Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, 26.4.2012 Jan Křístek Tomáš Chott.

Slides:



Advertisements
Similar presentations
Introducing New Additions to ProSafe Advanced Smart Switch Family: GS724TR and GS748TR (ProSafe 24 and 48-port Gigabit Smart Switches with Static Routing)
Advertisements

© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Which server is right for you? Get in Contact with us
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
© 2006 Avaya Inc. All rights reserved. Avaya Services Michael Dundon Business Development Manager.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dual WAN Router Brand & Marketing MGMT Dept DrayTek Corp Vigor2912 Series 14 th Jan Based on f/w RC4.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialLisbon 1 For Cisco Partners…
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Jeff McEachern Business Development Manager Smart Services Smart Care.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
Avaya - Proprietary. Use pursuant to your signed agreement or Avaya policy. 1 IP Office Support Services Customer Benefits.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
LTEC Assignment 3 Part 1 Shannon Smith /sls0571.
Barracuda NG Firewall ™
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Security Flex
Working at a Small-to-Medium Business or ISP – Chapter 8
Barracuda Firewall The Next-Generation Firewall for Everyone
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Customized Solutions to your needs
Cisco RV110W Wireless-N VPN Firewall Partner Launch
Cisco RV110W Wireless-N VPN Firewall Partner Launch
Cloud Security for Endpoints
Chapter 10: Advanced Cisco Adaptive Security Appliance
Presentation transcript:

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott

Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Security portfolio, OnPlus

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 One portfolio – a spectrum of choices Functionality Cost ASA 5500 Series SA500 Security Appliance SR520 Secure Router Integrated Services Routers RV Router + ProtectLink Web

Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. The Cisco 500 Series Secure Routers deliver: High performance broadband access for small offices and teleworkers Highly secure remote access and site-to-site connectivity with IP Security (IPsec) VPN, Secure Sockets Layer (SSL) VPN, and dynamic multipoint VPN (DMVPN) Built-in threat defense, including: Advanced network features – Stateful packet inspection (SPI) firewall to help minimize web and threats – Intrusion prevention system (IPS), providing protection from attacks, worms, and viruses by detecting and stopping these threats before they can affect the network – Cisco IOS® Content Filtering to restrict access to undesirable websites and help guard against malware and phishing attacks Highly secure b/g wireless networking option to connect mobile employees in the workplace

Cisco Confidential 5 © 2010 Cisco and/or its affiliates. All rights reserved. The Cisco 500 Series Secure Routers deliver: Support for static routing and dynamic routing protocols to easily adapt to diverse network environments Quality of service (QoS) for crisp voice and video communications 4-port 10/100 managed switch with VLAN support to interconnect workplace devices such as computers, servers, and printers Simple deployment, management, and troubleshooting with Cisco Configuration Assistant Models: With or without b/g wireless With or without ADSL support

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 All-in-one (UTM) Security Appliance: purpose-built for small businesses and their security needs Part of the Cisco Small Business Pro Series Simplified configuration, deployment, and management Supported by the Small Business Support Center Annual recurring revenue stream on optional licensed features

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Choose from three models for the port density, mobility, and performance that best suits small business needs: 4- and 8-port LAN models (all ports 10/100/1000 Ethernet) B/G/N Wireless 200- and 300-Mbps firewall throughput Ideal for small businesses requiring security, performance, reliability, and ease of use Provides a single solution for all needs Simple GUI device and system configuration and management Shortens installation and setup time with smart defaults and eases ongoing management

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Model NumberCisco ® SA 520Cisco ® SA 520WCisco ® SA 540 Firewall Performance200 Mbps 300 Mbps VPN Performance65 Mbps 85 Mbps Connections15,000 40,000 Ports: LAN WAN Optional (for use as LAN, DMZ, or WAN redundancy or load balancing) Wireless ( b/g/n-YES- IPsec VPN Tunnels50 max. 100 max. SSL VPN Tunnels2 seats included; license required to upgrade to 25 seats (maximum). 50 seats (max.) included and Web Security (via Subscription) Trend Micro ProtectLink Gateway with more than 3 million virus patterns, 420,000+ spyware patterns, and 80+ URL filtering categories.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential n delivers maximum speed and increased range while providing backwards compatibility for b and g x authentication adds control to allow only approved devices to connect. Features high-encryption WPA to secure the communications channel. Cisco SA 520W features n connectivity for in-office mobility.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco ® SA 500 Series  Firewall: Protects business from unwanted visitors, unwanted traffic, and malicious attacks.  Dual WAN: Ensures that the business is connected to the Internet in the event the connection to one ISP goes down.  DMZ: Enables safe and secure hosting of Internet-accessible resources without exposing the LAN. Internet ISP 1 ISP 2 DMZ Server File or Web Server LAN

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11  Site-to-Site VPN: Secure connectivity between office locations.  Remote Access VPN: Choice of IPsec or SSL VPN to enable safe connectivity for employees, contractors, and partners. Remote Office Requires site-to-site connectivity Supply Partner or Traveling Employee Requires access to ordering databases Employee at Home Requires consistent LAN-like access Internet Cisco ® SA 500 Series

