SlideShare a Scribd company logo
1 of 81
Download to read offline
Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1
Security and
Virtualization in the
Data Center
Ronnie Scott - CCIE 4099
T-DC-13-I
May 19th 2016
In collaboration with
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Housekeeping notes
Thank you for attending Cisco Connect Toronto 2016, here are a few housekeeping notes
to ensure we all enjoy the session today.
• Please ensure your cellphones / laptops are set on silent to ensure no one is disturbed
during the session
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Agenda
3
The New Security
Landscape
Defense By Design
Bringing The Big Guns
Conclusion
Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Simplify and Unify
security solutions
Evolve while maintaining
Security and Compliance
Stay ahead of
evolving threats
95% of firewall breaches
caused by misconfiguration*
12% YoY growth of
devices 2014-2019
Over 100K new
threats per day
* Greg Young, Gartner Inc
PROVISIONING SCALABILITY PROTECTION
DataCenter Security Challenges
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Attacker Profiles
Organized Crime
 Out to make money
 Needs organization to stay profitable
 Typically smash-and-grab style or
drive-by
Graffiti and Activism
 Attack you for fame
 To make a point
 Can be a nuisance
 Can also draw unwanted attention
State Sponsored Cyber Warfare
 Extremely advanced
 Companies are generally at a
disadvantage
 Hard to defend
 A-Typical
Espionage
 Somewhere between Organized Crime
and Military
 Could be state sponsored
 Replicating Intellectual Property
 Gain human intelligence
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Extortion
Data
Manipulation
Card Not
Present
IOT Zombies
Backdoors
Kim Zetter – Wired Magazine, Jan 1, 2016
TheBig5-2016
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
The Server Is Virtualized
13
• One Server - Multiple Guests
• Hypervisor abstractions hides hardware
• Partitioned system resources
• Application & OS encapsulation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
FinancialsCRM
Exchange ERP
OracleSAP
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Common Virtualization Concerns
15
• Physical Tools in a Virtual World
• Operations and Management Obfuscation
• Changes in Roles and Responsibilities
• Machine and Application Segmentation
Hypervisor
Initial
Infection
Secondary
Infection
Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Back to the basics … Ships in the night
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Cisco SAFE
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
The VMDC Architecture
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
But what our
customers want…
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
…is the vision on the box.
(Not the one on the carpet)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
SAFE Simplifies the Security Conversation
One Step at a Time
Capability Phase Architecture Phase Design Phase
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
WAN
Branch
Campus
Data
Center
Edge
Break the Network into Domains
Security Domains per PIN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
DC Core
Mapping The Problem
WAN / Campus
Core
Campus
App 2
Web
App
App 1 AppWeb DB
Branch
Site
1
Site
2
Edge
Shared
Services
DNS
DHCP
SQL
SLB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Business Requirements Per Domain
When done, try to rank by importance
Data Center
Protect Customer
Data
Must be easy to
operationalize
Support Role-based
Network Segmentation
Measurable
Security Increase
Example:
PCI Domain at Branch Office
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Identify the Threats, Risks, and Policy
Also, identify the mitigating capabilities that should be considered
Data Center
Domain
Policy: Role-based
Network
Segmentation
Risk: Lateral Spread
of Breach
Threat: Exploitation
of Trust
Example:
PCI Domain at Branch Office
Cisco Confidential 31© 2015 Cisco and/or its affiliates. All rights reserved.
Security Capabilities Design
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Security Capabilities Design
Example
1. No Products
2. Vendor-agnostic
L2//L3
Network
Access
Control +
TrustSec
To Campus
Shared
Services
Zone
Next-Gen
Intrusion
Prevention
System
App
Server
Zone
PCI
Compliance
Zone
Database
Zone
Flow
Analytics
Host-based
Security
Load
Balancer
Flow
Analytics
Firewall
Anti-
Malware
Threat
Intell-
igence
Access
Control +
TrustSec
Next-Gen
Intrusion
Prevention
System
Next-Generation Firewall Router
L2//L3
NetworkFirewall VPN
Switch
Web
Application
Firewall
Centralized Management
Policy/
Configuration
Visibility/
Context
Analysis
Correlation
Analytics
Logging/
Reporting
Threat
Intelligence
Vulnerability
Management
Monitoring
To Edge
Virtualized Capabilities
WAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
3. Identify existing capabilities
