BEFORE Discover Enforce Harden

AFTER Scope Contain

Remediate

Attack Continuum

Detect Block

Defend

DURING

Spend Shift

60% 30% 10%

Point in Time Continuous

Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Advanced Services

Covering the Entire Attack Continuum

Attack Continuum

NGFW

Secure Access + Identity Services

UTM Web Security

Email Security

Network Behavior Analysis

Firewall VPN NGIPS Advanced Malware Protection

BEFORE Discover Enforce Harden

AFTER Scope Contain

Remediate

Detect Block

Defend

DURING

Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.

Reduce Complexity and Increase Capability

Collective Security Intelligence

Centralized Management Appliances, Virtual

Network Control Platform

Device Control Platform

Cloud Services Control Platform

Appliances, Virtual Host, Mobile, Virtual Hosted

Thank you.