SlideShare una empresa de Scribd logo
1 de 29
“S     e g u r id a                                     d e n  C o m      u n ic a c                                      io n e s       U    n ific a d                                     a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   1
©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   2
A A g g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   3
Amenazas en U C                                                                       … u na r eal i d ad ! !                                                                                                                                                Trojan-I nf e c t e d M P 3 s  Botnet g a i ns , W eb                                                                                                                        H av e P C U s e rs S i ng i ng  2 . 0 p a i ns                                                                                                                                 t h e B lu e s                                                                                                Half a million sites hit         December 31, 2007                                                                                                b y hu g e w eb hac k                                             M a y 9 , 2008                                                                                                                      A p ri l 28 , 2008                                                                                                                                           H ow C r ed i t-C a r d                                                                                                                                            D a ta W ent O u t                           Hac k er p osts C hilean                                                                                          W i r el es s D oor                           g ov er nment d ata on 6                                                                                                        M a y 4 , 2007                            million                                                                M a y 13, 2008           ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                                                4
U C : U n ent o r no c o mp l ej o p o r p r o t eg er   Virtu aliz ation                              S p eech                                       P res ence                M obility           P olicy         Vid eo                                                           C ont ac t                                                        W eb              Mobile                                                                                                             C lient s                                                            C ent er                                                     C onf er enc ing       U CUnifiedC o m m u nic a t io ns                                                       U nif ied                                   V id eo/ A u d io            IP               C all                                                      Mes s ag ing                                C onf er enc ing          P h ones        P r oc es s ing             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                   5
Más c o mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … …       Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e                           p r ot ección”          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   6
Amenazas en T el ef o nía I P              A ye r                                                                                             Hoy       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l         7
Amenazas en C o mu ni c ac i o nes U ni f i c ad as•   T o l l F r au d – S am                                    e as a P B X                                               • B 2 B         U n ifie d C o         m m u n i c at i o n s•    E av e sd r o p p i n g                                                                                                   •S     P IT•     D o S , W o r m s, an                                d t h e V i r u s-D e -J o u r                                      •Id         e n tity T h e       ft•      R o g u e D e v ic e In                              se r t i o n                                                       •E      x t e r n al D o     S                                                                                                                          • E x te   r n al U C S e             r v ic e s•       R e c o n n ai ssan c e                                                                                                                               •S       e c u r e Mo b           ility•        Man -i n -t h e -Mi d d                            le                                                                                                                               •R        e m o te A c c          e ss•        D H C P S p o o fin g                              & S t ar v at i o n                ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                               8
S eg u r i d ad en C o mu ni c ac i o nes U ni f i c ad as     L a m ay oría d e la g ente p iens a q u e u n am biente d e U C                                                              s eg u ro es s olo:         - P rotección contra f rau d es         - Voz encrip tad a     H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones      U nif icad as                                                                             Conectividad                          M anej o de   D ef ens a contr a                                                                               s eg u r a                         identidades       am enaz as        I nf r as tr u ctu r a       P r oces am iento de        l l am adas        E ndp oints       A p l icaciones        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                          9
U n r et o , c o o p er ac i ón ent r e ár eas                                                                                           S ec u r e U ni f i ed                                                                                         C o mmu ni c at i o ns   N et O P s                                                                                                       S ec O p s    E x ec s                                                                                                        T el O p s  “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e  p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le   U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7         ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                 10
R et o s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es                                                                   y s eg u r id ad )              ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l       11
Ag gend n a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   12
T o mar en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a                                                                                                   P u n t o s f i n al e s S eg u r id ad en la                                                                                                        T elef onos I P , C lient es d e S W  c onec t iv id ad y                                                                                                         y ot r os d is p os it iv os   t r ans p or t e                                                                                                          U nif ied                                                                                                     Com m u nications C o n t r o l d e l l am ad as                                                                                               A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos                                                                                         Mens aj er ía, at enc ión a  p ar a la ad m inis t r ac ión d e                                                                                          c lient es , et c .   llam ad as                                                                                        L a r e d c o m o p lat af o r m a             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                        13
S eg u r i d ad en U C                                                    =            S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía                                               S ec u r e U ni f i ed                     S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny                                                                      S ec  “O r g a   n iz    a tio n s                    m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C  o w n e    rs h    ip . In c                  lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity   a n d M     a n     a g e m                 e n t.”    - K ey    Is s    u es fo                    r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7                     ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                  14
