SlideShare una empresa de Scribd logo
1 de 71
Descargar para leer sin conexión
1
#TEUNOsummit
2
#TEUNOsummit
CONOZCA MAS SOBRE NOSOTROS
3
#TEUNOsummit
NUESTRAS SOLUCIONES TIC
4
#TEUNOsummit
ALGUNOS DE NUESTROS CLIENTES
5
#TEUNOsummit
6
#TEUNOsummit
• Ataques actuales: Wanna Cry, Vulnerabilidades, DDOS, Brikerbot
(IoT), Ataque web Ejercito Argentina, APT, etc.
• Motivos de ataque: político, personal, remuneración.
• Como realizar un ataque?
• Como respondo al ataque?
• Como aprendo del ataque?
• He capacitado a mis usuarios en seguridad?
6
Ataques 2017
7
#TEUNOsummit
No se necesita ser un experto!
7
• Compro Bitcoins ($2747,00) / Etherum ($346,00)
• Compro el ataque.
• Ejecutan el ataque.
• Recibo información de la efectividad ataque.
8
#TEUNOsummit 8
Resultados !
9
#TEUNOsummit
Resultados !
10
#TEUNOsummit
Resultados !
11
#TEUNOsummit
12
#TEUNOsummit
Security
Analytics
Threat
Intelligence
Mobile
Cloud
Mobile
Cloud
Security
Analytics
Threat
Intelligence
Inteligencia
de
seguridad
Anomaly dtection
Vulnerability management Incident response
Log, flow, data analysis
13
#TEUNOsummit
OBSERVAR ORIENTAR
ACTUAR DECIDIR
• Observar todos los
ángulos.
• Aplicar priorizaciones
basada en inteligencia de
amenazas.
• Afinamiento continuo de
herramientas
• Implementación rápida de
remediación en activos
afectados
• Revisión y actualización
de políticas de seguridad
• Revisión y ajuste de
controles de monitoreo
con las lecciones
aprendidas
• Determinar el alcance e
impacto del ataque basado en
inteligencia.
• Revisión en contexto de
actividad de la red para
establecer una línea de tiempo
• Investigar la fuente del ataque
y la inteligencia que permita
tomar decisiones
• Determinar el siguiente
paso en responder al
incidente
• Revisión de los detalles
del active para priorizar la
respuesta
• Documentar tácticas de
remediación para los
activos afectados
RESPUESTA A
INCIDENTES
14
#TEUNOsummit
15
#TEUNOsummit
16
#TEUNOsummit
17
#TEUNOsummit
© 2014 Cisco and/or its affiliates. All rights reserved.
19
#TEUNOsummit
Cisco Meraki: a complete cloud-managed networking solution
-Wireless, switching, security, and MDM, centrally managed over the
web
-Built from the ground up for cloud management
-Integrated hardware, software, and cloud services
Leader in cloud-managed networking
-Tens of thousands of customers across all industries, over 100%
annual growth
-Operating in the cloud since 2006
Recognized for innovation
-Gartner Magic Quadrant, InfoWorld Technology of the Year, CRN
Coolest Technologies
Trusted by thousands of customers worldwide:
© 2014 Cisco and/or its affiliates. All rights reserved. 20
Why cloud managed
networking?
21
#TEUNOsummit
• Turnkey installation and management
• Integrated, always up to date features
• Scales from small branches to large networks
• Reduces operational costs
Manageability Scalability Cost Savings
© 2014 Cisco and/or its affiliates. All rights reserved. 22
Bringing the cloud to enterprise networks
Cisco Meraki MR
Wireless LAN
Cisco Meraki MX
Security Appliances
Cisco Meraki MS
Ethernet Switches
Cisco Meraki SM
Mobile Device
Management
23
#TEUNOsummit
1 billion iOS &
Android devices
Integrated
mobile device
management
HD video and
rich media
Layer 7
application
shaping
New business
opportunities
Analytics
and user
engagement
A complete solution out of the-box:
No extra hardware, software, or complexity
© 2014 Cisco and/or its affiliates. All rights reserved. 24
Cloud architecture
25
#TEUNOsummit
• Secure out-of-band
management: No user traffic
flows through the cloud
• Reliable: Network stays up if
connection to cloud is lost
• Scalable: Supporting customers
with thousands of sites, millions of
clients
• Future-proof: New features
delivered seamlessly from the
cloud
26
#TEUNOsummit
Wired +
wireless
Client
fingerprints
Application
QoS
Instant
search
Location
analytics
Real-time
control
27
#TEUNOsummit
User/device fingerprinting
Application firewall
Content filtering
Network access control WAN optimization
Mobile application deployment
© 2014 Cisco and/or its affiliates. All rights reserved. 28
Solution highlights
29
#TEUNOsummit
Centralized cloud
management scales to
thousands of sites
Multi-site visibility and control Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring and alerts
Zero-touch provisioning Devices automatically provision from the cloud, no staging required; self-configuring site-to-site VPN
Traffic acceleration WAN optimization and web caching accelerates and de-duplicates network traffic; application-aware QoS
prioritizes productivity apps
30
#TEUNOsummit
RF optimization and
application-aware QoS for
high-throughput, high-density
WLAN
Layer 7 application traffic
shaping
Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user and group-based
shaping rules
