SlideShare a Scribd company logo
1 of 15
Download to read offline
© 2018 Cisco and/or its affiliates. All rights reserved
Duc Le
Policy, Automation and Analytics
April 2018
How to strengthen DC Security with Cisco Tetration Analytics
Secure Data Center: Building a Secure Zero-Trust Infrastructure
© 2018 Cisco and/or its affiliates. All rights reserved
• How Analytics help in Security
• Tetration Analytics Overview
• Q&A
© 2018 Cisco and/or its affiliates. All rights reserved
I’ve already invested in many security vendors …
Massive ransomware cyber-attack
hits at least 150 countries and
infected 300,000 machines
… But am I safe?
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
National Security Agency(NSA) on securing your assets
1. When protecting your network, you have to know everything that is going
on.
2. Decrease attack surface. Lock down and disable services you are not
using.
3. Identify what is routine in your infrastructure and what is not. Monitor for
deviations.
4. Whitelisting is a must in today’s cyber security world
Usenix Enigma 2016 https://www.youtube.com/watch?v=bDJb8WOJYdA
Rob Joyce, Tailored Access Operations, NSA
https://techtalk.pcpitstop.com/2016/09/07/nsa-best-practices-whitelisting/
https://www.theregister.co.uk/2016/01/28/nsas_top_hacking_boss_explains_how_to_prote
ct_your_network_from_his_minions/
“If you really want to protect your network you have to know your network,
including all the devices and technology in it,” he said. “In many cases we
know networks better than the people who designed and run them.”
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
What if you could actually look at everything in your Data
Center that has ever traversed the network?
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Tetration with Machine Learning answers your Critical
Questions
What’s normal
/Baseline?
What’s going on now
and 6 months ago?
What’s outlier?
Who is talking to who? Real time Whitelist
Policy?
How to enforce policy to
heterogenesis env.?
How to reduce MTTI?
How I know unused
port/unpatched package?
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Application
Insight
Process
Inventory
Visibility and
Forensics
Cisco Tetration Platform
Security Use Cases
Cisco Tetration™
Platform
Foundation
Segmentation
Advanced Security
White-list Policy Policy
Compliance
Application
Segmentation
Process
Security
Software Inventory
Baseline
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Introducing Tetration
APPLICATION
INSIGHT
FLOW SEARCH
& FORENSICS
SEGMENTATION
& COMPLIANCE
v
Open Access
Web Rest API Event Bus Lab
Billions of Events
Meta-Data generated
from every packet
Software & Network Sensors: See everything
OS Sensor
Windows
Linux
Mid-Range
Universal
Network Sensor
Cloud-Scale Nexus
Nexus 9000 ‘X’
Data Analytics & Machine Learning Engine
Analytics Cluster
Appliance model
On-Premise or Cloud
▸ Ingest
▸ Store
▸ Analyse
▸ Learn
▸ Simulate
▸ Act
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco Tetration analytics data sources
Main features
 Low CPU overhead (SLA enforced)
 Low network overhead
 New Enforcement point (software agents)
 Highly secure (code signed and authenticated)
 Every flow (no sampling) and no payload
*Note: Available for POC/Trail purposes only
Software sensors
Linux servers
(virtual machine and bare metal)
Windows servers
(virtual machines and bare metal)
Windows Desktop VM
(virtual desktop infrastructure only)
Cisco Nexus 9300 EX
Cisco Nexus 9300 FX
Network sensors
Next-generation Cisco Nexus® Series Switches
Other Sensors
Other types of sensorsAvailable today
Container Host
(Host OS – Linux Based)
ERSPAN Sensor
Netflow Sensor*
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Tetration Analytics: Deployment Options
Cisco Tetration Analytics
(Large Form Factor)
• Suitable for deployments
more than 5000 workloads
• Built in redundancy
• Scales up to 25,000
workloads
Includes:
• 36 x UCS
C-220 servers
• 3 x Nexus
9300 switches
Cisco Tetration-M (Small
Form Factor)
• Suitable for deployments
under 5000 workloads
Includes:
• 6 x UCS C-220 servers
• 2 x Nexus 9300 switches
Cisco Tetration Cloud
• Software deployed in AWS
• Suitable for deployments
under 1000 workloads
• AWS instance owned by
customer
On-Premise Options Public Cloud
Amazon Web
Services
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Tetration Use Cases
Digital
Transformation
SDN & Cloud
Adoption
Mergers &
Acquisitions
Hybrid
IT
De-Risk
Change
Cost Visibility
& Reduction
High Availability
Operations
Cyber
Hardening
Forensics Compliance
Technology and Business Transformation
Secure Cloud+DC Operational ExcellencePartnering with Cisco Security
© 2018 Cisco and/or its affiliates. All rights reserved
CISCO CONNECT 2018 . IT’S ALL YOU
Cisco Tetration Analytics: Ecosystem
Service visibility Layer 4-7 services integration
Security orchestration Service assurance
Insight exchange
Cisco Tetration
Analytics™
[Cisco Connect 2018 - Vietnam] Anh duc le   building a secure data center

