Cisco Security Accelerating Digital Transformation › c › dam › m › en_ph › events ›...

Post on 25-Jun-2020

2 views 0 download

Transcript of Cisco Security Accelerating Digital Transformation › c › dam › m › en_ph › events ›...

Cisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 1

Cisco Security – Accelerating Digital TransformationStephen DaneManaging Director, Global Security Sales Organisation, Asia Pacific and Japan

March 2017

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

Lack Of Cybersecurity Hinders Innovation In The Digital Era

“Cybersecurity risks and threats

hinder innovation in my organization.”

Survey

“My organization halted a

mission-critical initiative

due to cybersecurity fears.”

Survey

Innovations are

moving forward, but

probably at 70%-

80% of what they

otherwise could if

there were better

tools to deal with the

dark cloud of

cybersecurity

threats.

Robert Simmons

CFO

71%

Agree

39%

Agree

1014 respondents

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

Security Challenges Globally

RansomwareMobile Work

Force

IoTCloud

Applications

Automation

Cost Complexity People Shortage

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Today,

DATAis where the money is

2.5Quintillion bytes

of data

created

every day

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 6

82%of all consumer Internet traffic

will be connected devices

66%of IP traffic will be Wi-Fi

and mobile devicesAnnual global IP traffic

2.3ZB

Broadband speeds

2x

Increasing Digital Traffic Creates A Greater Attack SurfaceGlobal IP Traffic To Triple 2020

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 7

of organizations investigated

had adware infections

Adware

75%Malvertising

Using brokers (gates) to increase speed

and agility

Switching quickly between servers

without changing redirection

ShadowGate: a cost-effective campaign

Adware And Malvertising Shift Into High Gear

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 8

of spam is malicious

8%65%of email is spam

201620132010

Em

ails

/ S

eco

nd

.5K

1K

1.5K

5K

4.5K

4K

3K

3.5K

2.5K

2K

Spam Comes Roaring BackEmail Is Back In Vogue

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 9

22%of organisations cited

lost customers

23%of organisations cited

lost opportunity

29%of organisations cited

lost revenue

$

Losses After An Attack Are Real

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

Firewall

Last 20 years of security:

Got a problem?

Buy a Box

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

The

Existingsecurity stack…

Firewall

VPN

Email Security

Web Security

DLP

SIEM

Replacement Box

Failover

Persistent Threats

IDS

Firewall 2.0

VPN 2.0

Email Security 2.0

Web Security 2.0

DLP 2.0

SIEM 2.0

Replacement Box 2.0

Failover 2.0

Persistent Threats 2.0

IDS 2.0

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 12

Complexity Continues To Accelerate

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 13© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public

The Security Effectiveness GapCisco Security Closes the Gap

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 15

Integrated Architectural Approach

Best of Breed Portfolio

Cisco’s Security Strategy

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

Industry’s Most Effective Security Portfolio

– Threat Intelligence

Services

Integrated Threat Defense

Network CloudEndpoint

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

Attack ContinuumBefore During After

Security Everywhere Architecture

Web

Network Analytics

Advanced Malware

Secure Internet Gateway

UTMW W W

Policy & Access

Email

NGFW + NGIPS

Cloud Security

17

Branch IOTCloudData CenterEndpoint CampusEdge

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

Cisco Leads In Breach Detection

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

Cisco

Architectural

Approach

* Final Results

Firewall

VPN

Email Security

Web Security

DLP

SIEM

Replacement Box

Failover

Persistent Threats

IDS

Firewall 2.0

VPN 2.0

Email Security 2.0

Web Security 2.0

DLP 2.0

SIEM 2.0

Replacement Box 2.0

Failover 2.0

Persistent Threats 2.0

IDS 2.0Point

Products

Approach

38%+Return

on Investment*

Cisco Architectural Approach Helps Customers Save Money

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 20

Internet of Everything Security

• IoE Value Chain Assessment• IoE Application Assessment

• IoE DeviceAssessment

Application Security

• Secure ApplicationDesign• Application Assessment

• Enterprise SDLC

Mobile & Cloud Security

• Mobile App & Device Assessment

• Cloud Strategy &Architecture

• Cloud Application Assessment

Strategy, Risk, & Programs

• ITGovernance• Security Strategy & Policy

• IT RiskAssessment

• 3rd Party RiskProgram

• Security Program Development

• Identity & AccessManagement• Incident Readiness &Response

• Proactive Threat Hunt

• CyberRange

Compliance

• PCI DSS & PA DSSAssessment• ISO 27001 / 27002

• HIPAA

Infrastructure Security

• Network Architecture Assessment• Red TeamExercises

• Penetration Testing

• Social Engineering

• SOC Enablement

• Segmentation Service

Integration• Cisco Build Services

• Security Readiness

• Design, Development,

Implementation

• SOC Build & Integration

Assessment

• Test Plan Development &

Execution

• DeviceAssessment• Validation and Testing

• Kick Start Deployment

Optimization

• Custom Reporting

• Cross Integration• Performance Tuning

• Optimization Service

Remote Managed

• Device Health & Welfare• Security Control Management

• Security Event Monitoring

• Collective Security Intelligence

Active ThreatAnalytics• Advanced Threat Detection and

Triage

• Anomaly Detection• Customer-Specific Mitigation

• Collective Security Intelligence

Security Services Portfolio

Optimization

Migration

Integration

Program Strategy

Architecture & Design

Assessments

Hosted SecurityProduct Support Managed Security

Managed Services

Advisory Integration

Cisco ConfidentialCisco Confidential© 2016 Cisco and/or its affiliates. All rights reserved. 21

ASEAN Reference Case: FSI Customer

Challenges

Knowledge of external entities with intent

Mandates for compliance

Multiple Security vendors

Solution

Cisco Stealthwatch (NaaS) gave the customer visibility into

foreign threats, internal policy violations and segmentation

faults

Business outcomes achieved

Regulatory mandate compliance and risk reduction

Industry Photo to Be Placed

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

Security Architecture in the Digital World

Simple

Open

Automated

Effective

© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

#1Cisco Priority

5KPeople Strong

Ongoing

Innovation Integrated Best of breed portfolio

250Threat

Researchers

19.7BThreats Blocked

Daily

100xFaster Finding

Breaches

99%Security

Effectiveness

88%Fortune 100 use Cisco Security

BillionsInvested

Sourcefire

Lancope

Neohapsis

OpenDNS

ThreatGRID

Cognitive

Portcullis

CloudLock

Cisco’s Security Commitment

Thank you.