© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1.

Slides:



Advertisements
Similar presentations
Haga clic para modificar el estilo de subtítulo del patrón © 2012 – Teldat GmbH – All rights reserved „Port Based Security“ – „Drop-In-Mode“ The ideal.
Advertisements

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud Rob Randell, CISSP, CCSK Principal Systems Engineer – Security.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Ingram Micro:
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
VMware Virtualization Last Update Copyright Kenneth M. Chipps Ph.D.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Unified Logs and Reporting for Hybrid Centralized Management
Citrix Partner Update The Citrix Delivery Centre.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Borderless Networks Enabling the Borderless Organisation Mark Jackson,
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
#CONVERGE2014 Session 1304 Managing Telecom Directories in a Distributed or Multi-Vendor Environment David Raanan Starfish Associates.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Getting Started with Oracle Compute Cloud
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco CloudVerse for Government: Helping Agencies Reduce Costs and Respond.
How to protect your Virtual Datacenter Michiel van den Bos.
Data Center Network Redesign using SDN
Chapter 1: Hierarchical Network Design
Overview of Access and Information Protection
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
The Citrix Delivery Center. 2 © 2008 Citrix Systems, Inc. — All rights reserved Every Day, IT Gets More Complex EMPLOYEES PARTNERS CUSTOMERS.
Dell Connected Security Solutions Simplify & unify.
An emerging computing paradigm where data and services reside in massively scalable data centers and can be ubiquitously accessed from any connected devices.
Deploying SharePoint Products and Technologies for Enterprise Collaboration Microsoft IT group’s Centrally Hosted Collaboration Solution.
Building the Infrastructure Grid: Architecture, Design & Deployment Logan McLeod – Database Technology Strategist.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
1 © Copyright 2010 EMC Corporation. All rights reserved.  Consolidation  Create economies of scale through standardization  Reduce IT costs  Deliver.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
VMware NSX and Micro-Segmentation
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC THAT’S THE ANSWER WHAT’S THE QUESTION? Software Defined Networking Dan DeBacker Principal.
Remote Access Portal Project Ben Dawson Larry Finn Peter Stickney Ken Vedaa May 7, GC.
1 © Copyright 2010 EMC Corporation. All rights reserved. The Virtualization BenefitThe Physical Challenge Virtualizing Microsoft Applications Aging, Inefficient.
Look, Ma, No Hardware -Stephanie Schossow. Cisco & VMware  September 16, Industry leaders in virtualization Cisco and VMware® announced that they.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Cisco “Your Way” Experience Customer Overview April 2012.
Your Name Your Title Hewlett-Packard Company Software Engineering for E-Business.
7.4 Update - ISE Session.
Chapter 1: Explore the Network
Minimising IT costs, maximising operational efficiency IO and NIMM: Now is the time Glyn Knaresborough Director of Strategic Consulting.
Network Requirements Analysis CPIT 375 Data Network Designing and Evaluation.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Hierarchical Network Design Connecting Networks.
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Designing Cisco Data Center Unified Fabric
Cisco Server Access and Virtualization Business Unit Cisco Nexus 1000 Series.
Getting Started with TrustSec
STEPS TO A CLOUD READY DATA CENTER
Virtual Private Networks (VPN)
Network Access Control 101 Securing the Critical Edge of Your Network
VMware NSX and Micro-Segmentation
KNOWLEDGE MANAGEMENT (KM) Session # 34
Topic 12: Virtual Private Networks
Presentation transcript:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 How do I classify so many devices coming onto my network? How do I allow suppliers and contractors to collaborate securely? Do we have control over devices connecting to our applications & data in the DC? Virtual Machine Sprawl! How should I manage security for all of those VMs we are being asked to provision everyday? My critical services are still running on physical servers. Do I maintain separate policies?

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Simplifying network security and engineering Secure Embeds security within the infrastructure Enforcement based on rich contextual identify of users and systems Solution simplicity enables end-to-end approach Efficient Simplifies implementation of security policy Highly scalable & Inline rate Simplifies Data Center network design Demonstrable ROI Reduces ACL and VLAN complexity & maintenance Can automate Firewall policy administration Can improve both performance & availability

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Translating Business Policy to the Network TrustSec lets you define policy in meaningful business terms Business Policy Source Destination Exec PC Prod HRMS HR Database Prod HRMS Storage Exec BYOD XXXX XXXX XX XX Distributed Enforcement throughout Network SwitchRouterDC FWDC Switch

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 WLC CAPWAP Tunnel Access Points Internet VLAN ACL  Securing BYOD becomes critical after On-boarding process.  VLAN Segmentation and static ACL are common implementation  Current solution relies on named ACLs (64 ACL max) or static policy (ACL) on other network devices ACL DC-PCI-DB DC-PCI-Web Local PCI Server

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Segmentation using Security Group, independent from topology Offload filtering to ASA for rich and scalable policy rule automation Simplified network design, lowering operational cost WLC CAPWAP Tunnel Internet VLAN BYOD Tag POS Tag Audit Tag SGACL/FW Device ISE BYOD Device Audit DC-PCI-DB DC-PCI-Web Local PCI Server Payment System Single VLAN

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Legacy Emerging  Data Center and Server Consolidation  Server Virtualization  “Any workload on any server”  Unpredictable traffic flows as workloads migrate  Accidental Architectures  Applications deployed in fixed positions (ex. multi-tier deployment)  Predictable traffic flows  Security often deployed to each pod or silo

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 DEPLOYMENT USE CASES. Healthcare: Ensure Privacy of Patient Data by Enforcing Roles Based Access and Segmentation Across the Network Retail: Intra Store Communication for Networked Devices While Ensuring That Only Authorized Users and Devices Have Access to PCI Data Technology: Allowing Approved Employee-Owned Tablets Access to Internal Portals and Corporate App Store Manufacturing: Marking Extranet Traffic to Allow PLC Vendor Remote Access to Specific Manufacturing Zone Only, and Offshore Development Partners Access to Development Servers Only

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 SecureEfficient Demonstrable ROI Embed security within the infra Enforcement based on rich context Solution simplicity enables end-to-end approach Simplifies implementation of security policy Highly scalable & Inline rate Simplifies Data Center network design Reduces ACL and VLAN complexity & maintenance Automates FW policy Improve both performance & availability

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Thank you.