securing the connected enterprise - cisco · securing the connected enterprise david goeckeler...
TRANSCRIPT
Securing the Connected Enterprise
David Goeckeler
SVP/GM, Security Business Group
Adam Philpott
Director, EMEAR Security
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Most Important Emerging Technologies
81%
0%
100%
Extremely important Somewhat important Slightly important Not at all important
Source: ZDNET 2014 Number of respondents, n=418
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Security Challenges
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Security Challenges
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
of organizations not
“fully aware” of all
network devices
BYOD
90%
SOCIAL MEDIA
times more cloud services
are being used than
known by IT
CLOUD
5–10of top 500 Android apps
carry security/privacy risks
APP STORES
92%of organizations had
malware enter the corporate
network through social
media/web apps
14%
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Security Challenges
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
60%of data is
stolen in
HOURS
54%of breaches remain
undiscovered for
MONTHS
YEARSMONTHSWEEKSHOURSSTART
85%of point-of-sale intrusions
aren’t discovered for
WEEKS
51%increase of companies
reporting a $10M loss
or more in the last
YEAR
A community that hides in plain sight avoids detection and attacks swiftly
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Security Challenges
Changing
Business Models
Complexity
and Fragmentation
Dynamic
Threat Landscape
Security Vendors
at RSA
Demand for
Security Talent
373 12x
Security Vendors for
Some Customers
45
Complexity TalentFragmentation
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Strategic Imperatives
Network-Integrated,
Broad Sensor Base,
Context and Automation
Visibility-Driven
Continuous Advanced Threat
Protection, Cloud-Based
Security Intelligence
Threat-Focused Platform-Based
Agile and Open Platforms,
Built for Scale, Consistent
Control, Management
EndpointNetwork Mobile Virtual Cloud
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
A Threat-Centric Security Model
ATTACK CONTINUUM
Point-in-Time Continuous
Network Endpoint Mobile Virtual Cloud
BEFOREDiscover
Enforce
Harden
AFTERScope
Contain
Remediate
Detect
Block
Defend
DURING
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Covering the Entire Attack Continuum
ATTACK CONTINUUM
SECURITY SERVICES
Firewall
NGFW
Secure Access + Identity Services
VPN
UTM
NGIPS
Web Security
Email Security
Advanced Malware Protection
Network Behavior Analysis
Malware Sandboxing
BEFOREDiscover
Enforce
Harden
AFTERScope
Contain
Remediate
Detect
Block
Defend
DURING
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
1.6M13B
Cisco Threat Intelligence: Unprecedented Breadth & Depth
120,000Daily Security Intelligence
Daily Web RequestsDeployed Security DevicesDaily Malware
Sandbox Reports
100TBSecurity
Intelligence
1.6MDeployed
Devices
13BWeb
Requests
150,000Micro-
applications
1,000Applications
93BDaily Email
Messages
35%Enterprise
5,500IPS
Signatures
150MDeployed
Endpoints
3-5
minUpdates
Cisco Security Intelligence
Global VisibilityGlobal Footprint
5BDaily Email
Connections
4.5BDaily Email
Blocks
14MDeployed
Access
Gateway
75,000FireAMP
Updates
6,000New Clam
AV Sigs
120KSandbox
Reports
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Security Services
Portfolio FY15 Security Services
Advisory Integration
Custom Threat
Intelligence
Vertical Security Assessments
Integration Services
Security Optimization
Services
Managed Threat
Defense
Secure Plant Operations
Managed
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Strong Differentiation
Advanced Analytics
and Correlation
Continuous and
Zero-Day Detection
AMP
Everywhere
Reduced Cost
and Complexity
Threat-Focused
Next-Generation Firewall
ASA with
FirePOWER
Services
Integrated Threat Defense
Diverse Threat Intelligence
Real Time Analytics
Managed Threat
Defense
Advanced Expertise
Thank you.