SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
© 2014 Cisco and/or its affiliates. All rights reserved. 
1 
© 2014 Cisco and/or its affiliates. All rights reserved. 
Cisco Confidential 
1 
Industry’s First Threat-Focused NGFW 
Héctor Casas 
Consultor de Seguridad de Cisco para Argentina, Chile, Paraguay y Uruguay 
16 de septiembre 
Cisco ASA with FirePOWER Services
© 2014 Cisco and/or its affiliates. All rights reserved. 
2 
Introducing: Cisco ASA with FirePOWER Services Industry’s First Threat-Focused Next-Generation Firewall 
►Cisco® ASA firewalling combined with Sourcefire® Next-Generation IPS 
►Advanced Malware Protection (AMP) 
►Best-in-class security intelligence, application visibility and control (AVC), and URL filtering 
Features 
►Superior, multilayered threat protection 
►Unprecedented network visibility 
►Integrated threat defense across the entire attack continuum 
►Reduced cost and complexity 
Benefits
© 2014 Cisco and/or its affiliates. All rights reserved. 
3 
100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 
01000 01000111 0100 11101 1000111010011101 1000111010011101 1100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 The Problem with Legacy Next-Generation Firewalls 
Focus on the Apps 
But totally miss the threat… 
Legacy NGFW can reduce attack surface area but advanced malware often evades security controls. 
0100 1110101001 1101 111 0011 0 
0111100 011 1010011101 1 
0100 111001 1001 11 111 0
© 2014 Cisco and/or its affiliates. All rights reserved. 
4 
Threat Landscape Demands more than Application Control 
100% of companies connect to domains that host malicious files or services 
54% 
of breaches 
remain undiscovered 
for months 
60% 
of data is stolen in hours 
avoids detection and attacks swiftly 
It is a Community that hides in plain sight
© 2014 Cisco and/or its affiliates. All rights reserved. 
5 
Legacy NGFWs Lack Complete Visibility and Control 
Without Proper Visibility Threat Protection Cannot Be Operationalized
© 2014 Cisco and/or its affiliates. All rights reserved. 
6 
Integrated Threat Defense Across the Attack Continuum 
ATTACK CONTINUUM 
Point-in-Time 
Continuous 
Discover 
Enforce 
Harden 
Detect 
Block 
Defend 
Scope 
Contain Remediate 
Network 
Endpoint 
Mobile 
Virtual 
Cloud
© 2014 Cisco and/or its affiliates. All rights reserved. 
7 
Industry’s First Threat-Focused Next-Generation Firewall Cisco ASA with FirePOWER Services 
►Cisco® ASA firewalling combined with Sourcefire® Next-Generation IPS 
►Advanced Malware Protection (AMP) 
►Best-in-class security intelligence, application visibility and control (AVC), and URL filtering 
Features 
►Superior, multilayered threat protection 
►Unprecedented network visibility 
►Integrated threat defense across the entire attack continuum 
►Reduced cost and complexity 
Benefits 
“By integrating defense layers, organizations can enhance visibility, enable dynamic controls, and provide advanced threat protection that address the entire attack continuum – before, during, and after an attack.”
© 2014 Cisco and/or its affiliates. All rights reserved. 
8 
Superior Integrated & Multilayered Protection 
►World’s most widely deployed, enterprise-class ASA stateful firewall 
►Granular Cisco® Application Visibility and Control (AVC) 
►Industry-leading FirePOWER next-generation IPS (NGIPS) 
►Reputation- and category-based URL filtering 
►Advanced Malware Protection with Retrospective Security 
Cisco ASA 
Identity-Policy Control & VPN 
URL Filtering 
(Subscription) 
FireSIGHT 
Analytics & Automation 
Advanced Malware Protection 
(Subscription) 
Application Visibility & Control 
Network Firewall 
Routing | Switching 
Clustering & High Availability 
Cisco Collective Security Intelligence Enabled 
Built-in Network Profiling 
Intrusion Prevention (Subscription)
© 2014 Cisco and/or its affiliates. All rights reserved. 
9 
Unprecedented Network Visibility 
Categories 
FirePOWER Services 
Legacy IPS 
Legacy NGFW 
Threats 
 
 
 
Users 
 
 
 
Web Applications 
 
 
 
Application Protocols 
 
 
 
File Transfers 
 
 
 
Malware 
 
 
 
Command & Control Servers 
 
 
 
Client Applications 
 
 
 
Network Servers 
 
 
 
Operating Systems 
 
 
 
Routers & Switches 
 
 
 
Mobile Devices 
 
 
 
Printers 
 
 
 
VoIP Phones 
 
 
 
