SlideShare ist ein Scribd-Unternehmen logo
1 von 68
Downloaden Sie, um offline zu lesen
Jamey Heary
Cisco Distinguished Systems Engineer
CCIE 7680
May 2016
Building a True Security
Architecture
One Capability at a Time
Agenda
Current State of Security
Cisco Security
Security as an Architecture- Stories
Summary
State of Security
Cyberwar is Raging!!
Why is the Security Industry Approach Failing?
• It is not a fair fight to begin with
• People, Process and Technology Issues
• Hacking People, Malicious Insiders
Security Technology Issues
• Silo’d Point Products. Nothing works together!
• Bolt on security, whack a mole strategy
• We are designing in complexity on purpose!
• Hyper focused on Prevention = anemic detection/scoping & Incident Response
• Lack of real network and security visibility
Architecture Fail
Working together Fail
Bolt-on Fail
Cisco Security
Cisco Security Homepage
Cisco.com/go/security
Cisco Security is Rockin it!
Best Security Company, 2016
Cisco’s Security Everywhere
…“that’s pretty brilliant”
“Cisco’s strength in its Security
business shows it is not an ‘old’
tech company”
“Network security architects …
need to adopt new products
and/or services that will enable
the network to be an integral
part of a strategy that focuses
on detecting and responding to
security incidents.”
“Vendors Like Palo Alto, FireEye Are
Selling Legacy Technology”
“Cisco is making all the
right moves… software-
focused, cloud-friendly
portfolio with double-digit
growth in Security
and acquisitions like
OpenDNS”
CIO Survey’s 1st in
Customer Preference
Cisco Security Execution and Investment
ThreatGRID
acquired
Sourcefire
Acquired
Active
Threat
Analytics
Black Hat
2014:
Talos
Integrated
Threat Defense
Vision
AMP Everywhere
w/Threat Grid
Incident Response
Service
Cisco ASA w/ FirePOWER
Services for Mid-Size and
Branch environments
Global Security
Sales Organization
Cisco ASA w/
FirePOWER
Services
ACI +
FirePOWER Services
RSAC: AMP
Everywhere;
OpenAppID
Security
and Trust
Organization
Security
Everywhere
2013 2016
Portcullis
acquired
OpenDNS
Acquired
OpenDNS/
Threat Grid
Integrated
Lancope
Acquired
Neohapsis
Acquired
Security
Everywhere
Extended
Firepower
NGFW and
Security
Advisory
Service for
Segmentation
unveiled
Cognitive
Acquired
Invested ~$5B in last 36 months!
2010 2012 2013 2014 20152011
100
98
96
94
92
90
88
86
84
82
NGFW
NGIPS
BDS
(Cisco AMP)
NGFW
(test average)
NGIPS
(test average)
A Track record of Best-of-Breed Security Effectiveness
Best of Breed Efficacy in NSS Labs testing Year after Year
Cisco
Test Average
Magic Quadrant Ranking
NGIPS “Leader” since 2006
Email Security “Leader” since 2005
Network Access Control (NAC) “Leader” since 2011
Web Security “Leader” 3 of past 4 years
Network Performance Monitoring and Diagnostics “Leader” (Lancope)
Enterprise Network Firewalls / UTM “Challenger”
SSLVPN (no longer updated) “Leader”
Comprehensive Best-of-Breed Security Capabilities
Cisco Confidential
WWW
DNS
Network Fabric, Threat Intelligence and Analytics
NGFW/
NGIPS
Advanced Threat
and Analytics
Policy and
Access
Web and
DNS
Email Endpoint
Capabilities Working Together
Simple | Open | Automated | Effective
The Cisco
Advantage
Best of Breed
Portfolio
Architectural
Approach
Only Cisco can build a true E2E security architecture
Without an Architecture it is a mess of complexity!
What makes an Architecture an Architecture?
Just Three things IMHO
1. Capabilities/Solutions (Ideally best of breed)
2. That work well together
3. Effectively
Cisco is building the Industry’s first
Threat-Centric Security Architecture
INNOVATION
SAFE Simplifies Security
Method Overview
1. Identify your goals
2. Break down your network into manageable pieces
3. Criteria for success of the business (requirements in each PIN/domain)
4. Categorize your Risks, Threats and Policies
5. Build the Security Solution
A. Capabilities Phase
B. Architecture Phase
C. Low-level Design Phase
Format: Whiteboard, Diagrams and/or Presentation
Security Capabilities Design – Branch Example
Host-
based
Security
Wireless Wireless
Intrusion
Prevention
Posture
Assess-
ment
Access
Control +
TrustSec
Flow
Analytics
L2//L3
Network
L2//L3
Network
Host-
based
Security
Posture
Assess-
ment
Access
Control +
TrustSec
Flow
Analytics
Web
Security
Services
Firewall Next-Gen
Intrusion
Prevention
System
Anti-
Malware
Flow
Analytics
AVC-
Application
Visibility
Control
Threat
Intelligence
VPN
Wireless Manager
Web browsing
Wired Clerk processing
credit card transaction
Wireless Controller
Switch Next-Generation Firewall/Router
To Data Center
To Cloud
WAN
• Use Best Practices to identify applicable security capabilities
• No Products and No Devices in this phase; that comes next
• Identify security capabilities that best mitigate threats, risks and policy
Management
Security
Services and
Applications
