the Evolution of Control Systems
Cisco ASA 5500Cisco ASA 5500Security ApplianceSecurity Appliance
Jon Sawdon- Security Business Development Manager.
the Evolution of Control Systems
AgendaAgenda
What do people look for in network security?
How can the ASA help?
What is the Cisco ASA Solution?
the Evolution of Control Systems
Understanding the SMB Decision MakerUnderstanding the SMB Decision Maker
How do I protect my
assets?
How can we be more productive?
How can I increase my profitability?
How can I be more adaptive to changing conditions?
AND do all that with limited staff
and budget?
the Evolution of Control Systems
SMB Situation AssessmentSMB Situation Assessment
Market research indicates strong demand in SMBs for ASA and ISR features:– - IPS – 39% Forrester, 25% Gartner– - Content Security – 36% Forrester, 35%
Gartner– - SSL – 25% Gartner
Manageability most important feature for SMBs
Source: Forrester, Dec 2006
the Evolution of Control Systems
Infrastructure Adoption and Infrastructure Adoption and Spending*Spending*
SMBs are looking to buy or upgrade all types of security technologies
Network Firewalls
Intrusion Detection
Content Security
Gateway Anti-Spyware Appliance
Gateway Anti-Virus Appliance
*December 2006, Data Overview “The State Of Security In SMBs And Enterprises”
the Evolution of Control Systems
The Need For a Systems The Need For a Systems ApproachApproach
• Complex environment
• Gaps and inconsistency
• Lower visibility
• More difficult to manage
• Higher TCO
• Simplified environment
• Tight integration, tight security
• Greater visibility
• Easier to deploy and manage
• Lower TCO
the Evolution of Control Systems
Security Appliance Market Has Diversified to Meet Changing Security Needs
Security Appliance Market Is EvolvingSecurity Appliance Market Is Evolving
• Small to medium businesses are moving to converged, multifunctional security appliances
• Larger enterprises seek environment-specific security solutions tailored to their needs
Source: IDC, 20060%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
2005 2006 2007 2008 2009
SSL VPN
UTM
SecureContent
ID&P
Firewall/VPN
IDC: Threat Management Security Appliance by Market Share
Ma
rke
t S
ize
($
M)
the Evolution of Control Systems
Market Leader with Commitment Market Leader with Commitment to Securityto Security
Product and Technology Innovation–1500+ security-focused engineers –Nine acquisitions added to our solution portfolio in last two years –SMB focused security products
Industry Leadership–Critical Infrastructure Assurance Group–Responsible disclosure
“ Because the network is a strategic customer asset, the protection of its business-critical applications and resources is a top priority.”
John Chambers, Chairman & CEO, Cisco
the Evolution of Control Systems
Network Security ThreatsNetwork Security Threats
• Network security threats include:– Network service attacks– Data theft and interception– Software-based viruses, worms and Trojan Horses
the Evolution of Control Systems
What is a Firewall?What is a Firewall?
Firewalls provide the first line of perimeter defense by:
Preventing unauthorized access to a network, while allowing in authorized users.
Provides ability to expose internet services in a limited ability to the outside world via a DMZ.
the Evolution of Control Systems
What is a VPN?What is a VPN?
VPNs are the solution to ensure that data confidentiality and integrity are protected in dynamic environments.
VPNs provide protection from data interception of unprotected assets using secure connectivity, encryption, and traffic authentication.
Company LANs and remoteusers can connect to thenetwork using the sameInternet access methods:dialup, (DSL), cable,ISDN, and wireless.
the Evolution of Control Systems
What is Intrusion What is Intrusion Prevention (IPS)Prevention (IPS)
IPS adds a layer of protection that firewalls alone cannot address. Follows are some key threats where IPS provides added protection:– Worms– Trojan Horses– Bots– Application Attacks– Port Scans and Hacking attempts– Covert Channel Communications
the Evolution of Control Systems
What is Content Security?What is Content Security?
Content Security represents a myriad of network security protections designed to protect information, users and devices stemming from common threats Comprehensive Malware Protection
–Integrates antivirus and malware technology to stop virtually all threats–Stops viruses, spyware, adware, jokeware, hacking tools, etc.
Advanced Content Filtering–Secures employee productivity and reduces legal liability–Stops phishing, spyware downloads, spyware “phone home” attempts, inappropriate browsing
Integrated Message Security–Removes unsolicited email (spam)–Stops email-born trojans, viruses, spware, etc.
VIRUSES
SPAM
SPYWARE
URL FILTERING
PHISHING
the Evolution of Control Systems
StorageNetworking
StorageNetworking
Security Is Now a Baseline Security Is Now a Baseline Architecture for IT InfrastructureArchitecture for IT Infrastructure
IP TelephonyIP Telephony
Wireless LANWireless LANNetworked
HomeNetworked
Home
RoutingRoutingSwitchingSwitching
Top Related