Presentation is loading. Please wait.

Presentation is loading. Please wait.

© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Presentation Title Sub-Title Partner Name/ Logo.

Similar presentations


Presentation on theme: "© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Presentation Title Sub-Title Partner Name/ Logo."— Presentation transcript:

1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Presentation Title Sub-Title Partner Name/ Logo

2 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Network Security: A Business Imperative Threats and Their Effects Disruption affects Productivity (The CIO Problem)  External source (e.g. distributed denial of service or DDoS)  Internal source (e.g. virus breakout)  Accidental source (e.g. configuration mistake) Damage affects Reputation (The CEO Problem)  Public visage (e.g. web site defacement)  Shareholder confidence (e.g. loss of information)  Accidental damage (e.g. a misstep in industry) Loss affects Value (The CFO Problem)  Random theft (e.g. break-in, no coordination)  Directed theft (e.g. espionage)  Accidental loss (e.g. email inadvertently sent)

3 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 The Challenge of Managing Security Monitoring Need to monitor multivendor networks Configuration How to rapidly deploy new policies Mitigation How to use network to eliminate threats Auditing How to audit against best practices Analysis Too much meaningless raw data Identity How to control access to network assets— who can do what Service Provider SMB Enterprise Mid-Market

4 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Enabling every element to be a point of defense and policy enforcement Integrated Proactive security technologies that automatically prevent threats Adaptive Collaboration among the services and devices throughout the network to thwart attacks Collaborative The Cisco Self-Defending Network A systems approach leveraging the Network

5 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Self-Defending Network Defined Threat Control and Containment Confidential Communications Operational Control and Policy Management Advanced technologies and security services to  Mitigate the effects of outbreaks  Protect critical assets  Ensure privacy Security as an integral, fundamental network feature Efficient security management, control, and response Secure Transactions Secure Network Infrastructure

6 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Network Security: Critical Business Imperative Increasing Complexity Requires Varying Levels of Capability Remote Site Consumer Devices Extranet Business Partners Commerce Teleworker and Sales  Exponential Growth of Collaboration Points  Proliferation of Connected Devices PDAs, Cell Phones, Laptops Physical security devices Consumer and Entertainment devices Increasing complexity requires…  Sophisticated solutions Architectural Design and Deployment Multi-layered security Design into infrastructure and business processes Collaborative, Adaptive, and Integrated solutions  Varying levels of “skills depth” in design, deployment, and support

7 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 [Insert Company Name] Cisco Master Security Specialized Customer Success:  Successful delivery of integrated, multiple security solutions across 5 customer references Services Capability and Methodology:  Comprehensive services suite across Cisco Lifecycle Services phases: Prepare, Plan, Design, Implement, Operate, and Optimize Technical Capability:  Deepest technical skills  Additional CCIE individuals, Industry accreditations An elite partner status indicating the partner has the most in-depth technology skills and has demonstrated customer success in designing, deploying, and providing services for more sophisticated, value-added Cisco security solutions. Cisco Advanced Security Specialization Annual Third Party Audit

8 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 Pre-Audit Verification Advanced Security Specialization Cisco Certified Internetwork Expert (CCIE) Certification for Security Project Management Institute (PMI), or PRojects IN Controlled Environments (Prince 2) certification Certified Information Security Manager ® (CISM), or Global Information Assurance Certifications (GIAC) including Global Certified Incident Handler (GCIH) or Global Systems and Network Auditor (GSNA) Five customer reference accounts (Across 5 specific solution sets) Partner Service Assessment documents Onsite Audit Validation Demonstration Capability: Across Cisco prescribed solution sets Cisco Lifecycle Services: Operate Phase capabilities— processes, tools and metrics * Vulnerability Assessment Documentation Sales Training and Development: Evidence of organizational structure and training for solution sales * Note: Requirement waived if ISO20000-2005 or BS15000 certified and meet metrics Cisco and Third Party Audit Requirements: Ensuring Integrity and Value of the Master Brand

9 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Network Admission Control NAC—Network Access Control Secure Communications ISR—Integrated Services Router ASA—Adaptive Security Appliance SSL VPN DMVPN—Dynamic Multipoint VPN Security Management CS—MARS CSM—Cisco Security Manager Secure Applications and Hosts CSA—Cisco Security Agent ASA—Adaptive Security Appliance Intrusion Prevention CSA—Cisco Security Agent ASA—Adaptive Security Appliance IPS—Intrusion Prevention System ISR—Integrated Services Router Solution Design and Deployment: Five Customer Reference Accounts Illustrating Sophisticated, Multi-Solution Integration and Services

10 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Coordinated Planning and Strategy Make sound financial decisions Prepare Assess Readiness Can your network support the proposed system? Plan Maintain Network Health Manage, resolve, repair, replace Operate Implement Solution Integrate without disruption or causing vulnerability Implement Design the Solution Products, service, support aligned to requirements Design Operational Excellence Adapt to changing business requirements Optimize Cisco ® Partner Customer A Lifecycle Approach to Security Service and Support

11 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 [INSERT COMPANY OFFERING(S) AND VALUE PROP(S)] [EXPAND AS NEEDED] [Insert Company Name] Master Security Specialization

12 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12 Case Study: [INSERT CUSTOMER HERE] Business Challenge  [INSERT CHALLENGE 1 HERE]  [INSERT CHALLENGE 2 HERE]  [INSERT CHALLENGE 3 HERE] Network Solution  [INSERT SOLUTION 1 HERE]  [INSERT SOLUTION 2 HERE]  [INSERT SOLUTION 3 HERE] “Insert Customer Quote Here.” Citation

13 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 13 Title/Subtitle  Master Security Specialization— Awarded by the industry leader in network security—Cisco  Part of an elite group of providers  Proven, in-depth technology skills  To help you Accelerate growth and profitability Gain and keep competitive advantage Stay in front of the latest technology

14 © 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 14


Download ppt "© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Presentation Title Sub-Title Partner Name/ Logo."

Similar presentations


Ads by Google