SlideShare a Scribd company logo
1 of 19
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
CyberSecurity today
Adrian Aron
Security Sales
Cisco Systems Romania
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Behind the Headlines
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Industrialization of Hacking
There is a multi-billion dollar global industry targeting your prized assets
$450 Billion
to
$1 TrillionSocial
Security
$1
Mobile
Malware
$150
$Bank
Account Info
>$1000 depending
on account type
and balance
Facebook
Accounts
$1 for an
account with
15 friends
Credit Card
Data
$0.25-$60
Malware
Development
$2500
(commercial
malware)
DDoS
DDoS as
A Service
~$7/hour
Spam
$50/500K
emails
Medical
Records
>$50
Exploits
$1000-
$300K
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
IT Sprawl
$
3.3
55%
Mobile
Devices Per
Knowledge Worker*
IP Traffic
Mobile by 2017**
545
44%
Cloud
Cloud Apps
Per Organization*
Annual Cloud
Workload Growth***
Growth in M2M
IP Traffic 2013–18**
50B Connected
“Smart Objects” by 2020*
36X
IoE
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Strategic Imperatives
Network-Integrated,
Broad Sensor Base,
Context and Automation
Continuous Advanced Threat
Protection, Cloud-Based
Security Intelligence
Agile and Open Platforms,
Built for Scale, Consistent
Control, Management
EndpointNetwork Mobile Virtual Cloud
Visibility-Driven Threat-Focused Platform-Based
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Infrastructure as a sensor, selfdefending, selfhealing architecture
Advanced Malware protection everywhere !
Big Data analytics and forensics with Open SoC
How Cisco is protecting
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
ACompany with a Digital Overlay
The security architecture impact
Geo distributed
firewall clusters
Switching
Wired & WiFi
Routing Secure
Datacenter
interconnect
Dynamic
Multipoint
Corelated
Full sample Netflow
MDM enforced
Cloud
security
Unified Access
for Unified Security Policy
IPv6 complete security
Hardened 802.1x
MacSEC
REMOTE
BRANCHES
DATACENTER
PARTNERS
REMOTE
SECURE
SECURE vDC
PARTNERS
TRUSTED
Intelligent sensors
VPN
Physical
access
BYoD
Cisco architecture for
security
Cloud, On-premises,
Collective & Collaborative
PxGrid
REST identity
BRANCHES
CONTAINED
TrustSEC
with
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Security capable infrastructure
Attack Continuum
Discover
Enforce
Harden
Detect
Block
Defend
Scope
Contain
Remediate
Firewall
NGFW
NAC + Identity Services
VPN
UTM
NGIPS
Web Security
Email Security
Advanced Malware Protection
Network Behavior Analysis
Malware Sandboxing
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Advanced Malware protection everywhere !
How Cisco is protecting
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Continuous Protection
when advanced malware evades point-in-time detection
Antivirus
Sandboxing
Initial Disposition = Clean
Point-in-time Detection
Initial Disposition = Clean
AMP
Actual Disposition = Bad = Too Late!!
Not 100%
Analysis Stops
Sleep Techniques
Unknown Protocols
Encryption
Polymorphism
Actual Disposition = Bad = Blocked
Retrospective Detection,
Analysis Continues
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
AMP, the secret sauce
Collective Security
Intelligence
SPERO
Uses AI methods for real-time
discovery of malware based on
environment and behavior. Uses
periodic review of Big Data store to
implement retrospection
ONE-TO-ONE
Catches “well known”
malware through use of
primary SHA match.
Equivalent to a signature-
based system.
ETHOS
Catches families of malware
through use of “fuzzy hashes”
embedded in the Feature Print.
Counters malware evasion by
“bit-twiddling”.
ADVANCED ANALYTICS
Integrates heuristics from the
malware environment, the Big Data
store, ETHOS and SPERO to clarify
the outcome of a marginal conviction
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
AMP Everywhere Strategy Means Protection Across the
Extended Network
MAC
AMP for Networks
PC
AMP for
Cloud Web Security
& Hosted Email
CWS
Virtual
AMP on Web & Email
Security Appliances
Mobile
AMP on ASA Firewall
with FirePOWER
Services
AMP for Endpoints
AMP Private Cloud
Virtual Appliance
AMP Threat Grid
Dynamic Malware Analysis +
Threat Intelligence Engine
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Big Data analytics and forensics with Open SoC
How Cisco is protecting
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
AMP Everywhere, down to the smallest scale
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Why Cisco ?
1.6 Million sensors globally
100 TB data received every day
150+ Million IP terminals
600 engineers, tehnicians and
security researchers
35% world wide emails inspected
6+ Mld $ invested in research
and development
TALOS – Global Operation
center for CyberSecurity
10 Million files inspected
everyday
Email PCs
MACs
Web Networks IPS mobile
WWW
Arhitecture
Solutions
IT building
blocks
Rezults
Network Data Center Colaboration Security
13 Mld web request inspected
24x7x365 operations
4.3 Mld web attacks blocked /
day
40+ programming languages
1.1 Million malware samples
analysed / day
Advanced Malware Protection
and Snort Community (AMP)
Intelligent
infrastructure
Secure infrastructure &
Continuous defence
Intelligent
cities
Conformity &
Security
Business
operations
Education
and Health
Production
Public
Administratio
n
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Thank You

