Академический Документы
Профессиональный Документы
Культура Документы
Cisco Confidential
Machine Harvesting Information Harvesting Internal Theft Abuse of Privilege Botnet Management Personal Information Information Brokerage Electronic IP Leakage
Espionage Extortion Commercial Sales Fraudulent Sales Click Fraud Financial Fraud
Viruses
Trojans
Spyware
Cisco Confidential
Web Ecosystem Becomes Number one Threat Vector Criminals Exploit Users Trust, Challenging Traditional Security Solutions Creative Methods (Business Models) Used to Attract Victims
Cisco Confidential
Cisco Confidential
Mobility
1.3 Billion New Networked Mobile Devices in the Next Three Years
Workplace Experience
Blurring the Borders:
Consumer Workforce Employee Partner
Video
Changing the Way We Work
Video projected to quadruple IP traffic by 2014 to 767 Exabytes*
Compliance Challenges: How to Secure new Anyone, Anything, Environment and Protect Anywhere, Sensitive Data Anytime Enforcing Policy on Remote Devices
Cisco Confidential
Policy
Corporate Border Applications and Data
Policy
(Access Control, Identity, Acceptable Use, Malware, Data Security)
Corporate Office
Borderless Internet
Branch Office
Home Office
Attackers
Partners
Customers
Cisco Confidential
Fabric of the
Network
Protected
Un-Protected
Cisco Confidential
Sydney, Australia
Cisco Confidential
Cisco Confidential
10
Thank you.
Cisco Security Intelligence Operations: www.cisco.com/go/sio Cisco Security blog: blogs.cisco.com/security Cisco Security Products: www.cisco.com/go/security