SlideShare una empresa de Scribd logo
1 de 91
Security Roadshow Chile, Diciembre 2010
Agenda Institucional Logicalis Historia de la Seguridad de la Información Esquemas de redes Presentación Ironport BestPractices
Antonio Díaz Engineering Manager / Chile Institucional Logicalis
Acerca del Grupo Logicalis Proveedor global de soluciones y servicios integrados de Tecnologías de la Información y las Comunicaciones – TIC- con foco en Colaboración, Data Centers, Servicios gerenciados y profesionales. Casa matrizen UK y operaciones en Europa, EstadosUnidos, América Latina y Asia Pacífico*. Ventas mayores a 1.000 millones de dólares. Más de 1.900 empleados en el mundo Más de 6.500 clientes a nivel global: corporativos, de sector público y de telecomunicaciones. Fuertes partnerships globales con empresaslíderes del mercadotecnológico.  * En diciembre de 2009 Logicalis completó la adquisición de NetStar, integrador de sistemas actuando en Taiwan, Hong Kong, Malasia, Australia y Singapur
Grupo Logicalis – Presencia Internacional 5  (1) Ingresos de PLLAL,  joint  venture entre el Grupo Logicalis y Promon S.A.  (2) Representa 6 semanas de facturación en el FY2010 de Logicalis Group.  5
Cobertura en América Latina Joint venture del grupo Logicalis y el grupobrasileñoPromon. Brasil San Pablo Río de Janeiro Brasilia Perú Lima Paraguay Asunción Chile Santiago Uruguay Montevideo Argentina Buenos Aires Córdoba Rosario Oficinas con apertura en FY11
Acerca de Logicalis Southern Cone ,[object Object],      Perú y Uruguay. ,[object Object]
12 años consecutivos como GoldPartner   de Cisco.
Profesionales altamente capacitados y       certificados anualmente ,[object Object],      tecnología líderes.
Certificaciones y Reconocimientos en América Latina  Certificaciones Cisco  - LATAM ,[object Object]
Master UC Specialization
Cisco Authorized SP Video Partner
Cisco Learning Solution Partner
Advanced Data Center Networking Infrastructure
Advanced Data Center Storage Networking
Advanced Routing & Switching
Advanced Security
Advanced Unified Communications
Advanced Wireless LAN
ATP - Cisco TelePresence Satellite
ATP – Data Center Unified Computing Satellite
ATP - Outdoor Wireless Mesh Satellite
ATP – WiMAX Satellite
ATP - Customer Voice Portal
ATP - Unified Contact Center Enterprise
ATP - Video Surveillance
WebEx Commission Pilot Program
Managed Services Certified Partner Advanced
Authorized Managed Services White Label Producer   Reconocimientos 2009 ,[object Object]
LATAM Technology Excellence Partner of the Year – Virtualisation
LATAM Enterprise Partner of the Year
Brasil Technology Excellence Partner of the  Year  Virtualisation
Brasil Service Provider Partner of the Year
Southern Cone Enterprise Partner of the Year2008 ,[object Object],ATP: Authorized Technology Provider ATP: Authorized Technology Provider (Proveedor autorizado para integrar esas soluciones)
Nuestros Partners
Visión y Posicionamiento Business and Technology Working as One PERSONAS PROCESOS INFORMACIÓN Aportar visión de negocios al proceso de toma de decisiones  en el ámbito tecnológico
Proceso con los clientes - Entendimiento de la demanda ,[object Object]
 Visión consultiva del negocio
Mantenimiento 24x7
 Monitoreo
 Resolución de incidentes
Elaboración de arquitectura tecnológica y diseño de soluciones- Ingeniería, Especificación técnica ,[object Object]
 Full operation
 Knowledge transfer
 Training
 Servicios profesionales y técnicos
 Integración e implementación de soluciones- Project management
Nuestras Soluciones y Servicios El portfolio de Logicalis tiene como fin ayudar a nuestros clientes a utilizar la tecnología para acompañar y conducir sus procesos estratégico de negocio, a través de skills avanzados, productos líderes y experiencia comprobada.  BUSINESS & TECHNOLOGY CONSULTING Access and Transport  Technologies Information Security Networks &  Systems Management Networking IT COMMUNICATIONS Collaboration, Voice and Video Data Centers ADVANCED SERVICES Managed Services, Training, Operations and Maintenance
Re-CERTIFIED  2010 Portfolio de Soluciones Communications ,[object Object],Soluciones de colaboración empresarial integradas con herramientas de video, incluyendo video conferencia de alta definición, comunicaciones unificadas, DMS, video vigilancia y otras aplicaciones. ,[object Object],Soluciones para Enterprise, Sector Público y Service Providers, incluyendo LAN, WAN, Metro/Carrier Ethernet y Backbones IP y redes MPLS de alta performance. ,[object Object],Tecnologías de acceso y transporte broadband y ultrabroadband cableado o wireless(incluyendo xDSL, FTTx, PON, WiMAX, DWDM, entre otros)principalmente enfocadas en el mercado de infraestructura de Service Providers
Portfolio de Soluciones IT ,[object Object],Herramientas de protección contra todo tipo de amenazas a la integridad de los datos corporativos, incluyendofirewalls, IPS/IDS, plataformas SIM, protección de DNS y soluciones de autenticación fuerte.  ,[object Object],Plataformas de gestión para Enterprise y Carriers, para red y entorno de infraestructura IT completamente virtualizados, incluyendoCapacity Planning, Inventario, Gestión de Fallas, Soluciones de Performance y Billing/ Mediation. ,[object Object],Soluciones enfocadas en un mejor uso de recursos y una mayor performance, en línea con los conceptos de Green IT y Cloud Computing. Incluyen servidores, herramientas de virtualización, sistemas de almacenamiento, energía y soluciones de infraestructura.
Portfolio de Servicios  ,[object Object],Asesoramiento respecto al impacto de la adopción de tecnología sobre el negocio, basado en modelos y metodologías de referencia estándares de la industria, comoITIL, eTOM, PMBoK. ,[object Object],Servicios gerenciados, outsourcing, operaciones on-site y remotas, capacitación; agregando valor a las organizaciones al permitir que se focalicen en su negocio.
Principales Clientes en la Región ,[object Object]
Ambev (Argentina, Bolivia, Paraguay)
Cargill (Argentina, Paraguay)
Banco Santander (Argentina, Uruguay, Brazil, Chile)
Red Clara (Argentina, Chile, Peru, Mexico, Brazil, Panama)
British Petroleum (Argentina)
Chevron (Argentina)
Ford Motors (Argentina, Chile)
General Electric (Argentina)
Tata Consultancy (Argentina)
Citibank (Argentina, Chile, Paraguay, Perú)
BHP (Chile)
Shell (Chile, Centro America , El salvador, Guatemala, Mexico, Honduras)
Endesa (Chilectra)
Asea Brown Boveri (ABB)
CelulosaArauco
Repsol YPF (Argentina, Peru, Brasil, Chile, Ecuador, Venezuela, Trinidad y Tobago, USA, Canadá)
General Motors (Argentina, Brasil)
Claro (Argentina, Brasil, Chile, Paraguay)
PetrobrasEnergía (Argentina, Brasil, Paraguay, Uruguay, Peru)
Telmex (Argentina, Brasil, Chile)
Telefónica (Argentina, Brasil, Chile, Uruguay, Peru)
HSBC (Argentina, Paraguay, Chile, Peru)
BancoSupervielle (Argentina)
BancoItaú (Argentina, Brasil, Paraguay, Uruguay)
British American Tobacco (Chile)
ArcelorMittal (Argentina)
Oracle (Argentina, Chile)
FIAT (Brasil, Argentina)
Suez Energy Andino
Quintec,[object Object]
Antes de ARPANET: Computadores previos a 1969 ,[object Object]
 Cerrando con llave donde se encontraba la computadora alcanzaba para brindarle seguridad
 Los sistemas eran altamente complejos de operar
 Comenzaron a producirse en 1946
 En 1961 se instaló la primer computadora en Chile, un IBM 1401 para el servicio de Aduanas de Valparaiso18
ARPANET: sus comienzos en 1969 ,[object Object]
 Inicialmente conecto a las universidades de Stanford, Utah, UC Los Angeles y UC Santa Barbara (4 nodos)
En 1981 tenía 213 nodos
Con estas primeras conexiones, surgió la necesidad de controlar las mismas. Por ello se comenzó a utilizar un equipo llamado Firewall ,[object Object]

