Вы находитесь на странице: 1из 11

Secure Borderless Networks

Ali Fuat TRKAY


Borderless Security, Central & Eastern Europe Sales Manager
Istanbul, February 17th, 2011

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Writers Tool Writers

First Stage Abusers Hacker/Direct Attack

Middle Men Compromised Host and Application Botnet Creation

Second Stage Abusers

End Value Fame Theft

Malware Writers Worms

Machine Harvesting Information Harvesting Internal Theft Abuse of Privilege Botnet Management Personal Information Information Brokerage Electronic IP Leakage

Extortionist DDoS for Hire Spammer

Espionage Extortion Commercial Sales Fraudulent Sales Click Fraud Financial Fraud

Viruses

Phisher Pharmer/DNS Poisioning Identity Theft

Trojans

Spyware

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

The Evolving Security Threats


Criminal Specialization Driving More Sophisticated Attacks

Web Ecosystem Becomes Number one Threat Vector Criminals Exploit Users Trust, Challenging Traditional Security Solutions Creative Methods (Business Models) Used to Attract Victims

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Mobility
1.3 Billion New Networked Mobile Devices in the Next Three Years

Workplace Experience
Blurring the Borders:
Consumer Workforce Employee Partner

Video
Changing the Way We Work
Video projected to quadruple IP traffic by 2014 to 767 Exabytes*

IT Device Consumerization Creates Security Challenges


Mobile and What Who you AreDevices you Have Access to Becomes Critical IT Resources

Compliance Challenges: How to Secure new Anyone, Anything, Environment and Protect Anywhere, Sensitive Data Anytime Enforcing Policy on Remote Devices

Security Must Perform Under new Bandwidth Requirements

Potential for new Threats Spreading Through Video

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Policy
Corporate Border Applications and Data

Policy
(Access Control, Identity, Acceptable Use, Malware, Data Security)

Borderless Data Center

Platform as a Service Software as a Service

Infrastructure as a Service X as a Service

Corporate Office

Borderless Internet

Branch Office
Home Office

Borderless End Zones

Airport Mobile User Coffee Shop

Attackers

Partners

Customers

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Pillar 1: Borderless end zone


Broadest Coverage Persistent Connectivity Advanced Security

Pillar 2: Borderless Security Array


Advanced,
Proactive Threat Protection Integrated into the

Pillar 3: Secure Virtualized Data Center


Secure Physical Infrastructure Connect Physical Security to Virtual Machines Embed Security in the Virtual Switch

Fabric of the
Network

Pillar 4: Rich Policy Enables Ubiquitous, Consistent Control


Access Control, Data Security & Acceptable Use
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Cisco Borderless Network Security Traditional VPN

Protected

Un-Protected

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Always On Security and Protection


In the Office Sitting in a Park At a Coffee Shop

Cape Town, South Africa San Jose, California

Sydney, Australia

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

1. Close gaps in situational awareness


2. Focus first on solving old issuesand doing it well

3. Educate your workforce on securityand include them in the process


4. Understand that one security border is no longer enough 5. View security as a differentiator for your business

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10

Thank you.

Cisco Security Intelligence Operations: www.cisco.com/go/sio Cisco Security blog: blogs.cisco.com/security Cisco Security Products: www.cisco.com/go/security

IntelliShield Alert Service 90-Day Trial: www.cisco.com/go/intellishield/trial