S eg u r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e                                                                                                              A p p li c at i o n s    V L A N s e g m e nt at i on                                                                                                          M u l t i -l e v e l ad m i ni s t rat i on     L ay e r 2 p rot e c t i on      F i re w al l                                                                                                                       Tol l f rau d p rot e c t i on                                                                                                          Internet           Intranet       I nt ru s i on d e t e c t i on                                                                                                    S e c u re m anag e m e nt        Q oS and t h re s h ol d s                                                                                                        H ard e ne d p l at f orm s         S e c u re V P N                                                                                                                                          h . 3 2 3 and S I P s i g nal i ng          W i re l e s s s e c u ri t y C all Man ag e m e n t                                                                                                                 E n d p o in ts                                                                                                                        Si     Si    H ard e ne d W i nd ow s O S                                                                                                          D i g i t al c e rt i f i c at e s    D i g i t al c e rt i f i c at e s                                                                                                    A u t h e nt i c at e d p h one s                                                                                                                                          G A R P p rot e c t i on    S i g ne d s of t w are i m ag e s                                                                                                                                          TL S p rot e c t e d s i g nal i ng    TL S s i g nal i ng                                                                                                                                          S R TP m e d i a e nc ry p t i on    I nt e g rat e d C S A                                                                                                                                          C e nt ral i z e d m anag e m e nt                   ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                         15
C i s c o c o m o s o c i o t e c n o l óg i c o                                          1                                                                                                   2                     3     I nc l u ded a s fea t u r es                                                                               I nc l u ded in net w o r k ing   T h ing s y o u      in C is c o UC P r o du c t s                                                                               p r o du c t s (ex : V L A N )    s h o u l d do a ny w a y      (ex : T L S )                                                                                                                                  (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID   © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d .   C is c o C o n fid e n tia l                                              1616
M B eja o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes                 n                      is U ni f i c ad as                           L o w                                                                                            Me d i u m                                 H ig h              Easy or Default                                                                           M o d erate and R eas o nab l e                 H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s                                                      U C -A w are F i re w al l s                     U C     A w are F W       w / TL S P rox yS TP , B P D U G u ard , S m art P ort s                                                      E nc ry p t e d C onf i g u rat i on             R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s )                                             TL S & S R TP f or P h one s                     V P N    ( Te l e c om m u t e r)S t and ard O S H ard e ni ng                                                                 I P S e c & S R TP f or G at e w ay s            8 0 2 .1 X & N A CU nm anag e d C S A                                                                           O p t i onal O S H ard e ni ng / P at c h i ng   N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y )                                                       M anag e d C S A ( W i nd ow s onl y )           S e c u ri t y E v e nt M anag e m e ntH TTP S                                                                                       D H C P S noop i ng                              D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on                                                D y nam i c A R P I ns p e c t i on              S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s                                                         D y nam i c P ort S e c u ri t y                 I nt ru s i on P re v e nt i on S ol u t i on                                                                                              I P S ou rc e G u ard                  ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                                       17
S A F E S e c u r ity A r c h ite c tu r e S tr a te g y                                                                                                            S ec u r it y D ev ic es                 S ec u r it y                                                          V PN s                                                                                         M o n ito r in g                                                                                                                            F ir e w a ll                                                                                                                             E m a il F ilt e r in g                                                                                                                                                            A d m i s s i o n Co n t r o l                                                                                                                                                             In t r u s i o n Pr e v e n t i o n                                                                                                                                                                                                        N et w o r k                  S o l u t io ns                                                                                                                                                                        D ev ic es                        PCI                                                                                                                                                                                    R o u te rs                        D L P                                                                                                                                                                                   S e rv e rs                                                                                                                    P o l i c y and D ev i c e                         T h re a t                                                                                                                                                                              S w itc h e s                          Co n t r o l                                                                                                                        M anag em ent                                                                                                                      Id e n t i f y                H a rd e n                                                                              M o n ito r                                                                                          Is o l a t e   V i s i b i l i ty                                                                                                                                                                                                    C o ntro l                                                                                                            Co r r e l a t e                            E n fo rc e                                                                                                                                                                                            C is c o      Data                                                             W A N                                                           I n te r n e t            E c o m m -                            V i r tu al              P ar tn e r                                C am p u s                                                           B r an c h                                                                           V i r tu al    C e n te r                                                          E d g e                                                           E d g e                   e rc e                                U s e r                  S i te s                                                                                                                                                                                           O f f ic e                                                      Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion                                                                                                     N etw ork F oun da tion P rotection                 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                                                                                                      18
C o l a b o r a c i ón / S e c u r i t y / S a a S                                                                                                     Collaboration                                                                                                               N etw or k                                                                                                                 as th e                                                                                                              P l atf or m                                                S e c u rity                                                                 S aaS    ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                          19
P l ant eami ent o C i sc o ant e l as nu ev as d i námi c as                                                                                                         Collaboration                                                                                                                        U n iq ue                                                                                                                   C om p etitiv e                                                                                                                  D if f eren tia tor                                                    S e c u rity                                                                        S aaS                                                                                   Network as the Platform        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                 20
Al g u no s ej emp l o s …. C i sc o I P S  I P S F e at u r e s:     I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic     D r o p c a l l s t h a t a r e c o m ing fr o m                                                                 I P a ddr es s es ident ified o n t h e C is c o      S ec u r it y A g ent “w a t c h l is t ”     D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y      A g ent     R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y ,      s ig na t u r e fidel it y a nd ev ent s ev er it y                                                                                                                                                           2 . C SA block s th e a tta ck a n d      1 . A tta ck er tries to brute f orce                                                                                                                                                            a dds a tta ck er to its w a tch lis t       a tta ck a n in tern a l s erv er                                               4 . F uture a tta ck s f rom                                                h a ck er a re block ed a t th e                                                 I P S dev ice                                                                                                                        3 . C SA colla bora tin g w ith C is co I P S is a ble to                                                                                                                         dyn a m ica lly elev a te th e R is k R a tin g th res h old f or            ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l      a tta ck s com in g f rom th e a tta ck er                                  21
C i sc o AS A                                                                                                                                                      N ew                                                                                                                                                     in8 .0 !                                                                                              T L S                                                                                         si g n ali n g                E ncr y p ted                                                                                     S R T P m e d ia                 E ndp oint                                                                                                          E ncr y p ted                                                                                                                                      E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an  n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s:       • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g         se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s       • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r         c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e          e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e )       • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d         au t o m at i c ally c lo se d w h e n c all e n d s        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                            22
S ec u r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0                                                                                                         E ns u r e S I P , S C C P , H . 3 2 3 ,                                                                                                                               M G C P r eq u es t s c o nfo r m t o                                                                                                                                s t a nda r ds                                                                                                                                 P r ev ent ina p p r o p r ia t e S I P                                                                                                                                  M et h o ds fr o m b eing s ent t o                                                                                                                                   C o m m u nic a t io n M a na g er                                                                                                                                    N et w o r k R a t e L im it S I P                                                                                                                                     R eq u es t s     C is c o                                                                                                                         P o l ic y enfo r c em ent o f c a l l s   S ec u ri ty                     C is c o A S A                                                                                     (w h it el is t , b l a c k l is t ,A g ent ( C S A )                     w i th IP S                                               W A N                                  c a l l er / c a l l ed p a r t y , S I P UR I )                                      and V P N                                                                                                                                        D y na m ic p o r t o p ening fo r                                                                                                                                         C is c o a p p l ic a t io ns       Cis co A S A        w ith S S L                                                  In te r n e t                                                        E na b l e o nl y “r eg is t er ed           V P N                                                                                                                           p h o nes ” t o m a k e c a l l s                                                                                                                                            E na b l e ins p ec t io n o f                                                                                                                                             enc r y p t ed p h o ne c a l l s                                                                                                                                             R es t r ic t UC s er v ic es (ins t a nt                                                                                                                                              m es s a g ing , a c c es s t o UR L s ,                                                                                                                                               m edia t y p es , m es s a g es ,                    ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                                                                                                                m es s a g e l eng t h )                23
C o n c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n  ent o r no de C o m u nic a c io nes  Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s  nec es ida des de s eg u r ida d          cisco.com/go/secureuc           ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   24
Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   25
L ig a s d e r e fe r e n c ia :   S ec u r e U ni f i ed C o mmu ni c at i o ns    h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c   S AF E Ar c h i t ec t u r es    h t t p : / / w w w . c i sc o . c o m/ g o / saf e   C i sc o S ec u r i t y    h t t p : / / w w w . c i sc o . c o m/ sec u r i t y          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   26
Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   27
G i l b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s  g v i c ente@ c i s c o . c o m                ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   28
©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   29

Más contenido relacionado

Similar a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz

Eyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak Brasil
 
Green Economy Initiative
Green Economy InitiativeGreen Economy Initiative
Green Economy InitiativeZ3P
 
How do i bring gene xus to my organization
How do i bring gene xus to my organizationHow do i bring gene xus to my organization
How do i bring gene xus to my organizationGeneXus
 
2007 20 most_important_megatrends
2007 20 most_important_megatrends2007 20 most_important_megatrends
2007 20 most_important_megatrendsatelier t*h
 
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyJ.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyShane Mitchell
 
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Vidhyalakshmi K
 
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2Ben Herz
 
weINDIE - Intro Pack
weINDIE - Intro PackweINDIE - Intro Pack
weINDIE - Intro PackDey Dos
 
Degenshein Architects
Degenshein ArchitectsDegenshein Architects
Degenshein ArchitectsFatima Rizvi
 
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyTraveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyStanford University
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summaryfsikipa
 
New doc 20
New doc 20New doc 20
New doc 20KingEdge
 
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University ssuser6ace78
 
Dance For Change
Dance For ChangeDance For Change
Dance For Changepoeschl
 

Similar a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz (20)

About me dia
About me diaAbout me dia
About me dia
 
AwardsCerts
AwardsCertsAwardsCerts
AwardsCerts
 
Puzzle
PuzzlePuzzle
Puzzle
 
Eyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak E Learning Plan
Eyespeak E Learning Plan
 
Green Economy Initiative
Green Economy InitiativeGreen Economy Initiative
Green Economy Initiative
 
Hotel marketing-plan
Hotel marketing-planHotel marketing-plan
Hotel marketing-plan
 
How do i bring gene xus to my organization
How do i bring gene xus to my organizationHow do i bring gene xus to my organization
How do i bring gene xus to my organization
 
2007 20 most_important_megatrends
2007 20 most_important_megatrends2007 20 most_important_megatrends
2007 20 most_important_megatrends
 
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyJ.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
 
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
 
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
 
weINDIE - Intro Pack
weINDIE - Intro PackweINDIE - Intro Pack
weINDIE - Intro Pack
 
Degenshein Architects
Degenshein ArchitectsDegenshein Architects
Degenshein Architects
 
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyTraveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
 
Celebrations game
Celebrations  gameCelebrations  game
Celebrations game
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summary
 
New doc 20
New doc 20New doc 20
New doc 20
 
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumenK4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
 
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
 
Dance For Change
Dance For ChangeDance For Change
Dance For Change
 

Más de Mundo Contact

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Mundo Contact
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Mundo Contact
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Mundo Contact
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Mundo Contact
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Mundo Contact
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Mundo Contact
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Mundo Contact
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Mundo Contact
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Mundo Contact
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Mundo Contact
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Mundo Contact
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Mundo Contact
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Mundo Contact
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Mundo Contact
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Mundo Contact
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Mundo Contact
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Mundo Contact
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Mundo Contact
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Mundo Contact
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Mundo Contact
 

Más de Mundo Contact (20)

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz

  • 1. “S e g u r id a d e n C o m u n ic a c io n e s U n ific a d a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 1
  • 2. ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 2
  • 3. A A g g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 3
  • 4. Amenazas en U C … u na r eal i d ad ! ! Trojan-I nf e c t e d M P 3 s Botnet g a i ns , W eb H av e P C U s e rs S i ng i ng 2 . 0 p a i ns t h e B lu e s Half a million sites hit December 31, 2007 b y hu g e w eb hac k M a y 9 , 2008 A p ri l 28 , 2008 H ow C r ed i t-C a r d D a ta W ent O u t Hac k er p osts C hilean W i r el es s D oor g ov er nment d ata on 6 M a y 4 , 2007 million M a y 13, 2008 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 4
  • 5. U C : U n ent o r no c o mp l ej o p o r p r o t eg er Virtu aliz ation S p eech P res ence M obility P olicy Vid eo C ont ac t W eb Mobile C lient s C ent er C onf er enc ing U CUnifiedC o m m u nic a t io ns U nif ied V id eo/ A u d io IP C all Mes s ag ing C onf er enc ing P h ones P r oc es s ing ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 5
  • 6. Más c o mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … … Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e p r ot ección” ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 6
  • 7. Amenazas en T el ef o nía I P A ye r Hoy ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 7
  • 8. Amenazas en C o mu ni c ac i o nes U ni f i c ad as• T o l l F r au d – S am e as a P B X • B 2 B U n ifie d C o m m u n i c at i o n s• E av e sd r o p p i n g •S P IT• D o S , W o r m s, an d t h e V i r u s-D e -J o u r •Id e n tity T h e ft• R o g u e D e v ic e In se r t i o n •E x t e r n al D o S • E x te r n al U C S e r v ic e s• R e c o n n ai ssan c e •S e c u r e Mo b ility• Man -i n -t h e -Mi d d le •R e m o te A c c e ss• D H C P S p o o fin g & S t ar v at i o n ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 8
  • 9. S eg u r i d ad en C o mu ni c ac i o nes U ni f i c ad as L a m ay oría d e la g ente p iens a q u e u n am biente d e U C s eg u ro es s olo: - P rotección contra f rau d es - Voz encrip tad a H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones U nif icad as Conectividad M anej o de D ef ens a contr a s eg u r a identidades am enaz as I nf r as tr u ctu r a P r oces am iento de l l am adas E ndp oints A p l icaciones ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 9
  • 10. U n r et o , c o o p er ac i ón ent r e ár eas S ec u r e U ni f i ed C o mmu ni c at i o ns N et O P s S ec O p s E x ec s T el O p s “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 10
  • 11. R et o s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es y s eg u r id ad ) ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 11
  • 12. Ag gend n a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 12
  • 13. T o mar en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a P u n t o s f i n al e s S eg u r id ad en la T elef onos I P , C lient es d e S W c onec t iv id ad y y ot r os d is p os it iv os t r ans p or t e U nif ied Com m u nications C o n t r o l d e l l am ad as A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos Mens aj er ía, at enc ión a p ar a la ad m inis t r ac ión d e c lient es , et c . llam ad as L a r e d c o m o p lat af o r m a ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 13
  • 14. S eg u r i d ad en U C = S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía S ec u r e U ni f i ed S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny S ec “O r g a n iz a tio n s m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C o w n e rs h ip . In c lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity a n d M a n a g e m e n t.” - K ey Is s u es fo r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 14
  • 15. S eg u r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e A p p li c at i o n s V L A N s e g m e nt at i on M u l t i -l e v e l ad m i ni s t rat i on L ay e r 2 p rot e c t i on F i re w al l Tol l f rau d p rot e c t i on Internet Intranet I nt ru s i on d e t e c t i on S e c u re m anag e m e nt Q oS and t h re s h ol d s H ard e ne d p l at f orm s S e c u re V P N h . 3 2 3 and S I P s i g nal i ng W i re l e s s s e c u ri t y C all Man ag e m e n t E n d p o in ts Si Si H ard e ne d W i nd ow s O S D i g i t al c e rt i f i c at e s D i g i t al c e rt i f i c at e s A u t h e nt i c at e d p h one s G A R P p rot e c t i on S i g ne d s of t w are i m ag e s TL S p rot e c t e d s i g nal i ng TL S s i g nal i ng S R TP m e d i a e nc ry p t i on I nt e g rat e d C S A C e nt ral i z e d m anag e m e nt ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 15
  • 16. C i s c o c o m o s o c i o t e c n o l óg i c o 1 2 3 I nc l u ded a s fea t u r es I nc l u ded in net w o r k ing T h ing s y o u in C is c o UC P r o du c t s p r o du c t s (ex : V L A N ) s h o u l d do a ny w a y (ex : T L S ) (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d . C is c o C o n fid e n tia l 1616
