Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Cisco Security Solutions for Small and Medium Businesses Make.

Similar presentations


Presentation on theme: "1 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Cisco Security Solutions for Small and Medium Businesses Make."— Presentation transcript:

1 1 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Cisco Security Solutions for Small and Medium Businesses Make your e-business secure

2 222 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Agenda Security solution overview Business issues and security Security features and benefits Tell us more about your security needs Measuring the success of your security deployment Importance of the network infrastructure in deploying security Example business scenario Example network blueprints URLs for additional information on security

3 333 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Security — Solution Overview What is security? A process, not a product An integrated system Security requires defense in depth, which includes: Firewalls and router access control lists (ACLs) Network and host-based intrusion detection Scanners Centralized security and policy management Authentication, authorization, and accounting (AAA), access control servers and certificate authorities Encryption and virtual private networks (VPNs) 3 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer

4 444 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Security is a Process “Security is not a product; it’s a process. You can’t just add it to a system after the fact. It’s vital to understand the real threats to a system, design a security policy commensurate with those threats, and build in appropriate security countermeasures.” Bruce Schneier “Secrets and Lies” 4 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution how to sell

5 555 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer The Cisco SMB Security Solution – Deploy Security as an Integrated System Secure Transport Card Readers Security Room CCTV Secured Doors and Vaults Surveillance and Alarms Patrolling Security Guard Firewalls and Router ACLs Network and Host-based Intrusion Detection Scanner Centralized Security and Policy Management Identity, AAA, Access Control Servers and Certificate Authorities Encryption and Virtual Private Networks (VPN’s)

6 666 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Security for Internet Business Solutions CIBR Security technical solution how to sell 6 Customer Care Workforce Optimization Manufacturing and Distribution Web Marketing Web Communication E-Commerce Supply Chain Management E-Procurement Salesforce Automation Financial Management

7 777 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Strategic Business Drivers for Security Solutions Do these issues influence your business? Damage to company image after a security breach Legal liabilities resulting from a breach Lost revenues resulting from a breach Need for customer/supplier confidence in doing e- business with the company Fear of theft Fear of fraud Loss of employee morale Wireless security

8 888 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Today’s Network Security Threats Everything is a target Internet attacks are on the rise (Computer Security Institute & FBI Report March, 2001) More and better hacker tools means more hackers Economic impact of Internet worms and viruses Theft of proprietary information Financial fraud Insider abuse Sabotage Unauthorized access by insiders (worse than by outsiders) Unauthorized access by outsiders Denial of service attacks

9 999 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Impact of an Improperly Secured Network ($M) 20002000 Theft of proprietary information $ 33.6M 11.211.2 7.9 7.9 3.7 3.7 2.1 2.1 19981998 2.82.8 $ 68.2M 5.35.3 1.61.6 $ 66.7M 56.056.0 29.2 29.2 28.028.0 27.127.1 8.28.2 $ 232.7M 10.410.4 7.17.1 Financial fraud VirusVirus Insider net abuse SabotageSabotage Laptop theft Denial of service attacks System penetration by outsiders TotalTotal Source: FBI 2000 Report on Computer Crime

10 10 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer The Pain Caused by Downtime Revenue loss Customer dissatisfaction Lost productivity Brand dilution Legal liability Financial performance Source: Meta Group, November 2001 EnergyEnergy$2,817,846$2,817,846 CommunicationsCommunications$2,066,245$2,066,245 ManufacturingManufacturing$1,610,654$1,610,654 Financial institutions $1,495,134$1,495,134 Information technology $1,344,461$1,344,461 InsuranceInsurance $1,202,444$1,202,444 RetailRetail$1,107,274$1,107,274 Industry Sector Lost Revenue per Hour

11 11 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Features Secure connectivity Perimeter security Controlled access Surveillance and alarms Security monitoring Centralized security policy management Centralized security device management Identity Secure transport

12 12 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Benefits Secure connectivity over public networks Restricted access to network resources Protection against network attack and misues Ability to find and close security holes before hackers find them Ability to identify users and what they are permitted to do on the network Simplified management of security policies and devices

13 13 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Tell Us More In the event of disruption, can you: Ensure critical systems and networks are continuously available? Restore mission critical applications? Provide uninterrupted workforce productivity with a secure instant office? What’s the impact of not properly securing your network in terms of cost?...credibility?...productivity?...viability?...liability? How much revenue loss caused by downtime can you afford? How much customer dissatisfaction caused by downtime can you afford? How much lost productivity?...brand dilution?...legal liability?...reduced financial performance?

