Pg 1 of 25 AGI www.agiuc.com IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

Name | Title | Microsoft Corporation
Integration-centric implementation of BPM in Financial Services.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
11 Public Safety Recording – Sharing Resources Quality, Accountability, Reliability. and Performance for the Mission-critical Environment Western Regional.
1 © 2003, Cisco Systems, Inc. All rights reserved. Cisco Integrated Security: Building The Self-Defending Network Bogdan Constantinescu Area Manager Romania.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialC Enterprise Architecture and the Architect.
Data Security Israel Mazin, Founding Partner & Chairman.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Title Subtitle Name Title Partner Name/Logo.
Unified Logs and Reporting for Hybrid Centralized Management
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Information Security in Real Business
© 2006 Cisco Systems, Inc. All rights reserved. Lesson 1.2: Describing Converged Network Requirements Module 1: Converged Network Connectivity Requirements.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
1 Cost-Effective Strategies for Countering Security Threats: IPSEC, SSLi and DDoS Mitigation Bruce Hembree, Senior Systems Engineer A10 Networks.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Overview of the Cloud Shibani Prasad Mohapatra, Microsoft Online Services Microsoft Corporation.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 The New Collaboration Experience Tim Stone Head of Collaboration Marketing.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1. Agenda Service Utilization Service Level Metrics Service Performance Review Incident Review Current / Future Service Plan Service Improvement Plan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
1 © 2004 Cisco Systems, Inc. All rights reserved. Cisco Self Defending Network SECURING THE INTELLIGENT INFORMATION NETWORK James Jones CCIE 1550, CISSP.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chris Wiborg Enterprise Architecture Marketing Manager Cisco Systems.
Duke Medicine IT Strategy Jeffrey Ferranti, MD Chief Information Officer / VP Medical Informatics Duke Medicine April 17, 2015.
Dell Connected Security Solutions Simplify & unify.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
1 FMC: Driving the Transition to IMS Ken Kuenzel VP and Founder Covergence Inc.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Adoption of IP in the Next Generation Contact Center Rupesh ChokshiGautham NatarajanDirector, AT&T.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Federal Acquisition Service 1 Networx – Enterprise Services: Awarded May 31, 2007 Telecommunications Services Communications Transport – Voice – Circuit.
Raya for Information Technology. About US  Raya IT, established in 1998, operates in the field of systems integration and IT business solutions.  A.
Microsoft and Symantec
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Self-Defending Networks Self-Defending Networks By-  Aseem Khan  Adeeb Akhil Shahi  Mohammed Sohail  Saiprasad H Bevinakatti.
Patrick Ortiz Global SQL Solution Architect Dell Inc. BIN209.
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Out of Sight, But Not Out of Touch Remote Office, Branch Office IP Telephony Solutions Charles Henderson Director, Product Management EADS TELECOM North.
PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved PROPRIETARY © Copyright Aruba Networks, Inc. All rights reserved Aruba Networks.
Transform the datacenter brought to you by [insert partner name] Speaker name 00/00/0000 Insert your Logo here.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Office 365 and Microsoft Project Integrations for HULAK Project Management Software Enable Teams to Remain Productive and Within Budget OFFICE 365 APP.
Communicating Through the Internet and Other Technologies
The EDUCAUSE 2019 Top 10 IT Issues
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
The EDUCAUSE 2019 Top 10 IT Issues
Presentation transcript:

Pg 1 of 25 AGI IP-Based Network Solutions Phil Flores Major Account Manager – Cisco Systems, inc.

Pg 2 of 25 AGI Agenda and Topics Introduction Why Cisco? Specific Solutions for DoD/IC community STK Integration with CIC and IPC/7970

Pg 3 of 25 AGI Why Cisco? Cisco offers much more than L2/L3 hardware products More than 600 personnel focused specifically on the Federal community More than $3B per year spent on R&D alone for new products/services offerings across the following domains:  Optical, L2/L3, Wireless Networking, Multimedia Collaboration Suite, Network Management, Storage, Security, IP Communications

Pg 4 of 25 AGI Specific Solutions for DoD/IC community CIC and CAAS, CCAS, CNPS PBX 1/PBX 2 Certification and IPC WAFS – Wide Area File Services AON – Application-Oriented Networking Meeting Place Collaboration Suite Optical/Storage HAIPE

