Suche senden
Hochladen
Gordon Thomson Infosecurity.nl 4 november Jaarbeurs Utrecht
âą
0 gefÀllt mir
âą
968 views
Infosecurity2010
Folgen
Technologie
Bildung
Melden
Teilen
Melden
Teilen
1 von 34
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
Â
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
UN Foundation posters - For the Millennium Development Goals ENERGY is ESSENTIAL
UN Foundation posters - For the Millennium Development Goals ENERGY is ESSENTIAL
Daniel Laender
Â
Boston trip, august 2010
Boston trip, august 2010
SAnsbach
Â
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Infosecurity2010
Â
Empfohlen
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Koen Gijsbers, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
Â
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
UN Foundation posters - For the Millennium Development Goals ENERGY is ESSENTIAL
UN Foundation posters - For the Millennium Development Goals ENERGY is ESSENTIAL
Daniel Laender
Â
Boston trip, august 2010
Boston trip, august 2010
SAnsbach
Â
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Andrew Yeomans, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Helmer Wieringa, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Stefan Eisses, Infosecurity 3 november 2010 jaarbeurs utrecht
Infosecurity2010
Â
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Infosecurity2010
Â
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Infosecurity2010
Â
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Infosecurity2010
Â
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Infosecurity2010
Â
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Â
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Â
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Â
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Â
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Â
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Â
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Â
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Â
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Â
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Â
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Â
Weitere Àhnliche Inhalte
Mehr von Infosecurity2010
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Infosecurity2010
Â
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Infosecurity2010
Â
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Infosecurity2010
Â
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Infosecurity2010
Â
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Infosecurity2010
Â
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Infosecurity2010
Â
Mehr von Infosecurity2010
(9)
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Â
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Stephan Hendriks Eric IJpelaar - Identity access management in the cloud -
Â
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Â
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Emiel Brok, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Event...
Â
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Ruud Mollema, Infosecurity.nl, 3 november 2010, Jaarbeurs Utrecht
Â
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Eric Verheul, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Â
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Jeroen de Boer, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Â
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Auke Huistra, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Â
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Paul James Adams, InfoSecurity.nl 2010, 3 november, Jaarbeurs Utrecht
Â
KĂŒrzlich hochgeladen
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
Â
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Â
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Â
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Â
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Orbitshub
Â
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Â
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Â
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Â
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
apidays
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Â
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Â
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Â
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Â
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Â
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Â
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(âïž+971_581248768%)**%*]'#abortion pills for sale in dubai@
Â
KĂŒrzlich hochgeladen
(20)
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Â
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Â
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Â
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Â
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Â
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Â
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Â
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Â
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Â
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Â
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Â
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Â
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Â
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Â
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Â
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Â
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Â
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Â
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Â
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Â
Gordon Thomson Infosecurity.nl 4 november Jaarbeurs Utrecht
1.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID The Secure Borderless Network Gordon Thomson Director of Security Sales, Europe November 4, 2010
2.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Urgent Sales Quote Hello, Our team needs a sales quote ASAP. Please respond as soon as possible. https://www.salesforce.com/ Urgent! Need Sales Quote User : ED Hello, Our team needs a sales quote ASAP. Please respond as soon as possible. https://www.salesforce.com/ Urgent! Need Sales Quote User : TED
3.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Cisco Secure Mobility 3
4.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID No Cisco Secure Mobility
5.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID While reporters and onlookers were lamenting the passing of the King of PopâŠ
6.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 6 6 6 6 6 6 6 6 6 6 6 6 Fri June 26 20:00 0.00% 1.00% 2.00% 3.00% 4.00% 5.00% 6.00% Michael Jackson Spam as a Percentage of Global Spam Sat June 27 02:00 Sat June 27 08:00 Sat June 27 14:00 Sat June 27 20:00 Sun June 28 02:00 Sun June 28 08:00 âŠcriminals spewed over 2 billion Michael Jackson spam messages
7.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Web 2.0 Abuse Commercial tools for account creation, posting, CAPTCHA bypass, and IP rotation are readily available Targets popular sites and blogs including Gmail, Yahoo, Facebook, Twitter, and Craigslist Enables abuse of many services including webmail account creation for spamming 7
8.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Botnet Trends ReducingâŠâŠâŠâŠâŠ Better Hidden, More Refined, but Hard Working as Ever 2007: Big Botnet story was Storm 2008: Storm not dead yet, now joined by Kraken/Bobax and Asprox 2009: Storm evolves to Waledac, Conficker, Koobface 2009: ZeusâŠâŠâŠwhatâs next?