More Related Content

What's hot

Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziOscar Romano
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 
RSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewRSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewSkybox Security
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018newbie2019
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Skybox Security
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi North Texas Chapter of the ISSA
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety Symantec
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...NetworkCollaborators
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolSylvain Martinez
 

What's hot (20)

Fortinet Broşür
Fortinet BroşürFortinet Broşür
Fortinet Broşür
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
RSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics OverviewRSA 2014: Skybox Security Risk Analytics Overview
RSA 2014: Skybox Security Risk Analytics Overview
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Iso iec 27000_2018
Iso iec 27000_2018Iso iec 27000_2018
Iso iec 27000_2018
 
Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security? Infosec 2014: Who Is Skybox Security?
Infosec 2014: Who Is Skybox Security?
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
NTXISSACSC3 - Managing Cyber Security Across the Enterprise by Asif Effendi
 
Securing physical security
Securing physical securitySecuring physical security
Securing physical security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Simple Steps to Online Safety
 Simple Steps to Online Safety  Simple Steps to Online Safety
Simple Steps to Online Safety
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital ...
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
 

Similar to Idc security roadshow may2015 Adrian Aron

Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation SecurityCybera Inc.
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldNetworkCollaborators
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...NetworkCollaborators
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content SecurityCisco Canada
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015ldangelo0772
 

Similar to Idc security roadshow may2015 Adrian Aron (20)

Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
The Next Generation Security
The Next Generation SecurityThe Next Generation Security
The Next Generation Security
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015
 

More from Dejan Jeremic

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicDejan Jeremic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicDejan Jeremic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićDejan Jeremic
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicDejan Jeremic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija Dejan Jeremic
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaDejan Jeremic
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaDejan Jeremic
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR BeogradDejan Jeremic
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataDejan Jeremic
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
DeinstitucionalizacijaDejan Jeremic
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadDejan Jeremic
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuDejan Jeremic
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Dejan Jeremic
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizijaDejan Jeremic
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijalaDejan Jeremic
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneDejan Jeremic
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoDejan Jeremic
 

More from Dejan Jeremic (20)

Konferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja IlicKonferencija 09.12. ​Maja Ilic
Konferencija 09.12. ​Maja Ilic
 
Konferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan DjurdjevicKonferencija 09.12. ph d Dragan Djurdjevic
Konferencija 09.12. ph d Dragan Djurdjevic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad KaludjerovicKonferencija 09.12. ph d Nenad Kaludjerovic
Konferencija 09.12. ph d Nenad Kaludjerovic
 
Konferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda MilenkovićKonferencija 09.12. Hilda Milenković
Konferencija 09.12. Hilda Milenković
 
Konferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana SimicKonferencija 9 12 - Biljana Simic
Konferencija 9 12 - Biljana Simic
 
Asistivna tehnologija
Asistivna tehnologija Asistivna tehnologija
Asistivna tehnologija
 
Podrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosaPodrska razvoja siblinskih odnosa
Podrska razvoja siblinskih odnosa
 
Beskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog radaBeskucnistvo i usluga socijalnog rada
Beskucnistvo i usluga socijalnog rada
 
Lokalne usluge GCSR Beograd
Lokalne usluge  GCSR BeogradLokalne usluge  GCSR Beograd
Lokalne usluge GCSR Beograd
 
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranataPostupanje GCSR u obezbedjivanju podrske maloletne dece migranata
Postupanje GCSR u obezbedjivanju podrske maloletne dece migranata
 
Deinstitucionalizacija
DeinstitucionalizacijaDeinstitucionalizacija
Deinstitucionalizacija
 
Centar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi SadCentar za porodicni smestaj i usvojenje Novi Sad
Centar za porodicni smestaj i usvojenje Novi Sad
 
Podrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvuPodrsak EU inkluzionom drustvu
Podrsak EU inkluzionom drustvu
 
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
Povremeni porodicni smeštaj - sajam socijalnih usluga 2016
 
Forenzička revizija
Forenzička revizijaForenzička revizija
Forenzička revizija
 
Analiza ljudskih potencijala
Analiza ljudskih potencijalaAnaliza ljudskih potencijala
Analiza ljudskih potencijala
 
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbraneSelekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
Selekcija kadrova i njihova uloga u inzinjeringu protivteroristicke odbrane
 
Razvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada PancevoRazvoj lokalnih usluga socijalne zastite grada Pancevo
Razvoj lokalnih usluga socijalne zastite grada Pancevo
 

Recently uploaded

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Recently uploaded (20)

notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Idc security roadshow may2015 Adrian Aron

  • 1. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 CyberSecurity today Adrian Aron Security Sales Cisco Systems Romania
  • 2. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Behind the Headlines © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Industrialization of Hacking There is a multi-billion dollar global industry targeting your prized assets $450 Billion to $1 TrillionSocial Security $1 Mobile Malware $150 $Bank Account Info >$1000 depending on account type and balance Facebook Accounts $1 for an account with 15 friends Credit Card Data $0.25-$60 Malware Development $2500 (commercial malware) DDoS DDoS as A Service ~$7/hour Spam $50/500K emails Medical Records >$50 Exploits $1000- $300K © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 IT Sprawl $ 3.3 55% Mobile Devices Per Knowledge Worker* IP Traffic Mobile by 2017** 545 44% Cloud Cloud Apps Per Organization* Annual Cloud Workload Growth*** Growth in M2M IP Traffic 2013–18** 50B Connected “Smart Objects” by 2020* 36X IoE
  • 5. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Strategic Imperatives Network-Integrated, Broad Sensor Base, Context and Automation Continuous Advanced Threat Protection, Cloud-Based Security Intelligence Agile and Open Platforms, Built for Scale, Consistent Control, Management EndpointNetwork Mobile Virtual Cloud Visibility-Driven Threat-Focused Platform-Based
  • 6. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Infrastructure as a sensor, selfdefending, selfhealing architecture Advanced Malware protection everywhere ! Big Data analytics and forensics with Open SoC How Cisco is protecting © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 ACompany with a Digital Overlay The security architecture impact Geo distributed firewall clusters Switching Wired & WiFi Routing Secure Datacenter interconnect Dynamic Multipoint Corelated Full sample Netflow MDM enforced Cloud security Unified Access for Unified Security Policy IPv6 complete security Hardened 802.1x MacSEC REMOTE BRANCHES DATACENTER PARTNERS REMOTE SECURE SECURE vDC PARTNERS TRUSTED Intelligent sensors VPN Physical access BYoD Cisco architecture for security Cloud, On-premises, Collective & Collaborative PxGrid REST identity BRANCHES CONTAINED TrustSEC with
