000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

Slides:



Advertisements
Similar presentations
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Advertisements

Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
The Most Analytical and Comprehensive Defense Network in a Box.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Chapter 12 Network Security.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Information Security in Real Business
Wireless Network Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
EDUCAUSE Security 2006 Internet John Brown University.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Nebojte se jí Tomáš Chott at Cisco
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
The Most Analytical and Comprehensive Defense Network in a Box.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Module 11: Designing Security for Network Perimeters.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Defense-in-Depth using Network Virtualization and Network Admission.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Cisco 2921/K9, Hot Required by Small to Enterprise Branch Offices.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Working at a Small-to-Medium Business or ISP – Chapter 8
Wireless Network Security
Introduction:. Vendor : Cisco Certifications : Next-Generation Firewall Express Security Engineer Exam Name : Cisco ASA Express Security Exam Code :
Virtualization & Security real solutions
Chapter 4: Protecting the Organization
Wireless Network Security
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Cisco Security Solutions Overview David Hettrick August ® PartnerSmart. ™

® _2 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Is there a reason to be Paranoid?  Yes  Often, selling security is easy after a customer has had a breach of some kind  Suggestion is to be proactive and warn of potential threats  Security will always be a trade- off between Price and Comfort Level

® _3 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Types of Threats  Denial of Service (DoS) attacks  IP Spoofing  Phishing  Spyware  Malware  Reconnaissance  Unauthorized entry and data theft  Viruses and Worms  And more…

® _4 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Cisco Firewall and VPN products  PIX- Firewall and VPN – Flagship firewall  VPN Concentrator – Dedicated VPN appliance – Optimized for Remote Access – (EOS August 2007)  Both products are replaced by the Cisco ASA Appliance – Built on PIX v7.0 Code – Feature equivalent to VPN Concentrator – Higher Performing

® _5 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Adaptive Security Appliances  ASA5500 Adaptive Security Appliances – Provide Firewall and IPSec/SSL VPN  ASA5505 ~150Mbps  ASA5510 ~300Mbps  ASA5520 ~450Mbps  ASA5540 ~650Mbps  ASA5550 ~ 1200Mbps  SSM Expansion Slot – 4 port Gigabit 10/100/1000 or SFP – AIP module for IPS/IDS  AIP-10  AIP-20 – CSC module for gateway anti-x  Provides Anti-Virus and Anti-Spyware  Additional license to add URL/Content filtering, Anti-Phishing, & Anti-Spam filtering, Anti-Phishing, & Anti-Spam

® _6 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Cisco ASA 5505 Adaptive Security Appliance Sleek, High Performance Desktop Design Diskless Architecture for High Reliability Expansion Slot for Future Capabilities Expansion Slot for Future Capabilities Three USB v2.0 Ports for Future Use (One in Front) Console Port Two Power over Ethernet (PoE) Ports for IP Phones, WiFi Access Points, Video Surveillance, etc. Secure Lock Slot and System Reset Button 8-port 10/100 Fully Configurable Switch with VLAN Support © 2004 Cisco Systems, Inc. All rights reserved. ASA 5500 Intro 666

® _7 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Content Security and Control SSM Product Details CSC SSM-10  50 User  100 User  250 User  500 User  Base Services: – File-based Anti-Virus and malware filtering; Anti-Spyware  Plus License: – Anti-Spam, Content Filtering, Anti- Phishing, URL Filtering & Blocking Cisco ASA 5500 Series Content Security and Control Module (CSC SSM) CSC SSM-20  500 User  750 User  1,000 User Platforms / Subscription Levels Feature Sets

® _8 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. ASA Advanced Intrusion Prevention Module (AIP)  Feature equivalent to Cisco’s standalone IPS product (4200 series)  Freedom to decide which traffic traversing the ASA is scanned for intrusion.  Ability to drop those packets and log them right at the ASA

® _9 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Dual ISP feature introduction – Dual ISP support via object tracking feature Main Office Primary ISP Cisco ASA Outside Backup Secondary ISP IOS sla tracking feature Active/Standby routes Uses ICMP to track the routes Works on static address, DHCP and PPPoE Fail Back feature when primary comes back

® _10 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Simple installation and monitoring for the Cisco ASA 5500 family Supports configuration of: - Firewall - Remote Access VPN - Site to Site VPN - And all other ASA services Supports monitoring of: - Syslog (real-time) - Connections - Throughput & more! Cisco Adaptive Security Device Manager v5.2

® _11 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. VPN Solutions: Easy VPN  Scaleable – Easily add remote sites with no changes to Easy VPN server  IOS Routers  PIX, ASA, CVPN Internet Easy VPN Client Dynamic IP Client Behind Firewall Easy VPN Server VPN Tunnel

® _12 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Network Based Intrusion Products  Based on Signatures – IDS-4215, IPS-4240 – AIP module in ASA – NM-CIDS in Router – IOS embedded IPS  Watch for unauthorized activity in real time  Implement in front of firewall to audit attacks against network  Implement behind firewall approving traffic by firewall packets leaving corporate network  Implement where key Servers reside

® _13 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. What does Host based IPS do?  Day zero attack protection (virus, spyware, malware, patch management)  Intercepts Operating System calls and compares them to cached security policies  Takes proactive approach to block malicious behavior on host

® _14 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Host Based Intrusion Prevention CSA: Cisco Security Agent CSA Server Protection: Host-based Intrusion Protection Network Worm Protection Web Server Protection Security for other applications CSA Desktop Protection: Distributed Firewall Day Zero Virus Protection Security for other applications Anomaly Based Create Your own Policies Windows or Solaris

® _15 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. CSA Architecture  CSA Manager (required)  CSA Servers  CSA Desktops  CSA Profiler – Automates analysis of Applications activities – Easily builds custom policies

® _16 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Network Admission Control NAC  Prevents vulnerable and non-compliant hosts from impacting enterprise resilience, and it enables customers to leverage their existing network and infrastructure  Components – Endpoint security with Cisco Trust Agent – Network Access devices – routers, switches, CSACS – Policy Server – Cisco Clean Access Server (CCA) – Management Server - Cisco Clean Access Manager (CCA)

® _17 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. NAC Appliance Overview All-in-One Policy Compliance and Remediation Solution AUTHENTICATE & AUTHORIZE  Enforces authorization policies and privileges  Supports multiple user roles SCAN & EVALUATE  Agent scan for required versions of hotfixes, AV, and other software  Network scan for virus and worm infections and port vulnerabilities QUARANTINE  Isolate non-compliant devices from rest of network  MAC and IP-based quarantine effective at a per-user level UPDATE & REMEDIATE  Network-based tools for vulnerability and threat remediation  Help-desk integration

® _18 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

® _19 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

® _20 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.

® _21 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Gathering information is easy. Identifying real threats is challenging

® _22 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. MARS: Mitigation and Response System  Appliance  Gathers information from all Security Devices and correlates  Allows for real time analysis of threat – Network intelligence – Context correlation – Vector analysis – Anomaly detection – Hotspot identification – Automated mitigation capabilities  Not limited to Cisco Devices – Microsoft Servers – Common Security Products from other vendors – Supports Netflow collection

® _23 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Security: The Pervasive Add-on  What this means is that with any product it becomes a consideration to add security – By up selling the product itself  Change a Cisco2811 into a Cisco2811-SEC-K9 – Or by adding on a new product to the solution  Add Cisco Security Agent to those new web servers – Also, sometimes it just needs to be discussed to position the right solution  What are your security requirements for your wireless network?

000000_24 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Question and Answer