Virtual Machines 
 
 

© 2014 Cisco and/or its affiliates. All rights reserved. 
10 
Impact Assessment 
Correlates all intrusion events to an impact of the attack against the target 
1 
2 
3 
4 
0 
IMPACT FLAG 
ADMINISTRATOR ACTION 
WHY 
Act Immediately, Vulnerable 
Event corresponds to vulnerability mapped to host 
Investigate, Potentially Vulnerable 
Relevant port open or protocol in use, but no vuln mapped 
Good to Know, Currently Not Vulnerable 
Relevant port not open or protocol not in use 
Good to Know, Unknown Target 
Monitored network, but unknown host 
Good to Know, Unknown Network 
Unmonitored network
© 2014 Cisco and/or its affiliates. All rights reserved. 
11 
Automated, Integrated Threat Defense 
Superior Protection for Entire Attack Continuum 
Retrospective Security 
Shrink Time between Detection and Cure 
PDF 
Mail 
Admin Request 
PDF 
Mail 
Admin Request 
Multi-vector Correlation 
Early Warning for Advanced Threats 
Host A 
Host B 
Host C 
3 IoCs 
Adapt Policy to Risks 
WWW 
WWW 
WWW 
Dynamic Security Control 
http:// 
http:// 
WWW 
WEB 
Context and Threat Correlation 
Priority 1 
Priority 2 
Priority 3 
Impact Assessment 
5 IoCs
© 2014 Cisco and/or its affiliates. All rights reserved. 
12 
Indicators of Compromise (IoCs) 
IPS Events 
Malware Backdoors 
CnC Connections 
Exploit Kits 
Admin Privilege Escalations 
Web App Attacks 
SI Events 
Connections to Known CnC IPs 
Malware Events 
Malware Detections 
Malware Executions 
Office/PDF/Java Compromises 
Dropper Infections
© 2014 Cisco and/or its affiliates. All rights reserved. 
13 
Cisco ASA with FirePOWER Services vs. Legacy NGFW 
Feature 
Cisco ASA with FirePOWER Services 
Legacy NGFW 
Reputation-Based Proactive Protection 
Superior 
Not Available 
Visibility, Context & Intelligent Security Automation 
Superior 
Not Available 
File Reputation, File Trajectory, Retrospective Analysis 
Superior 
Not Available 
IoC’s 
Superior 
Not Available 
NGIPS 
Superior 
Available1 
Application Visibility and Control 
Superior 
Available 
Acceptable Use/URL Filtering 
Superior 
Available 
Remote Access VPN 
Superior 
Not Enterprise-Grade 
Stateful Firewall, HA, Clustering 
Superior 
Available2 
1 – Typically 1st generation IPS, 2 -HA Capabilities vary from NGFW vendor
© 2014 Cisco and/or its affiliates. All rights reserved. 
14 
Complete Security Solutions 
Security Services 
Security Products
© 2014 Cisco and/or its affiliates. All rights reserved. 
15 
Accelerate Migration to Cisco ASA with FirePOWER Services with Professional and Technical Services 
SMARTnet Technical Support 
Migration Services 
Managed Services 
Provide full-time, proactive, systematic threat monitoring and management 
Move more quickly to new capabilities and with minimal disruption 
Keep security solutions available by providing access to broad Cisco support tools and expertise
© 2014 Cisco and/or its affiliates. All rights reserved. 
16 
Cisco ASA with FirePOWER Services 
Industry’s First Threat-Focused NGFW 
Superior Visibility 
Integrated Threat Defense 
▶Best-in-class, multilayered protection in a single device 
▶Full contextual awareness to eliminate gaps 
Automation 
▶Simplified operations and dynamic response and remediation
© 2014 Cisco and/or its affiliates. All rights reserved. 
17 
Thank You

Más contenido relacionado

La actualidad más candente

Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
Shamal Abeyrathne
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
Anwesh Dixit
 

La actualidad más candente (20)

Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Migration to cisco next generation firewall
Migration to cisco next generation firewallMigration to cisco next generation firewall
Migration to cisco next generation firewall
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Behind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced ThreatsBehind the Curtain: Exposing Advanced Threats
Behind the Curtain: Exposing Advanced Threats
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
 
Cisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better TogetherCisco, Sourcefire and Lancope - Better Together
Cisco, Sourcefire and Lancope - Better Together
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
Asa sslvpn security
Asa sslvpn securityAsa sslvpn security
Asa sslvpn security
 
Emerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber SecurityEmerging Threats - The State of Cyber Security
Emerging Threats - The State of Cyber Security
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...Cisco Connect Toronto  2017 - Accelerating Incident Response in Organizations...
Cisco Connect Toronto 2017 - Accelerating Incident Response in Organizations...
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of AttackCisco Connect Vancouver 2017 - Anatomy of Attack
Cisco Connect Vancouver 2017 - Anatomy of Attack
 

Destacado

Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style Guide
Bluetext
 
presentacion comercial de CISCO UCS
presentacion comercial de CISCO UCSpresentacion comercial de CISCO UCS
presentacion comercial de CISCO UCS
dnarvarte2
 
2628113149771875
26281131497718752628113149771875
2628113149771875
gueste85f05
 
How to connect to cisco asa
How to connect to cisco asaHow to connect to cisco asa
How to connect to cisco asa
IT Tech
 
Ficha Lectura 7 Casas En Francia
Ficha Lectura 7 Casas En FranciaFicha Lectura 7 Casas En Francia
Ficha Lectura 7 Casas En Francia
Eleuterio J. Saura
 
Standortbroschüre 2012
Standortbroschüre 2012Standortbroschüre 2012
Standortbroschüre 2012
EvaRom
 
Cloud stack meet_cloudbyte
Cloud stack meet_cloudbyteCloud stack meet_cloudbyte
Cloud stack meet_cloudbyte
CloudByte Inc.
 

Destacado (18)

Cisco UCS
Cisco UCSCisco UCS
Cisco UCS
 
Seminar040616
Seminar040616Seminar040616
Seminar040616
 
Source Fire Corporate Style Guide
Source Fire Corporate Style GuideSource Fire Corporate Style Guide
Source Fire Corporate Style Guide
 
presentacion comercial de CISCO UCS
presentacion comercial de CISCO UCSpresentacion comercial de CISCO UCS
presentacion comercial de CISCO UCS
 
Asamatrx
AsamatrxAsamatrx
Asamatrx
 
2628113149771875
26281131497718752628113149771875
2628113149771875
 
How to connect to cisco asa
How to connect to cisco asaHow to connect to cisco asa
How to connect to cisco asa
 
Presentation asa 5585-x next generation multi-service adaptive security app...
Presentation   asa 5585-x next generation multi-service adaptive security app...Presentation   asa 5585-x next generation multi-service adaptive security app...
Presentation asa 5585-x next generation multi-service adaptive security app...
 
AWS サービスアップデートまとめ 2014年7月
AWS サービスアップデートまとめ 2014年7月AWS サービスアップデートまとめ 2014年7月
AWS サービスアップデートまとめ 2014年7月
 
Presentacion arambee 21-11-2012
Presentacion arambee 21-11-2012Presentacion arambee 21-11-2012
Presentacion arambee 21-11-2012
 
MLS cuestiones previas a la puesta en marcha
MLS cuestiones previas a la puesta en marchaMLS cuestiones previas a la puesta en marcha
MLS cuestiones previas a la puesta en marcha
 
Name+id+brief+vc11
Name+id+brief+vc11Name+id+brief+vc11
Name+id+brief+vc11
 
Ficha Lectura 7 Casas En Francia
Ficha Lectura 7 Casas En FranciaFicha Lectura 7 Casas En Francia
Ficha Lectura 7 Casas En Francia
 
Huevo crioll orsfd
Huevo  crioll orsfdHuevo  crioll orsfd
Huevo crioll orsfd
 
Examen construcción de páginas web_Mary Sol
Examen construcción de páginas web_Mary SolExamen construcción de páginas web_Mary Sol
Examen construcción de páginas web_Mary Sol
 
Standortbroschüre 2012
Standortbroschüre 2012Standortbroschüre 2012
Standortbroschüre 2012
 
Visitas bou ferrer_2016_dossier_buceadores definitivo
Visitas bou ferrer_2016_dossier_buceadores definitivoVisitas bou ferrer_2016_dossier_buceadores definitivo
Visitas bou ferrer_2016_dossier_buceadores definitivo
 
Cloud stack meet_cloudbyte
Cloud stack meet_cloudbyteCloud stack meet_cloudbyte
Cloud stack meet_cloudbyte
 

Similar a Presentación - Cisco ASA with FirePOWER Services

apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
 

Similar a Presentación - Cisco ASA with FirePOWER Services (20)

BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content ProtectionTwo for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
 
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de SegurançaProteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Cisco Content Security
Cisco Content SecurityCisco Content Security
Cisco Content Security
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
NGFW Brochure 08 08
NGFW Brochure 08 08NGFW Brochure 08 08
NGFW Brochure 08 08
 
Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?Miben nyújt többet a Cisco ASA + FirePOWER Services?
Miben nyújt többet a Cisco ASA + FirePOWER Services?
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Marlabs cyber threat management
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 