  • 8. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Security capable infrastructure Attack Continuum Discover Enforce Harden Detect Block Defend Scope Contain Remediate Firewall NGFW NAC + Identity Services VPN UTM NGIPS Web Security Email Security Advanced Malware Protection Network Behavior Analysis Malware Sandboxing
  • 9. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Advanced Malware protection everywhere ! How Cisco is protecting © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 10. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Continuous Protection when advanced malware evades point-in-time detection Antivirus Sandboxing Initial Disposition = Clean Point-in-time Detection Initial Disposition = Clean AMP Actual Disposition = Bad = Too Late!! Not 100% Analysis Stops Sleep Techniques Unknown Protocols Encryption Polymorphism Actual Disposition = Bad = Blocked Retrospective Detection, Analysis Continues
  • 11. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 AMP, the secret sauce Collective Security Intelligence SPERO Uses AI methods for real-time discovery of malware based on environment and behavior. Uses periodic review of Big Data store to implement retrospection ONE-TO-ONE Catches “well known” malware through use of primary SHA match. Equivalent to a signature- based system. ETHOS Catches families of malware through use of “fuzzy hashes” embedded in the Feature Print. Counters malware evasion by “bit-twiddling”. ADVANCED ANALYTICS Integrates heuristics from the malware environment, the Big Data store, ETHOS and SPERO to clarify the outcome of a marginal conviction
  • 12. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 AMP Everywhere Strategy Means Protection Across the Extended Network MAC AMP for Networks PC AMP for Cloud Web Security & Hosted Email CWS Virtual AMP on Web & Email Security Appliances Mobile AMP on ASA Firewall with FirePOWER Services AMP for Endpoints AMP Private Cloud Virtual Appliance AMP Threat Grid Dynamic Malware Analysis + Threat Intelligence Engine
  • 13. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Big Data analytics and forensics with Open SoC How Cisco is protecting © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 14. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 AMP Everywhere, down to the smallest scale
  • 15. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 16. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 17. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 18. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Why Cisco ? 1.6 Million sensors globally 100 TB data received every day 150+ Million IP terminals 600 engineers, tehnicians and security researchers 35% world wide emails inspected 6+ Mld $ invested in research and development TALOS – Global Operation center for CyberSecurity 10 Million files inspected everyday Email PCs MACs Web Networks IPS mobile WWW Arhitecture Solutions IT building blocks Rezults Network Data Center Colaboration Security 13 Mld web request inspected 24x7x365 operations 4.3 Mld web attacks blocked / day 40+ programming languages 1.1 Million malware samples analysed / day Advanced Malware Protection and Snort Community (AMP) Intelligent infrastructure Secure infrastructure & Continuous defence Intelligent cities Conformity & Security Business operations Education and Health Production Public Administratio n
  • 19. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Thank You

