1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.

Slides:



Advertisements
Similar presentations
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Advertisements

Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Guide to Network Defense and Countermeasures Second Edition
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Enterprise Architecture and the Architect.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Stephen S. Yau CSE , Fall Security Strategies.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Getting Smarter with Information An Information Agenda Approach
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Service Transition & Planning Service Validation & Testing
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Network security Product Group 2 McAfee Network Security Platform.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Top-Down Network Design Chapter One Analyzing Business Goals and Constraints Copyright 2004 Cisco Press & Priscilla Oppenheimer.
Copyright © 2014 Juniper Networks, Inc. 1 Juniper Unite Cloud-Enabled Enterprise Juniper’s Innovation in Enterprise Networks.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Objectives how to use a systematic, top-down process when designing computer networks focuses on the first step in top-down network design: analyzing your.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
GRC: Aligning Policy, Risk and Compliance
Basic Concepts Key Learning Points : The objectives of this chapter are as follows:  To provide an introduction to the basic Concepts of enterprise architectures,
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
0 Agile Controller Key Message KM 1: Service Experience-centered Network Redefinition KM 2: Network-wide United Security KM 3: Product Openness and Collaboration.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
OIT Security Operations
Chapter 6: Securing the Cloud
CIM Modeling for E&U - (Short Version)
Cisco Sales Expert Dumps practice-questions.html.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Dumps4download Exam Question - 100% Passing Assurance
IS4680 Security Auditing for Compliance
Check Point Connectra NGX R60
How to Mitigate the Consequences What are the Countermeasures?
The MobileIron® Threat Detection difference:
Managing IT Risk in a digital Transformation AGE
Presentation transcript:

1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY SAFE BENEFITS Changes conversation from point products to solutions Shortens time from planning to deployment Tested and validated architecture Detailed implementation guidance Integrated, collaborative defense-in-depth Supports new Cisco technologies Addresses real-world issues Provides full lifecycle services “We need help with moving from the concept of a systems-based security solution to actual design and implementation.” “We have a lot of separate security products, but no way to coordinate information or threat responses between them.” “We need better visibility into what is happening on our network.” “We need to make sure that our security strategy can meet the demands of the new ways we are doing business.” Cisco SAFE is a reference security architecture that provides prescriptive Cisco Validated Design guides that address the planning, design and deployment of security solutions for the unique requirements of the different places in the network, such as Campus, Internet edge, Branches, and Data Center. These blueprints also provide best practices guidance for securing critical data and transactions as they traverse the entire networked infrastructure. SAFE’s unique defense-in-depth approach blends security elements with the network infrastructure so that event and posture information is shared between devices to create greater visibility, and enhances threat control through responses coordinated under a common control strategy. Step-by-step network security design and implementation guidance shortens deployment Solutions-based approach focused on risk management rather than product placement Designed using the Cisco Security Control Framework to enable support by Cisco Lifecycle Security Services Layered security design helps prevent being overwhelmed by a large or unexpected attack Threat visibility and coordinated response reduces exposure and IT overhead Layered security + network architecture ensures business-critical services availability Modular design allows gradual improvement based on priority Delivers best practices and functions commonly required by regulations and standards 1.Do you have a security strategy that supports system- wide intelligence sharing and collaboration, or simply a collection of stand-alone security products? 2.Are your business processes well understood? Is your security strategy aligned with your business processes and strategy? 3.What business applications, services, and infrastructure changes are being deployed or may be deployed in the next several years? 4.Change the discussion from products to risk management: What are the risks associated with your specific business strategy, now and in the future? How do we reduce THOSE specific risks as much as possible? 5.What regulatory compliance mandates are required for your organization and what is the status on meeting them? Do you have a systems strategy to meet your security goals and maximize risk reduction. Worldwide Sales Enablement - QuickStart - Security Access the QuickStart for Security on Sales University or PEC for more resources.Sales University PEC

2 Top Customer ObjectionsThe Competition Security Control Framework Additional Resources Internal: External: Objection: “I don’t have the budget to completely overhaul my entire security infrastructure.” Answer: “SAFE is modular in design so you can prioritize improvements and focus on critical places in your network first.” Objection: “What do we do with our current deployment of non-Cisco security products.” Answer: “While SAFE designs can accommodate non-Cisco security products, it is critical that every component is reassessed in terms of its ability to support business objectives, increase threat visibility, exercise cross- network control, and minimize risk. Cisco services can provide a comprehensive assessment to help you prioritize changes.” Objection: “Isn’t there a risk with having all my security from a single vendor?” Answer: “SAFE’s defense-in-depth design combines layered best-of-breed security with powerful collaboration to provide maximum risk reduction.” Objection: “I don’t have the expertise to deploy something as comprehensive as SAFE.” Answer: “Cisco Lifecycle Security Services are available for every phase of SAFE implementation, from assessment and design, to deployment and management.” Legacy security competitors, such as CheckPoint and Symantec: Point products lack the ability to collaborate with other security devices or the network infrastructure. Because they are siloed in a single point in a network they provide limited threat visibility and control. Network security competitors, such as Juniper: Like point product vendors, devices such as Juniper’s NetScreen are still poorly integrated into the network, so they suffer from poor visibility and control. Furthermore, they often do not provide solutions for many critical business applications and services, such as virtualization or UC Cisco SAFE Strategy: Focused on solutions and risk management rather than products and features Fully tested and validated architecture based on best security practices that cover the entire network. Emphasizes collaboration between devices and PINS for increased visibility and control Designed to secure and enhance business- critical applications and services Maximizes customer value by providing design and deployment guidelines for Cisco platforms and capabilities. Worldwide Sales Enablement - QuickStart - Security Access the QuickStart for Security on Sales University or PEC for more resources.Sales University PEC CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE Data Center Campus WAN Edge Branch Internet Edge Ecomm- erce Cisco Virtual Office Virtual User Partner Sites Policy and Device Manage ment Security Solutions  PCI  DLP  Threat Control Network Devices  Routers  Servers  Switches Identify Monitor Correlate Harden Isolate Enforce VisibilityControl Secured Mobility, Unified Communications, Network Virtualization Network Foundation Protection Security Devices  VPNs  Monitoring  Admission Control  Intrusion Prevention  Firewall  Filtering Services The Cisco Security Framework provides a consistent policy deployment and enforcement strategy for the SAFE architecture to enhance visibility and control across each place in the network, and across the entire infrastructure Visibility: Identify and classify users, traffic, and devices Monitor and record events and behaviors Collect and correlate data from multiple sources Identify and detect anomalous traffic and threats Classify traffic to apply security controls Control: Harden network and endpoint devices Limit access and usage per user, application and device Protect against known and unknown threats Isolate users, systems, services, and applications Collaborative response to anomalous events Enforce access controls and security policies, and mitigate security events