xerox secure x 060711 tg
DESCRIPTION
Tom Gillis, CiscoTRANSCRIPT
Cisco Confidential 1© 2011 Cisco and/or its affiliates. All rights reserved.
Cisco SecureX Architecture
Tom Gillis, VP/GM STBU
Cisco Confidential 2© 2011 Cisco and/or its affiliates. All rights reserved.
Design and Defendfor Unpredictable
Threats
Opposing Forces: Finding the Balance
BUSINESS
SECURITY
Simplify Security for the User, the Business, and
the Operations
Maintain Regulatory Compliance and
Manage Risk Well
Provide Business Speed and Agility
Enable New Business Models
Enable Collaborative Work
IMPERATIVES
BUSINESS
SECURITY
The Traditional Model
DMZDMZDesktopDesktop
The NetworkThe Network
Mobile Applications and Data
DMZDMZDesktopDesktop
The NetworkThe Network
Mobile Applications and Data
DMZDMZDesktopDesktop
The NetworkThe Network
The NetworkThe Network
The NetworkThe NetworkCisco SecureX
The Network
Context Aware EnforcementContext Aware EnforcementApplianceAppliance ModuleModule CloudCloud
Tru
stS
ec
Tru
stS
ec
Tru
stS
ec
Tru
stS
ec
Context Aware PolicyContext Aware Policy
An
yCo
nnec
tA
nyC
onn
ect
Vir
tua
l and
Clo
udV
irtu
al a
nd C
loud
ServicesServicesPartnersPartners ManagementManagement
Application Programming InterfacesApplication Programming Interfaces
Cisco SecureX Architecture
The NetworkThe Network
Cisco SIOCisco SIO
Cisco Confidential 10© 2011 Cisco and/or its affiliates. All rights reserved.
Cisco: Securing Today and Tomorrow
Private Cloud Physical Data CenterPublic Cloud
SecureXSecureX
Cisco Confidential 11© 2011 Cisco and/or its affiliates. All rights reserved.