Editor's Notes

  1. You are not alone with your concerns about cyber security. Everyday another headlines highlight another breach resulting in data loss and lost to business are becoming a weekly if not dally occurrence. Security is top of mind for all organizations, rising up to top executives. What is behind tis dramatic shift in out IT landscape? [CLICK]  
  2. Today’s cybercriminals are more sophisticated and backed by a multi-billion dollar industry that has been monetized where data and malware are being commoditized. With this their tactics have changed. They are not looking for quick wins, but long-term payouts. Adapting from attacking an individual computer or person and are now aiming to capture the full power of your infrastructure, to gain a long-term return on their investment .   What have we done in response? Add individual point in time security solutions to stop individual problems. Now we’re stuck dealing with complexity and fragmentation that has created gaps in our security and reduced visibility .
  3. For One: Organizations have been quick to evolve with IT innovations. Capturing the benefits of [CLICK] mobility, [CLICK] cloud and the IoT. These new business models have resulted in a new domain in a connect “any to any” environment. The modern extended network is sprawling your perimeter and assets across many entry points. And has created a dynamic threat landscape that cyber criminals are exploiting . With the shortage of IT security professionals compiled with a culture of “putting your head in the sand” and crossing your fingers around a cyber attack is rapidly becoming a strategy you can longer afford. We know it’s not a matter of if, but when you will be attacked. Why ?  
  4. We need to be threat­–centric, and think like an attacker. Why? You are up against a highly motivated and compensated workforce. Who are using advances in technology, changing business models and user behaviors to their advantage . The dynamic threat landscape is demanding an adapt or die strategy.   We think like you do. We have taken a threat–centric approach in creating our cybersecurity solutions to tackle your biggest issues .  
  5. IN CLOSING, CISCO SECURITY NOW HAS THE INDUSTRY’S MOST COMPREHENSIVE ADVANCED THREAT PROTECTION COVERING THE ENTIRE ATTACK CONTINUUM AND THE INDUSTRY’S BROADEST SET OF ENFORCEMENT AND REMEDIATION OPTIONS AT ATTACK VECTORS WHERE THREATS MANIFEST THE CISCO SECURITY PRODUCT PORTFOLIO HAS SPECIFIC PLATFORM BASED SOLUTIONS TO SOLVE YOUR CURRENT PROBLEMS, BUT ALSO INTEGRATE INTO AN OVERALL SECURITY SYSTEM. THEY WORK TOGETHER TO PROVIDE PROTECTION THROUGHOUT THE ATTACK CONTINUUM – BEFORE, DURING, AND AFTER AN ATTACK.
  6. Lets be upfront, we are not proposing that we have a magic bullet. It doesn’t exist. And those who tell you it does are only perpetuating your problem. [CLICK]  You can go back to a number of “point in time” cybersecurity solutions, such as a stand-alone firewall. We too have learned and adapted to the effects of IT Sprawl, and the industrialization of hacking. Any stand-alone solution, even a firewall on its own in not sufficient in a threat-centric strategy and does not cover the entire attack continuum. What we need to stop these criminals is a security strategy that provides protection [CLICK] Before-During and After and attack. Protection across the entire attack continuum, [CLICK]  that is visibility-driven, threat–focused with a platform based approach. Pervasive, continuous and always-on cybersecuirty, across the entire attack continuum .   At Cisco, our mission states our intentions…intelligent cybersecurity for the real world. Not claims that we have a fantasy solution to solve your real word cyberthreats.  
  7. We need to be threat­–centric, and think like an attacker. Why? You are up against a highly motivated and compensated workforce. Who are using advances in technology, changing business models and user behaviors to their advantage . The dynamic threat landscape is demanding an adapt or die strategy.   We think like you do. We have taken a threat–centric approach in creating our cybersecurity solutions to tackle your biggest issues .  
  8. SECURITY IS ABOUT DETECTING, UNDERSTANDING AND STOPPING THREATS. USING THE FOUNDATION OF VISIBILITY YOU CAN UNDERSTAND CONTEXT AND APPLY COLLECTIVE INTELLIGENCE TO DETECT A THREAT. ONCE THREAT IS DETECTED, YOU WANT AUTOMATED ENFORCEMENT TO STOP THE THREAT. BUT WITH ZERO DAY ATTACKS AND ADVANCED THREATS, YOU MAY NOT KNOW IF SOMETHING IS GOOD OR BAD WHEN YOU SEE IT. IT IS KEY TO RECORD EVERYTHING THAT IS SEEN TO HAVE A CONTINUOUS CAPABILITY TO DETECT THREATS HOURS, DAYS OR EVEN WEEKS LATER.
  9. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.
  10. systems deliver both file and network trajectory – Security personnel struggle to understand the broader impact, context, and spread of malware across the network and endpoints. Is the malware detection an isolated incident or were multiple systems affected? Network and file trajectory delivers the ability to track malware across the network using existing Sourcefire sensors or FireAMP connectors; providing detailed information on point of entry, propagation, protocols used, and which users or endpoints are involved, which are then followed up with detailed file trajectory analysis.
  11. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.
  12. We need to be threat­–centric, and think like an attacker. Why? You are up against a highly motivated and compensated workforce. Who are using advances in technology, changing business models and user behaviors to their advantage . The dynamic threat landscape is demanding an adapt or die strategy.   We think like you do. We have taken a threat–centric approach in creating our cybersecurity solutions to tackle your biggest issues .  
  13. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.
  14. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.
  15. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.
  16. Cisco has one of the most comprehensive AMP portfolios in the market. With investment and innovation spanning over several years, our AMP Everywhere strategy means customers are protected across the extended network including PCs, Macs, mobile devices and virtual environments, through a standalone AMP appliances, as part of FirePOWER appliances for Next-Generation IPS or Next-Generation Firewall, and via Cisco Web Security Appliances, Email Security Appliances and the Cloud Web and Hosted Email Security and SaaS offers. For dynamic malware analysis and threat intelligence capabilities, you can even deploy Amp Threat Grid as a standalone appliance.