Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Borderless Networks Enabling the Borderless Organisation Mark Jackson,

Slides:



Advertisements
Similar presentations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Advertisements

Device Evolution Greg Pelton Chief Technology Officer
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Network Basics.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Ingram Micro:
1:16 Multiplier Effect 1:16 Multiplier Effect Expanded Reach and Scale 17,000 Cisco Sales and Marketing 282,000+ Channel Employees.
Internet of Things Security Architecture
© 2009 Avaya Inc. All rights reserved. Page 1 AT&T Mobile Extension with Avaya one-X Mobile.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Partner Summit 2011 Padmasree Warrior CTO and SVP/GM, Enterprise, Commercial.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Unified Logs and Reporting for Hybrid Centralized Management
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Information Security in Real Business
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Switched Networks Routing and Switching.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
NW Security and Firewalls Network Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
4G-LTE: Enhancing Efficiency in Organizations. Factors Impacting Digitization Processes and Systems January Powerful Platforms and Devices Storage.
Exploring the Network.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Paul King Director, Threat Intelligence CiscoSystems.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco EnergyWise.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network security Product Group 2 McAfee Network Security Platform.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Laurent Philonenko, VP and General Manager Contact Center Business Unit,
Identity Assurance Emory University Security Conference March 26, 2008.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
Chapter 1: Explore the Network
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
IS3220 Information Technology Infrastructure Security
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Complete Cloud Security Anyone, anywhere, any app, any device.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Security fundamentals
Chapter 1: Explore the Network
Instructor Materials Chapter 1: Explore the Network
Chapter 1: Exploring the Network
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Chapter 1: Explore the Network
Module 2: Configure Network Intrusion Detection and Prevention
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Developing Innovative Unified Communications Applications
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
Presentation transcript:

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Borderless Networks Enabling the Borderless Organisation Mark Jackson, Technical Solutions Architect

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Branch Office Main Campus Data Center Viruses Denial of Service Unauthorized Access System Penetration Telecom Fraud

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Branch Office Main Campus Data Center Integrated Build security into the network Collaborative Make security work together as a system Adaptive Adjust defenses based on events and real time info

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Blurring the Borders: Consumer ↔ Workforce Employee ↔ Partner Physical ↔ Virtual Mobility Workplace Experience Video 1.3 Billion New Networked Mobile Devices in the Next Three Years Changing Way We Work Video projected to quadruple IP traffic by 2014 to 767 exabytes* Mobile Devices IT Resources Anyone, Anything, Anywhere, Anytime Operational Efficiency Program Government ICT Strategy

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 IT Consumerisation Mobile Worker Video/ Cloud IaaS,SaaS

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Information Security and Assurance Public Sector Network Government Cloud Shared Services

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 “The Public Service Network will allow the delivery of services to any location and, through standards, will enable unified communications in terms of voice, video and collaboration capabilities.” “Developments in ICT mean it is now possible for different teams, offices or even organisations to share the same ICT infrastructure.” “…data sharing is an essential element of joining up services and providing personalisation. This means that there must be effective, proportionate management of information risk.” “The need to continue to transform public services and to use ICT to enable transformation of the way the public sector runs and operates has become more pressing.”

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Location Device Application More Diverse Users, Working from More Places, Using More Devices, Accessing More Diverse Applications, and Passing Sensitive Data

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Infrastructure Borderless End-Point/User Services Mobility Workplace Experience Securely, Reliably, Seamlessly:AnyConnect Borderless Network Services Borderless Policy, Management and Smart Services Switching Wireless WAAS Routing Security Mobility: Motion Security: TrustSec Voice/Video: Medianet Green: EnergyWise App Performance: App Velocity PROFESSIONAL SERVICES: Realise the Value of Borderless Networks Faster Architecture for delivering reach, range and underpin shared services Video

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Corporate Office Branch Office Local Data Center SECURITY and POLICY AirportMobile UserAttackersPartners CitizensCoffee ShopHome Office Always-On Integrated Security and Policy 802.1X, TrustSec, MACsec, MediaNet Outside the Corp Environment Inside the Corp Environment CORP DMZ BORDER X as a Service Infrastructure as a Service Software as a Service Platform as a Service

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Who are you? An 802.1x or a Network Admission Control (NAC) appliance authenticates the user. What service level do you receive? The user is assigned services based on role and policy ( job, location, device, etc.). What service level do you receive? The user is assigned services based on role and policy ( job, location, device, etc.). What are you doing? The user’s identity, location, and access history are used for compliance & reporting. Where can you go? Based on authentication data, the network controls user access. 3 Enforces Access Policy Identifies Authorised Users Personalises The Network Increases Network Visibility

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 SGTs Current network access control segmentation methods (VLAN, ACL, Subnet) are topology dependent and operationally intensive Security Group Tags are topology independent and streamline the deployment of role-based access control  Attribute based access control assigns an SGT to users, devices, or virtual machines based on their role  Security Group ACLs (SGACLs) enforce access policy based on source and destination SGT  Transport of SGTs is secured via NDAC & 802.1AE MACsec  This is an emerging technology, expanding in platform availability and adoption SGACLs Authz Rules IndividualsResources Authz Rules Security Groups Employee Non-Europe Employee Security Groups Destination Internet Confidential Print/Copy Access Rules Source Partners

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Delivering a Platform to Enable Shared Services DDDDDDDDD VVVVVVVVV Single unified platform enforcing policy Duplicated Infrastructure, increased cost and complexity Shared Workspace Environment

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Next-Gen Unified Security  User/device identity  Posture validation  Integrated web security for always-on security (hybrid) Persistent Connectivity  Always-on connectivity  Optimal gateway selection  Automatic hotspot negotiation  Seamless connection hand-offs Corporate Office Mobile User Home Office Secure, Consistent Access Voice—Video—Apps—Data Broad Mobile Support  Fixed and semi-fixed platforms  Mobile platforms Wired 3G/Wi-Fi Broadband

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Choice Diverse Endpoint Support for Greater Flexibility Acceptable Use Access Control Data Loss Prevention Threat Prevention Intranet Corporate File Sharing Access Granted AnyConnect Client Security Rich, Granular Security Integrated into the network Experience Always-on Intelligent Connection for Seamless Experience and Performance WSA ASA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Enabling Seamless Remote and Mobile Working Secure Mobile Connectivity Unmanaged Devices, Risk of Data Loss, and Lack of Access Mobile Government Worker Acceptable Use Access Control Data Loss Prevention

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Keep the Bad Guys Out Firewall Access Intrusion Prevention Block Attacks Content Security & Web Self-Defending Network

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Self-Defending Network Enable Secure Borderless Access Firewall Access Intrusion Prevention Block Attacks Content Security & Web Policy & Identity Trusted Access Secure Mobility Always On Cloud Security Hosted/Hybrid New Security Requirements Keep the Bad Guys Out

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 The Borderless Organisation Needs a Borderless Network Architecture. Cisco Is Uniquely Equipped to Deliver That Architecture with “Broad and Deep” Network Innovation. The Cisco Borderless Network delivers the Platform to transform service delivery.