SYSCOM GLOBAL SOLUTIONS INC.
Transcript of SYSCOM GLOBAL SOLUTIONS INC.
Company Name:SYSCOM GLOBAL SOLUTIONS INC.
CEO:Seishi Sato
Incorporation:May 24th, 1990
Capital:$3,200,000.00
Stock Holders:• Seishi Sato, President & CEOー 199 shares (66.3%)
• ITOCHU Techno-Solutions America, Inc. ー101shares (33.7%)
Employees:150+ (70% engineers)
Headquarters: New York, NY
Branches: Los Angeles, Silicon Valley & Tokyo
©2021 SYSCOM GLOBAL SOLUTIONS INC. All Rights Reserved.
SYSCOM Company Profile
SYSCOM Solution & Service Overview
Consulting
Project Management
System Management
Incident Management
Account Management
ERP Solution - ERP (Microsoft Dynamics 365)- Consulting / PMO / SES
DX Solution - MS Power Platform - AI, BI / RPA / CRM / EDI /
WMS
Security Solution- Next-Gen Security- Threat Defense Lifecycle
(TDL)
Cloud Solution - Private Cloud by Clavis- Microsoft 365 - Azure- AWS System Integration
- Network - Server/Storage- VoIP
©2021 SYSCOM GLOBAL SOLUTIONS INC. All Rights Reserved. 3
Cisco Meraki & Duo
4
Introduction to Cloud-Managed Switching
Simplifying IT with Cloud Management
A complete cloud -managed IT solutionWire le ss, switching, security, SD-WAN, endpoint management, and security camerasIntegrated hardware , software , and cloud se rvices
Leader in cloud-managed ITAmong Cisco’s faste st growing portfolios
420k+Unique customers
5.7M+Meraki devices
online
30M+API calls per day
6
Delivered by MerakiMX Security & SD-WAN Appliances
7
Delivered by MerakiMX Security & SD-WAN Appliances
1.5 million malware samples/day
600 billion email messages / day
16 billion web requests / day
Honeypots
Open source communities
Internalvulnerability discovery
Telemetry
Internet-wide scanning
Over 250 full timethreat researchers
Millions of telemetry agents
4 global data centers
Over 100 threat intelligence partners
Over 1,100 threat traps
Supported by Cisco Talos Threat Intelligence
NEW
MX AppliancesCost-effective gigabitSD-WAN branch connectivity
RECOMMENDED USESmall branch
WAN PORTS×1 Gigabit Ethernet SFP×2 Gigabit Ethernet RJ45
FIREWALL THROUGHPUT1Gbps
SITE-TO-SITE VPN THROUGHPUT500Mbps
RECOMMENDED USESmall-medium branch
WAN PORTS×2 Gigabit Ethernet SFP×2 Gigabit Ethernet RJ45
FIREWALL THROUGHPUT1Gbps
SITE-TO-SITE VPN THROUGHPUT500Mbps
RECOMMENDED USEMedium-large branch
WAN PORTS×2 10 Gigabit Ethernet SFP+×2 2.5 Gigabit Ethernet RJ45
FIREWALL THROUGHPUT2Gbps
SITE-TO-SITE VPN THROUGHPUT800Mbps
RECOMMENDED USELarge branch
WAN PORTS×2 10 Gigabit Ethernet SFP+×2 2.5 Gigabit Ethernet RJ45
FIREWALL THROUGHPUT3Gbps
SITE-TO-SITE VPN THROUGHPUT1Gbps
MX75
$1,995
MX85$2,495
MX95
$4,995
MX105
$7,495
Available from 6 July 2021
Meraki Insights
10
Introduction to Cloud-Managed Switching
Why Customers Choose MerakiIntuitive, centralized management• All Meraki devices are configured through a single-pane-of-glass• No training or complex command line script required• Visualize and manage all switch ports on the Meraki dashboard
with Virtual Stacking
Easie st to deploy, manage , and configure
• Zero-touch provisioning for multi-site deployment
• Customizable Meraki APIs for automated site se tups
• Seamless firmware update s from the cloud
Industry-leading visibility
• Use r, application, and device analytics
• Network -wide monitoring and alerts to reduce re sponse times
• Remote packe t capture and othe r diagnostics tools
Your SASE Journey withCisco Meraki
Cisco’s SASE
Solution
Delivered by MerakiMX Security & SD-WAN Appliances
Best-in-class Cisco Umbrella security & Duo’s ZeroTrust
Agenda
● MFA in the world today
● How is Duo helping?
● Duo Product
● Duo + Meraki
Modern Perimeter
Traditional Perimeter
Corporate Networks;On-site Users, Endpoints,
Server, and Apps
Cloud Applications
Hybrid Cloud
Personal Devices
Vendors & Contractors
Mobile Devices
Remote Employees
Protect organizations by verifying the identity of usersand the health of their devices before connecting to the applications they need.
Every Application
Trusted Devices
Trusted Users
Visibility & Policies
Zero -Trust Model: Focus on Access
Security Risks Persistwith Credential Theft
of breaches leverage either stolen or weak
passwordsSource: Verizon, 10th edition of the Data Breach Investigations Report
81%Compromised credentials is a major security risk
Cumbersome tokens and one-time passwords;
not user friendly
CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
Why Duo?
World’s Easiest and Most Secure MFA
Instantly integrates with all apps
Users self-enroll in minutes
Users authenticate in seconds; no codes to enter
Unified Access Vision
● Who is the user?● What’s their role?● Privileged User?
● Up to date? ● Securely configured?● Corporate Issued or
BYOD?
● Cloud and On-Premise Apps
● Single Sign On● Consistent End User
Experience
Trusted Users
Trusted Devices
Every Application
Verify the identity of users and the health of their devices before they access your applications
Duo MFA
Device Insight Policies
1 2 3
REST APIS
WEB SDK
RADIUS
SAML
OIDC
CustomVPN RA SSO
RRAS
Multicloud Email/MSFT On-Prem
Start Here Then Expand
Duo Supports Thousands of Work Applications
Learn more about application integrations
Complete VisibilityGain complete visibility into all your devices.
NEWAssess Security PostureEasily identify device security posture.
● Is it managed?
● Is it running up to date software?
● Is it encrypted?
● Is it passcode protected?
● Is the firewall enabled?
● Is biometric enabled?
CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
Duo + Meraki = Better
Together
Allow Access For Only Managed Devices
● Check if the device is enrolled in System Manager
● Restrict BYOD access to sensitive applications
● Provide compliant device access on and off network
CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
Thank You!