4. What are common missing
capabilities?
Security Capabilities Design
Example
L2//L3
Network
Access
Control +
TrustSec
To Campus
Shared
Services
Zone
Next-Gen
Intrusion
Prevention
System
App
Server
Zone
PCI
Compliance
Zone
Database
Zone
Flow
Analytics
Host-based
Security
Load
Balancer
Flow
Analytics
Firewall
Anti-
Malware
Threat
Intell-
igence
Access
Control +
TrustSec
Next-Gen
Intrusion
Prevention
System
Next-Generation Firewall Router
L2//L3
NetworkFirewall VPN
Switch
Web
Application
Firewall
Centralized Management
Policy/
Configuration
Visibility/
Context
Analysis
Correlation
Analytics
Logging/
Reporting
Threat
Intelligence
Vulnerability
Management
Monitoring
To Edge
Virtualized Capabilities
WAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Interconnected Enclaves
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
BBI
Data Center
Core
DMZCampus
ACLs/
Firewall
ACLs/
Firewall
AMP or
IDS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Shared Services
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Data Center
Core
Permit TCP/5000-5010
Backup
Server
Inter-Zone
Firewall
Backup
Server
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Inside The Enclave
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
User
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Perimeter
Firewall
AMP or
IPS
SLB
WAAS
SLB
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Architecture Phase
Assign capabilities to devices
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Building the Solution
Lower-level designs with the details
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Physical vs. Virtualized
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Virtualized vs. Virtualization
Web
ServerWeb
Server
Permit TCP/80
(HTTP)
Permit TCP/22
(SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80
(HTTP)
Permit TCP/22
(SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80
(HTTP)
Permit TCP/22
(SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80
(HTTP)
Permit TCP/22
(SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Intra-Zone
Firewall
Intra-Zone
Firewall
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Cloud Provisioning
Stack
Automation and Orchestration
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Web
ServerWeb
Server
Permit TCP/80 (HTTP) Permit TCP/22 (SSH)
Permit Web
to App
Web
Group
DB
serverDB
server
DB
Group
App
ServerApp
Server
App
Group
Permit App
to DB
Deny All
Inter-Zone
Firewall
Intra-Zone
Firewall
Intra-Zone
Firewall
Self-Service
Orchestration
Automation
Cisco Confidential 45© 2015 Cisco and/or its affiliates. All rights reserved.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Network-Integrated,
Broad Sensor Base,
Context and Automation
Continuous Advanced Threat
Protection, Cloud-Based
Security Intelligence
Agile and Open Platforms,
Built for Scale, Consistent
Control, Management
Security Solutions Strategic Imperatives
Network Endpoint Mobile Virtual Cloud
Visibility-Driven Threat-Focused Platform-Based
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Web-zone Fileserver-zoneApplication-zone
Hypervisor
Nexus 7000
Nexus
1000V Primary VLAN 20
VRF
VLAN 20
UCS
VLAN 100
Isolated
VLAN 200
Isolated
VLAN 300
Community
Layer 2 Segmentation
• Isolate VMs in shared Layer 2 subnet
• Limit communication to Layer 3 gateway
• ACLs block unwanted communication
PVLANs for Physical and Virtual Isolation
.1Q Trunk
47
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
ACI Security
Automated Security With Built In Multi-Tenancy
Security AutomationEmbedded Security
• White-list Firewall Policy Model
• RBAC rules
• Hardened CentOS 7.2
• Authenticated Northbound API (X.509)
• Encrypted Intra-VLAN (TLS 1.2)
• Secure Key-store for Image Verification
• Dynamic Service Insertion and Chaining
• Closed Loop Feedback for Remediation
• Centralized Security Provisioning & Visibility
• Security Policy Follows Workloads
Distributed Stateless Firewall
Line Rate Security Enforcement
Open: Integrate Any Security Device
PCI, FIPS, CC, UC-APL, USG-v6
ACI Services
Graph
Micro-Segmentation
• Hypervisor Agnostic (ESX, Hyper-V, KVM*)
• Physical, Virtual Machine, Container
• Attribute Based Isolation/Quarantine
• Point and Click Micro-segmentation
• TrustSec-ACI Integration
Encryption
• Link MACSEC
• INS-SEC Overlay Encryption
• MKA, SAP
• GCM-AES-256/128-XPN
• GCM-AES-256/128
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Segmentation begins with visibility
You can’t protect what you can’t see
Who is on the Network?
And what are they up to?
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Make Fully Informed Decisions with Rich Contextual
Awareness
Context
Who
What
Where
When
How
IP address 192.168.1.51
Unknown
Unknown
Unknown
Unknown
Bob
Tablet, iOS, v. 9.1x
Building 200, first floor
11:00 a.m. EST on April 10
Wireless
The right user, on the right device, from the
right place is granted the right access
