16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Wireless Solution Training for the (Enterprise) Carpeted Office February 2004 Tina Herrera
Virtual Private Network
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Karolina Muszyńska Based on
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
[Name / Title] [Date] Effective Threat Protection Strategies.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
© 2004, Cisco Systems, Inc. All rights reserved..
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco EnergyWise.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
WebEx Cloud Connected Audio Enterprise
IS Network and Telecommunications Risks Chapter Six.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Managed Security Vikas Khanduri CCIE#13516,CCSP,CCDP,CCNP,MCSE.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
1 © 2003, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Advancing the Carrier IP/MPLS Edge Routing Technology Group Cisco Systems, Inc. April.
Identity Assurance Emory University Security Conference March 26, 2008.
Module 11: Designing Security for Network Perimeters.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialLisbon 1 For Cisco Partners…
Security fundamentals Topic 10 Securing the network perimeter.
Hot Topics in Information Security Rick Shaw – President, CorpNet Security, Inc. Mick Johannes – CTO, CorpNet Security, Inc.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Security ROI and Conclusions Cisco commissioned custom research project.
IS3220 Information Technology Infrastructure Security
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Chapter 1: Exploring the Network
Cisco's Assurance System
AT&T Premises-Based Firewall Enhanced SBS Solution
Securing Information Systems
Topic 12: Virtual Private Networks
In the attack index…what number is your Company?
Providing Teleworker Services
Presentation transcript:

16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Security Market Opportunity Worldwide Source: IDC, 12/01 $0 $10,000 $20,000 $30,000 $40,000 $50, Services Hardware Software $M % CAGR $46B Security and VPN

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Security: Network Transformation Remote Site Leased Line PSTN Frame Relay X.25 Closed Network Circa 1995 PSTN

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Security: Network Transformation Open Network Circa 2001 Partner Site Remote Site Internet Internet-Based Extranet (VPN) Internet-Based Intranet (VPN) PSTN Service Provider

© 2002, Cisco Systems, Inc. All rights reserved _08_ Not Reported to Law Enforcement Reported to Law Enforcement Security Breaches CAGR 39% CAGR 130% Thousands of Incidents Source: Computerworld 2002, CSI/FBI Computer Crime and Security Survey

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Requires defense-in-depth Requires multiple components Integration into e-business infrastructure Requires comprehensive blueprint Security Critical Enabler for E-Business Supply Chain Management E-Commerce E-Learning Workforce Optimization Customer Care

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Network Security Components Identity Secure Connectivity Secure Connectivity Perimeter Security Perimeter Security Intrusion Protection Intrusion Protection Security Management Security Management Authentication Firewalls VPN Policy Intrusion Detection

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Key Directions in Network Security Integration—into network infrastructure Inter-linkage—across components Secure extensions—wireless and voice Integration—into network infrastructure Inter-linkage—across components Secure extensions—wireless and voice Identity Secure Connectivity Secure Connectivity Perimeter Security Perimeter Security Intrusion Protection Intrusion Protection Security Management Security Management Authentication Firewalls VPN Policy Intrusion Detection

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 There’s No Longer a Question of Need The Question Is How To Secure # of Organizations Reporting Breaches % Suffering Breaches Average Days Lost / Year Average US$ Lost / Year Highest Reported US$ Lost / Year Virus Incident 39061%68$162,000$10,000,000 Intrusion (eg Spamming) 18329%12$16,000$200,000 Loss of s/w $104,000$3,000,000 Website Intrusion (eg Hacking) $32,000$200,000 Critical System Failure $155,000$4,000,000 Loss of Confidential Data 35518$197,000$1,500,000 Tampering on I/O 23414$14,000$100,000 Source: KPMG 2002 Information Security Survey

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Performance Evolutionary Infrastructure Intelligent Services Our Technology Strategy Three Components - No Compromises

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Cisco’s Security Vision Intelligent Services Security Intelligent Services Security Performance Line Rate Performance Line Rate Evolutionary Infrastructure Integrated Evolutionary Infrastructure Integrated Secure the network fabric with increased intelligence that preserves and protects network integrity and value for our customers

