Cisco Vision de Arquitectura Sin Fronteras

download Cisco Vision de Arquitectura Sin Fronteras

of 20

Transcript of Cisco Vision de Arquitectura Sin Fronteras

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    1/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID

    Ricardo RiveraBusiness Development ManagerSecurity & Mobility Southern Cone

    Visin de la Arquitectura

    Seguridad Sin Fronteras

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    2/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2

    Frontera Corporativa Tradicional

    Frontera Corporativa

    Oficina Remota

    Aplicacionesy Datos

    Oficina Corporativa

    Polticas

    Atacantes ClientesPartners

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    3/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3

    Movilidad y Colaboracin

    estn Disolviendo la Frontera de Internet

    Frontera Corporativa

    Oficina Remota

    Aplicacionesy Datos

    Oficina Corporativa

    Polticas

    Atacantes Clientes

    Oficina deCasa

    CoffeeShop

    Aeropuerto

    UsuarioMvil Partners

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    4/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4

    Cloud Computing est Disolviendo

    la Frontera del Data Center

    Frontera Corporativa

    Oficina Remota

    Aplicacionesy Datos

    Oficina Corporativa

    Polticas

    Atacantes

    Oficina deCasa

    CoffeeShopClientes

    Aeropuerto

    UsuarioMvil Partners

    Platformas a Service

    Infrastructureas a Service

    Xas a Service

    Softwareas a Service

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    5/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5

    Los Clientes Quieren Negocios

    sin Fronteras

    Frontera Corporativa

    Oficina Remota

    Aplicacionesy Datos

    Oficina Corporativa

    Polticas

    Atacantes

    Oficina deCasa

    CoffeeShopClientes

    Aeropuerto

    UsuarioMvil Partners

    Platformas a Service

    Infrastructureas a Service

    Xas a Service

    Softwareas a Service

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    6/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6

    Bo

    rderless

    DataCenter

    3

    Borderless

    Internet

    2

    Borderless

    EndZones

    1

    Arquitectura Cisco para Seguridad de

    Redes sin Fronteras

    Policy

    Corporate Border

    Branch Office

    Applicationsand Data

    Corporate Office

    Polticas(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)4

    Home Office

    AttackersCoffeeShopCustomers

    Airport

    MobileUser Partners

    Platformas a Service

    Infrastructureas a Service

    Xas a Service

    Softwareas a Service

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    7/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7

    Intelligent End Point Traffic Routing

    Pillar 1: Borderless End Zone

    Persistent Connectivity

    Always On, Location Aware

    Auto Head-end Discovery

    IPsec , SSL VPN, DTLS

    Advanced Security

    Strong Authentication

    Fast, Accurate Protection

    Consistent Enforcement

    Broadest Coverage

    Most OSs and Protocols

    Windows Mobile

    Apple iPhone

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    8/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8

    Always On Security and Protection

    Traditional VPN

    Protected

    Cisco Borderless Network Security

    Un-Protected

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    9/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9

    Always On Security and Protection

    Anytime, Anywhere, Any Device

    Sitting in a Park

    Cape Town, South AfricaCape Town, South Africa

    At a Coffee Shop

    Sydney, AustraliaSydney, Australia

    In the Office

    San Jose, CaliforniaSan Jose, California

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    10/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10

    Pillar 2: Borderless Security Array

    Advanced Scanning and Enforcement Capabilities

    Access Control | Acceptable Use | Data Security |Threat Protection

    Integrated into the Fabric of the Network

    Access Control | Acceptable Use | Data Security |Threat Protection

    Integrated into the Fabric of the Network

    Cisco IronPortEmail Security

    Appliance

    Cisco AdaptiveSecurity Appliance

    Cisco IntegratedServices Routers

    Cisco IronPortWeb SecurityAppliance

    10

    VM Software Security Module Hybrid HostedAppliance

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    11/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11

    HTTP Is the New TCP

    Instant Messaging

    Peer to Peer

    File TransferProtocol

    Understanding Web Traffic11

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    12/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12

    Advanced Content Analysis

    12

    SSN Detection

    Rule Is Matched MultipleTimes to Increase Score

    Unique Rule Matches Are Met

    Matches Are Foundin Close Proximity

    Proper NameDetection

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    13/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13

    Advanced, Proactive Threat Protection

    Cisco Security Intelligence Operations

    GlobalThreat

    Telemetry

    GlobalThreatTelemetry

    8:03 GMT Sensor DetectsHacker Probing

    Bank Branchin Chicago

    Ad Agency HQin London

    ISP Datacenterin Moscow

    8:00 GMT Sensor DetectsNew Malware

    8:07 GMT Sensor DetectsNew Botnet

    8:10 GMT

    All Cisco Customers Protected

    8:10 GMT

    All Cisco Customers Protected

    Cisco

    SensorBase

    Threat

    Operations Center

    Advanced

    Algorithms

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13

    Higher Threat Coverage, Greater Accuracy, Proactive Protection

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    14/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14

    AppServer

    DatabaseServer

    WebServer

    Physical Security Device

    Virtual Contexts

    Pillar 3: Secure Virtualized Data Center

    AppServer

    DatabaseServer

    WebServer

    Hypervisor

    Physical Security Device

    Virtual ContextsVIRTUAL SECURITY

    AppServer

    DatabaseServer

    WebServer

    Hypervisor

    Connect Physical Securityto Virtual Machines withCiscos SIA

    2Secure PhysicalInfrastructure1Embed Security inthe Virtual Switch3

    Service Chaining

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    15/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15

    Pillar 4: Rich Policy Enables

    Ubiquitous , Consistent Control

    Who? What? When? Where? How?

    3Policy On and OffPremise

    2 DynamicContainment Policy

    1Access

    Policy

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    16/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16

    Access Control

    Access ControlPolicy

    In a Cisco Secure and Protected Borderless Network

    Access ControlViolation

    Remote WebExParticipant

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    17/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17

    In a Cisco Secure and Protected Borderless Network

    Acceptable Use

    Employee in MarketingDepartment

    Acceptable UsePolicy

    Access ControlViolation

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    18/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18

    In a Cisco Secure and Protected Borderless Network

    Data Security

    Data SecurityPolicy

    Data SecurityViolation

    Employee atUnmanaged Device

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    19/20

    2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19

    Borderless

    DataCenter

    3

    Borderless

    Internet

    2

    Borderless

    EndZones

    1

    Arquitectura Cisco para Seguridad de

    Redes sin Fronteras

    Polticas

    Frontera Corporativa

    Oficina Remota

    Aplicaciones yDatos

    Oficina

    Corporativa

    Polticas(Control de Acceso, Uso Permitido, Malware, Seguridad de Datos)4

    Oficina deCasa

    AtacantesCoffeeShopClientes

    Aeropuerto

    UsuarioMvil Partners

    Platformas a Service

    Infrastructureas a Service

    Xas a Service

    Softwareas a Service

  • 8/10/2019 Cisco Vision de Arquitectura Sin Fronteras

    20/20