Más contenido relacionado

La actualidad más candente

Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...
Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...
Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...Foro Global Crossing
 
Presentación comercial 2016
Presentación comercial 2016 Presentación comercial 2016
Presentación comercial 2016 RETO
 
Comunicaciones unificadas de Nortel
Comunicaciones unificadas de NortelComunicaciones unificadas de Nortel
Comunicaciones unificadas de NortelSebastian Xamena
 
Empresas y Personajes Relevantes en la Informática
Empresas y Personajes Relevantes en la Informática Empresas y Personajes Relevantes en la Informática
Empresas y Personajes Relevantes en la Informática amigosgrupono5
 
Rab0801.Congreso Unal.Aplicaciones Ngn.Presentacion
Rab0801.Congreso Unal.Aplicaciones Ngn.PresentacionRab0801.Congreso Unal.Aplicaciones Ngn.Presentacion
Rab0801.Congreso Unal.Aplicaciones Ngn.Presentacionantojv18
 
Informe. La sociedad en red. Edición 2012.
Informe. La sociedad en red. Edición 2012.Informe. La sociedad en red. Edición 2012.
Informe. La sociedad en red. Edición 2012.Alfredo Alday
 
Cisco system
Cisco systemCisco system
Cisco systemAngel
 
Sbpg april 2012_0427
Sbpg april 2012_0427Sbpg april 2012_0427
Sbpg april 2012_0427Mario Zamora
 
Diode Comunicaciones 2012
Diode Comunicaciones 2012Diode Comunicaciones 2012
Diode Comunicaciones 2012David Tajuelo
 
NetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_TelecomNetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_TelecomCristiano Ferraz
 

La actualidad más candente (17)

Portafolio Desysweb 2020
Portafolio Desysweb 2020Portafolio Desysweb 2020
Portafolio Desysweb 2020
 
Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...
Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...
Evaluación de Casos: Red Corporativa, grupo de Empresas Madeco, por Gabriel M...
 