More Related Content

What's hot

Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveEric Vanderburg
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki NetworkCollaborators
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website Blockchain Council
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...Nur Shiqim Chok
 
AWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAmazon Web Services
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeJoAnna Cheshire
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...African Cyber Security Summit
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
From Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot DataFrom Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot DataDefCamp
 
Cisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network IntutiveCisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network IntutiveNetworkCollaborators
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE - ATT&CKcon
 
Preventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero TrustPreventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero TrustSara Goodison
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNorth Texas Chapter of the ISSA
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudBitglass
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNorth Texas Chapter of the ISSA
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 

What's hot (20)

Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki Cisco Connect 2018 Vietnam - Cisco meraki
Cisco Connect 2018 Vietnam - Cisco meraki
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
What is a blockchain api how can you integrate in your website
What is a blockchain api  how can you integrate in your website What is a blockchain api  how can you integrate in your website
What is a blockchain api how can you integrate in your website
 
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...[Cisco Connect 2018 - Vietnam] Jeff chua  hn - print - cisco connect 2018 (ha...
[Cisco Connect 2018 - Vietnam] Jeff chua hn - print - cisco connect 2018 (ha...
 
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...[Cisco Connect 2018 - Vietnam] Jeff chua   hcm print - cisco connect 2018 (hc...
[Cisco Connect 2018 - Vietnam] Jeff chua hcm print - cisco connect 2018 (hc...
 
AWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at Scale
 
Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
From Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot DataFrom Mirai to Monero – One Year’s Worth of Honeypot Data
From Mirai to Monero – One Year’s Worth of Honeypot Data
 
Cisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network IntutiveCisco Connect 2018 Indonesia - The Network Intutive
Cisco Connect 2018 Indonesia - The Network Intutive
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
MITRE ATT&CKcon 2.0: ATT&CK Updates - Cyber Analytics Repository (CAR); Ivan ...
 
Preventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero TrustPreventing Data Cloud Breaches with Zero Trust
Preventing Data Cloud Breaches with Zero Trust
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 

Similar to [Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center

Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...Cisco Canada
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsRobb Boyd
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connectNur Shiqim Chok
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPROIDEA
 
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloudNur Shiqim Chok
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Canada
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitiveCisco Canada
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...NetworkCollaborators
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Canada
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internetRony Melo
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...NetworkCollaborators
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsRobb Boyd
 

Similar to [Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center (20)

Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
 
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect[Cisco Connect 2018 - Vietnam] Eric rennie  sw cisco_connect
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud
[Cisco Connect 2018 - Vietnam] Joseph yap journey to the multi cloud
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Cisco connect winnipeg 2018 introducing the network intuitive
Cisco connect winnipeg 2018   introducing the network intuitiveCisco connect winnipeg 2018   introducing the network intuitive
Cisco connect winnipeg 2018 introducing the network intuitive
 
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...Cisco Connect 2018 Indonesia -  software-defined access-a transformational ap...
Cisco Connect 2018 Indonesia - software-defined access-a transformational ap...
 
Cisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev netCisco Connect Ottawa 2018 dev net
Cisco Connect Ottawa 2018 dev net
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational Insights
 

More from Nur Shiqim Chok

[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_diveNur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Long ton dc pss hyper flex
[Cisco Connect 2018 - Vietnam] Long ton dc pss  hyper flex[Cisco Connect 2018 - Vietnam] Long ton dc pss  hyper flex
[Cisco Connect 2018 - Vietnam] Long ton dc pss hyper flexNur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4Nur Shiqim Chok
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...
[Cisco Connect 2018 - Vietnam] 3. rajinder singh   cisco sd-wan-next generati...[Cisco Connect 2018 - Vietnam] 3. rajinder singh   cisco sd-wan-next generati...
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] 1. lam doan introducing cisco dna assurance-...
[Cisco Connect 2018 - Vietnam] 1. lam doan   introducing cisco dna assurance-...[Cisco Connect 2018 - Vietnam] 1. lam doan   introducing cisco dna assurance-...
[Cisco Connect 2018 - Vietnam] 1. lam doan introducing cisco dna assurance-...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Yedu s. cisco cmx
[Cisco Connect 2018 - Vietnam] Yedu s.   cisco cmx[Cisco Connect 2018 - Vietnam] Yedu s.   cisco cmx
[Cisco Connect 2018 - Vietnam] Yedu s. cisco cmxNur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] Thuy luong hcm welcome & opening address
[Cisco Connect 2018 - Vietnam] Thuy luong hcm   welcome & opening address[Cisco Connect 2018 - Vietnam] Thuy luong hcm   welcome & opening address
[Cisco Connect 2018 - Vietnam] Thuy luong hcm welcome & opening addressNur Shiqim Chok
 

More from Nur Shiqim Chok (20)

[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
[Cisco Connect 2018 - Vietnam] Satit adirek hn under_the_hood_sdwan deep_dive
 
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...[Cisco Connect 2018 - Vietnam] Rajinder singh   cisco sd-wan-next generation ...
[Cisco Connect 2018 - Vietnam] Rajinder singh cisco sd-wan-next generation ...
 
[Cisco Connect 2018 - Vietnam] Long ton dc pss hyper flex
[Cisco Connect 2018 - Vietnam] Long ton dc pss  hyper flex[Cisco Connect 2018 - Vietnam] Long ton dc pss  hyper flex
[Cisco Connect 2018 - Vietnam] Long ton dc pss hyper flex
 
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...[Cisco Connect 2018 - Vietnam] Lam doan   software-defined access-a transform...
[Cisco Connect 2018 - Vietnam] Lam doan software-defined access-a transform...
 
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
 
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
[Cisco Connect 2018 - Vietnam] Huyen duong hn_cisco aci_delivering intent for...
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...
[Cisco Connect 2018 - Vietnam] 3. rajinder singh   cisco sd-wan-next generati...[Cisco Connect 2018 - Vietnam] 3. rajinder singh   cisco sd-wan-next generati...
[Cisco Connect 2018 - Vietnam] 3. rajinder singh cisco sd-wan-next generati...
 
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...[Cisco Connect 2018 - Vietnam] 2. lam doan   software-defined access-a transf...
[Cisco Connect 2018 - Vietnam] 2. lam doan software-defined access-a transf...
 
[Cisco Connect 2018 - Vietnam] 1. lam doan introducing cisco dna assurance-...
[Cisco Connect 2018 - Vietnam] 1. lam doan   introducing cisco dna assurance-...[Cisco Connect 2018 - Vietnam] 1. lam doan   introducing cisco dna assurance-...
[Cisco Connect 2018 - Vietnam] 1. lam doan introducing cisco dna assurance-...
 
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
 
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...
[Cisco Connect 2018 - Vietnam] Vib nang cap ha tang cntt san sang cho chuyen ...
 
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 30 min hcmc cisco connect 2018
 
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...
[Cisco Connect 2018 - Vietnam] Shamil fernando hcmc next-gen cisco sd-wan (vi...
 
[Cisco Connect 2018 - Vietnam] Yedu s. cisco cmx
[Cisco Connect 2018 - Vietnam] Yedu s.   cisco cmx[Cisco Connect 2018 - Vietnam] Yedu s.   cisco cmx
[Cisco Connect 2018 - Vietnam] Yedu s. cisco cmx
 
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018
[Cisco Connect 2018 - Vietnam] Vib 15 min hn cisco connect 2018
 
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
[Cisco Connect 2018 - Vietnam] Trung nguyen and an le demo security everywher...
 
[Cisco Connect 2018 - Vietnam] Thuy luong hcm welcome & opening address
[Cisco Connect 2018 - Vietnam] Thuy luong hcm   welcome & opening address[Cisco Connect 2018 - Vietnam] Thuy luong hcm   welcome & opening address
[Cisco Connect 2018 - Vietnam] Thuy luong hcm welcome & opening address
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