Any user, any device, anywhere gets on
the network
Result
Poor Context Awareness Extensive Context Awareness
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Visibility with Cisco Identity Services Engine (ISE)
Discover Known and Unknown in Your Network
PARTNER CONTEXT
DATA
NETWORK / USER
CONTEXT
How
WhatWho
WhereWhen
CONSISTENT SECURE ACCESS POLICY ACROSS WIRED, WIRELESS and VPN
Access Policy
PxGrid
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Flexible and Scalable Policy Enforcement
Switch Router DC FW DC Switch
Security Control Automation
Simplified Access Management
Improved Security Efficacy
access-list 102 deny icmp 76.176.66.41 0.255.255.255 lt 278 169.48.105.37 0.0.1.255 gt 968
access-list 102 permit ip 8.88.141.113 0.0.0.127 lt 2437 105.145.196.67 0.0.1.255 lt 4167
access-list 102 permit udp 60.242.95.62 0.0.31.255 eq 3181 33.191.71.166 255.255.255.255 lt 2422
access-list 102 permit icmp 186.246.40.245 0.255.255.255 eq 3508 191.139.67.54 0.0.1.255 eq 1479
access-list 102 permit ip 209.111.254.187 0.0.1.255 gt 4640 93.99.173.34 255.255.255.255 gt 28
access-list 102 permit ip 184.232.88.41 0.0.31.255 lt 2247 186.33.104.31 255.255.255.255 lt 4481
access-list 102 deny ip 106.79.247.50 0.0.31.255 gt 1441 96.62.207.209 0.0.0.255 gt 631
access-list 102 permit ip 39.136.60.170 0.0.1.255 eq 4647 96.129.185.116 255.255.255.255 lt 3663
access-list 102 permit tcp 30.175.189.93 0.0.31.255 gt 228 48.33.30.91 0.0.0.255 gt 1388
access-list 102 permit ip 167.100.52.185 0.0.1.255 lt 4379 254.202.200.26 255.255.255.255 gt 4652
access-list 102 permit udp 172.16.184.148 0.255.255.255 gt 4163 124.38.159.247 0.0.0.127 lt 3851
access-list 102 deny icmp 206.107.73.252 0.255.255.255 lt 2465 171.213.183.230 0.0.31.255 gt 1392
Traditional Security Policy
Business
Policy
Software Defined Segmentation
Building a Policy Matrix
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
TrustSec Components
Access
Switch
Router DC FW DC Switch
HR Servers
Enforcement
Fin Servers
ISE DirectoryClassification
User /
Endpoint
Propagation
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
ISE Dynamically provisions TrustSec
Security Groups in APIC-DC
ACITrustSec
Security Groups External (Outside Fabric) EPGs
TrustSec Security Groups Provisioned in ACI
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
ISE dynamically learns EPGs and
VM Bindings from ACI fabric
ACI
VM1 VM1000TrustSec Domain
TrustSec
Internal (Inside Fabric) EPGsSecurity Group from APIC-DC
ACI Application Servers are Automatically Propagated
to the TrustSec Domain
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Assigning Security Groups
56
Dynamic Classification Static Classification
• IP Address
• VLANs
• Subnets
• L2 Interface
• L3 Interface
• Virtual Port Profile
• Layer 2 Port Lookup
Common Classification for
Mobile Devices
Classification for Servers,
Topology-based assignments.
802.1X Authentication
MAC Auth Bypass
Web Authentication
SGT
56
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Nexus 1000V: SGT Assignment in Port Profile
• Port Profile
– Container of network properties
– Applied to different interfaces
• Server Admin assign Port Profiles
• VMs inherit SGT from port-profile
• SGT bound to the VM
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Firewall Policy based on SGT
Security Group
definitions from ISE
Trigger FirePower
services by SGT policies
Can still use Network Object (Host,
Range, Network (subnet), or FQDN)
AND / OR the SGT
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
Evolution of Firepower and ASA
October 2013
Firepower AND
ASA
September 2014
ASA with Firepower Services
ON the ASA-5500-X and
ASA-5585-X
March 2016
Firepower Threat Defense
FOR the ASA-5500-X,
FP-4100, and FP-9300
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Introducing FirePOWER 9300
FirePOWER 9300
Security Appliance
Ultra High Performance
High Port Density
Multi-Services
Flexible Programmability
Power Efficiency
Best in Class
Price
&
Performance
Per RU
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Security Modules
• Two configurations
SM-36 “Extreme”: 72 x86 CPU cores (up to 80Gbps)
SM-24 “Enterprise”: 48 x86 CPU cores (up to 60Gbps)
• Dual 800GB SSD in RAID1 by default
• Built-in hardware Smart NIC and Crypto Accelerator
Hardware VPN acceleration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Introducing Virtual Security Gateway
• L2 transparent FW
• Inspection between L2 adjacent hosts
• Uses VMware attributes for policy
• L2 separation for East-West traffic
• One or more VSGs per tenant
• Based on Nexus 1000V vPath
Virtual
Hosts
Virtual
Hosts
Virtual
Hosts
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Cisco ASAv Platforms
Cisco ASAv30 2 Gbps
Cisco® ASAv5
• ASA Code Base
• Hypervisor Agnostic
• Lab Edition license
Cisco ASAv10 1 Gbps
100 Mbps
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Comparing Cisco Virtual Firewalls