  • 17. M B eja o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes n is U ni f i c ad as L o w Me d i u m H ig h Easy or Default M o d erate and R eas o nab l e H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s U C -A w are F i re w al l s U C A w are F W w / TL S P rox yS TP , B P D U G u ard , S m art P ort s E nc ry p t e d C onf i g u rat i on R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s ) TL S & S R TP f or P h one s V P N ( Te l e c om m u t e r)S t and ard O S H ard e ni ng I P S e c & S R TP f or G at e w ay s 8 0 2 .1 X & N A CU nm anag e d C S A O p t i onal O S H ard e ni ng / P at c h i ng N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y ) M anag e d C S A ( W i nd ow s onl y ) S e c u ri t y E v e nt M anag e m e ntH TTP S D H C P S noop i ng D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on D y nam i c A R P I ns p e c t i on S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s D y nam i c P ort S e c u ri t y I nt ru s i on P re v e nt i on S ol u t i on I P S ou rc e G u ard ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 17
  • 18. S A F E S e c u r ity A r c h ite c tu r e S tr a te g y S ec u r it y D ev ic es S ec u r it y V PN s M o n ito r in g F ir e w a ll E m a il F ilt e r in g A d m i s s i o n Co n t r o l In t r u s i o n Pr e v e n t i o n N et w o r k S o l u t io ns D ev ic es PCI R o u te rs D L P S e rv e rs P o l i c y and D ev i c e T h re a t S w itc h e s Co n t r o l M anag em ent Id e n t i f y H a rd e n M o n ito r Is o l a t e V i s i b i l i ty C o ntro l Co r r e l a t e E n fo rc e C is c o Data W A N I n te r n e t E c o m m - V i r tu al P ar tn e r C am p u s B r an c h V i r tu al C e n te r E d g e E d g e e rc e U s e r S i te s O f f ic e Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion N etw ork F oun da tion P rotection ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 18
  • 19. C o l a b o r a c i ón / S e c u r i t y / S a a S Collaboration N etw or k as th e P l atf or m S e c u rity S aaS ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 19
  • 20. P l ant eami ent o C i sc o ant e l as nu ev as d i námi c as Collaboration U n iq ue C om p etitiv e D if f eren tia tor S e c u rity S aaS Network as the Platform ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 20
  • 21. Al g u no s ej emp l o s …. C i sc o I P S I P S F e at u r e s: I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic D r o p c a l l s t h a t a r e c o m ing fr o m I P a ddr es s es ident ified o n t h e C is c o S ec u r it y A g ent “w a t c h l is t ” D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y A g ent R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y , s ig na t u r e fidel it y a nd ev ent s ev er it y 2 . C SA block s th e a tta ck a n d 1 . A tta ck er tries to brute f orce a dds a tta ck er to its w a tch lis t a tta ck a n in tern a l s erv er 4 . F uture a tta ck s f rom h a ck er a re block ed a t th e I P S dev ice 3 . C SA colla bora tin g w ith C is co I P S is a ble to dyn a m ica lly elev a te th e R is k R a tin g th res h old f or ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l a tta ck s com in g f rom th e a tta ck er 21
  • 22. C i sc o AS A N ew in8 .0 ! T L S si g n ali n g E ncr y p ted S R T P m e d ia E ndp oint E ncr y p ted E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s: • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e ) • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d au t o m at i c ally c lo se d w h e n c all e n d s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 22
  • 23. S ec u r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0 E ns u r e S I P , S C C P , H . 3 2 3 , M G C P r eq u es t s c o nfo r m t o s t a nda r ds P r ev ent ina p p r o p r ia t e S I P M et h o ds fr o m b eing s ent t o C o m m u nic a t io n M a na g er N et w o r k R a t e L im it S I P R eq u es t s C is c o P o l ic y enfo r c em ent o f c a l l s S ec u ri ty C is c o A S A (w h it el is t , b l a c k l is t ,A g ent ( C S A ) w i th IP S W A N c a l l er / c a l l ed p a r t y , S I P UR I ) and V P N D y na m ic p o r t o p ening fo r C is c o a p p l ic a t io ns Cis co A S A w ith S S L In te r n e t E na b l e o nl y “r eg is t er ed V P N p h o nes ” t o m a k e c a l l s E na b l e ins p ec t io n o f enc r y p t ed p h o ne c a l l s R es t r ic t UC s er v ic es (ins t a nt m es s a g ing , a c c es s t o UR L s , m edia t y p es , m es s a g es , ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l m es s a g e l eng t h ) 23
  • 24. C o n c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n ent o r no de C o m u nic a c io nes Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s nec es ida des de s eg u r ida d cisco.com/go/secureuc ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 24
  • 25. Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 25
  • 26. L ig a s d e r e fe r e n c ia : S ec u r e U ni f i ed C o mmu ni c at i o ns h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c S AF E Ar c h i t ec t u r es h t t p : / / w w w . c i sc o . c o m/ g o / saf e C i sc o S ec u r i t y h t t p : / / w w w . c i sc o . c o m/ sec u r i t y ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 26
  • 27. Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 27
  • 28. G i l b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s g v i c ente@ c i s c o . c o m ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 28
  • 29. ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 29