Cloud-base RF optimization Dynamically avoid interference, optimizing channel selection and power levels
Density-optimized WLAN RF platform tuned for airtime fairness and performance in dense performance-critical environments
31
#TEUNOsummit
Out-of-the-box security,
management, and
capacity for BYOD-ready
deployments
Device-aware security Device-aware firewall and access control; Antivirus scan; LAN isolation;
Bonjour Gateway; Content and security filtering
Integrated MDM Enforce encryption, passcodes, and device restrictions; Deploy enterprise applications; Remotely lock or
wipe devices
Simplified onboarding Flexible authentication with AD integration, SMS authentication, hosted splash pages, and automatic MDM
enrollment
32
#TEUNOsummit
Built-in location
analytics
dashboard
Optimize marketing and
business operations
Analyze capture rate, dwell time, and new / repeat visitors to measure advertising, promotions, site
utilization, etc.
Built-in analytics Integrated into WLAN, no extra sensors, appliances, or software
Extensible API Integrate location data with CRM, loyalty programs, and custom applications for targeted real-time
offers
33
#TEUNOsummit
Flexible built-in
authentication
mechanisms
Flexible authentication Secure 802.1x and Active Directory authentication; Facebook Authentication for branding and targeted
social marketing; SMS self-service authentication, Lobby Ambassador, and hosted sign-on splash pages
Dynamic access control Assign clients layer 3-7 firewall rules, VLANs, and application-aware quality of service by identity, group,
location, or device type
34
#TEUNOsummit
Enterprise-class security features
for security-conscious
environments
Air Marshal WIDS/WIPS Detect wireless attacks; contain rogue APs; cloud-based alerting and diagnostics
User and device aware
security
User, device, and group-based firewall rules (layer 3-7) with
Active Directory integration
Complete NG firewall and
content security
Application firewall; content filtering matching 1B+ URLs; antivirus / antimalware filtering; Google safe-
search
© 2014 Cisco and/or its affiliates. All rights reserved. 35
Case studies
36
#TEUNOsummit
• Wireless LAN spanning over 270 restaurants
nationwide
• Customer engagement through guest access,
coupons, promotions
• PCI-compliant solution enables mobile POS
• Restaurants centrally managed over the web
• Deployed without pre-staging or on-site IT
“The Meraki Dashboard makes it easy to manage the WiFi across all the restaurants, and we have
the visibility we wanted.”
Leslie McMasters, Network Administrator, Apple American Group
37
#TEUNOsummit
• California school district with 14 schools,
10,000 students
• Deployed cloud-managed firewall, 500
wireless APs (indoor + outdoor), and 100
Ethernet switches
• Enabled 1:1 Google Chromebook
deployment and BYOD policy
• Application visibility and control
optimizes bandwidth across 10k+ clients
“The Dashboard, the traffic shaping, and the MDM were real advantages. We can see the traffic
and devices on the fly.”
Chin Song, Director of Technology, Milpitas Unified School District
38
#TEUNOsummit
• Healthcare and services provider with 5,000
employees, 40 facilities across 11 states
• Deployed 350 cloud-managed wireless APs,
switches, and security appliances
• HIPAA-compliant WiFi for electronic medical
records and guest access
• Centrally managed by small IT staff
“The Meraki solution has provided us with a secure, centrally managed distributed network.”
Daniel McDonald, Systems Integration Manager, Mosaic
© 2014 Cisco and/or its affiliates. All rights reserved. 39
Product Families
40
#TEUNOsummit
Feature
highlights
BYOD policies
Application traffic shaping
Guest access
Enterprise security
WIDS / WIPS
Mesh routing
6 models including indoor/outdoor, high performance (802.11ac) and value-priced
Enterprise-class silicon including PoE, voice/video optimization
Lifetime warranty on indoor APs
41
#TEUNOsummit
Feature highlights
Zero-touch site-to-site VPN
WAN optimization
NG firewall
Content filtering
WAN link bonding
Intrusion detection/prevention
6 models scaling from small branch to large campus
Complete networking and security in a single appliance
42
#TEUNOsummit
Feature
highlights
Zero-touch site to site VPN
WAN optimization
NG firewall
Content filtering
WAN link bonding
Intrusion detection/prevention
6 models scaling from small branch to campus / datacenter
Complete networking and security in a single appliance
43
#TEUNOsummit
Gigabit access switches in 8, 24, and 48 port configurations, PoE available on all
ports
10 Gigabit SFP+ aggregation switches in 24 and 48 port configurations
Enterprise-class performance and reliability including non-blocking performance,
voice/video QoS, and a lifetime warranty
Voice and video QoS
Layer 7 app visibility
Virtual stacking
PoE / PoE + on all ports
Remote packet capture, cable
testing
Feature
highlights
44
#TEUNOsummit
Scalable
- Unlimited throughput, no bottlenecks
- Add devices or sites in minutes
Reliable
- Highly available cloud with multiple datacenters
- Network functions even if connection to cloud is interrupted
- 99.99% uptime SLA
Secure
- No user traffic passes through cloud
- Fully HIPAA / PCI compliant (level 1 certified)
- 3rd party security audits, daily penetration testing
- Automatic firmware and security updates (user-scheduled)
Reliability and security information at meraki.cisco.com/trust
Management
data (1 kb/s)
WAN
45
#TEUNOsummit
Device Management controls iOS, Android, Mac, and Windows devices
Cloud-based: no on-site appliances or software, works with any vendor’s network
Free: available at no cost to any organization, sign up at meraki.cisco.com/sm
Feature
highlights
Centralized app deployment
Device security
Rapid provisioning
Backpack™ file sharing
Asset management
46
#TEUNOsummit
• Try Meraki on your network
• Sets up in 15 minutes
• Technical support available at no cost
Free trials available at meraki.cisco.com/eval
Thank you.
48
#TEUNOsummitFranklin	Pilapanta,	Te Uno,		Preventa Microsoft
49
#TEUNOsummit
Números en este momento
750
millón
194 billón
188 billón
340 billón
>90%
De la lista Fortune
500 usa Microsoft
Cloud
50
#TEUNOsummit
Transformación	
Digital
51
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
52
#TEUNOsummit
Previene
Detecta
Responde
53
#TEUNOsummit
HIPAA	/	
HITECH	Act
Moderate
JAB	P-ATO
FIPS	140-2
FERPA
DoD	DISA
SRG	Level	2
ITAR CJIS
GxP
21	CFR	Part	11
IRS	1075Section	
508	VPAT
ISO	27001 SOC	1
Type	2
ISO	27018 CSA	STAR
Self-Assessment
Singapore
MTCS
UK	
G-Cloud
Australia
IRAP/CCSL
FISC
Japan
China
DJCP
New	
Zealand	
GCIO
China
GB	18030
EU
Model	Clauses
ENISA
IAF
Argentina	
PDPA
Japan	CS	
Mark	Gold
SP	800-171
China
TRUCS
Spain
ENS
PCI	DSS
Level	1
CDSA Shared
Assessments
MPAA
Japan	
My
Number	
Act
FACT
UK
High
JAB	P-ATO
GLBA
DoD	DISA
SRG	Level	4
MARS-E FFIEC
ISO	27017 SOC	2
Type	2
SOC	3
India
MeitY
Canada
Privacy
Laws
Privacy
Shield
ISO	22301
Germany	IT
Grundschutz
workbook
Spain
DPA
CSA	STAR
Certification
CSA	STAR
Attestation
HITRUST IG	Toolkit
UK
La nube más confiable y compatible
GLOBALUS	GOVINDUSTRIAREGIONAL
54
#TEUNOsummit
Retos de hoy
Entre la innovación empresarial y los requisitos de seguridad cibernética
Innovación Empresarial
55
#TEUNOsummit
Partner de Seguridad
Amplio ecosistema de soluciones de socios
56
#TEUNOsummit
Privacidad de Datos
• Cumplimiento y certificados con estándares de privacidad
a nivel mundial
Más información de certificación está
disponible en la Azure Trust Center.
Microsoft	Azure
ISO/IEC 27018 ü
SAS 70/ SSAE / SOC 1 / SOC 2 ü
FedRAMP ü
HIPAA BAA ü
EU-Model Clauses / Safe
Harbor
ü
UK G-Cloud/IL2 ü
PCI DSS ü
57
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
58
#TEUNOsummit
Crear	y	
ejecutar	
soluciones	de	
código	abierto
Implementar	la	
nube	en	
on-premises
Identidad	
consistente,	
aplicaciones,	
datos	y	gestión
59
#TEUNOsummit
60
#TEUNOsummit
Azure	Active	
Directory
SQL	ServerActive	
Directory
Azure	
data	services
Azure	services
Azure	Stack
Azure	administración	y	
seguridad
Una	sola	
Identidad
Gestión	
Integrada	de	
Seguridad
Plataforma	de	
datos	
coherente
Desarrollo	
Unificado	y	
DevOps
Infraestructura
On-premises
Nube
On-Premises
61
#TEUNOsummit
Azure	Site
Recovery
Azure	
StorSimple
SQL	Server	
Stretch DB
Azure	Active	
Directory
App	Service
Web	|	Mobile	
Logic Apps	|	API	Apps
Azure	
Backup Operations
Management	
Suite
NubeUsuarios
Datos Administración
Apps
Infrastructure
62
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
63
#TEUNOsummit
64
#TEUNOsummit
Abierto	e	Hibrido
Inteligencia	impulsada	por	datos
Confiable
Innovación	de	App
65
#TEUNOsummit
Apoyar la
estrategia de
negocio con
información
Aprender con
inteligencia
artificial
Predecir y
responder
proactivament
e
66
#TEUNOsummit
Datos	
Tradicionales
Datos	Web
Big	data
67
#TEUNOsummit
Recuperación
Organizar	la	reparación	de	sus	aplicaciones	para	una	
recuperación	de	desastres	simplificada
Mejore	los	Objetivos	de	Tiempo	de	Recuperación	(RTO)	y	
los	Objetivos	de	Recuperación	(RPO)	para	las	
interrupciones	planificadas	y	no	planificadas
Lograr	instrucciones	de	recuperación	de	desastres	de	
impacto	cero
Minimizar	errores	de	aplicación	y	pérdida	de	datos	con	
puntos	de	recuperación	de	aplicaciones	consistentes
Replicación	para	entornos	heterogéneos:	Hyper-V,	
VMware y	dispositivos	físicos
Azure
68
#TEUNOsummit
Economía de escala ▪ Escalamiento ágil ▪ Pago por uso
Azure Fortalezas
69
#TEUNOsummit
Socio de Negocios estratégicos
*operated by 21Vianet	
Chicago
Cheyenne
Dublin
Amsterdam
Hong	Kong
Singapore
Japan
San	Antonio
Boydton
Shanghai*
Quincy
Des	Moines
Brazil
Australia
Beijing*
70
#TEUNOsummit
Confianza de grandes cadenas empresariales
70
TEUNO Summit - Presentaciones

