Cisco Vision de Arquitectura Sin Fronteras
-
Upload
fundacionfenixtech -
Category
Documents
-
view
220 -
download
0
Transcript of Cisco Vision de Arquitectura Sin Fronteras
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
1/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Ricardo RiveraBusiness Development ManagerSecurity & Mobility Southern Cone
Visin de la Arquitectura
Seguridad Sin Fronteras
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
2/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2
Frontera Corporativa Tradicional
Frontera Corporativa
Oficina Remota
Aplicacionesy Datos
Oficina Corporativa
Polticas
Atacantes ClientesPartners
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
3/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
Movilidad y Colaboracin
estn Disolviendo la Frontera de Internet
Frontera Corporativa
Oficina Remota
Aplicacionesy Datos
Oficina Corporativa
Polticas
Atacantes Clientes
Oficina deCasa
CoffeeShop
Aeropuerto
UsuarioMvil Partners
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
4/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
Cloud Computing est Disolviendo
la Frontera del Data Center
Frontera Corporativa
Oficina Remota
Aplicacionesy Datos
Oficina Corporativa
Polticas
Atacantes
Oficina deCasa
CoffeeShopClientes
Aeropuerto
UsuarioMvil Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
5/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5
Los Clientes Quieren Negocios
sin Fronteras
Frontera Corporativa
Oficina Remota
Aplicacionesy Datos
Oficina Corporativa
Polticas
Atacantes
Oficina deCasa
CoffeeShopClientes
Aeropuerto
UsuarioMvil Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
6/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
Bo
rderless
DataCenter
3
Borderless
Internet
2
Borderless
EndZones
1
Arquitectura Cisco para Seguridad de
Redes sin Fronteras
Policy
Corporate Border
Branch Office
Applicationsand Data
Corporate Office
Polticas(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)4
Home Office
AttackersCoffeeShopCustomers
Airport
MobileUser Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
7/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
Intelligent End Point Traffic Routing
Pillar 1: Borderless End Zone
Persistent Connectivity
Always On, Location Aware
Auto Head-end Discovery
IPsec , SSL VPN, DTLS
Advanced Security
Strong Authentication
Fast, Accurate Protection
Consistent Enforcement
Broadest Coverage
Most OSs and Protocols
Windows Mobile
Apple iPhone
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
8/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8
Always On Security and Protection
Traditional VPN
Protected
Cisco Borderless Network Security
Un-Protected
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
9/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9
Always On Security and Protection
Anytime, Anywhere, Any Device
Sitting in a Park
Cape Town, South AfricaCape Town, South Africa
At a Coffee Shop
Sydney, AustraliaSydney, Australia
In the Office
San Jose, CaliforniaSan Jose, California
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
10/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10
Pillar 2: Borderless Security Array
Advanced Scanning and Enforcement Capabilities
Access Control | Acceptable Use | Data Security |Threat Protection
Integrated into the Fabric of the Network
Access Control | Acceptable Use | Data Security |Threat Protection
Integrated into the Fabric of the Network
Cisco IronPortEmail Security
Appliance
Cisco AdaptiveSecurity Appliance
Cisco IntegratedServices Routers
Cisco IronPortWeb SecurityAppliance
10
VM Software Security Module Hybrid HostedAppliance
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
11/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
HTTP Is the New TCP
Instant Messaging
Peer to Peer
File TransferProtocol
Understanding Web Traffic11
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
12/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
Advanced Content Analysis
12
SSN Detection
Rule Is Matched MultipleTimes to Increase Score
Unique Rule Matches Are Met
Matches Are Foundin Close Proximity
Proper NameDetection
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
13/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
Advanced, Proactive Threat Protection
Cisco Security Intelligence Operations
GlobalThreat
Telemetry
GlobalThreatTelemetry
8:03 GMT Sensor DetectsHacker Probing
Bank Branchin Chicago
Ad Agency HQin London
ISP Datacenterin Moscow
8:00 GMT Sensor DetectsNew Malware
8:07 GMT Sensor DetectsNew Botnet
8:10 GMT
All Cisco Customers Protected
8:10 GMT
All Cisco Customers Protected
Cisco
SensorBase
Threat
Operations Center
Advanced
Algorithms
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
Higher Threat Coverage, Greater Accuracy, Proactive Protection
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
14/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14
AppServer
DatabaseServer
WebServer
Physical Security Device
Virtual Contexts
Pillar 3: Secure Virtualized Data Center
AppServer
DatabaseServer
WebServer
Hypervisor
Physical Security Device
Virtual ContextsVIRTUAL SECURITY
AppServer
DatabaseServer
WebServer
Hypervisor
Connect Physical Securityto Virtual Machines withCiscos SIA
2Secure PhysicalInfrastructure1Embed Security inthe Virtual Switch3
Service Chaining
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
15/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
Pillar 4: Rich Policy Enables
Ubiquitous , Consistent Control
Who? What? When? Where? How?
3Policy On and OffPremise
2 DynamicContainment Policy
1Access
Policy
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
16/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16
Access Control
Access ControlPolicy
In a Cisco Secure and Protected Borderless Network
Access ControlViolation
Remote WebExParticipant
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
17/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
In a Cisco Secure and Protected Borderless Network
Acceptable Use
Employee in MarketingDepartment
Acceptable UsePolicy
Access ControlViolation
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
18/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
In a Cisco Secure and Protected Borderless Network
Data Security
Data SecurityPolicy
Data SecurityViolation
Employee atUnmanaged Device
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
19/20
2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
Borderless
DataCenter
3
Borderless
Internet
2
Borderless
EndZones
1
Arquitectura Cisco para Seguridad de
Redes sin Fronteras
Polticas
Frontera Corporativa
Oficina Remota
Aplicaciones yDatos
Oficina
Corporativa
Polticas(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)4
Oficina deCasa
AtacantesCoffeeShopClientes
Aeropuerto
UsuarioMvil Partners
Platformas a Service
Infrastructureas a Service
Xas a Service
Softwareas a Service
-
8/10/2019 Cisco Vision de Arquitectura Sin Fronteras
20/20