Enviar búsqueda
Cargar
Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
•
0 recomendaciones
•
386 vistas
Mundo Contact
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 29
Recomendados
Turismo power point
Turismo power point
Kornelia Lohynova
Doppelgangers? Prince Harry et al.
Doppelgangers? Prince Harry et al.
The Free School
8
8
guest7964de
Sw2009 Setup
Sw2009 Setup
guest6901d
Hans Biomed Spine & Orthopedic
Hans Biomed Spine & Orthopedic
JamieatHansUSA
Knowledge Management Australia 2013
Knowledge Management Australia 2013
Ark Group Australia Pty Ltd
Breaking Through the Talent Barrier
Breaking Through the Talent Barrier
Service Strategies
Reinsurance Powerpoint
Reinsurance Powerpoint
rfredmond
Recomendados
Turismo power point
Turismo power point
Kornelia Lohynova
Doppelgangers? Prince Harry et al.
Doppelgangers? Prince Harry et al.
The Free School
8
8
guest7964de
Sw2009 Setup
Sw2009 Setup
guest6901d
Hans Biomed Spine & Orthopedic
Hans Biomed Spine & Orthopedic
JamieatHansUSA
Knowledge Management Australia 2013
Knowledge Management Australia 2013
Ark Group Australia Pty Ltd
Breaking Through the Talent Barrier
Breaking Through the Talent Barrier
Service Strategies
Reinsurance Powerpoint
Reinsurance Powerpoint
rfredmond
About me dia
About me dia
Kent Toh Kian Hong
AwardsCerts
AwardsCerts
Brandon Clement
Puzzle
Puzzle
NataliaZapata14
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Eyespeak Brasil
Green Economy Initiative
Green Economy Initiative
Z3P
Hotel marketing-plan
Hotel marketing-plan
chan Philavong
How do i bring gene xus to my organization
How do i bring gene xus to my organization
GeneXus
2007 20 most_important_megatrends
2007 20 most_important_megatrends
atelier t*h
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Shane Mitchell
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
Vidhyalakshmi K
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
Ben Herz
weINDIE - Intro Pack
weINDIE - Intro Pack
Dey Dos
Degenshein Architects
Degenshein Architects
Fatima Rizvi
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Stanford University
Celebrations game
Celebrations game
claudiamariagiraldo
Active22 - Executive Summary
Active22 - Executive Summary
fsikipa
New doc 20
New doc 20
KingEdge
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
KNOWDLE Consortium Group (A.A.E.I.)
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
ssuser6ace78
Dance For Change
Dance For Change
poeschl
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Mundo Contact
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Mundo Contact
Más contenido relacionado
Similar a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
About me dia
About me dia
Kent Toh Kian Hong
AwardsCerts
AwardsCerts
Brandon Clement
Puzzle
Puzzle
NataliaZapata14
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Eyespeak Brasil
Green Economy Initiative
Green Economy Initiative
Z3P
Hotel marketing-plan
Hotel marketing-plan
chan Philavong
How do i bring gene xus to my organization
How do i bring gene xus to my organization
GeneXus
2007 20 most_important_megatrends
2007 20 most_important_megatrends
atelier t*h
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Shane Mitchell
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
Vidhyalakshmi K
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
Ben Herz
weINDIE - Intro Pack
weINDIE - Intro Pack
Dey Dos
Degenshein Architects
Degenshein Architects
Fatima Rizvi
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Stanford University
Celebrations game
Celebrations game
claudiamariagiraldo
Active22 - Executive Summary
Active22 - Executive Summary
fsikipa
New doc 20
New doc 20
KingEdge
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
KNOWDLE Consortium Group (A.A.E.I.)
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
ssuser6ace78
Dance For Change
Dance For Change
poeschl
Similar a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
(20)
About me dia
About me dia
AwardsCerts
AwardsCerts
Puzzle
Puzzle
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Green Economy Initiative
Green Economy Initiative
Hotel marketing-plan
Hotel marketing-plan
How do i bring gene xus to my organization
How do i bring gene xus to my organization
2007 20 most_important_megatrends
2007 20 most_important_megatrends
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
weINDIE - Intro Pack
weINDIE - Intro Pack
Degenshein Architects
Degenshein Architects
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Celebrations game
Celebrations game
Active22 - Executive Summary
Active22 - Executive Summary
New doc 20
New doc 20
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
Dance For Change
Dance For Change
Más de Mundo Contact
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Mundo Contact
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Mundo Contact
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
Mundo Contact
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
Mundo Contact
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
Mundo Contact
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
Mundo Contact
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
Mundo Contact
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
Mundo Contact
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
Mundo Contact
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
Mundo Contact
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
Mundo Contact
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
Mundo Contact
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
Mundo Contact
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
Mundo Contact
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
Mundo Contact
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
Mundo Contact
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
Mundo Contact
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
Mundo Contact
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
Mundo Contact
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
Mundo Contact
Más de Mundo Contact
(20)
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
Último
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Último
(20)
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
1.