Presentación comercial 2016
Presentación comercial 2016 Presentación comercial 2016
Presentación comercial 2016
 
Comunicaciones unificadas de Nortel
Comunicaciones unificadas de NortelComunicaciones unificadas de Nortel
Comunicaciones unificadas de Nortel
 
Empresas y Personajes Relevantes en la Informática
Empresas y Personajes Relevantes en la Informática Empresas y Personajes Relevantes en la Informática
Empresas y Personajes Relevantes en la Informática
 
Portafolio Desysweb 2020
Portafolio Desysweb 2020Portafolio Desysweb 2020
Portafolio Desysweb 2020
 
Rab0801.Congreso Unal.Aplicaciones Ngn.Presentacion
Rab0801.Congreso Unal.Aplicaciones Ngn.PresentacionRab0801.Congreso Unal.Aplicaciones Ngn.Presentacion
Rab0801.Congreso Unal.Aplicaciones Ngn.Presentacion
 
Cisco Systems
Cisco SystemsCisco Systems
Cisco Systems
 
Presentacion+cisco
Presentacion+ciscoPresentacion+cisco
Presentacion+cisco
 
Informe. La sociedad en red. Edición 2012.
Informe. La sociedad en red. Edición 2012.Informe. La sociedad en red. Edición 2012.
Informe. La sociedad en red. Edición 2012.
 
Noticias Tel Nov
Noticias Tel NovNoticias Tel Nov
Noticias Tel Nov
 
Cisco system
Cisco systemCisco system
Cisco system
 
Sbpg april 2012_0427
Sbpg april 2012_0427Sbpg april 2012_0427
Sbpg april 2012_0427
 
Noticias TEL ago
Noticias TEL agoNoticias TEL ago
Noticias TEL ago
 
Huawei
Huawei Huawei
Huawei
 
Diode Comunicaciones 2012
Diode Comunicaciones 2012Diode Comunicaciones 2012
Diode Comunicaciones 2012
 
NetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_TelecomNetconAmericas_2015_Estructuracion_Empresa_Telecom
NetconAmericas_2015_Estructuracion_Empresa_Telecom
 

Destacado

Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 

Destacado (6)

Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 

Similar a Road show chile 2010 v2

A ntecedentes
A ntecedentesA ntecedentes
A ntecedentesluisbryan
 
Empresas lideres
Empresas lideresEmpresas lideres
Empresas lidereskrmnfa
 
PresentacióN Corporativa 2011 Q4
PresentacióN Corporativa 2011 Q4PresentacióN Corporativa 2011 Q4
PresentacióN Corporativa 2011 Q4toniespinosa
 
Netdata Profile
Netdata ProfileNetdata Profile
Netdata Profilejacf99
 
Portafolio TYC Global 2015
Portafolio TYC Global 2015Portafolio TYC Global 2015
Portafolio TYC Global 2015VaLe Rie
 
Presentación Grupo SATEC
Presentación Grupo SATECPresentación Grupo SATEC
Presentación Grupo SATECIsaac Gil
 
Presentacion Corporativa Greenbit Tecnologias De La Informacion
Presentacion Corporativa Greenbit Tecnologias De La InformacionPresentacion Corporativa Greenbit Tecnologias De La Informacion
Presentacion Corporativa Greenbit Tecnologias De La InformacionPDOMENECH
 
Entornos de negocios en internet
Entornos de negocios en internetEntornos de negocios en internet
Entornos de negocios en internetLima Innova
 
Presentación comercial RETO 2016
Presentación comercial RETO 2016 Presentación comercial RETO 2016
Presentación comercial RETO 2016 RETO
 
Huawei Empresas
Huawei EmpresasHuawei Empresas
Huawei Empresasrosslili
 
Presentación corporativa Powernet 2014
Presentación corporativa Powernet 2014Presentación corporativa Powernet 2014
Presentación corporativa Powernet 2014Powernet
 
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptx
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptxPPT Corporativa ADEXUS 2013 español_agosto_2013.pptx
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptxestefaniamonaco
 
Presentación corporativa + infraestructuras 2014 (esp) v2
Presentación corporativa + infraestructuras 2014 (esp) v2Presentación corporativa + infraestructuras 2014 (esp) v2
Presentación corporativa + infraestructuras 2014 (esp) v2AnyHelp International
 
