1 © 2003, Cisco Systems, Inc. All rights reserved. Cisco Integrated Security: Building The Self-Defending Network Bogdan Constantinescu Area Manager Romania.

Slides:



Advertisements
Similar presentations
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 JUNIPER NETWORKS Moving up the Partner Program.
Advertisements

Stonesoft Roadmap WHAT FEATURES WILL COME IN
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Borderless Networks Enabling the Borderless Organisation Mark Jackson,
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Enterprise Network Architecture SAFE Suhento Gunawan Systems Engineer.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Delivering Converged Services to Enterprise Branches and SMBs Cisco ®
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
CPE5021 Advanced Network Security ---Network Security and Performance--- Lecture 9 CPE5021 Advanced Network Security ---Network Security and Performance---
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Self Defending Network SECURING THE INTELLIGENT INFORMATION NETWORK James Jones CCIE 1550, CISSP.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Presentation Title Sub-Title Partner Name/ Logo.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
7.4 Update - ISE Session.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
IS3220 Information Technology Infrastructure Security
Self-Defending Networks Self-Defending Networks By-  Aseem Khan  Adeeb Akhil Shahi  Mohammed Sohail  Saiprasad H Bevinakatti.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Barracuda NG Firewall ™
Module 2: Configure Network Intrusion Detection and Prevention
ISMS Information Security Management System
IS4680 Security Auditing for Compliance
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Presentation transcript:

1 © 2003, Cisco Systems, Inc. All rights reserved. Cisco Integrated Security: Building The Self-Defending Network Bogdan Constantinescu Area Manager Romania & Rep. Moldova Cisco Systems Romania SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII 21 Septembrie 2004

222 Agenda Changes in Security Requirements Integrated Security & Self-Defending Networks Cisco Security Solutions

333 The Network as a Strategic Asset Customers Partners Suppliers Employees Improved Productivity Reduced Operational Costs Financial Performance Corporate Enterprises Small/Medium Businesses Service Providers

444 Intelligent Information Network Capabilities Security, IPC, Wireless Application Aware Management Modular Approach Security, IPC, Wireless Application Aware Management Modular Approach INTEGRATED High Availability Multilayer Security Virtual Services Scalable High Availability Multilayer Security Virtual Services Scalable RESILIENT Self-Provisioning Self-Optimizing Self-Defending Self-Provisioning Self-Optimizing Self-Defending ADAPTABLE

555 Business Continuity: Impact of Not Securing Your Network Cost—directly affects bottom line 494 organizations* reported overall financial losses totaling nearly 142 million. Credibility—end-user perception Can your end-user trust your network? Productivity—ability to use your system Downtime is lost time and revenue Viability—can ultimately affect your business Where will your company be in 1 year… 5 years? Liability—are you responsible? If you don’t take actions to stop outbound attacks, are you liable for damages inflicted on others? *

666 The Self Defending Network 666 © 2003 Cisco Systems, Inc. All rights reserved. Presentation_ID

777 Security is a Systematic Process Vulnerabilities and Risk Assessment Architecture Design and Implementation Security Policy/ Procedures Deploy Security Policy Surveillance, Monitoring, Audit & Analysis Incident Response Corrective Action Forensic Analysis 777 Central Security Management Central Security Management

888 Evolution of Cisco Security Strategy 1990s Integrated security Routers Switches Appliances Endpoints FW + VPN + IDS…. Integrated management software Evolving advanced services Integrated security Routers Switches Appliances Endpoints FW + VPN + IDS…. Integrated management software Evolving advanced services Security appliances Enhanced router security Separate management software Security appliances Enhanced router security Separate management software Basic router security Command line interface Basic router security Command line interface 2003 End-point posture enforcement Network device protection Dynamic/Secure connectivity Dynamic communication between elements Automated threat response End-point posture enforcement Network device protection Dynamic/Secure connectivity Dynamic communication between elements Automated threat response Self-Defending Networks Self-Defending Networks 2004… Integrated Security Integrated Security Defense- In-Depth Point Products Basic Security Multiple technologies Multiple locations Multiple appliances Little/no integration Multiple technologies Multiple locations Multiple appliances Little/no integration

999 SYSTEM LEVEL SOLUTIONS EndpointsEndpoints NetworkNetwork ServicesServices SECURITY TECHNOLOGY INNOVATION SECURITY TECHNOLOGY INNOVATION Endpoint SecurityEndpoint Security Application FirewallApplication Firewall SSL VPNSSL VPN Network AnomalyNetwork Anomaly INTEGRATED SECURITY Secure Connectivity Threat Defense Trust & Identity Secure Connectivity Threat Defense Trust & Identity An initiative to dramatically improve the network’s ability to identify, prevent, and adapt to threats Self Defending Network Strategy Cisco strategy to dramatically improve the network’s ability to identify, prevent, and adapt to threats