9.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 9 9 9 9 9 9 9 9 9 9 9 9 Strategic Alliances: Conficker and Waledac Waledac monetizes Conficker botnet ï§ Fake and malicious SMS software ï§ Scareware Antivirus software
10.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 10 10 10 10 10 10 10 10 10 10 10 10 Service dedicated to checking if a malware executable is detectable by AV engines Criminal SaaS Offerings Expand
11.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Rise in SMS Attacks Often will direct users to call automated phone systems designed to steal personal info Targeted (by area code) Credible âSmishingâ: SMS being used to deliver phishing links Smartphone OS vulnerability exploits being discovered 11
12.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID Security Top of Agenda âHow important are each of the following IT initiatives to your organizations usiness or corporate initiatives for the coming year?â 1st Security Enhancement 3rd Updating Disaster recovery 5th Beginning/Updating Server Virtualisation 11th Adoption of Unified Communications Technology IT Managers place highest priority on adoption of security Critical Priority High Priority Low Priority Not on our agenda Source: Wedbush Morgan, Jan. 2010, 49% 36% 12% 3% 35% 38% 21% 5% 34% 35% 25% 5% 25% 35% 26% 14%
13.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 13 13 13 13 13 13 13 13 13 13 13 13 â I need security to be simpler, transparent to the user and more agile. â â John Stewart CSO Cisco Collaboration is changing workplace experience Cloud computing drives efficiency Vendor consolidation lowers costs
14.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 14 14 14 14 14 14 14 14 14 14 14 14 My business has a mass of data. I need to identify which data needs protection, and put systems in place to protect it. â â Dave Martin CSO EMC â Data theft turns âprofessionalâ Regulations make data control more critical Anytime, anywhere access increases risk
15.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 15 15 15 15 15 15 15 15 15 15 15 15 I need to be thinking about all threats â rational and irrational, amateur, professional and political. â â â Charlie Forand CSO Verizon Cyber crime fuels malicious R&D Industrial espionage is a real threat Political attacks are growing threat
16.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 16 16 16 16 16 16 16 16 16 16 16 16 Business Imperatives Security Imperatives Simplify Security for the User, the Business, and for the Operations Maintain Regulatory Compliance and Manage Risk Well Design and Defend for Unpredictable Threats Enable Business Speed and Agility Maintain Regulatory Compliance and Manage Risk Well Protect Intellectual Property
17.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 17 17 17 17 17 17 The European CIO Landscape
18.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID The Customerâs Problem Theft Unintentional Loss Virus Scanning - Host & Server Anomaly Detection & Mitigation Encryption Software One-Time Token Software Multifunction Security Firewall Physical Security Endpoint Security Network Intrusion Protection Router/Switch Security Security Management VPN Compliance Validation Application Optimization Identity Management Security Alerts Event Logging Application Vulnerability Assessment Access Control & Video Surveillance Vulnerability Scan Risk Management Facility Management Application Security Policy Access Control Identity Web Security Website Defacement Loss of Confidentiality Virus Outbreak DDoS
19.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 19 19 19 19 19 19 Our Approach to Security needs to Change Improve Effectiveness Reduce Risk Control Costs
20.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 20 20 20 20 20 20 20 20 20 20 20 20 Opposing Forces Access Control Cyber Security Control Open Smart Connected Communities Mobility Cloud Collaboration Virtualization Smart Grid Connected Cameras, Printers⊠Acceptable Use Threat Protection Data Security Compliance
21.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 21 21 21 21 21 21 21 21 21 21 21 21 The Traditional Network DMZ and Server Desktop