NexTReT Corporativa 201011
NexTReT Corporativa 201011NexTReT Corporativa 201011
NexTReT Corporativa 201011NexTReT
 
Powernet presentacion-corporativa
Powernet presentacion-corporativaPowernet presentacion-corporativa
Powernet presentacion-corporativaPowernet
 

Similar a Road show chile 2010 v2 (20)

A ntecedentes
A ntecedentesA ntecedentes
A ntecedentes
 
DOMINION SERVICES
DOMINION SERVICESDOMINION SERVICES
DOMINION SERVICES
 
Empresas lideres
Empresas lideresEmpresas lideres
Empresas lideres
 
MOVYTEC
MOVYTECMOVYTEC
MOVYTEC
 
PresentacióN Corporativa 2011 Q4
PresentacióN Corporativa 2011 Q4PresentacióN Corporativa 2011 Q4
PresentacióN Corporativa 2011 Q4
 
Netdata Profile
Netdata ProfileNetdata Profile
Netdata Profile
 
Raytel - Presentacion Corporativa
Raytel - Presentacion CorporativaRaytel - Presentacion Corporativa
Raytel - Presentacion Corporativa
 
Portafolio TYC Global 2015
Portafolio TYC Global 2015Portafolio TYC Global 2015
Portafolio TYC Global 2015
 
¿Quién es CPV? www.cpvmicro.com
¿Quién es CPV?       www.cpvmicro.com¿Quién es CPV?       www.cpvmicro.com
¿Quién es CPV? www.cpvmicro.com
 
Presentación Grupo SATEC
Presentación Grupo SATECPresentación Grupo SATEC
Presentación Grupo SATEC
 
Presentacion Corporativa Greenbit Tecnologias De La Informacion
Presentacion Corporativa Greenbit Tecnologias De La InformacionPresentacion Corporativa Greenbit Tecnologias De La Informacion
Presentacion Corporativa Greenbit Tecnologias De La Informacion
 
Entornos de negocios en internet
Entornos de negocios en internetEntornos de negocios en internet
Entornos de negocios en internet
 
Presentación comercial RETO 2016
Presentación comercial RETO 2016 Presentación comercial RETO 2016
Presentación comercial RETO 2016
 
Huawei Empresas
Huawei EmpresasHuawei Empresas
Huawei Empresas
 
Presentación corporativa Powernet 2014
Presentación corporativa Powernet 2014Presentación corporativa Powernet 2014
Presentación corporativa Powernet 2014
 
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptx
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptxPPT Corporativa ADEXUS 2013 español_agosto_2013.pptx
PPT Corporativa ADEXUS 2013 español_agosto_2013.pptx
 
Presentación corporativa + infraestructuras 2014 (esp) v2
Presentación corporativa + infraestructuras 2014 (esp) v2Presentación corporativa + infraestructuras 2014 (esp) v2
Presentación corporativa + infraestructuras 2014 (esp) v2
 
NexTReT Corporativa 201011
NexTReT Corporativa 201011NexTReT Corporativa 201011
NexTReT Corporativa 201011
 
Powernet presentacion-corporativa
Powernet presentacion-corporativaPowernet presentacion-corporativa
Powernet presentacion-corporativa
 
Cloud
CloudCloud
Cloud
 

Último

¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?
¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?
¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?Michael Rada
 
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptx
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptxT.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptx
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptxLizCarolAmasifuenIba
 
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptx
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptxJOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptx
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptxJosVidal41
 
Presentación La mujer en la Esperanza AC.pptx
Presentación La mujer en la Esperanza AC.pptxPresentación La mujer en la Esperanza AC.pptx
Presentación La mujer en la Esperanza AC.pptxDanielFerreiraDuran1
 
La electrónica y electricidad finall.pdf
La electrónica y electricidad finall.pdfLa electrónica y electricidad finall.pdf
La electrónica y electricidad finall.pdfDiegomauricioMedinam
 
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...antonellamujica
 
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdfRamon Costa i Pujol
 
DO_FCE_310_PO_.pdf. La contabilidad gubernamental SOS de suma importancia fu...
DO_FCE_310_PO_.pdf.  La contabilidad gubernamental SOS de suma importancia fu...DO_FCE_310_PO_.pdf.  La contabilidad gubernamental SOS de suma importancia fu...
DO_FCE_310_PO_.pdf. La contabilidad gubernamental SOS de suma importancia fu...ssuser2887fd1
 
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-Teleconferencia Accionistas Q1 2024 . Primer Trimestre-
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-ComunicacionesIMSA
 
Coca cola organigrama de proceso empresariales.pptx
Coca cola organigrama de proceso empresariales.pptxCoca cola organigrama de proceso empresariales.pptx
Coca cola organigrama de proceso empresariales.pptxJesDavidZeta
 