Security
Services
Platform
Infrastructure
Element
Layer
Cisco Platform-Based Security Architecture
Hardware Agnostic, Integrated and 3rd Party Friendly
Common Security Policy & Management
Common Security Policy and Management
Orchestration
Security
Management APIs
Cisco APIC
APIs
Platform
APIs
Cloud Intelligence
APIs
Physical Appliance Virtual Cloud
Access
Control
Context
Awareness
Content
Inspection
Application
Visibility
Threat
Prevention
Device API: OpenFlow, OpenStack, Rest, Yang
Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider, Cloud)
Route–Switch–ComputeASIC Data Plane Software Data Plane
APIs APIs
Cisco Security Applications Third-Party Security Applications
APIs
Web AccessNGIPS Adv. Malw
WAF SaaS VisibAnti-Virus FPCNAC DLPDDoS
Integrated Management
SERVICES
LAYER
ANALYTICS
LAYER
Global & Local Threat Intelligence
Email
Raw Data (Cisco + 3rd Party) Threat Research Analytics Engines
ENFORCEMENT
LAYER
Partnerships Cisco Portfolio
FW/NGFW
TELEMETRY
INTELLIGENCE
PolicyAutomation,APIsandControllerIntegration
Network Platforms
Security Platforms
Router / Switches / Server
Cloud Platform
OpenDNS, Email, CWS,
Stealthwatch, Defense Orchestrator
Endpoint Platform
AnyConnect
AMP
Umbrella
Cisco Integrated Threat Defense Architecture
Stuff simply works together
Control
Cisco
AnyConnect®
FirePowerCisco CWS
WWW
Cisco WSACisco ASACisco ESA
Visibility
WWW
Web
Endpoints
Devices
Networks
Email
IPS
Difference between a paperweight and a NGFW?
Best-of-Breed Global Threat Intelligence Cloud
24x7x365
operations
40+ languages
More than US$100 million
spent on dynamic research
and development
Information
Actions
Cisco® Collective
Security IntelligencePervasive across Portfolio
www.talosintel.com
Threat Intel
See the Unseen
Unprecedented Intel Breadth & Depth
Daily Security Intelligence
Daily Threats Blocked
Deployed Security Devices
Daily Malware
Sandbox Reports
120TB
Security
Intelligence
1.6M
Deployed
Devices
19.7B
Threats
Blocked
150,000
Micro-
applications
1,000
Applications
93B
Daily Email
Messages
35%
Enterprise
Email
13B
Web
Requests
150M
Deployed
Endpoints
3-5 min
Updates
Cisco Security Intelligence
Global Visibility
Global Footprint
5B
Daily Email
Connections
4.5B
Daily Email
Blocks
14M
Deployed
Access
Gateway
75,000
FireAMP
Updates
6,000
New Clam
AV Sigs
1.1M
Sandbox
Reports
Cisco Talos Research
Finding Bad Guys,
one 0-day at a time
Prevention Says easy, Does hard
Criminals only have to find one vuln; Be prepared
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Attack Continuum
Detect
Block
Defend
DURING
Shared Context & Security Intelligence
The power of a Cisco Security
Architecture
A collection of stories
Malicious Code
Launches
Alice, the contractor,
Clicks a Link or
Malvertising
Ransomware
Payload
Malicious
Infrastructure
Story 1: Ransomware
How Cisco Protects Customers
OpenDNS Next-Gen Firewall AMP Lancope
OpenDNS blocks the DNS request
NGFW blocks the connection/file
Web Security w/AMP blocks the file
AMP for Endpoint blocks the file &
communication back to home
OpenDNS blocks the request
NGFW blocks the connection
Lancope detects the activity
OR
Ransomware
Payload
Bob Downloads
Malicious Email
Attachment
OR
Email Security w/AMP
blocks the file
OpenDNS Email Security AMP Lancope
AMP for Endpoint blocks
the file & communication
back to home
Cisco TrustSec
Building block of a true security architecture
• TrustSec is a context-based TAG firewall/access control solution
• Cisco ISE is the central policy engine for Trustsec
• Classification of systems/users based on context
(user role, device, location, posture, threat, access method…)
• The context-based classification propagates using SGT tags
• SGT used by firewalls, stealthwatch, routers and switches to make intelligent
forwarding or blocking decisions in the DC
Users,
Device
Switch Router DC NGFW DC Switch
HR Servers
Enforcement
SGT Transport
Fin Servers SGT = 4
SGT = 10
ISE DirectoryClassification
SGT:5
30© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Architecture: Network & Security working together
WLAN
Controller
VPN Remote
Access Access Switch
Firewall
ISE
Policy Server
Business Data
App / Storage
Corp Asset
Endpoints
Corp Network
Device Type: Apple Mac
User: Mary
AD Group: Employee
Asset Registration: Yes
Posture: Compliant
Physical Location: Lobby
Policy Mapping  SGT: Employee
Source Destination Action
IP SGT IP SGT Service Action
Any Employee Any Biz Server HTTPS Allow
Any Suspicious Any Biz Server Any Deny
Firewall Rules
• Differentiated Network Access based on Context
• Security Group Tag is added to every packet from
host
• Massive Firewall rule simplification
• Policy Enforcement regardless of IP address/vlan
• Accelerated service provisioning
• Consistent policy assignment regardless of
access method
Architecture: Rapid Threat Containment
WLAN
Controller
Quarantine is based on MAC Address
preventing compromised device accessing
from other location / access methods
NGFW
Policy
Server
Business Data
App / Storage
Compromised
Endpoint
10.10.10.10 (aa:bb:cc:dd:ee:ff)
Corp Network
Source Destination Action
IP SGT IP SGT Service Action
Any Employee Any Biz Server HTTPS Allow
Any Suspicious Any Biz Server Any Deny
Firewall Rules
NGFW Stealthwatch
Event: Malware
Source IP: 10.10.10.10/32
Response: Quarantine
OS Type: Windows 8
User: Mary
AD Group: Employee
Asset Registration: Yes
Posture: Non-Compliant
Physical Location: Lobby
MAC Address: aa:bb:cc:dd:ee:ff
Policy Mapping  SGT: Suspicious
PXGRID: EPS Quarantine: 10.10.10.10
Access Switch
Story 2: Security Automation – Dynamic Segmentation
32
Enabling Network-Wide Identity & Context Sharing
Cisco Platform Exchange Grid – pxGrid
INFRASTRUCTURE FOR A ROBUST
SECURITY ECOSYSTEM
• Single framework – develop once,
instead of to multiple APIs
• Control what & where context is
shared among platforms
• Bi-directional – share and consume
context at the same time
• Extremely Scalable
• Integrating with Cisco SDN for broad
network control functions
AD
Single, Pub/Sub
Open Framework
Real-time & Secure
pxGrid
Context
Sharing
NGFW
Story 3: Security Automation – Rapid Threat Containment
VPN
Bob
Cisco NGFW cutting-edge Automation
Not your grandma’s NGFW
Context Rich
Creates a host profile Internally, ISE pxgrid,
3rd party host scan data
Impact Assessment
Threat correlation reduces actionable
events by up to 99%
Automated Tuning
Adjust IPS policies automatically
based on traffic profile
App Identification you can trust
OpenAppID
Demo
• Breaches will happen. Be Prepared.
Scenario
• Zero-day Malware gets through and infects Bob’s wireless PC and
then spreads to a single server in the DC he has access to
• AMP sees the unknown file and sends it to the sandbox
• Malware tries to spread from Bob and the server.
Story 4: Security Retrospection– Scope, contain,
remediate
Web
Filtering and
Reputation
Security
Intelligence
File Type
Blocking
Application
Visibility &
Control
Indicators of
Compromise
Traffic
Intelligence
File
Reputation
Cognitive
Threat
Analytics
XXX X
After
www.website.com
X
File
Retrospection
Roaming User
Reporting
Log Extraction
Management
Allow Warn Block
Partial
Block
NGFW/
Meraki
AMP
ApplianceWSA/CWS ESA AMP Endpoint
Admin
Cisco Security Architecture
Threats
File
Sandbox
X
AMP Everywhere
Integrated
A New Layer of Breach Protection
Industries first recursive DNS Security Solution
Threat Prevention
DNS is common to almost all threats
Protects On & Off Network
Not limited to devices forwarding traffic through on-premise
appliances
Partner & Custom Integrations
Block based on malware analysis (Threatgrid, FireEye, etc.)
Block by Domains for All Ports
No added latency
Incredibly easy to POV/Deploy
30min deploy time
UMBRELLA &
Investigate
DNS Protection and Intel
• Previous automated Software defined segmentation drastically limits the
attack surface available to the malware to spread
• OpenDNS prevents C&C connection
• Stealthwatch (flow behavior analytics) alerts on C&C and host lock
The Cisco Security Architecture Goes to Work
Card Processor
Hacked
Server
POS Terminals
ASA
Firewall
Private
WAN
(truste
d)
Credit Card
Processor
ASA
Firewall
Stores Data CenterUpdatesfrom
POSServer
HTTPS
Credit Card Processing HTTPS
Internet
ISR G2
Routers
ISR G2
Routers
Wireless
AP
Wireless POS
C3850
Unified
Acces
s
Network as a Sensor– Host Lock Violation and Suspect
Data Loss
Host Lock Violation - CTD
Public
Internet
Compromised
Server
StealthWatch
FlowCollector
StealthWatch
Management
Console
Cisco ISE
Command and
Collect
• Stealthwatch uses pxGrid to have ISE change the SGT to compromised
• Hosts are now in quarantine and ISE posture assessment can start self-
patching
• Within <5mins AMP returns a malicious verdict on the file. All AMP devices
are now alerting and dropping file. AMP on endpoint will kill the process
and shutdown the malware on infected hosts
• All domains discovered by AMP threatgrid are passed to OpenDNS for
blocking providing an umbrella of threat coverage
• Both AMP and Stealthwatch can be used to investigate and scope breach
The Cisco Security Architecture Goes to Work
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
When Malware Strikes, Have Answers - AMP
Where did it come
from?
Who else is
infected?
What is it doing? How do I stop it?
Device Trajectory
File Trajectory
File Analysis Automated Remediation
Near Future: Threat Centric NAC: ISE 2.1*
EndPoints based on Incidents and Indicators
ISE Threat Centric NAC
Network as
a Sensor
and
Enforcer,
and
Integrated
Threat
Defense
Story 5: Cisco ACI Security
EPG
“Internet”
EPG
“Web”
Solving the inline problem elegantly– Service
graphs & chaining
FireSIGHT Management
Center
Alerts