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Customer / Market Context – Short / Medium Term Customer familiarity with security appliances and anti-virus software (applied at access points to network) Employee awareness is critical to maintaining security Strong competitive pressure for market share leadership Piece-meal approach to security Only 30% have evaluated ROI for IT security expenditures (Source: Price Waterhouse Coopers, Information Security Breaches Survey 2002) Customer familiarity with security appliances and anti-virus software (applied at access points to network) Employee awareness is critical to maintaining security Strong competitive pressure for market share leadership Piece-meal approach to security Only 30% have evaluated ROI for IT security expenditures (Source: Price Waterhouse Coopers, Information Security Breaches Survey 2002)

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Customer / Market Context – Long Term Increasing sophistication of - and changing - threats from both external and internal sources Increasing appliance competition Holistic security approach needed Increasing business impact and cost of network outages as connectivity and mobility increases Increasing sophistication of - and changing - threats from both external and internal sources Increasing appliance competition Holistic security approach needed Increasing business impact and cost of network outages as connectivity and mobility increases 60% of organizations expect to experience greater vulnerability as connectivity increases Source: Ernst & Young, Information and Security Survey % of organizations expect to experience greater vulnerability as connectivity increases Source: Ernst & Young, Information and Security Survey 2002

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Cisco’s Security Strategy – Short / Medium Term Components: Reinforce SAFE (a system-based approach to security and VPN design) Develop competitive appliances and security systems that increase our market share and combat the competition Continue to drive ROI for prevention of security breaches Build holistic security approach, i.e. pervasive network security Components: Reinforce SAFE (a system-based approach to security and VPN design) Develop competitive appliances and security systems that increase our market share and combat the competition Continue to drive ROI for prevention of security breaches Build holistic security approach, i.e. pervasive network security

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Cisco Security Strategy – Long Term Components: Framework for all Cisco products, not limited to any particular product line Devices included: switches, routers, phones, gateways, wireless devices Hop-2-hop protection that maintains value proposition of network Components: Framework for all Cisco products, not limited to any particular product line Devices included: switches, routers, phones, gateways, wireless devices Hop-2-hop protection that maintains value proposition of network

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Benefits of Long Term Strategy Protects existing network services, including QoS, NBAR, CBAC Incremental deployment is supported The solution may be enabled on a port by port basis Legacy devices can be accommodated through access policies Protects existing network services, including QoS, NBAR, CBAC Incremental deployment is supported The solution may be enabled on a port by port basis Legacy devices can be accommodated through access policies

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 SAFE Establishes Framework Blueprint for Integrated Network Security Application and Services Integration Network Infrastructure Network Infrastructure SAFE Provides a Defense-in-Depth Approach to Security Services SAFE Enables Integration of Security Services into the Network Infrastructure SAFE Integrates Security with Intelligent “Network” Services SAFE is Delivered though Appliances and Integrated Security within Routers & Switches SAFE Expanded to Include Catalyst 6500 Series SAFE Provides a Defense-in-Depth Approach to Security Services SAFE Enables Integration of Security Services into the Network Infrastructure SAFE Integrates Security with Intelligent “Network” Services SAFE is Delivered though Appliances and Integrated Security within Routers & Switches SAFE Expanded to Include Catalyst 6500 Series Security Management & Monitoring Intrusion Detection & Protection Secure Connectivity Secure Connectivity Extended Perimeter Security Extended Perimeter Security Identity Services

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 Next Critical Steps Short / Medium Term Increase momentum and market share leadership in networking security space Quickly deliver additional competitive offering Clearly articulate the SAFE Blueprint story and vision for pervasive security Increase momentum and market share leadership in networking security space Quickly deliver additional competitive offering Clearly articulate the SAFE Blueprint story and vision for pervasive security

© 2002, Cisco Systems, Inc. All rights reserved _08_2002 In Summary We must continue to set the industry standard for network security and translate our technology leadership and innovation into customer value We must continue to set the industry standard for network security and translate our technology leadership and innovation into customer value