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdf
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdfPRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdf
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdfCarolinaMaguio
 
diapositivas 26-12-16_seguridad ciudadana.pptx
diapositivas 26-12-16_seguridad ciudadana.pptxdiapositivas 26-12-16_seguridad ciudadana.pptx
diapositivas 26-12-16_seguridad ciudadana.pptxDiegoQuispeHuaman
 
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASA
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASAPLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASA
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASAAlexandraSalgado28
 
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdf
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdfAFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdf
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdfOdallizLucanaJalja1
 
Rendicion de cuentas del Administrador de Condominios
Rendicion de cuentas del Administrador de CondominiosRendicion de cuentas del Administrador de Condominios
Rendicion de cuentas del Administrador de CondominiosCondor Tuyuyo
 
Continex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosContinex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosFundación YOD YOD
 
PPT Empresas IANSA Sobre Recursos Humanos.pdf
PPT Empresas IANSA Sobre Recursos Humanos.pdfPPT Empresas IANSA Sobre Recursos Humanos.pdf
PPT Empresas IANSA Sobre Recursos Humanos.pdfihmorales
 
Pensamiento Lógico - Matemático USB Empresas
Pensamiento Lógico - Matemático USB EmpresasPensamiento Lógico - Matemático USB Empresas
Pensamiento Lógico - Matemático USB Empresasanglunal456
 
PROCESO PRESUPUESTARIO - .administracion
PROCESO PRESUPUESTARIO - .administracionPROCESO PRESUPUESTARIO - .administracion
PROCESO PRESUPUESTARIO - .administracionDayraCastaedababilon
 
estadistica funcion distribucion normal.ppt
estadistica funcion distribucion normal.pptestadistica funcion distribucion normal.ppt
estadistica funcion distribucion normal.pptMiguelAngel653470
 

Último (20)

¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?
¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?
¿ESTÁ PREPARADA LA LOGÍSTICA PARA EL DECRECIMIENTO?
 
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptx
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptxT.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptx
T.A CONSTRUCCION DEL PUERTO DE CHANCAY.pptx
 
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptx
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptxJOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptx
JOSSELYN SALINfffffffAS- CAPITULO 4 Y 5.pptx
 
Presentación La mujer en la Esperanza AC.pptx
Presentación La mujer en la Esperanza AC.pptxPresentación La mujer en la Esperanza AC.pptx
Presentación La mujer en la Esperanza AC.pptx
 
La electrónica y electricidad finall.pdf
La electrónica y electricidad finall.pdfLa electrónica y electricidad finall.pdf
La electrónica y electricidad finall.pdf
 
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...
Mapa Conceptual relacionado con la Gerencia Industrial, su ámbito de aplicaci...
 
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf
20240418-CambraSabadell-SesInf-AdopTecnologica-CasoPractico.pdf
 
DO_FCE_310_PO_.pdf. La contabilidad gubernamental SOS de suma importancia fu...
DO_FCE_310_PO_.pdf.  La contabilidad gubernamental SOS de suma importancia fu...DO_FCE_310_PO_.pdf.  La contabilidad gubernamental SOS de suma importancia fu...
DO_FCE_310_PO_.pdf. La contabilidad gubernamental SOS de suma importancia fu...
 
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-Teleconferencia Accionistas Q1 2024 . Primer Trimestre-
Teleconferencia Accionistas Q1 2024 . Primer Trimestre-
 
Coca cola organigrama de proceso empresariales.pptx
Coca cola organigrama de proceso empresariales.pptxCoca cola organigrama de proceso empresariales.pptx
Coca cola organigrama de proceso empresariales.pptx
 
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdf
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdfPRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdf
PRINCIPIOS DE CONDUCCION Y LIDERAZGO SGTO 1.pdf
 
diapositivas 26-12-16_seguridad ciudadana.pptx
diapositivas 26-12-16_seguridad ciudadana.pptxdiapositivas 26-12-16_seguridad ciudadana.pptx
diapositivas 26-12-16_seguridad ciudadana.pptx
 
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASA
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASAPLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASA
PLANILLA DE CONTROL LIMPIEZA TRAMPA DE GRASA
 
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdf
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdfAFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdf
AFILIACION CAJA NACIONAL DE SALUD WOM 1 .pdf
 
Rendicion de cuentas del Administrador de Condominios
Rendicion de cuentas del Administrador de CondominiosRendicion de cuentas del Administrador de Condominios
Rendicion de cuentas del Administrador de Condominios
 
Continex para educación, Portafolio de servicios
Continex para educación, Portafolio de serviciosContinex para educación, Portafolio de servicios
Continex para educación, Portafolio de servicios
 
PPT Empresas IANSA Sobre Recursos Humanos.pdf
PPT Empresas IANSA Sobre Recursos Humanos.pdfPPT Empresas IANSA Sobre Recursos Humanos.pdf
PPT Empresas IANSA Sobre Recursos Humanos.pdf
 
Pensamiento Lógico - Matemático USB Empresas
Pensamiento Lógico - Matemático USB EmpresasPensamiento Lógico - Matemático USB Empresas
Pensamiento Lógico - Matemático USB Empresas
 