14 14 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Security — Measuring Success Establish success metrics in advance Metrics to consider: Revenue loss Customer dissatisfaction Lost productivity Legal liability Financial performance Number of security incidents Disruption of services Unauthorized access Information theft Number and severity of virus attacks Number and severity of Distributed Denial of Service (DDoS) attacks

15 15 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Characteristics Networking Implications The Importance of the Network Infrastructure Routers, firewalls, VPNs Access control lists (ACLs), firewalls AAA, access control servers (ACS), certificate authorities, public key infrastructure (PKI) Centralized security device and policy management Secure connectivity Security monitoring Perimeter security Identity Security management Network and host-based intrusion detection systems (IDS) Scanners Network and host-based intrusion detection systems (IDS) Scanners 15 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer

16 16 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Security — Business Scenario Company: Southern California graphic design agency Challenge: Clients demand aggressive scheduling for their high-profile projects. Sending a job back and forth for repeated reviews and changes extended project completion time and exposed creative materials to the possibility of loss or damage. Need to offer the flexibility and capacity to accommodate a continually changing and growing community of partners and customers. Solution: Adding VPN capability to its existing Cisco network enabled the agency to exchange creative materials over the public Internet with the same level of security, manageability, and quality of service as a private network — at a fraction of the cost. Results: Reduced courier charges by more than 75% Reduced total turnaround time for projects VPN access to select major accounts results in closer customer relationships Mobile employees connect to the office network

17 17 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 100 Users or Fewer Internet Main business location Teleworker/remote access Secure corporate servers Web server Catalyst stackable switch with Secure LAN features 10/100 Ethernet Cisco broadband router with firewall and VPN Desktops/laptops with Cisco VPN Client and third-party anti-virus software DMZ LAN ISDN, cable, xDSL Broadband access modems Desktops/laptops with third-party anti- virus software WAN Cisco® modular access router or cable access router with IOS firewall and VPN This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

18 18 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 100 Users or Fewer Internet Main business location Teleworker/remote access Secure corporate servers Web server Cisco® 1700, 2600 or uBR925 with firewall and VPN Catalyst® 2950 with Secure LAN features 10/100 Ethernet Cisco 806 with firewall and VPN Desktops/laptops with Cisco VPN Client and third-party anti-virus software DMZ LAN ISDN, cable, xDSL Broadband access modems Desktops/laptops with third-party anti- virus software WAN This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

19 19 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 100 to 500 Users Internet Main business location Desktops/laptops with third-party anti-virus software Web server with Cisco IDS 10/100 Ethernet DMZ LAN ISDN, cable, xDSL Desktops/laptops with third-party anti- virus software Catalyst switch with in- line power, with Secure LAN features Cisco Aironet Wireless Access Point Fractional T1, T1, multi-T1 services Cisco ACS using Remote Dial-In User Service (RADIUS) Cisco VPN concentrator Cisco PIX firewall Catalyst switch with Secure LAN features Secure corporate servers with Cisco IDS Cisco PIX firewall Broadband access modems Cisco modular access router with IOS firewall and VPN Branch office (fewer than 100 users) Catalyst stackable switch with Secure LAN features Desktops/laptops with third-party anti- virus software Cisco VPN concentrator Cisco Aironet NICs WAN Teleworker/remote access Cisco modular access router with firewall and VPN Catalyst stackable switch with Secure LAN features Cisco access router or cable access router with IOS firewall and VPN Catalyst stackable switch with Secure LAN features This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

20 20 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 100 to 500 Users Internet Main business location Desktops/laptops with third-party anti-virus software 10/100 Ethernet DMZ LAN ISDN, cable, xDSL Desktops/laptops with third-party anti- virus software Catalyst 2950 with Secure LAN features Catalyst 3524-PWR XL with Secure LAN features Cisco Aironet® 1200 Access Point Fractional T1, T1, multi-T1 services Cisco ACS using Remote Dial-In User Service (RADIUS) Cisco VPN 3005 Cisco PIX® 515 Catalyst 2950 with Secure LAN features Catalyst 3550 or 4000 with Secure LAN features Secure corporate servers with Cisco IDS Cisco PIX 501 with Firewall and VPN Broadband access modems Cisco uBR925, 803, or 827 with firewall and VPN Cisco 1700 or 2600 with firewall and VPN Branch office (fewer than 100 users) Catalyst 2950 with Secure LAN features Desktops/laptops with third-party anti- virus software Cisco VPN 3002 Cisco Aironet NICs WAN Teleworker/remote access Cisco 2600/3700 with firewall and VPN Web server with Cisco IDS This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