Cisco ASAv Cisco VSG
Layer 2 and 3 modes Layer 2 mode
Dynamic and static routing No routing
DHCP server and client support No DHCP support
Site-to-site and RA-VPN No IPsec support
CLI and Cisco®
ASDM, Cisco
Security Manager, and APIC
Cisco Prime NSC
ASA CLI, SSH, and REST API Limited CLI and SSH configuration
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Firepower Threat Defense (FTD)
Converged ASA+FirePOWER Image
FirePOWER capabilities + select ASA features
Firepower Management Center 6.0
Same subscriptions as FirePOWER Services
• Delivered via Smart Licensing only
Threat (IPS + SI)
Malware (AMP + ThreatGrid)
URL Filtering
Firepower Threat Defense 6.0
ASA features
Unified ASA / Firepower Rules and
Objects
ASA Dynamic and Static NAT
OSPFv2, BGP4, RIP, Static
Syn Cookies, Anti-Spoofing
ASA ALGs (fixed configuration)
VMware and AWS Support
Smart Licensing Support
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Cisco StealthWatch System
Network Reconnaissance Using Dynamic NetFlow Analysis
Monitor Detect Analyze Respond
 Understand your
network normal
 Gain real-time
situational awareness
of all traffic
 Leverage Network
Behavior Anomaly
detection & analytics
 Detect behaviors
linked to APTs,
insider threats,
DDoS, and malware
 Collect & Analyze
holistic network audit
trails
 Achieve faster root
cause analysis to
conduct thorough
forensic investigations
 Accelerate network
troubleshooting & threat
mitigation
 Respond quickly to
threats by taking action
to quarantine through
Cisco ISE
*Cisco acquired Lancope Dec ‘15
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Card Processor
Hacked
Server
POS Terminals
ASA
Firewall
Private
WAN
(trusted)
Credit Card
Processor
ASA
Firewall
Stores Data CenterUpdatesfrom
POSServer
HTTPS
Credit Card Processing HTTPS
Internet
ISR G2
Routers
ISR G2
Routers
Wireless
AP
Wireless POS
C3850
Unified
Access
Network as a Sensor
Host Lock Violation and Suspect Data Loss
Public
Internet
Compromised
Server
StealthWatch
FlowCollector
StealthWatch
Management
Console
Cisco ISE
Command and
Collect
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
AMP Everywhere Deployment AMP
Advanced Malware Protection
Deployment
Options
Email and Web
AMP for Networks
(AMP on
FirePOWER)
AMP for Endpoints AMP Private Cloud
Virtual Appliance
Method License with ESA, WSA,
CWS, or ASA customers
ASA w/ FP, FP Appliances
Install lightweight
connector on endpoints
On-premises Virtual
Appliance
Ideal for
New or existing Cisco
CWS, Email /Web Security,
ASA customers
IPS/NGFW customers
Windows, Mac, Android,
and Linux
High-Privacy Environments
Details
 ESA/WSA: Prime
visibility into email/web
 CWS: web and
advanced malware
protection in a cloud-
delivered service
 AMP capabilities on ASA
with FirePOWER
Services
 Wide visibility inside
network
 Broad selection of
features- before, during,
and after an attack
 Comprehensive threat
protection and response
 Granular visibility and
control
 Widest selection of AMP
features
 Anyconnect delivery
 Private Cloud option for
those with high-privacy
requirements
 For endpoints and
networks
PC/MAC Mobile Virtual
Meraki
Soon
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
PRODUCTS & TECHNOLOGIES
Umbrella
Enforcement
DNS based security service
protects any device, anywhere
Investigate
Intelligence
Discover and predict
attacks before they happen
OpenDNS Adds to Cisco’s Threat Prevention Portfolio
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Advantages of a DNS-based Solution
ANY OPERATING SYSTEM
Win, Mac, iOS, Android,
Linux, ChromeOS, and even
network devices and custom
operating systems
FAST AND SCALABLE
Extremely efficient
query/response method
SIMPLE TO DEPLOY
network’s DHCP tells
every connected device
where to point DNS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
Talos is the industry-leading threat intelligence
organization. We detect and correlate threats in real time
using the largest threat detection network in the world to
protect against known and emerging cyber security threats
to better protect your organization.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Talos Research
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
Cisco Talos Security Intelligence & Research
IPS Rules
Malware
Protection
Reputation
Feeds
Vulnerability
Database
Updates
AEGIS™
Program
Private and
Public
Threat Feeds
Sandnets
FireAMP™
Community
300,000 detections
added per day
Honeypots
Advanced Microsoft
and Industry
Disclosures
Crete Program
100,000 True
Positive
Events/Day
Snort and ClamAV
Open Source
Communities
File Samples
1,100,000 daily
Sandboxing
Machine Learning
Big Data Infrastructure
Threat Grid
Community
Cisco Confidential 75© 2015 Cisco and/or its affiliates. All rights reserved.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
www.cisco.com/go/vmdc
www.cisco.com/go/safe
Thank you.
In collaboration with