PROCESO PRESUPUESTARIO - .administracion
PROCESO PRESUPUESTARIO - .administracionPROCESO PRESUPUESTARIO - .administracion
PROCESO PRESUPUESTARIO - .administracion
 
estadistica funcion distribucion normal.ppt
estadistica funcion distribucion normal.pptestadistica funcion distribucion normal.ppt
estadistica funcion distribucion normal.ppt
 

Road show chile 2010 v2

Notas del editor

  1. We now have 2 main offices for Latin America - based in Sao Paulo (Brazil) and Buenos Aires (Argentina)The Brazilian operation that has merged with Logicalis, is now part of a holding company for the whole Latin American business. The operations in Argentina, Bolivia, Chile, Ecuador, Paraguay, Peru and Uruguay trade under the name of Logicalis (they have dropped the Softnet brand). In Brazil, the operation trades as PromonLogicalis.Logicalis is now the single largest independent network integrator for this region.
  2. There is no question that the traditional corporate border is gone forever. In the past, applications, data centers and branch office networks were protected by perimeter devices such as firewalls and policy-based rule sets. The internet and attackers were outside the perimeter, although VPN and other technologies made it possible to grant controlled access for partners and customers. The perimeter was your line in the sand, where all your policies were set, and where your policy enforcement systems were located. Although it could be complex to manage this properly, this architecture was straightforward to understand and police. ------------------Cisco Promotion Points: Cisco Systems has about 350 partners with access through the perimeter. You can assume each partner has up to 350 partners of their own. Cisco had to move past the concept of the perimeter in order to secure its extranet.
  3. However, the traditional network borders are disappearing. The way companies do enterprise computing and access information has changed, and will continue to change over the next five years. The two biggest architectural changes are mobility and cloud computing. A key driver behind mobility is the latest generation of smart phones, iPhones and handheld devices. These are internet-enabled, so they can access WebEx, Skype and YouTube. They may have VPN or other access into corporate applications. The mobile work force can now use laptops from home offices and coffee shops, as well as computers in airport kiosks. This is not just about email access – the mobile users and devices can now have the same capabilities as office systems. The browser and a vast number of powerful applets have radically expanded the things that can be accomplished remotely, and productivity is climbing. This productivity jump is a direct result of the connectivity and data sharing provided by the network. Yes, the device may have local data storage. Yes, there are security issues. But the huge increase in efficiency means that this genie is not going back in the bottle. More and more companies are spending time and energy around handheld computing. IT departments want to support new operating systems like Google Android, and are being asked to support platforms besides Windows. Cisco’s Borderless Network architecture provides security in this mobile, multi-platform, multi-vendor, multi-location environment. -------------------------------------------------------------------------------------------------------------------Cisco Promotion Points: Cisco helped build the internet backbone and corporate connectivity that makes data sharing possible.Microsoft is providing a new VPN technology in Windows, called Direct Access. While this competes against Cisco’s current and future VPN clients, Cisco supports Windows, Macs, BlackBerries, smart phones, iPhones and more, while Microsoft Direct Access supports Windows 7 only. Cisco shines in this heterogeneous environment.
  4. The second big change is cloud computing. There are compelling reasons to move certain applications and services into the cloud. Cost savings and survivability are two main drivers, virtualization makes it easier to achieve and the network makes it transparent to users in any location. Typically the first wave of applications that we’ve seen move into the “cloud” included email. Email security is one of the apps that we’ve seen more of our customers, like you, having interest in.Another example is salesforce.com, a customer relationship management system. You can rent a Sun or Windows server for your own applications, and cut your management costs using Platform as a Service. Infrastructure as a Service could be a managed router environment, managed firewalls, or something else. These providers are specialists, and the savings from cloud computing can be substantial. But now you’ve got more users on more devices in more places in the network, and data residing in more places in the network. That’s a deadly combination for security. Consider what happens when your CFO uses a handheld to check your sales forecast at salesforce.com. That transaction, that connection never touches a firewall. It doesn’t touch a web proxy.
  5. This is a diagram of the new, Borderless network environment we live in. Users, devices, cloud-based services and head-office resources are all accessible, but without traditional network perimeters. Cisco’s new architecture to secure this borderless network is able to restore the auditing, logging, access control, verification, malware policy and threat prevention. We’ve had to rethink how security is done, and how to accommodate this dramatic shift. We can help customers migrate to a protected network without borders, but this kind of security has to be “baked in” to the architecture and the products. Security as an afterthought is much less likely to restore the traditional levels of control. ----------------------------------------------------------------------------------Cisco Promotion Points: There is no single best practice for securing a Borderless Network – instead, Cisco’s new architecture is flexible and adaptable.