10 Cisco Self-Defending Network - In Action End-point security enforcement Network Admission Control, Identity Based Network Services Network device protection Control Plane Policing, Auto-Secure, Switch/Router/WAP protection technologies. Dynamic/Secure connectivity Dynamic Multipoint VPN, VLAN Dynamic communication between elements Netflow, NBAR, Dynamic Intrusion Protection, ‘AreYouThere?’ Automatic response Cisco Security Agent, Network Anomaly Detection

11 Self-Defending Network Example Identity Based Networking Services 802.1x Authentication Challenge 802.1x Authentication Info Verify Login and Check with Policy DB Credentials Verified Login granted Send Policies Set port to enable set port vlan 10 VLAN 10 Engineering VLAN Switch applies policies and enables port. Login + Certificate Login Verified CiscoSecure ACS AAA Radius Server 802.1x Authentication Server Active Directory Login and Certificate Services 6500 SeriesAccess Points 4000 Series 3550/2950 Series 802.1x Capable Access Devices 802.1x Capable Client Secure Access In Action

12 Cisco Security Agent (CSA): Behavioral Protection From Attacks Target  Rapidly Mutating  Continual signature updates  Inaccurate  Most damaging Change very slowly Inspiration for CSA solution

13 Cisco Security Solutions 13

14 Cisco’s Integrated Network Security Solutions Threat Defense Defend the Edge: Integrated Network FW+IDS Detects and Prevents External Attacks Protect the Interior: Catalyst Integrated Security Protects Against Internal Attacks Guard the Endpoints: Cisco Security Agent (CSA) Protects Hosts Against Infection Trust and Identity Verify the User and Device: Identity-Based Networking/NAC Control Who/What Has Access Secure the Transport: IPSec VPN SSL VPN MPLS Protects Data/Voice Confidentiality Secure Comm. Intranet Internet

15 Cisco Integrated Network Security VPN 3002 VPN 3005 VPN 3015 VPN 3030 VPN 3080 VPN E 515E xxx 3700 CSS11500 SCA Secure Content Accelerator SCA Secure Content Accelerator Catalyst 6500 Remote Access VPN Appliances Remote Access VPN Appliances Intrusion Detection Appliances Intrusion Detection Appliances PIX Firewall VPN Appliances PIX Firewall VPN Appliances Site-to-Site VPN / Firewall Routers Site-to-Site VPN / Firewall Routers Content Switching, Filtering SSL Optimization Content Switching, Filtering SSL Optimization High Performance Switch Integrated Campus Security Solutions High Performance Switch Integrated Campus Security Solutions Content Engine Catalyst CSM & SSL Blades CSS115XX SSL Blade 800 SOHO 90 Now with AES Acceleration

16 First Routers in the Industry to Support IPS and DMVPN! 3800 Series 2800 Series 1800 Series FCS September 2004 FCS September 2004 FCS September 2004 Highest Density and Performance for Concurrent Services Embedded, Advanced Voice, Video, Data & Security Services Integrated Security & Data Substantial increase in price/performance! Extension into new markets! Greater service densities across the portfolio! Increased Value Extended to New Markets Cisco Integrated Services Routers Cisco 3800, 2800, and 1800 Series Performance and Services Density Enterprise Branch Office SMBSmall Branch

17 ManagementBuildingDistribution Core Edge ServerE-Commerce Corporate Internet VPN/Remote Access WAN ISP PSTN FR/ATM

18 Continually identify and mitigate risk Cisco Advanced Services for Network Security Assess and plan for a sound architecture and design Build in scalable, adaptable, easy-to- upgrade solutions Transparently integrate into the core network infrastructure  Security Posture Assessment  Network Security Design Review  Network Security Design Development  Network Security Implementation Plan Assistance  Network Security Implementation Engineering  Network Security Optimization

19 Trust Cisco to Provide Leadership The threats are here to stay, are changing, and we must evolveThe threats are here to stay, are changing, and we must evolve Our connected world is the target, not one piece or one companyOur connected world is the target, not one piece or one company Cisco remains committed to help protect our customersCisco remains committed to help protect our customers The threats are here to stay, are changing, and we must evolveThe threats are here to stay, are changing, and we must evolve Our connected world is the target, not one piece or one companyOur connected world is the target, not one piece or one company Cisco remains committed to help protect our customersCisco remains committed to help protect our customers Cisco Spent $300M on Security R&D (FY’03) We’re a Partner You Can Trust

20 More Information (Cisco router recommendation guide)

21