More Related Content

What's hot

Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformRobb Boyd
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewallCisco Canada
 
UCS Update: Efficiently Managing your server environment for traditional ente...
UCS Update: Efficiently Managing your server environment for traditional ente...UCS Update: Efficiently Managing your server environment for traditional ente...
UCS Update: Efficiently Managing your server environment for traditional ente...Cisco Canada
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabCisco Canada
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceCisco Canada
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoCisco Canada
 
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Canada
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Canada
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityRobb Boyd
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...Cisco Canada
 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Cisco Canada
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data centerCisco Canada
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Canada
 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesCisco Canada
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 Robb Boyd
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Canada
 

What's hot (20)

Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container Platform
 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC Networking
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Putting firepower into the next generation firewall
Putting firepower into the next generation firewallPutting firepower into the next generation firewall
Putting firepower into the next generation firewall
 
UCS Update: Efficiently Managing your server environment for traditional ente...
UCS Update: Efficiently Managing your server environment for traditional ente...UCS Update: Efficiently Managing your server environment for traditional ente...
UCS Update: Efficiently Managing your server environment for traditional ente...
 
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on LabNSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
NSO: Network Service Orchestrator enabled by Tail-f Hands-on Lab
 
Innovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching SpaceInnovations in the Enterprise Routing & Switching Space
Innovations in the Enterprise Routing & Switching Space
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with Cisco
 
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful Technology
 
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experienceCisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
Cisco Connect Vancouver 2017 - Optimizing your client's wi fi experience
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...Cisco connect winnipeg 2018   understanding cisco's next generation sdwan sol...
Cisco connect winnipeg 2018 understanding cisco's next generation sdwan sol...
 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi ExperienceCisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
Cisco Connect Toronto 2017 - Optimizing your client's Wi-Fi Experience
 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch services
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000 TechWiseTV Workshop: ASR 9000
TechWiseTV Workshop: ASR 9000
 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation Branch
 

Viewers also liked

Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsGiuseppe Paterno'
 
Data Center Security
Data Center SecurityData Center Security
Data Center Securitydevalnaik
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Data Center Security
Data Center SecurityData Center Security
Data Center SecurityCisco Canada
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareDatapath Consulting
 

Viewers also liked (12)

Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
VMware Presentation
VMware PresentationVMware Presentation
VMware Presentation
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Virtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMwareVirtualization 101: Everything You Need To Know To Get Started With VMware
Virtualization 101: Everything You Need To Know To Get Started With VMware
 

Similar to Security and Virtualization in the Data Center

SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Canada
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaCisco do Brasil
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarThousandEyes
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinarAlgoSec
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connectNur Shiqim Chok
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaFelipe Lamus
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop securityRobert Albach
 

Similar to Security and Virtualization in the Data Center (20)

SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
EMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? WebinarEMEA What is ThousandEyes? Webinar
EMEA What is ThousandEyes? Webinar
 
2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar2021 01-27 reducing risk of ransomware webinar
2021 01-27 reducing risk of ransomware webinar
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 
Cumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America LatinaCumbre PR/AR sobre el mercado Telco en America Latina
Cumbre PR/AR sobre el mercado Telco en America Latina
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Mfg workshop security
Mfg workshop   securityMfg workshop   security
Mfg workshop security
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