  6. Cisco’s vision is around 4 pillarsFirst The borderless end zones – i.e. protecting the end user device from threats - whether it’s the smart phone, laptop, etc.Second is the Borderless Internet which is really the focus of this presentation. Central to this pillar is the cloud based as well as a unique “hybrid” deployment modelThe third pillar of the vision is the borderless data center where cisco’s vision is to provide security to the evolving data center. Aspects like inter-VM and intra-VM security are the areas where we are investigating.And finally the fourth pillar is that around policy. Our customers are telling us that regardless of the way information is accessed, they have to apply the same policies – whether it’s around access control, data security, acceptable use, etc.As you can see the cloud is the central to the strategy of Cisco’s SBN
  7. Challenges in today’s IT are vast and diverse. IT budgets are flat or shrinking and these challenges are ever growing. This is driving the Enterprise toward hard requirements for firewall.These requirements include:A clear understanding of the threat environment which means a continuous update to software and security content to keep up with the latest threatsHigh performance platforms that are capable of keeping up with today’s traffic needs and allowing for growth as the threat environment evolvesFlexible deployment options to assure coverage of threats anywhere in the networkThat same flexibility of options applied to the new mobile teleworker and remote enviromentsSecurity applied to the latest voice and video communicationsAnd tying it all together with an operational model that make management effective and efficient
  8. The CSIO piece that provides Cisco IronPort’s email security threat protection is Senderbase.It is the world’s first, largest and most thorough email & threat monitoring database. This chart illustrates some of the sources of senderbase information and the over 150 parameters we track in real time.- Global volume- Complaints, spamtraps- 3rd party blacklist and dynamic lists- Results of content filter scanning for spam and viruses- URLs with known risks of spamvertising, viruses, spyware- Website composition to look at suspicious payloads or known bad files- Domain registration information- Look at linking reputation of sites through hyperlinksBy having real time insight into this data we can see threats before anyone else in the industry and protect our customer base.Some of this information is available to the public at www.senderbase.org
  9. At Cisco, we pioneered the whole conceptof reputation filtering that relied on the depth of email security data collected from a wide deployment sensor.However as the threat landscape has evolved, so have our techniques. The result is CSIO – Cisco Security Intelligence Operations – industry’s leading threat data base that gathers information from a wide variety of threat sources and converts them into dynamic rules to protect our customers in real time from new and evolving threats.The reason why CSIO is industry leading is because of the breadth and depth of threat information that we harness through it.By leveraging the rich security portfolio that Cisco has – comprised of both network security and content security offerings – we have effectively converted this broad deployment into – what we call sensors.These sensors send us anonymous threat data that gives us the vast visibility into the threat landscape. These sensors include web security sensors, email security sensors, IPS devices as well as firewall devices – providing threat information from various parts of the layers in the networking stack.To give you a sense of the breadth and depth of this sensor netwrok – we have visibility into 30% of the global email data base, we have more than 700,000+ devices on the network security side.
  10. Lets shift gears from inbound email protection to outbound email controlCustomers today are faced with a number of different challenges Ensuring compliance with regulations like HIPAA, PCI, etcOr protecting trade secrets, confidential data, etcEmail is the primary vector of concern for organizations and hence it is important to discuss the variety of technologies that Cisco IronPort has for the email security infrastructure that help customers detect incidents and apply appropriate remediation to those incidents.That’s where the DLP and Encryption technologies from Cisco help. We are the industry’s first vendor that has a comprehensive DLP and Encryption solution available in the cloud only deployment model. This provides customers who’ve made the choice to move to the cloud a great solution to maintain regulatory compliance and adherence to company Acceptable Use Policies.The first step is one that allows customers to detect events.And on detecting events, the email security deployment can be configured to perform a number of different remediation options including encrypting the email, dropping the attachment, cc-ing to an HR/Legal inbox etc.
  11. To explain how easy our secure messaging solution is, we will first show you how simple it is for the senders, then the receivers. The first is sending a message. The thing you want to convey here is that customers can instantly deploy PXE with a simple feature key, no additional management overhead. An email that is detected is as being required to have encryption would automatically be enrolled into the key management system, which is provided via Cisco registered envelope service hosted in the Cisco cloud. Then that message is pushed to the end-user and that end-user would retrieve the key from the Cisco registered envelope service and render that message in their browser. This provides for a host of center controls, because the fact that that message’s key is stored in host fashion. The sender can log-in to the registered envelope service and deal with tracking, secure, reply, recall and so on. And what makes this really powerful is the fact that we, meaning Cisco, never actually store that email message. All we are doing is storing the key, making it a high-performance, high-secure model for managing secure email.