Network Visibility
Policy Management
Analytics
Remediation
Application Policy
Infrastructure
Controller (APIC)
Service Graph
Contracts
NGIPS/NGFW
Advanced Malware Protection
Policy and events
Basic configuration
and health
Intelligent Remediation
VRF1 pod1net
ASA and Firepower Insertion into ACI
Web host
Web EPG
App host
App EPG
DB host
DB EPG
NGIPS
ASA5525 Cluster
Routed L3FW Context
Dynamic Routing to vPC
GoTo
ASA virtual
RoutedL3FW Context
GoTo
ASAv
Firepower 7010
Inline NGIPS
GoThrough
Outside host
Outside Network
NGFW Cluster
Fabric
Perimeter
Outside
Router
L3out3
ASA DP 1.2.3.4
Firepower DP 1.0.1
So much more I’d like to
tell you,
So many more use cases
Reach out to your Cisco account team
In Summary
Simple, Effective, Integrated & Open Security
Cisco Security
Leapfrogging the Market
Our Approach is Unique
Strategy is for amateurs.
Execution is for professionals.
Appendix
Cisco’s Comprehensive Best-of-Breed Security Portfolio
WWW
Threat Intelligence and Analytics
Open | Simple | Integrated | Automated
NGFW/
NGIPS
Advanced
Threat
Policy and
Access
Web Email Endpoint
Building Blocks Working Together as an Architecture
10I000 0II0 00 0III000 II1010011 101 1100001 110
Working Together to Create a True Security Architecture
Cisco FTD
ASA w/ FP
Cisco Web &
Email Security
Cisco
NGIPS
Common Identity, Policy
and Context Sharing
Malware Prevention /
Sandboxing
10I000 0II0 00 0III000 II1010011 101 1100001 110
110000III000III0 I00I II0I III0011 0110011 101000 0110 00
1010000II0000III000III0I00IIIIII0000III0
100III0IIII00II0II00III0I0000II000
Context-aware
Segmentation
Network Integration
Context Visibility
Cisco AMP Client
AMP
OpenDNS
Trustsec
ISE
Pxgrid
NaaS
NaaE
Cisco
Pervasive & Integrated
Across the Portfolio
Remediation
Pervasive & Integrated Across Cisco
Across the whole Attack Continuum
Attack Continuum
Network-Integrated,
Broad Sensor Base,
Context sharing and
Automation
Continuous Advanced
Threat Protection, Cloud-
Based Security Intelligence
Leading products working
together as a system
Built for Scale, Consistent
Control, Management
Visibility-Driven Threat-Focused Integrated
BEFORE
Discover
Enforce
Harden
AFTER
Scope
Contain
Remediate
Detect
Block
Defend
DURING
How to Build a Security Architecture
SAFE Simplifies Security
Method Overview
1. Identify your goals
2. Break down your network into manageable pieces
3. Criteria for success of the business (requirements in each PIN/domain)
4. Categorize your Risks, Threats and Policies
5. Build and model the Security Architecture
A. Capabilities Phase
B. Architecture Phase
C. Low-level Design Phase
Format: Whiteboard, Diagrams and/or Presentation
Reference Architectures
ISE 2.1 Feature List
 Guest and SSO Enhancements
 Microsoft Intune & SCCM Integration
 ACS to ISE Migration Features
 Smart Licensing
 Third party NAD Support
 EasyConnect
 Streamlined Visibility
Context directory
Customizable Dashboard
Expanded Profiling Capabilities
 Threat Centric NAC
 TrustSec Workflow Enhancements
 TrustSec / ACI Policy Plane Integration
 New Posture Compliance Check
Cisco Meraki
Cisco Meraki: Cloud-managed Networks
Meraki MS
Ethernet Switches
Meraki SM
Mobile Device
Management
Meraki MR
Wireless LAN
Meraki MX
Security
Appliances
Meraki MX Security Appliances
6 models scaling from small branch to campus / datacenter
Complete networking and security in a single appliance
Zero-touch site to site
VPN
WAN optimization
NG firewall
Content filtering
WAN link-bonding
Intrusion Prevention
Feature
highlights
Future support for:
• AMP
• IPFIX
Systems Manager Mobile Device Management
Device Management controls iOS, Android, Mac, and Windows devices
Cloud-based - no on-site appliances or software, works with any vendor’s network
Free for up to 100 seats
Centralized app
deployment
Device security
Rapid provisioning
Backpack™ file sharing
Asset management
Feature
highlights
AMP
IPFIX
Future
support
“Yellow” Retail
WAN
Data Centre
“Yellow” Retail
3rd-party supplier
“Blue” Retail
Store
Core Network
(Transit)
“Yellow” Retail
Store
“Yellow” Retail Router:
TAG everything
“yellow”
Allow “Yellow” &
“Purple”
DC Router:
Allow yellow to yellow Allow blue and
Yellow to purple
Tag “Yellow” apps “Yellow”
Tag “Shared” apps “Purple”
“Blue” Retail Router:
TAG everything “Blue”
Allow “Blue” & “Purple”
Shared
Apps
Retail
Apps
Simplify: Segmenting traffic with SGT
Security Domain Level classifications
6
“Blue” Retail
WAN
“Blue” Retail
3rd-party supplier
SGACL
SGACLSGACL
Cisco Security Solution Partners
Combined Program – Over 60+ Partners
Combined API Framework and Integration Points
BEFORE
Policy
and
Control
AFTER
Analysis
and
Remediation
Identification
and Block
DURING
Infrastructure & Mobility
RemediationVulnerability Management
SIEMVisualizationNetwork Access Taps
Custom Detection Incident ResponseFull Packet Capture
IAM/SSO