[Cisco Connect 2018 - Vietnam] Anh duc le building a secure data center

  • 1. © 2018 Cisco and/or its affiliates. All rights reserved
  • 2. Duc Le Policy, Automation and Analytics April 2018 How to strengthen DC Security with Cisco Tetration Analytics Secure Data Center: Building a Secure Zero-Trust Infrastructure
  • 3. © 2018 Cisco and/or its affiliates. All rights reserved • How Analytics help in Security • Tetration Analytics Overview • Q&A
  • 4. © 2018 Cisco and/or its affiliates. All rights reserved I’ve already invested in many security vendors …
  • 5. Massive ransomware cyber-attack hits at least 150 countries and infected 300,000 machines … But am I safe?
  • 6. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU National Security Agency(NSA) on securing your assets 1. When protecting your network, you have to know everything that is going on. 2. Decrease attack surface. Lock down and disable services you are not using. 3. Identify what is routine in your infrastructure and what is not. Monitor for deviations. 4. Whitelisting is a must in today’s cyber security world Usenix Enigma 2016 https://www.youtube.com/watch?v=bDJb8WOJYdA Rob Joyce, Tailored Access Operations, NSA https://techtalk.pcpitstop.com/2016/09/07/nsa-best-practices-whitelisting/ https://www.theregister.co.uk/2016/01/28/nsas_top_hacking_boss_explains_how_to_prote ct_your_network_from_his_minions/ “If you really want to protect your network you have to know your network, including all the devices and technology in it,” he said. “In many cases we know networks better than the people who designed and run them.”
  • 7. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU What if you could actually look at everything in your Data Center that has ever traversed the network?
  • 8. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Tetration with Machine Learning answers your Critical Questions What’s normal /Baseline? What’s going on now and 6 months ago? What’s outlier? Who is talking to who? Real time Whitelist Policy? How to enforce policy to heterogenesis env.? How to reduce MTTI? How I know unused port/unpatched package?
  • 9. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Application Insight Process Inventory Visibility and Forensics Cisco Tetration Platform Security Use Cases Cisco Tetration™ Platform Foundation Segmentation Advanced Security White-list Policy Policy Compliance Application Segmentation Process Security Software Inventory Baseline
  • 10. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Introducing Tetration APPLICATION INSIGHT FLOW SEARCH & FORENSICS SEGMENTATION & COMPLIANCE v Open Access Web Rest API Event Bus Lab Billions of Events Meta-Data generated from every packet Software & Network Sensors: See everything OS Sensor Windows Linux Mid-Range Universal Network Sensor Cloud-Scale Nexus Nexus 9000 ‘X’ Data Analytics & Machine Learning Engine Analytics Cluster Appliance model On-Premise or Cloud ▸ Ingest ▸ Store ▸ Analyse ▸ Learn ▸ Simulate ▸ Act
  • 11. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Cisco Tetration analytics data sources Main features  Low CPU overhead (SLA enforced)  Low network overhead  New Enforcement point (software agents)  Highly secure (code signed and authenticated)  Every flow (no sampling) and no payload *Note: Available for POC/Trail purposes only Software sensors Linux servers (virtual machine and bare metal) Windows servers (virtual machines and bare metal) Windows Desktop VM (virtual desktop infrastructure only) Cisco Nexus 9300 EX Cisco Nexus 9300 FX Network sensors Next-generation Cisco Nexus® Series Switches Other Sensors Other types of sensorsAvailable today Container Host (Host OS – Linux Based) ERSPAN Sensor Netflow Sensor*
  • 12. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Tetration Analytics: Deployment Options Cisco Tetration Analytics (Large Form Factor) • Suitable for deployments more than 5000 workloads • Built in redundancy • Scales up to 25,000 workloads Includes: • 36 x UCS C-220 servers • 3 x Nexus 9300 switches Cisco Tetration-M (Small Form Factor) • Suitable for deployments under 5000 workloads Includes: • 6 x UCS C-220 servers • 2 x Nexus 9300 switches Cisco Tetration Cloud • Software deployed in AWS • Suitable for deployments under 1000 workloads • AWS instance owned by customer On-Premise Options Public Cloud Amazon Web Services
  • 13. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Tetration Use Cases Digital Transformation SDN & Cloud Adoption Mergers & Acquisitions Hybrid IT De-Risk Change Cost Visibility & Reduction High Availability Operations Cyber Hardening Forensics Compliance Technology and Business Transformation Secure Cloud+DC Operational ExcellencePartnering with Cisco Security
  • 14. © 2018 Cisco and/or its affiliates. All rights reserved CISCO CONNECT 2018 . IT’S ALL YOU Cisco Tetration Analytics: Ecosystem Service visibility Layer 4-7 services integration Security orchestration Service assurance Insight exchange Cisco Tetration Analytics™