Security and Virtualization in the Data Center

  • 1. Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1 Security and Virtualization in the Data Center Ronnie Scott - CCIE 4099 T-DC-13-I May 19th 2016 In collaboration with
  • 2. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Housekeeping notes Thank you for attending Cisco Connect Toronto 2016, here are a few housekeeping notes to ensure we all enjoy the session today. • Please ensure your cellphones / laptops are set on silent to ensure no one is disturbed during the session
  • 3. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Agenda 3 The New Security Landscape Defense By Design Bringing The Big Guns Conclusion
  • 4. Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.
  • 5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Simplify and Unify security solutions Evolve while maintaining Security and Compliance Stay ahead of evolving threats 95% of firewall breaches caused by misconfiguration* 12% YoY growth of devices 2014-2019 Over 100K new threats per day * Greg Young, Gartner Inc PROVISIONING SCALABILITY PROTECTION DataCenter Security Challenges
  • 6. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Attacker Profiles Organized Crime  Out to make money  Needs organization to stay profitable  Typically smash-and-grab style or drive-by Graffiti and Activism  Attack you for fame  To make a point  Can be a nuisance  Can also draw unwanted attention State Sponsored Cyber Warfare  Extremely advanced  Companies are generally at a disadvantage  Hard to defend  A-Typical Espionage  Somewhere between Organized Crime and Military  Could be state sponsored  Replicating Intellectual Property  Gain human intelligence
  • 7. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Extortion Data Manipulation Card Not Present IOT Zombies Backdoors Kim Zetter – Wired Magazine, Jan 1, 2016 TheBig5-2016
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10.
  • 11. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 The Server Is Virtualized 13 • One Server - Multiple Guests • Hypervisor abstractions hides hardware • Partitioned system resources • Application & OS encapsulation
  • 14. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 FinancialsCRM Exchange ERP OracleSAP
  • 15. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Common Virtualization Concerns 15 • Physical Tools in a Virtual World • Operations and Management Obfuscation • Changes in Roles and Responsibilities • Machine and Application Segmentation Hypervisor Initial Infection Secondary Infection
  • 16.
  • 17. Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved.
  • 18. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Back to the basics … Ships in the night
  • 20. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Cisco SAFE
  • 21. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 The VMDC Architecture
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 But what our customers want…
  • 25. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 …is the vision on the box. (Not the one on the carpet)
  • 26. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 SAFE Simplifies the Security Conversation One Step at a Time Capability Phase Architecture Phase Design Phase
  • 27. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 WAN Branch Campus Data Center Edge Break the Network into Domains Security Domains per PIN
  • 28. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 DC Core Mapping The Problem WAN / Campus Core Campus App 2 Web App App 1 AppWeb DB Branch Site 1 Site 2 Edge Shared Services DNS DHCP SQL SLB
  • 29. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Business Requirements Per Domain When done, try to rank by importance Data Center Protect Customer Data Must be easy to operationalize Support Role-based Network Segmentation Measurable Security Increase Example: PCI Domain at Branch Office
  • 30. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Identify the Threats, Risks, and Policy Also, identify the mitigating capabilities that should be considered Data Center Domain Policy: Role-based Network Segmentation Risk: Lateral Spread of Breach Threat: Exploitation of Trust Example: PCI Domain at Branch Office
  • 31. Cisco Confidential 31© 2015 Cisco and/or its affiliates. All rights reserved. Security Capabilities Design
  • 32. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Security Capabilities Design Example 1. No Products 2. Vendor-agnostic L2//L3 Network Access Control + TrustSec To Campus Shared Services Zone Next-Gen Intrusion Prevention System App Server Zone PCI Compliance Zone Database Zone Flow Analytics Host-based Security Load Balancer Flow Analytics Firewall Anti- Malware Threat Intell- igence Access Control + TrustSec Next-Gen Intrusion Prevention System Next-Generation Firewall Router L2//L3 NetworkFirewall VPN Switch Web Application Firewall Centralized Management Policy/ Configuration Visibility/ Context Analysis Correlation Analytics Logging/ Reporting Threat Intelligence Vulnerability Management Monitoring To Edge Virtualized Capabilities WAN
  • 33. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 3. Identify existing capabilities 4. What are common missing capabilities? Security Capabilities Design Example L2//L3 Network Access Control + TrustSec To Campus Shared Services Zone Next-Gen Intrusion Prevention System App Server Zone PCI Compliance Zone Database Zone Flow Analytics Host-based Security Load Balancer Flow Analytics Firewall Anti- Malware Threat Intell- igence Access Control + TrustSec Next-Gen Intrusion Prevention System Next-Generation Firewall Router L2//L3 NetworkFirewall VPN Switch Web Application Firewall Centralized Management Policy/ Configuration Visibility/ Context Analysis Correlation Analytics Logging/ Reporting Threat Intelligence Vulnerability Management Monitoring To Edge Virtualized Capabilities WAN
  • 34. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Interconnected Enclaves Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall BBI Data Center Core DMZCampus ACLs/ Firewall ACLs/ Firewall AMP or IDS
  • 35. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Shared Services Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Data Center Core Permit TCP/5000-5010 Backup Server Inter-Zone Firewall Backup Server
  • 36.
  • 37.
  • 38.
  • 39. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Inside The Enclave Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App User Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Perimeter Firewall AMP or IPS SLB WAAS SLB
  • 40. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Architecture Phase Assign capabilities to devices
