Secure Borderless Networks
Ali Fuat TRKAY
Borderless Security, Central & Eastern Europe Sales Manager
Istanbul, February 17th, 2011
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Writers Tool Writers
First Stage Abusers Hacker/Direct Attack
Middle Men Compromised Host and Application Botnet Creation
Second Stage Abusers
End Value Fame Theft
Malware Writers Worms
Machine Harvesting Information Harvesting Internal Theft Abuse of Privilege Botnet Management Personal Information Information Brokerage Electronic IP Leakage
Extortionist DDoS for Hire Spammer
Espionage Extortion Commercial Sales Fraudulent Sales Click Fraud Financial Fraud
Viruses
Phisher Pharmer/DNS Poisioning Identity Theft
Trojans
Spyware
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
The Evolving Security Threats
Criminal Specialization Driving More Sophisticated Attacks
Web Ecosystem Becomes Number one Threat Vector Criminals Exploit Users Trust, Challenging Traditional Security Solutions Creative Methods (Business Models) Used to Attract Victims
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Mobility
1.3 Billion New Networked Mobile Devices in the Next Three Years
Workplace Experience
Blurring the Borders:
Consumer Workforce Employee Partner
Video
Changing the Way We Work
Video projected to quadruple IP traffic by 2014 to 767 Exabytes*
IT Device Consumerization Creates Security Challenges
Mobile and What Who you AreDevices you Have Access to Becomes Critical IT Resources
Compliance Challenges: How to Secure new Anyone, Anything, Environment and Protect Anywhere, Sensitive Data Anytime Enforcing Policy on Remote Devices
Security Must Perform Under new Bandwidth Requirements
Potential for new Threats Spreading Through Video
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Policy
Corporate Border Applications and Data
Policy
(Access Control, Identity, Acceptable Use, Malware, Data Security)
Borderless Data Center
Platform as a Service Software as a Service
Infrastructure as a Service X as a Service
Corporate Office
Borderless Internet
Branch Office
Home Office
Borderless End Zones
Airport Mobile User Coffee Shop
Attackers
Partners
Customers
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Pillar 1: Borderless end zone
Broadest Coverage Persistent Connectivity Advanced Security
Pillar 2: Borderless Security Array
Advanced,
Proactive Threat Protection Integrated into the
Pillar 3: Secure Virtualized Data Center
Secure Physical Infrastructure Connect Physical Security to Virtual Machines Embed Security in the Virtual Switch
Fabric of the
Network
Pillar 4: Rich Policy Enables Ubiquitous, Consistent Control
Access Control, Data Security & Acceptable Use
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Cisco Borderless Network Security Traditional VPN
Protected
Un-Protected
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Always On Security and Protection
In the Office Sitting in a Park At a Coffee Shop
Cape Town, South Africa San Jose, California
Sydney, Australia
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
1. Close gaps in situational awareness
2. Focus first on solving old issuesand doing it well
3. Educate your workforce on securityand include them in the process
4. Understand that one security border is no longer enough 5. View security as a differentiator for your business
2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
10
Thank you.
Cisco Security Intelligence Operations: www.cisco.com/go/sio Cisco Security blog: blogs.cisco.com/security Cisco Security Products: www.cisco.com/go/security
IntelliShield Alert Service 90-Day Trial: www.cisco.com/go/intellishield/trial