“S
e g u r id a d e n C o m u n ic a c io n e s U n ific a d a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 1
2.
©2 0 0
8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 2
3.
A A g
g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 3
4.
Amenazas en U
C … u na r eal i d ad ! ! Trojan-I nf e c t e d M P 3 s Botnet g a i ns , W eb H av e P C U s e rs S i ng i ng 2 . 0 p a i ns t h e B lu e s Half a million sites hit December 31, 2007 b y hu g e w eb hac k M a y 9 , 2008 A p ri l 28 , 2008 H ow C r ed i t-C a r d D a ta W ent O u t Hac k er p osts C hilean W i r el es s D oor g ov er nment d ata on 6 M a y 4 , 2007 million M a y 13, 2008 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 4
5.
U C :
U n ent o r no c o mp l ej o p o r p r o t eg er Virtu aliz ation S p eech P res ence M obility P olicy Vid eo C ont ac t W eb Mobile C lient s C ent er C onf er enc ing U CUnifiedC o m m u nic a t io ns U nif ied V id eo/ A u d io IP C all Mes s ag ing C onf er enc ing P h ones P r oc es s ing ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 5
6.
Más c o
mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … … Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e p r ot ección” ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 6
7.
Amenazas en T
el ef o nía I P A ye r Hoy ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 7
8.
Amenazas en C
o mu ni c ac i o nes U ni f i c ad as• T o l l F r au d – S am e as a P B X • B 2 B U n ifie d C o m m u n i c at i o n s• E av e sd r o p p i n g •S P IT• D o S , W o r m s, an d t h e V i r u s-D e -J o u r •Id e n tity T h e ft• R o g u e D e v ic e In se r t i o n •E x t e r n al D o S • E x te r n al U C S e r v ic e s• R e c o n n ai ssan c e •S e c u r e Mo b ility• Man -i n -t h e -Mi d d le •R e m o te A c c e ss• D H C P S p o o fin g & S t ar v at i o n ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 8
9.
S eg u
r i d ad en C o mu ni c ac i o nes U ni f i c ad as L a m ay oría d e la g ente p iens a q u e u n am biente d e U C s eg u ro es s olo: - P rotección contra f rau d es - Voz encrip tad a H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones U nif icad as Conectividad M anej o de D ef ens a contr a s eg u r a identidades am enaz as I nf r as tr u ctu r a P r oces am iento de l l am adas E ndp oints A p l icaciones ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 9
10.
U n r
et o , c o o p er ac i ón ent r e ár eas S ec u r e U ni f i ed C o mmu ni c at i o ns N et O P s S ec O p s E x ec s T el O p s “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 10
11.
R et o
s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es y s eg u r id ad ) ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 11
12.
Ag gend n
a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 12
13.
T o mar
en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a P u n t o s f i n al e s S eg u r id ad en la T elef onos I P , C lient es d e S W c onec t iv id ad y y ot r os d is p os it iv os t r ans p or t e U nif ied Com m u nications C o n t r o l d e l l am ad as A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos Mens aj er ía, at enc ión a p ar a la ad m inis t r ac ión d e c lient es , et c . llam ad as L a r e d c o m o p lat af o r m a ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 13
14.
S eg u
r i d ad en U C = S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía S ec u r e U ni f i ed S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny S ec “O r g a n iz a tio n s m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C o w n e rs h ip . In c lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity a n d M a n a g e m e n t.” - K ey Is s u es fo r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 14
15.
S eg u
r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e A p p li c at i o n s V L A N s e g m e nt at i on M u l t i -l e v e l ad m i ni s t rat i on L ay e r 2 p rot e c t i on F i re w al l Tol l f rau d p rot e c t i on Internet Intranet I nt ru s i on d e t e c t i on S e c u re m anag e m e nt Q oS and t h re s h ol d s H ard e ne d p l at f orm s S e c u re V P N h . 3 2 3 and S I P s i g nal i ng W i re l e s s s e c u ri t y C all Man ag e m e n t E n d p o in ts Si Si H ard e ne d W i nd ow s O S D i g i t al c e rt i f i c at e s D i g i t al c e rt i f i c at e s A u t h e nt i c at e d p h one s G A R P p rot e c t i on S i g ne d s of t w are i m ag e s TL S p rot e c t e d s i g nal i ng TL S s i g nal i ng S R TP m e d i a e nc ry p t i on I nt e g rat e d C S A C e nt ral i z e d m anag e m e nt ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 15
16.
C i s
c o c o m o s o c i o t e c n o l óg i c o 1 2 3 I nc l u ded a s fea t u r es I nc l u ded in net w o r k ing T h ing s y o u in C is c o UC P r o du c t s p r o du c t s (ex : V L A N ) s h o u l d do a ny w a y (ex : T L S ) (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d . C is c o C o n fid e n tia l 1616
17.