Pg 5 of 25 AGI Why is security important? Cisco Security Overview

Pg 6 of 25 AGI

Pg 7 of 25 AGI Key Issues Facing Customers Today SECURITY Threats Theft Loss Response time APPLICATION AND SERVICE OPTIMIZATION Enablers Awareness App management Performance/Optimization Resilience SIMPLIFICATION Scale Cost Staffing Integration and systems management

Pg 8 of 25 AGI Security = Top Business Issue   Selected change in ranking compared with 2003 * New question for 2004 * Need for revenue growth * Use of information in products/services * Economic recovery Single view of customer Faster innovation Greater transparency in reporting Enterprise risk management   Security breaches/business disruptions Operating costs/budgets Data protection and privacy Ranking    Gartner: Top Ten Business Trends In 2004

Pg 9 of 25 AGI Security Incidents on the Rise Incidents Source: CERT: Carnegie Mellon Software Engineering Institute, IDC

Pg 10 of 25 AGI Cisco Strategic Overview Relative to the IIN

Pg 11 of 25 AGI IP Network The New Network Paradigm Collaboration Calendar Video- on-Demand Web Application Audio- Conferencing Instant Messaging Voice Messaging Contact Center Contact Center Telephone Services Telephone Services TelephoneServices SECURITY A NEW WAY TO COMMUNICATE AND COLLABORATE— ENABLED BY AN INTELLIGENT NETWORK

Pg 12 of 25 AGI Self-Defending Network IP + Security 2. Disparate Security Services 2. Disparate Security Services 3. Reactive Security Collaborative Security Systems Adaptive Security Adaptive Security 1. Point Products Integrated Security Integrated Security

Pg 13 of 25 AGI SYSTEM LEVEL SOLUTIONS Endpoints + Networks + PoliciesEndpoints + Networks + Policies PartnershipsPartnerships ServicesServices ADVANCED SECURITY TECHNOLOGIES SSL and IPSECVPNSSL and IPSECVPN Endpoint ProtectionEndpoint Protection Application FirewallApplication Firewall Network AnomalyNetwork Anomaly SSL and IPSECVPNSSL and IPSECVPN Endpoint ProtectionEndpoint Protection Application FirewallApplication Firewall Network AnomalyNetwork Anomaly SECURE INFRASTRUCTURE Secure Connectivity Trust and Identity Threat Defense Secure Connectivity Trust and Identity Threat Defense An initiative to dramatically improve the network’s ability to identify, prevent, and adapt to threats Self-Defending Network Strategy Cisco Strategy to Dramatically Improve the Network’s Ability to Identify, Prevent, and Adapt to Threats

Pg 14 of 25 AGI Historical approach to Security vs. Cisco’s approach to Security

Pg 15 of 25 AGI Value of Integrated Security System Security is no longer an option… It’s a necessity Security as an Option Security is an add-on Challenging integration Not cost-effective Cannot focus on core priority Security as INTEGRAL of a System Security is built-in Intelligent collaboration Appropriate security Direct focus on core priority

Pg 16 of 25 AGI How does Cisco approach security? - Intrusion Prevention System - Intrusion Detection System - Cisco Security Agent (application behavioral anomalies - demo) - DDoS Solutions - Cisco Security Monitoring, Analysis and Response System (CS-MARS) x also supported - Network Admission Control

Pg 17 of 25 AGI Cisco Network Admission Control: First Collaborative Security System Solution Desktop Access granted Access denied Quarantine remediation Authentication and policy check of client Quarantine VLAN Remediation NAC Framework Corporate Net Client attempts connection

Pg 18 of 25 AGI Why is Cisco concerned with developing world-class security products? We use our own products to maintain business and process integrity. Federal customers require secure solutions. Cisco understands the mission space in which we all work. STK Integration with CIC and IPC/7970

Pg 19 of 25 AGI Satellite uplinks/downlinks to terrestrial network

Pg 20 of 25 AGI

Pg 21 of 25 AGI

Pg 22 of 25 AGI

Pg 23 of 25 AGI

Pg 24 of 25 AGI 24 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. Phil Flores Phone: