Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Security Management Update.

Slides:



Advertisements
Similar presentations
Heroix Longitude - multiplatform, automated application performance monitoring and management software.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Unity Connection Qualification for Prime Collaboration Development Release.
XProtect® Expert 2013 Product presentation
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Preview of Cisco New Low-End ASA 5500-X Appliances - Cisco ASA 5506-X & 5508-X Your name Your team Date.
FirePOWER Services for ASA Sizing Guidance and Performance Discussion
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
1 Enabling Secure Internet Access with ISA Server.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 5 – Implementing Intrusion Prevention.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Implementing Network Access Protection
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Copyright 2010 Elitecore Technologies Ltd. All rights reserved.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Name Company A Day in the Life… A Demonstration of Application Delivery.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Introduction to the Adapter Server Rob Mace June, 2008.
Configuring Network Access Protection
CSCI 1033 Computer Hardware Course Overview. Go to enter TA in the “Enter Promotion Code” box on the bottom right corner.
Microsoft Management Seminar Series SMS 2003 Change Management.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Synchronized Security Revolutionizing Advanced Threat Protection
Chapter 4: Implementing Firewall Technologies
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Unified. Simplified. Unified Communications Launch 2007.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Advanced Security Management with PRSM & CSM 4.3.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
What’s New in Fireware v WatchGuard Training.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
1 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Defense Orchestrator Effective security policy management made simple.
Palo Alto Networks Certified Network Security Engineer
The sign of success.
Securing the Network Perimeter with ISA 2004
Cisco ASA Express Security DUMPS practice-questions.html.
Introduction:. Vendor : Cisco Certifications : Next-Generation Firewall Express Security Engineer Exam Name : Cisco ASA Express Security Exam Code :
Cisco ASA Express Security practice-questions.html.
SVTRAININGS. SVTRAININGS Features of SCCM  Application management  Provides a set of tools and resources that can help you create, manage, deploy, and.
Managing Services with VMM and App Controller
Increase and Improve your PC management with Windows Intune
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Chapter 10: Advanced Cisco Adaptive Security Appliance
Designed for powerful live monitoring of larger installations
Route web traffic using Azure CLI
VNet and Cross-Premises Connectivity
Presentation transcript:

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Security Management Update

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 2

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 3 Manager of Managers Multi-TenantScalableAnalysis Global Policies ReliableVisibility CSM & ASDM Flagship ASA Management Solutions Complete ASA device Management 10+ years of Development 1000’s of Customers Breadth of features PRSM Next Generation Management ASA and NGFW Management Schema Driven Web 2.0 User Experience Windows Based ScalabilityScalability Out of Band Changes Client & Server Architecture Native HA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Cisco ISR G2 Cisco ISR 1000 Cisco Prime InfrastructureCisco PRSM API BASED DATA SHARING ISR with NGFW ASA NGFW

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 6

Cisco Confidential 7 Unified Security Management for Firewall, IPS, VPN and Remote Access Security Configuration Event Management Tactical Reporting Proactive Monitoring

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 (Not Committed)

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 2HCY12 1HCY132HCY13

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Supported OS & Models X 5515-X 5525-X 5545-X 5555-X Peregrine

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Supported Features Peregrine

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Unsupported Features Peregrine

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Support 5585-X SSP 40 and 60 Additional CLI for troubleshooting Telemetry Malicious transaction report Policy Based Rate Limiting Warn End Users Enhancements Safe Search

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Internet Edge Use Case 80% Internet Edge Signatures Threat Protection Updates Threat Protection Workflows Threat Protection Licensing Threat Protection Objects Threat Protection Profiles Features

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 New Features New Policy Model Policy Sharing Per Device Configuration Repository View CLI Preview HA Dashboard Scale 25 Devices

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Key Features Device Selector ASA Policy Tab NGFW Policy Tab 5- Tuple Rule base Policy Sharing Install On Device Configuration Tab

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 APIAPI

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Complete Migration Workspace (CSM & Device) PRSM Migration Workspace ObjectsObjects PoliciesPolicies ConfigurationConfiguration MappingMapping SaveSave ValidateValidate Clean upClean up CSV BulkCSV Bulk

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 25

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 I want complete ASA management I want complete ASA logging and reporting I want comprehensive ASA image management I want detailed Health monitoring of ASA I want to manage ASA S2S VPN I want to manage ASA RA VPN I want to manage IPS Stand alone I want ASA FW Policy Validation I want to manage more than 50+ ASA devices I don’t have the need for NGFW

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 ** Next Gen IPS (Internet Edge) I want basic ASA FW, NAT Management I want basic ASA device management I need to deploy new ASA’s I want complete NGFW management I want web client for management I want unified NGFW and IPS management** I want better User Experience

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 I want complete ASA management (CSM) I want complete NGFW management (PRSM) I have a Internet Edge deployment use case I want to maintain my current deployments I want to test PRSM before migration

Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 29

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 High Availability component Connects to PRSM, Logger, PRSM Console

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Logger HA

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Logger

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 CSM Videos External