Más de Oscar Romano

VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
Oscar Romano
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global
Oscar Romano
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014
Oscar Romano
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Oscar Romano
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Oscar Romano
 

Más de Oscar Romano (15)

Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDCEstudio sobre Habilidades en Redes en América Latina de Cisco e IDC
Estudio sobre Habilidades en Redes en América Latina de Cisco e IDC
 
VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016VNI Argentina 2015 2020 - Junio 2016
VNI Argentina 2015 2020 - Junio 2016
 
Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016Presentación del VNI Argentina - Febrero 2016
Presentación del VNI Argentina - Febrero 2016
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
Conectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXIConectividad Escolar para el Siglo XXI
Conectividad Escolar para el Siglo XXI
 
Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)Cisco Global Cloud Index (2014-2019)
Cisco Global Cloud Index (2014-2019)
 
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 "Transformación digital. Redes listas para la Era de la Internet de las Cosas" "Transformación digital. Redes listas para la Era de la Internet de las Cosas"
"Transformación digital. Redes listas para la Era de la Internet de las Cosas"
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - ArgentinaCisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
Cisco Visual Networking Index and VNI Service Adoption 2014–2019 - Argentina
 
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
Cisco® Visual Networking Índex™ y las predicciones para el tráfico de datos m...
 
20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global20 años de Cisco Argentina y 30 años de Cisco global
20 años de Cisco Argentina y 30 años de Cisco global
 
Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014Presentación del Mid-Security Report de Cisco - Agosto 2014
Presentación del Mid-Security Report de Cisco - Agosto 2014
 
Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014Presentación del VNI Argentina - Junio 2014
Presentación del VNI Argentina - Junio 2014
 
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
Cisco Visual Networking Index (VNI) Global Mobile Data Traffic Forecast for 2...
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Presentación - Cisco ASA with FirePOWER Services