  • 41. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Building the Solution Lower-level designs with the details
  • 42. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Physical vs. Virtualized Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall
  • 43. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Virtualized vs. Virtualization Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Intra-Zone Firewall Intra-Zone Firewall
  • 44. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Cloud Provisioning Stack Automation and Orchestration Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Web ServerWeb Server Permit TCP/80 (HTTP) Permit TCP/22 (SSH) Permit Web to App Web Group DB serverDB server DB Group App ServerApp Server App Group Permit App to DB Deny All Inter-Zone Firewall Intra-Zone Firewall Intra-Zone Firewall Self-Service Orchestration Automation
  • 45. Cisco Confidential 45© 2015 Cisco and/or its affiliates. All rights reserved.
  • 46. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 Network-Integrated, Broad Sensor Base, Context and Automation Continuous Advanced Threat Protection, Cloud-Based Security Intelligence Agile and Open Platforms, Built for Scale, Consistent Control, Management Security Solutions Strategic Imperatives Network Endpoint Mobile Virtual Cloud Visibility-Driven Threat-Focused Platform-Based
  • 47. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 Web-zone Fileserver-zoneApplication-zone Hypervisor Nexus 7000 Nexus 1000V Primary VLAN 20 VRF VLAN 20 UCS VLAN 100 Isolated VLAN 200 Isolated VLAN 300 Community Layer 2 Segmentation • Isolate VMs in shared Layer 2 subnet • Limit communication to Layer 3 gateway • ACLs block unwanted communication PVLANs for Physical and Virtual Isolation .1Q Trunk 47
  • 48. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 ACI Security Automated Security With Built In Multi-Tenancy Security AutomationEmbedded Security • White-list Firewall Policy Model • RBAC rules • Hardened CentOS 7.2 • Authenticated Northbound API (X.509) • Encrypted Intra-VLAN (TLS 1.2) • Secure Key-store for Image Verification • Dynamic Service Insertion and Chaining • Closed Loop Feedback for Remediation • Centralized Security Provisioning & Visibility • Security Policy Follows Workloads Distributed Stateless Firewall Line Rate Security Enforcement Open: Integrate Any Security Device PCI, FIPS, CC, UC-APL, USG-v6 ACI Services Graph Micro-Segmentation • Hypervisor Agnostic (ESX, Hyper-V, KVM*) • Physical, Virtual Machine, Container • Attribute Based Isolation/Quarantine • Point and Click Micro-segmentation • TrustSec-ACI Integration Encryption • Link MACSEC • INS-SEC Overlay Encryption • MKA, SAP • GCM-AES-256/128-XPN • GCM-AES-256/128
  • 49. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49 Segmentation begins with visibility You can’t protect what you can’t see Who is on the Network? And what are they up to?
  • 50. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50 Make Fully Informed Decisions with Rich Contextual Awareness Context Who What Where When How IP address 192.168.1.51 Unknown Unknown Unknown Unknown Bob Tablet, iOS, v. 9.1x Building 200, first floor 11:00 a.m. EST on April 10 Wireless The right user, on the right device, from the right place is granted the right access Any user, any device, anywhere gets on the network Result Poor Context Awareness Extensive Context Awareness
  • 51. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Visibility with Cisco Identity Services Engine (ISE) Discover Known and Unknown in Your Network PARTNER CONTEXT DATA NETWORK / USER CONTEXT How WhatWho WhereWhen CONSISTENT SECURE ACCESS POLICY ACROSS WIRED, WIRELESS and VPN Access Policy PxGrid
  • 52. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Flexible and Scalable Policy Enforcement Switch Router DC FW DC Switch Security Control Automation Simplified Access Management Improved Security Efficacy access-list 102 deny icmp 76.176.66.41 0.255.255.255 lt 278 169.48.105.37 0.0.1.255 gt 968 access-list 102 permit ip 8.88.141.113 0.0.0.127 lt 2437 105.145.196.67 0.0.1.255 lt 4167 access-list 102 permit udp 60.242.95.62 0.0.31.255 eq 3181 33.191.71.166 255.255.255.255 lt 2422 access-list 102 permit icmp 186.246.40.245 0.255.255.255 eq 3508 191.139.67.54 0.0.1.255 eq 1479 access-list 102 permit ip 209.111.254.187 0.0.1.255 gt 4640 93.99.173.34 255.255.255.255 gt 28 access-list 102 permit ip 184.232.88.41 0.0.31.255 lt 2247 186.33.104.31 255.255.255.255 lt 4481 access-list 102 deny ip 106.79.247.50 0.0.31.255 gt 1441 96.62.207.209 0.0.0.255 gt 631 access-list 102 permit ip 39.136.60.170 0.0.1.255 eq 4647 96.129.185.116 255.255.255.255 lt 3663 access-list 102 permit tcp 30.175.189.93 0.0.31.255 gt 228 48.33.30.91 0.0.0.255 gt 1388 access-list 102 permit ip 167.100.52.185 0.0.1.255 lt 4379 254.202.200.26 255.255.255.255 gt 4652 access-list 102 permit udp 172.16.184.148 0.255.255.255 gt 4163 124.38.159.247 0.0.0.127 lt 3851 access-list 102 deny icmp 206.107.73.252 0.255.255.255 lt 2465 171.213.183.230 0.0.31.255 gt 1392 Traditional Security Policy Business Policy Software Defined Segmentation Building a Policy Matrix
  • 53. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 TrustSec Components Access Switch Router DC FW DC Switch HR Servers Enforcement Fin Servers ISE DirectoryClassification User / Endpoint Propagation
  • 54. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 ISE Dynamically provisions TrustSec Security Groups in APIC-DC ACITrustSec Security Groups External (Outside Fabric) EPGs TrustSec Security Groups Provisioned in ACI
  • 55. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55 ISE dynamically learns EPGs and VM Bindings from ACI fabric ACI VM1 VM1000TrustSec Domain TrustSec Internal (Inside Fabric) EPGsSecurity Group from APIC-DC ACI Application Servers are Automatically Propagated to the TrustSec Domain
  • 56. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56 Assigning Security Groups 56 Dynamic Classification Static Classification • IP Address • VLANs • Subnets • L2 Interface • L3 Interface • Virtual Port Profile • Layer 2 Port Lookup Common Classification for Mobile Devices Classification for Servers, Topology-based assignments. 802.1X Authentication MAC Auth Bypass Web Authentication SGT 56
  • 57. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57 Nexus 1000V: SGT Assignment in Port Profile • Port Profile – Container of network properties – Applied to different interfaces • Server Admin assign Port Profiles • VMs inherit SGT from port-profile • SGT bound to the VM
  • 58. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Firewall Policy based on SGT Security Group definitions from ISE Trigger FirePower services by SGT policies Can still use Network Object (Host, Range, Network (subnet), or FQDN) AND / OR the SGT
