Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Enabling business beyond the corporate network.
CTS IT Security Enhancement Projects December 10, 2014.
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved Adaptive Trust Security Policies for Today’s Enterprise Mobility Pete Ryan – ClearPass.
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
ScanSafe Overview.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Service Overview WiFi Internet Access for Wireless Internet Service Providers, Resellers and Operators.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
The Business and Technology of Caching-based Services for State Education Networks Mike Lane Cacheflow, Inc. Phone (773)
Greg Pierce| Concerto Cloud Services Which Cloud is Right for Microsoft CRM?
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Networks Steve Scheidegger Commercial Account Manager
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
1 ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. ©2015. CYREN Ltd. All Rights Reserved. Proprietary and Confidential. This document.
Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cloud Computing and Intermediary Liability Issues Global Policy and Government.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Cloud WebSecurity Field Update.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
August 27, 2008 Platform Market, Business & Strategy.
Altai Certification Training Backend Network Planning
© 2011 Aerohive Networks CONFIDENTIAL AEROHIVE Mike Allers
© British Telecommunications plc BT Managed Services Innovate
CONTACT CENTRE SOLUTION Confidential All rights reserved. No part of this work may be reproduced or transmitted in any form by any means, electronic or.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Cisco Live /23/2017 Enabling a Hybrid Cloud Extension between Enterprises and AWS with Cisco CSR 1000V and LISP
Cisco Confidential 1 © 2011 Cisco and/or its affiliates. All rights reserved. Customer Name Date Cisco Transformative Networking Lifecycle Financing that.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Chapter 4: Implementing Firewall Technologies
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Solutions for Unified Enterprise IP Communication Steven J. Johnson President, Ingate Systems Inc.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Barracuda Essentials for Office 365 Barracuda Essentials combines three proven cloud-based solutions enhance Office 365 deployments, making it easy to.
Small Business Solutions Copyright 2014 Trend Micro Inc.
What is SWGfL? A not-for-profit charity owned and directed by the 15 member LAs An organisation that deals exclusively with education and public sector.
© 2010 Cisco and/or its affiliates. All rights reserved.
Barracuda Backup Easy Cloud-Connected Backup Version 5.4 | July 2014.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
The Cloud Connection Company
Barracuda Web Security Flex
Barracuda Web Filtering Service
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
How Smart Networks are Changing Corporate Networks
Present By:- Company Name: Global Market Forecastes Tel: / Web:
Cloud Security for Endpoints
AT&T Network Based Firewall with NetBond® for Cloud
Product presentation.
AT&T Firewall Battlecard
Presentation transcript:

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Customers Awards Partners  Pioneer in SaaS Web Security  Over 34% market share in SaaS Web Security (IDC)  Multi-award winning product portfolio  Billions of Web requests scanned every day  Leader in Gartner Magic Quadrant - Secure Web Gateway

Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Commercial enterprises offering free Wi-Fi to customers as a value- add Establishments still want the ability to block inappropriate content (pornography, hate etc.) on premises Not interested in specific user policy, but a global rule for all Wi-Fi customers Leverage ScanSafe’s proven web-security platform ScanSafe’s cloud-based infrastructure ideally suited to a geographically disperse establishment Administrator has access to aggregate usage reports via online reporting platform (WIRe)

Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. 1. Fully managed by the hotspot provider (e.g. ATT Wayport, BT, Vodafone) 2. Customer-managed Cisco solution

Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. ISR G2 The ASA (8.3/8.4) can be configured to port forward to Scansafe Cloud: 1. Distributed ASA - internet traffic from the guest Wi-Fi at every location breaks out from every location 2. Central deployment - internet traffic from the guest Wi-Fi is backhauled to a central location form, which point it breaks out to the internet. From July 2011 ISR G2’s can re-direct web traffic to the global ScanSafe Cloud Supported on: Cisco ISR G2 routers (880, 890, 19xx,29XX, and 39XX) ASA Firewalls

Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Easy to deploy and configure Global policy across all locations Aggregate WIRe reports on the ScanSafe portal for usage statistics Option of web filtering only or bundle of web filtering and malware AV scanning (add malware scanning for only 20% extra) Sample portal and reporting screenshots