Weitere ähnliche Inhalte

Was ist angesagt?

NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity frameworkShriya Rai
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadarPencilData
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture DesignPriyanka Aash
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecturenarenvivek
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onJustin Henderson
 

Was ist angesagt? (20)

NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0SABSA Implementation(Part IV)_ver1-0
SABSA Implementation(Part IV)_ver1-0
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Enterprise Security Architecture Design
Enterprise Security Architecture DesignEnterprise Security Architecture Design
Enterprise Security Architecture Design
 
Modelling Security Architecture
Modelling Security ArchitectureModelling Security Architecture
Modelling Security Architecture
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
Splunk Phantom SOAR Roundtable
Splunk Phantom SOAR RoundtableSplunk Phantom SOAR Roundtable
Splunk Phantom SOAR Roundtable
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
AWS Architecting In The Cloud
AWS Architecting In The CloudAWS Architecting In The Cloud
AWS Architecting In The Cloud
 
Security architecture
Security architectureSecurity architecture
Security architecture
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 

Andere mochten auch

Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitectureKris Kimmerle
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security ServicesJad Bejjani
 
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...Cisco Canada
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureSABSAcourses
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+DesignAlfred Ouyang
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premiseCisco Canada
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architectureVladimir Jirasek
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionAndy Ellis
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseCisco Canada
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDeivid Toledo
 

Andere mochten auch (20)

Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...
Collaboration Architecture Design: Unified Call Control and Dial plans for Vo...
 
Adaptive Enterprise Security Architecture
Adaptive Enterprise Security ArchitectureAdaptive Enterprise Security Architecture
Adaptive Enterprise Security Architecture
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premise
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS ProtectionRadware Hybrid Cloud Web Application Firewall and DDoS Protection
Radware Hybrid Cloud Web Application Firewall and DDoS Protection
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
NetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat DefenseNetFlow Monitoring for Cyber Threat Defense
NetFlow Monitoring for Cyber Threat Defense
 
DDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWAREDDoS Mitigation - DefensePro - RADWARE
DDoS Mitigation - DefensePro - RADWARE
 

Ähnlich wie Building a Security Architecture

Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web SystemsInnoTech
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksCisco Service Provider
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsSplunk
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...Cisco DevNet
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summits
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachNetworkCollaborators
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overviewali raza
 

Ähnlich wie Building a Security Architecture (20)

Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Architecting Secure Web Systems
Architecting Secure Web SystemsArchitecting Secure Web Systems
Architecting Secure Web Systems
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Monetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless NetworksMonetizing The Enterprise: Borderless Networks
Monetizing The Enterprise: Borderless Networks
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
 
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approachCisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Chapter 5 overview
Chapter 5 overviewChapter 5 overview
Chapter 5 overview
 

Mehr von Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Mehr von Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Building a Security Architecture