  • 59. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59 Evolution of Firepower and ASA October 2013 Firepower AND ASA September 2014 ASA with Firepower Services ON the ASA-5500-X and ASA-5585-X March 2016 Firepower Threat Defense FOR the ASA-5500-X, FP-4100, and FP-9300
  • 60. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60 Introducing FirePOWER 9300 FirePOWER 9300 Security Appliance Ultra High Performance High Port Density Multi-Services Flexible Programmability Power Efficiency Best in Class Price & Performance Per RU
  • 61. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 Security Modules • Two configurations SM-36 “Extreme”: 72 x86 CPU cores (up to 80Gbps) SM-24 “Enterprise”: 48 x86 CPU cores (up to 60Gbps) • Dual 800GB SSD in RAID1 by default • Built-in hardware Smart NIC and Crypto Accelerator Hardware VPN acceleration
  • 62. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 Introducing Virtual Security Gateway • L2 transparent FW • Inspection between L2 adjacent hosts • Uses VMware attributes for policy • L2 separation for East-West traffic • One or more VSGs per tenant • Based on Nexus 1000V vPath Virtual Hosts Virtual Hosts Virtual Hosts
  • 63. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 Cisco ASAv Platforms Cisco ASAv30 2 Gbps Cisco® ASAv5 • ASA Code Base • Hypervisor Agnostic • Lab Edition license Cisco ASAv10 1 Gbps 100 Mbps
  • 64. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Comparing Cisco Virtual Firewalls Cisco ASAv Cisco VSG Layer 2 and 3 modes Layer 2 mode Dynamic and static routing No routing DHCP server and client support No DHCP support Site-to-site and RA-VPN No IPsec support CLI and Cisco® ASDM, Cisco Security Manager, and APIC Cisco Prime NSC ASA CLI, SSH, and REST API Limited CLI and SSH configuration
  • 65. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Firepower Threat Defense (FTD) Converged ASA+FirePOWER Image FirePOWER capabilities + select ASA features Firepower Management Center 6.0 Same subscriptions as FirePOWER Services • Delivered via Smart Licensing only Threat (IPS + SI) Malware (AMP + ThreatGrid) URL Filtering Firepower Threat Defense 6.0 ASA features Unified ASA / Firepower Rules and Objects ASA Dynamic and Static NAT OSPFv2, BGP4, RIP, Static Syn Cookies, Anti-Spoofing ASA ALGs (fixed configuration) VMware and AWS Support Smart Licensing Support
  • 66. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 Cisco StealthWatch System Network Reconnaissance Using Dynamic NetFlow Analysis Monitor Detect Analyze Respond  Understand your network normal  Gain real-time situational awareness of all traffic  Leverage Network Behavior Anomaly detection & analytics  Detect behaviors linked to APTs, insider threats, DDoS, and malware  Collect & Analyze holistic network audit trails  Achieve faster root cause analysis to conduct thorough forensic investigations  Accelerate network troubleshooting & threat mitigation  Respond quickly to threats by taking action to quarantine through Cisco ISE *Cisco acquired Lancope Dec ‘15
  • 67. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Card Processor Hacked Server POS Terminals ASA Firewall Private WAN (trusted) Credit Card Processor ASA Firewall Stores Data CenterUpdatesfrom POSServer HTTPS Credit Card Processing HTTPS Internet ISR G2 Routers ISR G2 Routers Wireless AP Wireless POS C3850 Unified Access Network as a Sensor Host Lock Violation and Suspect Data Loss Public Internet Compromised Server StealthWatch FlowCollector StealthWatch Management Console Cisco ISE Command and Collect
  • 68. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 AMP Everywhere Deployment AMP Advanced Malware Protection Deployment Options Email and Web AMP for Networks (AMP on FirePOWER) AMP for Endpoints AMP Private Cloud Virtual Appliance Method License with ESA, WSA, CWS, or ASA customers ASA w/ FP, FP Appliances Install lightweight connector on endpoints On-premises Virtual Appliance Ideal for New or existing Cisco CWS, Email /Web Security, ASA customers IPS/NGFW customers Windows, Mac, Android, and Linux High-Privacy Environments Details  ESA/WSA: Prime visibility into email/web  CWS: web and advanced malware protection in a cloud- delivered service  AMP capabilities on ASA with FirePOWER Services  Wide visibility inside network  Broad selection of features- before, during, and after an attack  Comprehensive threat protection and response  Granular visibility and control  Widest selection of AMP features  Anyconnect delivery  Private Cloud option for those with high-privacy requirements  For endpoints and networks PC/MAC Mobile Virtual Meraki Soon
  • 69. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 PRODUCTS & TECHNOLOGIES Umbrella Enforcement DNS based security service protects any device, anywhere Investigate Intelligence Discover and predict attacks before they happen OpenDNS Adds to Cisco’s Threat Prevention Portfolio
  • 70. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 Advantages of a DNS-based Solution ANY OPERATING SYSTEM Win, Mac, iOS, Android, Linux, ChromeOS, and even network devices and custom operating systems FAST AND SCALABLE Extremely efficient query/response method SIMPLE TO DEPLOY network’s DHCP tells every connected device where to point DNS
  • 71. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71 Talos is the industry-leading threat intelligence organization. We detect and correlate threats in real time using the largest threat detection network in the world to protect against known and emerging cyber security threats to better protect your organization.
  • 72. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
  • 73. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 Talos Research
  • 74. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74 Cisco Talos Security Intelligence & Research IPS Rules Malware Protection Reputation Feeds Vulnerability Database Updates AEGIS™ Program Private and Public Threat Feeds Sandnets FireAMP™ Community 300,000 detections added per day Honeypots Advanced Microsoft and Industry Disclosures Crete Program 100,000 True Positive Events/Day Snort and ClamAV Open Source Communities File Samples 1,100,000 daily Sandboxing Machine Learning Big Data Infrastructure Threat Grid Community
  • 75. Cisco Confidential 75© 2015 Cisco and/or its affiliates. All rights reserved.
  • 76.
  • 77. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
  • 78. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
  • 79. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79 www.cisco.com/go/vmdc www.cisco.com/go/safe
  • 80.