M B eja
o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes n is U ni f i c ad as L o w Me d i u m H ig h Easy or Default M o d erate and R eas o nab l e H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s U C -A w are F i re w al l s U C A w are F W w / TL S P rox yS TP , B P D U G u ard , S m art P ort s E nc ry p t e d C onf i g u rat i on R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s ) TL S & S R TP f or P h one s V P N ( Te l e c om m u t e r)S t and ard O S H ard e ni ng I P S e c & S R TP f or G at e w ay s 8 0 2 .1 X & N A CU nm anag e d C S A O p t i onal O S H ard e ni ng / P at c h i ng N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y ) M anag e d C S A ( W i nd ow s onl y ) S e c u ri t y E v e nt M anag e m e ntH TTP S D H C P S noop i ng D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on D y nam i c A R P I ns p e c t i on S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s D y nam i c P ort S e c u ri t y I nt ru s i on P re v e nt i on S ol u t i on I P S ou rc e G u ard ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 17
18.
S A F
E S e c u r ity A r c h ite c tu r e S tr a te g y S ec u r it y D ev ic es S ec u r it y V PN s M o n ito r in g F ir e w a ll E m a il F ilt e r in g A d m i s s i o n Co n t r o l In t r u s i o n Pr e v e n t i o n N et w o r k S o l u t io ns D ev ic es PCI R o u te rs D L P S e rv e rs P o l i c y and D ev i c e T h re a t S w itc h e s Co n t r o l M anag em ent Id e n t i f y H a rd e n M o n ito r Is o l a t e V i s i b i l i ty C o ntro l Co r r e l a t e E n fo rc e C is c o Data W A N I n te r n e t E c o m m - V i r tu al P ar tn e r C am p u s B r an c h V i r tu al C e n te r E d g e E d g e e rc e U s e r S i te s O f f ic e Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion N etw ork F oun da tion P rotection ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 18
19.
C o l
a b o r a c i ón / S e c u r i t y / S a a S Collaboration N etw or k as th e P l atf or m S e c u rity S aaS ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 19
20.
P l ant
eami ent o C i sc o ant e l as nu ev as d i námi c as Collaboration U n iq ue C om p etitiv e D if f eren tia tor S e c u rity S aaS Network as the Platform ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 20
21.
Al g u
no s ej emp l o s …. C i sc o I P S I P S F e at u r e s: I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic D r o p c a l l s t h a t a r e c o m ing fr o m I P a ddr es s es ident ified o n t h e C is c o S ec u r it y A g ent “w a t c h l is t ” D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y A g ent R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y , s ig na t u r e fidel it y a nd ev ent s ev er it y 2 . C SA block s th e a tta ck a n d 1 . A tta ck er tries to brute f orce a dds a tta ck er to its w a tch lis t a tta ck a n in tern a l s erv er 4 . F uture a tta ck s f rom h a ck er a re block ed a t th e I P S dev ice 3 . C SA colla bora tin g w ith C is co I P S is a ble to dyn a m ica lly elev a te th e R is k R a tin g th res h old f or ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l a tta ck s com in g f rom th e a tta ck er 21
22.
C i sc
o AS A N ew in8 .0 ! T L S si g n ali n g E ncr y p ted S R T P m e d ia E ndp oint E ncr y p ted E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s: • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e ) • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d au t o m at i c ally c lo se d w h e n c all e n d s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 22
23.
S ec u
r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0 E ns u r e S I P , S C C P , H . 3 2 3 , M G C P r eq u es t s c o nfo r m t o s t a nda r ds P r ev ent ina p p r o p r ia t e S I P M et h o ds fr o m b eing s ent t o C o m m u nic a t io n M a na g er N et w o r k R a t e L im it S I P R eq u es t s C is c o P o l ic y enfo r c em ent o f c a l l s S ec u ri ty C is c o A S A (w h it el is t , b l a c k l is t ,A g ent ( C S A ) w i th IP S W A N c a l l er / c a l l ed p a r t y , S I P UR I ) and V P N D y na m ic p o r t o p ening fo r C is c o a p p l ic a t io ns Cis co A S A w ith S S L In te r n e t E na b l e o nl y “r eg is t er ed V P N p h o nes ” t o m a k e c a l l s E na b l e ins p ec t io n o f enc r y p t ed p h o ne c a l l s R es t r ic t UC s er v ic es (ins t a nt m es s a g ing , a c c es s t o UR L s , m edia t y p es , m es s a g es , ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l m es s a g e l eng t h ) 23
24.
C o n
c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n ent o r no de C o m u nic a c io nes Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s nec es ida des de s eg u r ida d cisco.com/go/secureuc ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 24
25.
Ag gend n
a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 25
26.
L ig a
s d e r e fe r e n c ia : S ec u r e U ni f i ed C o mmu ni c at i o ns h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c S AF E Ar c h i t ec t u r es h t t p : / / w w w . c i sc o . c o m/ g o / saf e C i sc o S ec u r i t y h t t p : / / w w w . c i sc o . c o m/ sec u r i t y ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 26
27.
Ag gend n
a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 27
28.
G i l
b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s g v i c ente@ c i s c o . c o m ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 28
29.
©2 0 0
8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 29