22.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 22 22 22 22 22 22 22 22 22 22 22 22 Any Device, Anytime, Anywhere Workplace Applications and Data Are Now Mobile
23.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 23 23 23 23 23 23 23 23 23 23 23 23 Applications and Data Are Now Mobile Security Extends from the Network
24.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 24 24 24 24 24 24 24 24 24 24 24 24 From Self-Defending Network to Secure Borderless Networks Keep the Bad Guys Out Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web Self-Defending Network
25.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 25 25 25 25 25 25 25 25 25 25 25 25 From Self-Defending Network to Secure Borderless Networks Self-Defending Network Enable Secure Borderless Access Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web Policy & Identity Trusted Access Secure Mobility Always On Cloud Security Hosted/Hybrid New Security Requirements Keep the Bad Guys Out
26.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 26 26 26 26 26 26 26 26 26 26 26 26 From Self-Defending Network to Secure Borderless Networks Self-Defending Network Enable Secure Borderless Access Keep the Bad Guys Out Secure Mobility Always On Secure Borderless Networks Policy & Identity Trusted Access Cloud Security Hosted/Hybrid Cisco Security Intelligence Operations Firewall Access Control Intrusion Prevention Block Attacks Content Security Email & Web
27.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 27 27 27 27 27 27 27 27 27 27 27 27 Ciscoâs Security Approach Accurately, Seamlessly & Always On DEFEND Defend Against Threats Anyone, Anywhere, Anything, Anytime Threat Defence and Risk Reduction EXTEND PREVENT COMPLY Achieve Regulatory Compliance Prevent Loss of Business Assets Secure Enterprise Connectivity Secure Mobile Workforce Physical and Data Loss Prevention Governance, Risk and Compliance
28.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID New Business Models in Security Suitable for single site, no mobile workers, low perception of security risk, DIY mentality. Appliance Self-Managed, On-Premise Hybrid Hosted Divided Control, On-Premise & Cloud-Based Managed Fully-Managed, On-Premise or DC. Suitable for multiple sites, many mobile workers, TCO aware , Cloud friendly. Large HQ, hub sites, many mobile workers, but cloud not strategic. Company outsource to SI or SP. Technology agnostic. Hosted Cloud-Based, SaaS Infrastructure
29.
Trusted Systems Management Endpoint Cloud Services Partners
Site Licenses The Whole Offer Cisco Security Architecture Global Intelligence Local Intelligence
30.
Trusted Systems Management Endpoint Cloud Services Partners
Site Licenses The Whole Offer The Cisco Advantage Global Intelligence Local Intelligence AnyConnect Hybrid Scanning TrustSec Security Intelligence Operations Policy Network Integration
31.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 31 31 31 31 31 31 31 31 31 31 31 31 The New Borderless Organization Securely, Reliably, Seamlessly Borderless Experience Anything Anytime Anywhere Anyone
32.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 32 32 32 32 32 32 32 32 32 32 32 32 Critical Questions to Consider Do I Have a Consistent Access Policy Architecture Across My Network for all Users and Devices? Can Mobile Devices Access My Network Securely, Reliably and Seamlessly? Can My Network Deliver Real-Time Collaboration Experiences? Can My Network Deliver Protection from the Premises to the Cloud? Can My Network Optimize Performance of Applications Anytime, Anywhere? Am I Using My Network to Reduce My Energy Costs? Is My Network Ready for Current and Future Regulatory Requirements? Where Am I Now? Where Do I Start? 1 2 3 4 5 6 7 8
33.
© 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID 33 33 33 33 33 33 SECURITY NEEDS TO SECURE, ENABLE AND CONTROL COST Secure Borderless Networks delivers the anytime, anywhere experience securely
34.
34 34 © 2009 Cisco
Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 34 34 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID © 2009 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID
Jetzt herunterladen