Más contenido relacionado

La actualidad más candente

IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watsonPrime Infoserv
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleDavid Fuchs
 
Complete Security
Complete SecurityComplete Security
Complete SecuritySophos
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker dsIvanti
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlAruj Thirawat
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...CSA Argentina
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTForescout Technologies Inc
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your SchoolSophos
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security Tripwire
 

La actualidad más candente (20)

Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Sprite guard on line brochure
Sprite guard on line brochureSprite guard on line brochure
Sprite guard on line brochure
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
Complete Security
Complete SecurityComplete Security
Complete Security
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Throughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security ControlThroughwave Day 2015 - ForeScout Automated Security Control
Throughwave Day 2015 - ForeScout Automated Security Control
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...Csa summit   cualquier aplicación, desde cualquier dispositivo, en cualquier ...
Csa summit cualquier aplicación, desde cualquier dispositivo, en cualquier ...
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
BYOD - Protecting Your School
BYOD - Protecting Your SchoolBYOD - Protecting Your School
BYOD - Protecting Your School
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 

Similar a TEUNO Summit - Presentaciones

NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfPhilSmith165
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-WebGiovanni Maree
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiRowell Dionicio
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Marketing Team
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksNTS UK - Part of Capita
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration Chris Cavallo
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar a TEUNO Summit - Presentaciones (20)

NVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdfNVIS-Pitch Deck version 6 - 2022 MAR.pdf
NVIS-Pitch Deck version 6 - 2022 MAR.pdf
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Genesys-2-Brochure-Web
Genesys-2-Brochure-WebGenesys-2-Brochure-Web
Genesys-2-Brochure-Web
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus Businessday okt 2016 - Xirrus
Businessday okt 2016 - Xirrus
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 

