LIVE TALK - Security Speed Pitch di Stefano Volpi, Architecture Leader Security per l’Italia, Cisco.

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

Security Life Cycle for Advanced Threats
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Cisco Live /20/2017.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Fortinet An Introduction
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Paul King Director, Threat Intelligence CiscoSystems.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
The Changing World of Endpoint Protection
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Cisco Quick Hit Briefing
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Chapter 6: Securing the Local Area Network
Synchronized Security Revolutionizing Advanced Threat Protection
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
LIVE TALK - IOT e Mobility Speed Pitch di Alberto Degradi, Senior Manager, IoE leader, Cisco Italia.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Small Business Solutions Copyright 2014 Trend Micro Inc.
©2015 Cisco and/or its affiliates. All rights reserved. Welcome… to the Digital Age Let’s make Amazing Happen Rick Huijbregts yes, on
Blue Coat Cloud Continuum
1 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Defense Orchestrator Effective security policy management made simple.
Barracuda NG Firewall ™
Internal Security Threats
“Introduction to Azure Security Center”
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Mitigating Advance Threats Threat-Centric Security
Threat Management Gateway
IPS Express Security Account Manager Representative Exam : practice-questions.html.
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Complete Exam Dumps - Pass In 24 Hours - Dumps4Download
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
IPS Express Security Account Manager Representative practice-questions.html.
Virtualization & Security real solutions
بهترین راهکار را انتخاب کنید...
Cisco Dumps PDF Implementing Cisco Network Security RealExamCollection.com.
2018 Real Cisco Dumps IT-Dumps
Company Overview & Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure once, run anywhere Simplify your security with Sophos
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
Global Availability Americas EMEAR APJC
Introduction to the 3rd Gen Fortinet Security Fabric
Introduction to Symantec Security Service
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

LIVE TALK - Security Speed Pitch di Stefano Volpi, Architecture Leader Security per l’Italia, Cisco

5/11/2016 Stefano Volpi Cisco GSSO Security Everywhere Leading to Security Everywhere

3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential John Chambers CEO, Cisco April 2015 Security is Cisco’s #1 priority. We are going big and making strategic investments to become our customers’ and partners’ most trusted security advisor. “ ” Cisco Is All In with Security

4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Confidential 4 © Cisco and/or its affiliates. All rights reserved. In the news: Feb 2013  Today Cisco Confidential 4 ©2014 Cisco and/or its affiliates. All rights reserved. Global Security Sales Organization Portcullis

5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cisco: un approccio unico alla cybersecurity  Investimenti superiori a 5,7 miliardi negli ultimi 3 anni  Cisco e’ la piu grande security company dell’industria con piu’ di 6000 professionisti dedicati  Cisco Talos blocca circa 20 miliardi di minacce al giorno e 2,5 milioni di s con spam al secondo  Cisco AMP riduce il tempo della scoperta di malware da 200 giorni a 48h  Cisco detiene il 22% di market share di tutto il mercato della security di EMEAR ed il 41% del mercato dei Firewall WW

6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Talos Group: Threats by the Numbers 8800 Common Vulnerabilities and Exposure (CVE) Entries in ,100,000 Incoming Malware Samples Per Day, Increasing Daily 4.2 Billion Web Filtering Blocks Per Day 1 Billion Sender Base Reputation Queries Per Day

7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential The Security Problem Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation

8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Silos Create Security Gaps Context- Aware Functions IPS Functions Malware Functions VPN Functions Traditional Firewall Functions

9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Increases Visibility Accelerates Detection Scales Enforcement Synergies Through Integration The Network and Security

10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential AdvisoryIntegration Managed Custom Threat Intelligence Technical Security Assessments Integration Services Security Optimization Services Managed Threat Defense Remote Managed Services Security Services

Cisco Confidential11C © 2015 Cisco and/or its affiliates. All rights reserved. Integrated Threat Defense Architecture NGFW/NGIPS Content Security (Web, ) EVAS Endpoint Visualization, Access, and Security APT $$ Behavior analysis CTD AMP Investigate Umbrella

12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BEFORE Discover Enforce Harden AFTER Scope Contain Remediate Detect Block Defend DURING Network as a SensorNetwork as an Enforcer Next Generation Firewall VPN + AnyConnect Web / Security (cloud) Next Generation IPS Advanced Malware Protection Web / Security (cloud) Advanced Malware Protection pxGrid APIC-EM

13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential BranchCampu s EdgeOperational Technology CloudData Center Services Endpoint Security Everywhere