  • 1. Jamey Heary Cisco Distinguished Systems Engineer CCIE 7680 May 2016 Building a True Security Architecture One Capability at a Time
  • 2. Agenda Current State of Security Cisco Security Security as an Architecture- Stories Summary
  • 5. Why is the Security Industry Approach Failing? • It is not a fair fight to begin with • People, Process and Technology Issues • Hacking People, Malicious Insiders Security Technology Issues • Silo’d Point Products. Nothing works together! • Bolt on security, whack a mole strategy • We are designing in complexity on purpose! • Hyper focused on Prevention = anemic detection/scoping & Incident Response • Lack of real network and security visibility
  • 7. Cisco Security Cisco Security Homepage Cisco.com/go/security
  • 8. Cisco Security is Rockin it! Best Security Company, 2016 Cisco’s Security Everywhere …“that’s pretty brilliant” “Cisco’s strength in its Security business shows it is not an ‘old’ tech company” “Network security architects … need to adopt new products and/or services that will enable the network to be an integral part of a strategy that focuses on detecting and responding to security incidents.” “Vendors Like Palo Alto, FireEye Are Selling Legacy Technology” “Cisco is making all the right moves… software- focused, cloud-friendly portfolio with double-digit growth in Security and acquisitions like OpenDNS” CIO Survey’s 1st in Customer Preference
  • 9. Cisco Security Execution and Investment ThreatGRID acquired Sourcefire Acquired Active Threat Analytics Black Hat 2014: Talos Integrated Threat Defense Vision AMP Everywhere w/Threat Grid Incident Response Service Cisco ASA w/ FirePOWER Services for Mid-Size and Branch environments Global Security Sales Organization Cisco ASA w/ FirePOWER Services ACI + FirePOWER Services RSAC: AMP Everywhere; OpenAppID Security and Trust Organization Security Everywhere 2013 2016 Portcullis acquired OpenDNS Acquired OpenDNS/ Threat Grid Integrated Lancope Acquired Neohapsis Acquired Security Everywhere Extended Firepower NGFW and Security Advisory Service for Segmentation unveiled Cognitive Acquired Invested ~$5B in last 36 months!
  • 10. 2010 2012 2013 2014 20152011 100 98 96 94 92 90 88 86 84 82 NGFW NGIPS BDS (Cisco AMP) NGFW (test average) NGIPS (test average) A Track record of Best-of-Breed Security Effectiveness Best of Breed Efficacy in NSS Labs testing Year after Year Cisco Test Average
  • 11. Magic Quadrant Ranking NGIPS “Leader” since 2006 Email Security “Leader” since 2005 Network Access Control (NAC) “Leader” since 2011 Web Security “Leader” 3 of past 4 years Network Performance Monitoring and Diagnostics “Leader” (Lancope) Enterprise Network Firewalls / UTM “Challenger” SSLVPN (no longer updated) “Leader”
  • 12. Comprehensive Best-of-Breed Security Capabilities Cisco Confidential WWW DNS Network Fabric, Threat Intelligence and Analytics NGFW/ NGIPS Advanced Threat and Analytics Policy and Access Web and DNS Email Endpoint Capabilities Working Together Simple | Open | Automated | Effective
  • 13. The Cisco Advantage Best of Breed Portfolio Architectural Approach Only Cisco can build a true E2E security architecture
  • 14. Without an Architecture it is a mess of complexity! What makes an Architecture an Architecture? Just Three things IMHO 1. Capabilities/Solutions (Ideally best of breed) 2. That work well together 3. Effectively
  • 15. Cisco is building the Industry’s first Threat-Centric Security Architecture INNOVATION
  • 16. SAFE Simplifies Security Method Overview 1. Identify your goals 2. Break down your network into manageable pieces 3. Criteria for success of the business (requirements in each PIN/domain) 4. Categorize your Risks, Threats and Policies 5. Build the Security Solution A. Capabilities Phase B. Architecture Phase C. Low-level Design Phase Format: Whiteboard, Diagrams and/or Presentation
  • 17. Security Capabilities Design – Branch Example Host- based Security Wireless Wireless Intrusion Prevention Posture Assess- ment Access Control + TrustSec Flow Analytics L2//L3 Network L2//L3 Network Host- based Security Posture Assess- ment Access Control + TrustSec Flow Analytics Web Security Services Firewall Next-Gen Intrusion Prevention System Anti- Malware Flow Analytics AVC- Application Visibility Control Threat Intelligence VPN Wireless Manager Web browsing Wired Clerk processing credit card transaction Wireless Controller Switch Next-Generation Firewall/Router To Data Center To Cloud WAN • Use Best Practices to identify applicable security capabilities • No Products and No Devices in this phase; that comes next • Identify security capabilities that best mitigate threats, risks and policy
  • 18. Management Security Services and Applications Security Services Platform Infrastructure Element Layer Cisco Platform-Based Security Architecture Hardware Agnostic, Integrated and 3rd Party Friendly Common Security Policy & Management Common Security Policy and Management Orchestration Security Management APIs Cisco APIC APIs Platform APIs Cloud Intelligence APIs Physical Appliance Virtual Cloud Access Control Context Awareness Content Inspection Application Visibility Threat Prevention Device API: OpenFlow, OpenStack, Rest, Yang Cisco Networking Operating Systems (Enterprise, Data Center, Service Provider, Cloud) Route–Switch–ComputeASIC Data Plane Software Data Plane APIs APIs Cisco Security Applications Third-Party Security Applications APIs
  • 19. Web AccessNGIPS Adv. Malw WAF SaaS VisibAnti-Virus FPCNAC DLPDDoS Integrated Management SERVICES LAYER ANALYTICS LAYER Global & Local Threat Intelligence Email Raw Data (Cisco + 3rd Party) Threat Research Analytics Engines ENFORCEMENT LAYER Partnerships Cisco Portfolio FW/NGFW TELEMETRY INTELLIGENCE PolicyAutomation,APIsandControllerIntegration Network Platforms Security Platforms Router / Switches / Server Cloud Platform OpenDNS, Email, CWS, Stealthwatch, Defense Orchestrator Endpoint Platform AnyConnect AMP Umbrella Cisco Integrated Threat Defense Architecture Stuff simply works together
  • 20. Control Cisco AnyConnect® FirePowerCisco CWS WWW Cisco WSACisco ASACisco ESA Visibility WWW Web Endpoints Devices Networks Email IPS Difference between a paperweight and a NGFW? Best-of-Breed Global Threat Intelligence Cloud 24x7x365 operations 40+ languages More than US$100 million spent on dynamic research and development Information Actions Cisco® Collective Security IntelligencePervasive across Portfolio www.talosintel.com Threat Intel
  • 21. See the Unseen Unprecedented Intel Breadth & Depth Daily Security Intelligence Daily Threats Blocked Deployed Security Devices Daily Malware Sandbox Reports 120TB Security Intelligence 1.6M Deployed Devices 19.7B Threats Blocked 150,000 Micro- applications 1,000 Applications 93B Daily Email Messages 35% Enterprise Email 13B Web Requests 150M Deployed Endpoints 3-5 min Updates Cisco Security Intelligence Global Visibility Global Footprint 5B Daily Email Connections 4.5B Daily Email Blocks 14M Deployed Access Gateway 75,000 FireAMP Updates 6,000 New Clam AV Sigs 1.1M Sandbox Reports
  • 22. Cisco Talos Research Finding Bad Guys, one 0-day at a time
  • 23. Prevention Says easy, Does hard Criminals only have to find one vuln; Be prepared BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Attack Continuum Detect Block Defend DURING Shared Context & Security Intelligence
  • 24. The power of a Cisco Security Architecture A collection of stories
  • 25. Malicious Code Launches Alice, the contractor, Clicks a Link or Malvertising Ransomware Payload Malicious Infrastructure Story 1: Ransomware
  • 26. How Cisco Protects Customers OpenDNS Next-Gen Firewall AMP Lancope OpenDNS blocks the DNS request NGFW blocks the connection/file Web Security w/AMP blocks the file AMP for Endpoint blocks the file & communication back to home OpenDNS blocks the request NGFW blocks the connection Lancope detects the activity
  • 28. OR Email Security w/AMP blocks the file OpenDNS Email Security AMP Lancope AMP for Endpoint blocks the file & communication back to home
  • 29. Cisco TrustSec Building block of a true security architecture • TrustSec is a context-based TAG firewall/access control solution • Cisco ISE is the central policy engine for Trustsec • Classification of systems/users based on context (user role, device, location, posture, threat, access method…) • The context-based classification propagates using SGT tags • SGT used by firewalls, stealthwatch, routers and switches to make intelligent forwarding or blocking decisions in the DC Users, Device Switch Router DC NGFW DC Switch HR Servers Enforcement SGT Transport Fin Servers SGT = 4 SGT = 10 ISE DirectoryClassification SGT:5
  • 30. 30© 2013-2014 Cisco and/or its affiliates. All rights reserved. Architecture: Network & Security working together WLAN Controller VPN Remote Access Access Switch Firewall ISE Policy Server Business Data App / Storage Corp Asset Endpoints Corp Network Device Type: Apple Mac User: Mary AD Group: Employee Asset Registration: Yes Posture: Compliant Physical Location: Lobby Policy Mapping  SGT: Employee Source Destination Action IP SGT IP SGT Service Action Any Employee Any Biz Server HTTPS Allow Any Suspicious Any Biz Server Any Deny Firewall Rules • Differentiated Network Access based on Context • Security Group Tag is added to every packet from host • Massive Firewall rule simplification • Policy Enforcement regardless of IP address/vlan • Accelerated service provisioning • Consistent policy assignment regardless of access method
  • 31. Architecture: Rapid Threat Containment WLAN Controller Quarantine is based on MAC Address preventing compromised device accessing from other location / access methods NGFW Policy Server Business Data App / Storage Compromised Endpoint 10.10.10.10 (aa:bb:cc:dd:ee:ff) Corp Network Source Destination Action IP SGT IP SGT Service Action Any Employee Any Biz Server HTTPS Allow Any Suspicious Any Biz Server Any Deny Firewall Rules NGFW Stealthwatch Event: Malware Source IP: 10.10.10.10/32 Response: Quarantine OS Type: Windows 8 User: Mary AD Group: Employee Asset Registration: Yes Posture: Non-Compliant Physical Location: Lobby MAC Address: aa:bb:cc:dd:ee:ff Policy Mapping  SGT: Suspicious PXGRID: EPS Quarantine: 10.10.10.10 Access Switch
  • 32. Story 2: Security Automation – Dynamic Segmentation 32
  • 33. Enabling Network-Wide Identity & Context Sharing Cisco Platform Exchange Grid – pxGrid INFRASTRUCTURE FOR A ROBUST SECURITY ECOSYSTEM • Single framework – develop once, instead of to multiple APIs • Control what & where context is shared among platforms • Bi-directional – share and consume context at the same time • Extremely Scalable • Integrating with Cisco SDN for broad network control functions AD Single, Pub/Sub Open Framework Real-time & Secure pxGrid Context Sharing
  • 34. NGFW Story 3: Security Automation – Rapid Threat Containment VPN Bob
  • 35. Cisco NGFW cutting-edge Automation Not your grandma’s NGFW Context Rich Creates a host profile Internally, ISE pxgrid, 3rd party host scan data Impact Assessment Threat correlation reduces actionable events by up to 99% Automated Tuning Adjust IPS policies automatically based on traffic profile App Identification you can trust OpenAppID
  • 36. Demo
  • 37. • Breaches will happen. Be Prepared. Scenario • Zero-day Malware gets through and infects Bob’s wireless PC and then spreads to a single server in the DC he has access to • AMP sees the unknown file and sends it to the sandbox • Malware tries to spread from Bob and the server. Story 4: Security Retrospection– Scope, contain, remediate
  • 38. Web Filtering and Reputation Security Intelligence File Type Blocking Application Visibility & Control Indicators of Compromise Traffic Intelligence File Reputation Cognitive Threat Analytics XXX X After www.website.com X File Retrospection Roaming User Reporting Log Extraction Management Allow Warn Block Partial Block NGFW/ Meraki AMP ApplianceWSA/CWS ESA AMP Endpoint Admin Cisco Security Architecture Threats File Sandbox X AMP Everywhere Integrated
  • 39. A New Layer of Breach Protection Industries first recursive DNS Security Solution Threat Prevention DNS is common to almost all threats Protects On & Off Network Not limited to devices forwarding traffic through on-premise appliances Partner & Custom Integrations Block based on malware analysis (Threatgrid, FireEye, etc.) Block by Domains for All Ports No added latency Incredibly easy to POV/Deploy 30min deploy time UMBRELLA & Investigate DNS Protection and Intel
  • 40. • Previous automated Software defined segmentation drastically limits the attack surface available to the malware to spread • OpenDNS prevents C&C connection • Stealthwatch (flow behavior analytics) alerts on C&C and host lock The Cisco Security Architecture Goes to Work