  • 1. © 2014 Cisco and/or its affiliates. All rights reserved. 1 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Industry’s First Threat-Focused NGFW Héctor Casas Consultor de Seguridad de Cisco para Argentina, Chile, Paraguay y Uruguay 16 de septiembre Cisco ASA with FirePOWER Services
  • 2. © 2014 Cisco and/or its affiliates. All rights reserved. 2 Introducing: Cisco ASA with FirePOWER Services Industry’s First Threat-Focused Next-Generation Firewall ►Cisco® ASA firewalling combined with Sourcefire® Next-Generation IPS ►Advanced Malware Protection (AMP) ►Best-in-class security intelligence, application visibility and control (AVC), and URL filtering Features ►Superior, multilayered threat protection ►Unprecedented network visibility ►Integrated threat defense across the entire attack continuum ►Reduced cost and complexity Benefits
  • 3. © 2014 Cisco and/or its affiliates. All rights reserved. 3 100 0111100 011 1010011101 1000111010011101 10001110 10011 101 010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 01000 01000111 0100 11101 1000111010011101 1000111010011101 1100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 The Problem with Legacy Next-Generation Firewalls Focus on the Apps But totally miss the threat… Legacy NGFW can reduce attack surface area but advanced malware often evades security controls. 0100 1110101001 1101 111 0011 0 0111100 011 1010011101 1 0100 111001 1001 11 111 0
  • 4. © 2014 Cisco and/or its affiliates. All rights reserved. 4 Threat Landscape Demands more than Application Control 100% of companies connect to domains that host malicious files or services 54% of breaches remain undiscovered for months 60% of data is stolen in hours avoids detection and attacks swiftly It is a Community that hides in plain sight
  • 5. © 2014 Cisco and/or its affiliates. All rights reserved. 5 Legacy NGFWs Lack Complete Visibility and Control Without Proper Visibility Threat Protection Cannot Be Operationalized
  • 6. © 2014 Cisco and/or its affiliates. All rights reserved. 6 Integrated Threat Defense Across the Attack Continuum ATTACK CONTINUUM Point-in-Time Continuous Discover Enforce Harden Detect Block Defend Scope Contain Remediate Network Endpoint Mobile Virtual Cloud
  • 7. © 2014 Cisco and/or its affiliates. All rights reserved. 7 Industry’s First Threat-Focused Next-Generation Firewall Cisco ASA with FirePOWER Services ►Cisco® ASA firewalling combined with Sourcefire® Next-Generation IPS ►Advanced Malware Protection (AMP) ►Best-in-class security intelligence, application visibility and control (AVC), and URL filtering Features ►Superior, multilayered threat protection ►Unprecedented network visibility ►Integrated threat defense across the entire attack continuum ►Reduced cost and complexity Benefits “By integrating defense layers, organizations can enhance visibility, enable dynamic controls, and provide advanced threat protection that address the entire attack continuum – before, during, and after an attack.”
  • 8. © 2014 Cisco and/or its affiliates. All rights reserved. 8 Superior Integrated & Multilayered Protection ►World’s most widely deployed, enterprise-class ASA stateful firewall ►Granular Cisco® Application Visibility and Control (AVC) ►Industry-leading FirePOWER next-generation IPS (NGIPS) ►Reputation- and category-based URL filtering ►Advanced Malware Protection with Retrospective Security Cisco ASA Identity-Policy Control & VPN URL Filtering (Subscription) FireSIGHT Analytics & Automation Advanced Malware Protection (Subscription) Application Visibility & Control Network Firewall Routing | Switching Clustering & High Availability Cisco Collective Security Intelligence Enabled Built-in Network Profiling Intrusion Prevention (Subscription)
  • 9. © 2014 Cisco and/or its affiliates. All rights reserved. 9 Unprecedented Network Visibility Categories FirePOWER Services Legacy IPS Legacy NGFW Threats    Users    Web Applications    Application Protocols    File Transfers    Malware    Command & Control Servers    Client Applications    Network Servers    Operating Systems    Routers & Switches    Mobile Devices    Printers    VoIP Phones    Virtual Machines   
  • 10. © 2014 Cisco and/or its affiliates. All rights reserved. 10 Impact Assessment Correlates all intrusion events to an impact of the attack against the target 1 2 3 4 0 IMPACT FLAG ADMINISTRATOR ACTION WHY Act Immediately, Vulnerable Event corresponds to vulnerability mapped to host Investigate, Potentially Vulnerable Relevant port open or protocol in use, but no vuln mapped Good to Know, Currently Not Vulnerable Relevant port not open or protocol not in use Good to Know, Unknown Target Monitored network, but unknown host Good to Know, Unknown Network Unmonitored network
  • 11. © 2014 Cisco and/or its affiliates. All rights reserved. 11 Automated, Integrated Threat Defense Superior Protection for Entire Attack Continuum Retrospective Security Shrink Time between Detection and Cure PDF Mail Admin Request PDF Mail Admin Request Multi-vector Correlation Early Warning for Advanced Threats Host A Host B Host C 3 IoCs Adapt Policy to Risks WWW WWW WWW Dynamic Security Control http:// http:// WWW WEB Context and Threat Correlation Priority 1 Priority 2 Priority 3 Impact Assessment 5 IoCs
  • 12. © 2014 Cisco and/or its affiliates. All rights reserved. 12 Indicators of Compromise (IoCs) IPS Events Malware Backdoors CnC Connections Exploit Kits Admin Privilege Escalations Web App Attacks SI Events Connections to Known CnC IPs Malware Events Malware Detections Malware Executions Office/PDF/Java Compromises Dropper Infections
  • 13. © 2014 Cisco and/or its affiliates. All rights reserved. 13 Cisco ASA with FirePOWER Services vs. Legacy NGFW Feature Cisco ASA with FirePOWER Services Legacy NGFW Reputation-Based Proactive Protection Superior Not Available Visibility, Context & Intelligent Security Automation Superior Not Available File Reputation, File Trajectory, Retrospective Analysis Superior Not Available IoC’s Superior Not Available NGIPS Superior Available1 Application Visibility and Control Superior Available Acceptable Use/URL Filtering Superior Available Remote Access VPN Superior Not Enterprise-Grade Stateful Firewall, HA, Clustering Superior Available2 1 – Typically 1st generation IPS, 2 -HA Capabilities vary from NGFW vendor
  • 14. © 2014 Cisco and/or its affiliates. All rights reserved. 14 Complete Security Solutions Security Services Security Products
  • 15. © 2014 Cisco and/or its affiliates. All rights reserved. 15 Accelerate Migration to Cisco ASA with FirePOWER Services with Professional and Technical Services SMARTnet Technical Support Migration Services Managed Services Provide full-time, proactive, systematic threat monitoring and management Move more quickly to new capabilities and with minimal disruption Keep security solutions available by providing access to broad Cisco support tools and expertise
  • 16. © 2014 Cisco and/or its affiliates. All rights reserved. 16 Cisco ASA with FirePOWER Services Industry’s First Threat-Focused NGFW Superior Visibility Integrated Threat Defense ▶Best-in-class, multilayered protection in a single device ▶Full contextual awareness to eliminate gaps Automation ▶Simplified operations and dynamic response and remediation
  • 17. © 2014 Cisco and/or its affiliates. All rights reserved. 17 Thank You