securing the connected enterprise - cisco · securing the connected enterprise david goeckeler...

13
Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

Upload: others

Post on 27-May-2020

34 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

Securing the Connected Enterprise

David Goeckeler

SVP/GM, Security Business Group

Adam Philpott

Director, EMEAR Security

Page 2: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

Most Important Emerging Technologies

81%

0%

100%

Extremely important Somewhat important Slightly important Not at all important

Source: ZDNET 2014 Number of respondents, n=418

Page 3: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

Security Challenges

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

Page 4: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

Security Challenges

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

of organizations not

“fully aware” of all

network devices

BYOD

90%

SOCIAL MEDIA

times more cloud services

are being used than

known by IT

CLOUD

5–10of top 500 Android apps

carry security/privacy risks

APP STORES

92%of organizations had

malware enter the corporate

network through social

media/web apps

14%

Page 5: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Security Challenges

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

60%of data is

stolen in

HOURS

54%of breaches remain

undiscovered for

MONTHS

YEARSMONTHSWEEKSHOURSSTART

85%of point-of-sale intrusions

aren’t discovered for

WEEKS

51%increase of companies

reporting a $10M loss

or more in the last

YEAR

A community that hides in plain sight avoids detection and attacks swiftly

Page 6: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

Security Challenges

Changing

Business Models

Complexity

and Fragmentation

Dynamic

Threat Landscape

Security Vendors

at RSA

Demand for

Security Talent

373 12x

Security Vendors for

Some Customers

45

Complexity TalentFragmentation

Page 7: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Strategic Imperatives

Network-Integrated,

Broad Sensor Base,

Context and Automation

Visibility-Driven

Continuous Advanced Threat

Protection, Cloud-Based

Security Intelligence

Threat-Focused Platform-Based

Agile and Open Platforms,

Built for Scale, Consistent

Control, Management

EndpointNetwork Mobile Virtual Cloud

Page 8: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

A Threat-Centric Security Model

ATTACK CONTINUUM

Point-in-Time Continuous

Network Endpoint Mobile Virtual Cloud

BEFOREDiscover

Enforce

Harden

AFTERScope

Contain

Remediate

Detect

Block

Defend

DURING

Page 9: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

Covering the Entire Attack Continuum

ATTACK CONTINUUM

SECURITY SERVICES

Firewall

NGFW

Secure Access + Identity Services

VPN

UTM

NGIPS

Web Security

Email Security

Advanced Malware Protection

Network Behavior Analysis

Malware Sandboxing

BEFOREDiscover

Enforce

Harden

AFTERScope

Contain

Remediate

Detect

Block

Defend

DURING

Page 10: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

1.6M13B

Cisco Threat Intelligence: Unprecedented Breadth & Depth

120,000Daily Security Intelligence

Daily Web RequestsDeployed Security DevicesDaily Malware

Sandbox Reports

100TBSecurity

Intelligence

1.6MDeployed

Devices

13BWeb

Requests

150,000Micro-

applications

1,000Applications

93BDaily Email

Messages

35%Enterprise

Email

5,500IPS

Signatures

150MDeployed

Endpoints

3-5

minUpdates

Cisco Security Intelligence

Global VisibilityGlobal Footprint

5BDaily Email

Connections

4.5BDaily Email

Blocks

14MDeployed

Access

Gateway

75,000FireAMP

Updates

6,000New Clam

AV Sigs

120KSandbox

Reports

Page 11: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

Security Services

Portfolio FY15 Security Services

Advisory Integration

Custom Threat

Intelligence

Vertical Security Assessments

Integration Services

Security Optimization

Services

Managed Threat

Defense

Secure Plant Operations

Managed

Page 12: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

Strong Differentiation

Advanced Analytics

and Correlation

Continuous and

Zero-Day Detection

AMP

Everywhere

Reduced Cost

and Complexity

Threat-Focused

Next-Generation Firewall

ASA with

FirePOWER

Services

Integrated Threat Defense

Diverse Threat Intelligence

Real Time Analytics

Managed Threat

Defense

Advanced Expertise

Page 13: Securing the Connected Enterprise - Cisco · Securing the Connected Enterprise David Goeckeler SVP/GM, Security Business Group Adam Philpott Director, EMEAR Security

Thank you.