  • 41. Card Processor Hacked Server POS Terminals ASA Firewall Private WAN (truste d) Credit Card Processor ASA Firewall Stores Data CenterUpdatesfrom POSServer HTTPS Credit Card Processing HTTPS Internet ISR G2 Routers ISR G2 Routers Wireless AP Wireless POS C3850 Unified Acces s Network as a Sensor– Host Lock Violation and Suspect Data Loss Host Lock Violation - CTD Public Internet Compromised Server StealthWatch FlowCollector StealthWatch Management Console Cisco ISE Command and Collect
  • 42. • Stealthwatch uses pxGrid to have ISE change the SGT to compromised • Hosts are now in quarantine and ISE posture assessment can start self- patching • Within <5mins AMP returns a malicious verdict on the file. All AMP devices are now alerting and dropping file. AMP on endpoint will kill the process and shutdown the malware on infected hosts • All domains discovered by AMP threatgrid are passed to OpenDNS for blocking providing an umbrella of threat coverage • Both AMP and Stealthwatch can be used to investigate and scope breach The Cisco Security Architecture Goes to Work
  • 43. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 When Malware Strikes, Have Answers - AMP Where did it come from? Who else is infected? What is it doing? How do I stop it? Device Trajectory File Trajectory File Analysis Automated Remediation
  • 44. Near Future: Threat Centric NAC: ISE 2.1* EndPoints based on Incidents and Indicators
  • 45. ISE Threat Centric NAC Network as a Sensor and Enforcer, and Integrated Threat Defense
  • 46. Story 5: Cisco ACI Security
  • 47. EPG “Internet” EPG “Web” Solving the inline problem elegantly– Service graphs & chaining FireSIGHT Management Center Alerts Network Visibility Policy Management Analytics Remediation Application Policy Infrastructure Controller (APIC) Service Graph Contracts NGIPS/NGFW Advanced Malware Protection Policy and events Basic configuration and health Intelligent Remediation
  • 48. VRF1 pod1net ASA and Firepower Insertion into ACI Web host Web EPG App host App EPG DB host DB EPG NGIPS ASA5525 Cluster Routed L3FW Context Dynamic Routing to vPC GoTo ASA virtual RoutedL3FW Context GoTo ASAv Firepower 7010 Inline NGIPS GoThrough Outside host Outside Network NGFW Cluster Fabric Perimeter Outside Router L3out3 ASA DP 1.2.3.4 Firepower DP 1.0.1
  • 49. So much more I’d like to tell you, So many more use cases Reach out to your Cisco account team
  • 51. Simple, Effective, Integrated & Open Security Cisco Security Leapfrogging the Market
  • 52. Our Approach is Unique
  • 53. Strategy is for amateurs.
  • 54. Execution is for professionals.
  • 55.
  • 57. Cisco’s Comprehensive Best-of-Breed Security Portfolio WWW Threat Intelligence and Analytics Open | Simple | Integrated | Automated NGFW/ NGIPS Advanced Threat Policy and Access Web Email Endpoint Building Blocks Working Together as an Architecture
  • 58. 10I000 0II0 00 0III000 II1010011 101 1100001 110 Working Together to Create a True Security Architecture Cisco FTD ASA w/ FP Cisco Web & Email Security Cisco NGIPS Common Identity, Policy and Context Sharing Malware Prevention / Sandboxing 10I000 0II0 00 0III000 II1010011 101 1100001 110 110000III000III0 I00I II0I III0011 0110011 101000 0110 00 1010000II0000III000III0I00IIIIII0000III0 100III0IIII00II0II00III0I0000II000 Context-aware Segmentation Network Integration Context Visibility Cisco AMP Client AMP OpenDNS Trustsec ISE Pxgrid NaaS NaaE Cisco Pervasive & Integrated Across the Portfolio Remediation
  • 59. Pervasive & Integrated Across Cisco Across the whole Attack Continuum Attack Continuum Network-Integrated, Broad Sensor Base, Context sharing and Automation Continuous Advanced Threat Protection, Cloud- Based Security Intelligence Leading products working together as a system Built for Scale, Consistent Control, Management Visibility-Driven Threat-Focused Integrated BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING
  • 60. How to Build a Security Architecture SAFE Simplifies Security Method Overview 1. Identify your goals 2. Break down your network into manageable pieces 3. Criteria for success of the business (requirements in each PIN/domain) 4. Categorize your Risks, Threats and Policies 5. Build and model the Security Architecture A. Capabilities Phase B. Architecture Phase C. Low-level Design Phase Format: Whiteboard, Diagrams and/or Presentation
  • 62. ISE 2.1 Feature List  Guest and SSO Enhancements  Microsoft Intune & SCCM Integration  ACS to ISE Migration Features  Smart Licensing  Third party NAD Support  EasyConnect  Streamlined Visibility Context directory Customizable Dashboard Expanded Profiling Capabilities  Threat Centric NAC  TrustSec Workflow Enhancements  TrustSec / ACI Policy Plane Integration  New Posture Compliance Check
  • 64. Cisco Meraki: Cloud-managed Networks Meraki MS Ethernet Switches Meraki SM Mobile Device Management Meraki MR Wireless LAN Meraki MX Security Appliances
  • 65. Meraki MX Security Appliances 6 models scaling from small branch to campus / datacenter Complete networking and security in a single appliance Zero-touch site to site VPN WAN optimization NG firewall Content filtering WAN link-bonding Intrusion Prevention Feature highlights Future support for: • AMP • IPFIX
  • 66. Systems Manager Mobile Device Management Device Management controls iOS, Android, Mac, and Windows devices Cloud-based - no on-site appliances or software, works with any vendor’s network Free for up to 100 seats Centralized app deployment Device security Rapid provisioning Backpack™ file sharing Asset management Feature highlights AMP IPFIX Future support
  • 67. “Yellow” Retail WAN Data Centre “Yellow” Retail 3rd-party supplier “Blue” Retail Store Core Network (Transit) “Yellow” Retail Store “Yellow” Retail Router: TAG everything “yellow” Allow “Yellow” & “Purple” DC Router: Allow yellow to yellow Allow blue and Yellow to purple Tag “Yellow” apps “Yellow” Tag “Shared” apps “Purple” “Blue” Retail Router: TAG everything “Blue” Allow “Blue” & “Purple” Shared Apps Retail Apps Simplify: Segmenting traffic with SGT Security Domain Level classifications 6 “Blue” Retail WAN “Blue” Retail 3rd-party supplier SGACL SGACLSGACL
  • 68. Cisco Security Solution Partners Combined Program – Over 60+ Partners Combined API Framework and Integration Points BEFORE Policy and Control AFTER Analysis and Remediation Identification and Block DURING Infrastructure & Mobility RemediationVulnerability Management SIEMVisualizationNetwork Access Taps Custom Detection Incident ResponseFull Packet Capture IAM/SSO