Cisco Confidential 12 © 2010 Cisco and/or its affiliates. All rights reserved. IPSec Deployment Steps 1. Create user account. 2. Send IPSec client to computer. 3. Install IPSec client. 4. Configure IPSec client. 5. User connects with VPN client. (Conflicts likely if another brand of IPSec client is already installed.) IPSec Deployment Steps 1. Create user account. 2. Send IPSec client to computer. 3. Install IPSec client. 4. Configure IPSec client. 5. User connects with VPN client. (Conflicts likely if another brand of IPSec client is already installed.) SSL VPN Deployment Steps 1.Create user account. 2.Send URL to user. 3.User connects to URL.  Easy Deployment: SSL VPN faster and easier to deploy since VPN client is not required. Leverages security integrated into web browsers.  Disaster Recovery: SSL VPN works well when employees are forced to use remote access due to weather or other disaster-related events.  Two-Factor Authentication: VeriSign VIP service provides hosted token- based authentication for enhanced security with SSL VPN remote access.  Licensed Feature: Requires license on the Cisco ® SA520 and SA520W. Licensed Feature

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13  Trend Micro ProtectLink Gateway: security, web threat protection, and URL filtering.  Install at Any Time: Functionality is enabled via a license key that can be easily added at a later date without additional hardware installation.  Annual Subscription-Based Offering: Provides a recurring revenue opportunity for partners since customers renew their subscriptions annually. Trend Micro ProtectLink Gateway Service Cisco ® SA 500 Series Licensed Feature Internet

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Protection: s sent to your businesses are scanned for spam, viruses, malware, spyware, and phishing attacks. Based on the award-winning Trend Micro Interscan Hosted Messaging Security (IMHS) offering. Unique Cloud-Based Solution: Enables full-strength protection – over 3 million anti-virus patterns and over 400,000 anti- spyware patterns, 10 different techniques to ID spam, including methods that look at both the IP address of the sender and the actual content of the itself. No risk of the inspection engines being out of date and unable to protect against the latest threats. Threats are stopped before they get to your business. Bandwidth is maintained even when security services are enabled. Trend Micro ProtectLink Gateway Service Internet Licensed Feature Cisco ® SA 500 Series

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Web Threat Protection: Reputation-based URL blocking prevents users from accessing dangerous websites known to have malware, phishing exploits, etc. URL Filtering: Over 80 categories of websites control employee web browsing and help increase employee productivity and reduce legal liability Malicious Websites Licensed Feature Trend Micro ProtectLink Gateway Service Internet Cisco ® SA 500 Series

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Standalone configuration using the embedded web-based GUI Security Appliance Configuration Utility. Launch Security Appliance Configuration Utility as part of a solution using Cisco Configuration Assistant. Menu-based access via console for disaster recovery. Remote monitoring support using SNMP. Security Appliance Configuration UtilityCCA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Supports data, voice, video, wireless, solutions Seamless integration with other Cisco Small Business Pro solutions as they develop Predictable experience with easy-to-use configuration tools and smart defaults Autodiscovery, common terminology and look and feel SECURITYDATA WIRELESS SA 500ESW 500 SA 500 ESW 500 Internet

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 What Does OnPlus Enable? How Is OnPlus Different? Auto Discovery Remote Monitoring, Alerts Direct Connectivity Remote Configuration Device Updates Affordable Simple Scalable Network Focused Making Network Services More Accessible to Small Business VARs Small Business VARs with MSP Practice

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Automated Visibility Automated Visibility Opportunity Appraisal Opportunity Appraisal Accelerated Relationships Accelerated Relationships Automated Alerts Automated Alerts Remote Configuration Remote Configuration Service Coverage Monitor Service Coverage Monitor Proactive Planning Proactive Planning Holistic Viewpoint Holistic Viewpoint Deep Services Platform Deep Services Platform Assess ManageAdvise Win Customers Retain Profits Grow Sales

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 VAR Customers OnPlus Cloud Service OnPlus Portal OnPlus Agent

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Subscription-Based Service $250 List Price 3-year cloud-based service subscription Appliance-based agent Browser and mobile app portal VAR-Defined Business Model ~$5/ Month

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Topology Fast, Efficient Results High-Value Interaction Increased Accuracy Accelerated Relationship Physical Discovery Business Needs Recommendations Analysis Without OnPlus Agent Discovery Plug In OnPlus Business Needs Recommendations With OnPlus

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Faster Diagnosis More Efficient Use of Staff Faster Resolution Faster Notification Business Interruption Call to Partner Dispatch Case Logged Triage Sr Eng Jr Eng Travel Time Resolution ! ! Without OnPlus ! ! $ $

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Without OnPlus Proactive Planning Maximized Uptime Preventive Treatments Real-Time Monitoring Degraded Performance Business Interruption Onsite Diagnosis Recommendation Resolution Travel Time ! ! With OnPlus MonitoringTrendingPreventionRecommendation

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 AirMagnet Planner for Cisco Small Business app takes the guesswork out of designing wireless networks Available thru the Cisco OnPlus app store for US$249 Enables proactive advisory services for demanding wireless environments Detailed WLAN reporting includes: connected devices, traffic by device, traffic by access point Enabling and Expanding Proactive Assessment, Management and Advisory Services for Solution Providers

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Firmware Warranty Service Contract Without OnPlus Manual Administration

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 How will I grow my customer base? How can I drive customer loyalty? How can I help my staff be more efficient? How do I create and grow a services practice? Proactive contact Elevated trust Fast assessments Expanded market footprint Accurate triage Remote resolution Efficient dispatch Scalable, affordable network advisor services How can I demonstrate more value? Address business needs Customer peace of mind

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Reactive Sales & Support Proactive Advisor Scaling Services Managing Staff Driving Customer Loyalty Fostering Profitable Growth Cisco OnPlus

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Information Accessibility Accessibility EffectiveCommunication EmployeeMobility Integrated Security Work anywhere Increased responsiveness Better customer service Communications and collaboration more effectively Faster/better decisions Communicate on any device or network Business Benefits Business Driver Flexible work environment Stay connected Increased productivity Availability and Reliability Immediate access Protect your company’s network and information Prepare for the future

Thank you.