21 21 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 500 to 1000 Users Internet Main business location Desktops/laptops with third-party anti-virus software Web server with Cisco IDS 10/100 Ethernet DMZ LAN ISDN, cable, xDSL Desktops/laptops with third-party anti-virus software Catalyst stackable switch with Secure LAN features Catalyst switch with in- line power Cisco Aironet Access Point Cisco VPN concentrator Cisco PIX firewall Catalyst stackable switch with Secure LAN features Secure corporate servers with Cisco IDS Cisco IP Phone Cisco PIX firewall with firewall and VPN Broadband access modem Desktops/laptops with third-party anti- virus software Cisco modular access router or cable access router with firewall and VPN Cisco VPN concentrator Cisco IP Phone Cisco Aironet Access Point Cisco IP Phone Catalyst switch with in-line power IP call processing WAN Branch office (fewer than 300 users) Teleworker/remote access Cisco ACS using RADIUS Catalyst switch with Secure LAN features Cisco modular access router or cable access router with firewall and VPN Cisco modular access router with IOS firewall and VPN Cisco modular access router with firewall and VPN Fractional T1, T1, multi-T1 services This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

22 22 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMB Security Deployment Blueprint – 500 to 1000 Users Internet Main business location Desktops/laptops with third-party anti-virus software 10/100 Ethernet DMZ LAN ISDN, cable, xDSL Desktops/laptops with third-party anti-virus software Catalyst 2950 with Secure LAN features Catalyst 3524- PWR XL with Secure LAN features Cisco Aironet 1200 Access Point Cisco VPN 3005 Cisco PIX 515 or 525 Cisco 2600/3700 with firewall and VPN Catalyst 2950 with Secure LAN features Catalyst 3550 or 4000 with Secure LAN features Secure corporate servers with Cisco IDS Cisco 7490/7960 IP Phone Cisco PIX 501 with firewall and VPN Broadband access modem Desktops/laptops with third-party anti- virus software Cisco uBR925, 803, or 827 with firewall and VPN Cisco uBR925, 803, or 827 with firewall Cisco VPN 3002 Cisco 7905/7910 IP Phone Cisco Aironet 1200 Access Point Cisco 7490/7960 IP Phone Catalyst 3524-PWR XL with Secure LAN features IP call processing Cisco 1700, 2600, or 3700 with firewall and VPN WAN Branch office (fewer than 300 users) Teleworker/remote access Cisco ACS using RADIUS Fractional T1, T1, multi-T1 services Web server with Cisco IDS This network blueprint is intended to be an educational resource and a starting point in planning your network solution; it is not a final recommendation from Cisco. To determine the deployment most appropriate for your company we suggest you work with a Cisco representative, Cisco channel partner or a solutions provider.

23 23 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer SMARTnet and SMARTnet Onsite What is SMARTnet/SMARTnet Onsite? Cisco’s Technical Support Service, available direct and through resale What does it offer? Operating system software updates (including IOS) -- major, minor, and maintenance releases 24x7x365 access to highly skilled networking personnel (TAC) via phone, email, and web Access to Self Help technical repositories on-line Advance parts replacement in as little as two hours Onsite field engineers available in as little as two hours (OSS) to assist in hardware replacement

24 24 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Why Cisco for SMB Security? No one knows your network, the Internet, or security better Compatibility with the installed Cisco base (80% of the Internet) Significant savings from a single-vendor solution Excellent quality, standards-based development, and certified products – Network intelligent, integrated security solutions Key partnerships and worldwide security industry leadership Market-leading solutions, services, and support

25 25 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Important URLs Cisco security overview www.cisco.com/go/security Cisco SAFE documents www.cisco.com/go/safe VPN ROI calculator www.cisco.com/go/evpn Reseller support Web site www.cisco.com/go/vsec Cisco Secure Encyclopedia www.cisco.com/go/csec www.cisco.com/go/securitypartners www.cisco.com/go/netpro www.cisco.com/go/securitytrng www.cert.org www.happyhacker.org www.infosecuritymag.com 25 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer

26 © 2001, Cisco Systems, Inc. www.cisco.com/warp/public/779/smbiz/iroadmap/solutions.html CIBR Security technical solution customer 26


Download ppt "1 © 2002, Cisco Systems, Inc. All rights reserved. CIBR Security technical solution customer Cisco Security Solutions for Small and Medium Businesses Make."

Similar presentations


Ads by Google