  12. HTTP is the New TCPOne can be reasonably sure that, no matter what the other firewall settings, Port 80 and Port 443 will be open. It’s the 24x7 path into and out of every enterprise.This is driven by business critical content and applications on the web. The secondary effect is that other applications, such as FTP, SOCKS, IM, P2P, and Video are also shifting to tunnel over HTTP to take advantage of the ubiquitous access.Result: HTTP now dominates at the enterprise edge, carrying numerous applications and types of information. In some cases, up to 90% of traffic traversing the enterprise edge is HTTP.This creates new security challenges for enterprise IT.ORFirst objective: establish the problem set and the concept of the Secure Web Gateway as the solution.Important to set this framework for the customer conversation: while we may not have the world’s best web proxy or the world’s best URL filtering, we do have the world’s best Secure Web Gateway. Establishing this framework helps qualify customer priorities vs our value prop, and helps position us for success relative to vendors focused on subsets of the problem space.Web has become the ubiquitous path into enterprises – and it’s overloaded with different applications and content that businesses want to handle differently.Saas applications like Saleforce and Netsuite; rich collaboration apps like WebEx; information discovery—researching prospects, learning about competitive products and market trends, or catching up on today’s news. The idea of locking down web access is unthinkable.And this has driven a second trend: taking advantage of that pipe in and out to tunnel apps over HTTP. A few years back, P2P apps like BitTorrent dominated Internet backbone traffic. Today that’s been replaced by HTTP-Video—the YouTube effect plus ubiquitous access. IM clients traversing the edge also tend to use HTTP more and more today, e.g. Yahoo releasing Yahoo Web Messenger. Legacy SOCKS applications transitioning to CONNECT.Result: HTTP now dominates at the enterprise edge, carrying numerous applications and types of information. In many ways, it has become the new TCP at the enterprise edge.
  13. While the challenge has become multi-dimensional, the policy issues remain the same:There is a need to apply access controls to ensure the right people have access to the right parts of the network and applications.Acceptable Use controls for compliance and productivity, to ensure employees are using the web resources appropriately. Threat Protection to block all the bad stuff like malware, botnets, intrusions and spam from coming into the network.And finally data protection to ensure that confidential information is not getting out into the open or into wrong hands, either inadvertently or with a malicious intent.
  14. Cisco IronPort Dynamic Vectoring and Streaming (DVS) engine
  15. For maximum efficacy, a Secure Web Gateway needs to examine traffic at both the network layer and the application layer. Furthermore, a Web security appliance needs to combine signature based analysis as well as traffic based or "reputation" analysis to distinguish legitimate traffic from hostile spyware or malware. And it needs to deliver this without introducing any degradation in the end user browsing experience.The IronPort S-Series represents the next generation of Web technology, leveraging techniques developed for Web proxy caching but built from the ground up for security. Built on IronPort's proprietary AsyncOS operating system, the S-Series appliance offers extremely high performance scanning of Web content at both the network layer and the application layer using both signature and reputation based filtering. The IronPort S-Series Web Security Appliance is the industry’s first and only Web security appliance to combine traditional URL filtering, reputation filtering and multi-vendor anti-malware filtering on a single platform. This squarely addresses the growing challenges of both securing and controlling Web traffic while enjoying a low Total Cost of Ownership (TCO). Enterprise-class management and reporting tools deliver ease of administration, flexibility and control, and complete visibility into policy-related and threat-related activities.
  16. Choice also takes the form of flexible deployment options leveraging the same market-leading email security technologyCustomers can now choose from hosted, hybrid hosted, managed appliances or self-managed appliances based on the form factor that they preferCisco can leverage our data center to host all or parts of the equipment, can out-task manage the devices on the customer premise, or divide the control between the cloud and customer premise.Regardless of the deployment option, customers retain co-managed access while maintaining a common policy, centralized reporting and consistent protection
  17. Let’s look at the various deployment optionsFirst is dedicated hosted email securityHere the email security devices reside in the Cisco data center minimizing the customer’s data center requirementsThe dedicated nature of the service ensures that the customer’s sensitive data is not leaked and eliminates the “shared fate” risk of critical outagesThe customer can be assured of spam growth headroom with future capacity assurance. Meaning that Cisco will take the necessary steps to scale the infrastructure behind the seems to provide the highest level of service for the rated user count.DIAGRAM: In the diagram you can see that both the inbound and outbound filtering is done on the appliances hosted in the Cisco data center. After removing inbound spam and viruses, the clean email is passed to the customer.
  18. Next, let’s look at the Hybrid Hosted email security offeringThis solution divides the control between the “cloud” and the customer premise. The inbound filtering is done in the Cisco cloud prior to the traffic entering the customer premise. Outbound control policies are applied on the customer premise where customers want to prevent the leakage of sensitive information or to encrypt the email traffic to ensure security and confidentialityNOTE: Emphasize what we are, best of both worlds. Scalability, consolidated reporting. First vendor to deliver – others make the claim but we are actually the first ones to pull it off.
  19. And lastly, let’s look at managed email security which provides the highest level of out-taskingThe Cisco Remote Management Services provides vigilant 24x7 remote management and monitoring on behalf of the customerProvides a predictable cost model that the CFO will appreciate.Email continues to flow through the on-premise infrastructure where both inbound and outbound filtering is applied. Cisco RMS accesses the on-premise appliance via a VPN tunnel delivered by the dedicated VPN router