Más de TEUNO

Principales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasPrincipales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasTEUNO
 
¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?TEUNO
 
Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017TEUNO
 
9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según GarnerTEUNO
 
Seguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasSeguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasTEUNO
 
Complejidad en infraestructura TI
Complejidad en infraestructura TI Complejidad en infraestructura TI
Complejidad en infraestructura TI TEUNO
 
La complejidad de las redes
La complejidad de las redesLa complejidad de las redes
La complejidad de las redesTEUNO
 
¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?TEUNO
 
El ingeniero de red
El ingeniero de redEl ingeniero de red
El ingeniero de redTEUNO
 
Backup en la nube
Backup en la nubeBackup en la nube
Backup en la nubeTEUNO
 
Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. TEUNO
 
Cableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoCableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoTEUNO
 
Guía de supervivencia contra ataques web
Guía de supervivencia contra ataques webGuía de supervivencia contra ataques web
Guía de supervivencia contra ataques webTEUNO
 
5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nubeTEUNO
 
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la VideoconferenciaTEUNO
 
Evolución de la SIEM moderna
Evolución de la SIEM modernaEvolución de la SIEM moderna
Evolución de la SIEM modernaTEUNO
 
3 pasos para proteger su oficina
3 pasos para proteger su oficina3 pasos para proteger su oficina
3 pasos para proteger su oficinaTEUNO
 
Cloud computing: usos y beneficios
Cloud computing: usos y beneficiosCloud computing: usos y beneficios
Cloud computing: usos y beneficiosTEUNO
 
Esquema del Cableado Estructurado
Esquema del Cableado EstructuradoEsquema del Cableado Estructurado
Esquema del Cableado EstructuradoTEUNO
 
7 ventajas del outsourcing
7 ventajas del outsourcing7 ventajas del outsourcing
7 ventajas del outsourcingTEUNO
 

Más de TEUNO (20)

Principales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresasPrincipales amenazas en la seguridad de las empresas
Principales amenazas en la seguridad de las empresas
 
¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?¿Cómo funciona la Seguridad Gestionada?
¿Cómo funciona la Seguridad Gestionada?
 
Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017Los trabajos IT más solicitados en el 2017
Los trabajos IT más solicitados en el 2017
 
9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner9 tecnologías que marcarán el 2017 según Garner
9 tecnologías que marcarán el 2017 según Garner
 
Seguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticasSeguridad Informática: Las Mejores prácticas
Seguridad Informática: Las Mejores prácticas
 
Complejidad en infraestructura TI
Complejidad en infraestructura TI Complejidad en infraestructura TI
Complejidad en infraestructura TI
 
La complejidad de las redes
La complejidad de las redesLa complejidad de las redes
La complejidad de las redes
 
¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?¿Cómo funciona el internet satelital?
¿Cómo funciona el internet satelital?
 
El ingeniero de red
El ingeniero de redEl ingeniero de red
El ingeniero de red
 
Backup en la nube
Backup en la nubeBackup en la nube
Backup en la nube
 
Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo. Tendencias claves en la revolución del Espacio de trabajo.
Tendencias claves en la revolución del Espacio de trabajo.
 
Cableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégicoCableado estructurado, un recurso estratégico
Cableado estructurado, un recurso estratégico
 
Guía de supervivencia contra ataques web
Guía de supervivencia contra ataques webGuía de supervivencia contra ataques web
Guía de supervivencia contra ataques web
 
5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube5 Grandes Beneficios de la computación en la nube
5 Grandes Beneficios de la computación en la nube
 
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
7 aspectos que mejoran la calidad de la Telepresencia y la Videoconferencia
 
Evolución de la SIEM moderna
Evolución de la SIEM modernaEvolución de la SIEM moderna
Evolución de la SIEM moderna
 
3 pasos para proteger su oficina
3 pasos para proteger su oficina3 pasos para proteger su oficina
3 pasos para proteger su oficina
 
Cloud computing: usos y beneficios
Cloud computing: usos y beneficiosCloud computing: usos y beneficios
Cloud computing: usos y beneficios
 
Esquema del Cableado Estructurado
Esquema del Cableado EstructuradoEsquema del Cableado Estructurado
Esquema del Cableado Estructurado
 
7 ventajas del outsourcing
7 ventajas del outsourcing7 ventajas del outsourcing
7 ventajas del outsourcing
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

TEUNO Summit - Presentaciones