Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,
Post on 07-Aug-2020
2 Views
Preview:
Transcript
Sam Rastogi, Product Marketing, Security Michal Brenner, Product Marketing, Service Provider Video December 9, 2015
Cisco End-to-end Video Security Solutions Video security everywhere
2 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Consumer demand for content is evolving
Consumers are watching anytime, anywhere, on any device
Multi-device streaming Binge Watching Online News Access
Ad-free viewing options Faster content creation New device options On-demand television
3 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
To meet that demand, you’re transforming video delivery to be
Flexible • Offer multiple pricing tiers
and subscription packages • Support multiple devices and
delivery methods
Responsive • Deliver content on demand • Implement new services and
delivery methods quickly
Efficient • Support business proposition
to customer • Price services competitively • Simplify operations
4 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
With the latest innovations to monetize your content
UHD content OTT
distribution
IP-based delivery
Multi-device viewing
TV apps
Personalized services
Home networking
Cloud technologies
Smart devices
Mobile
5 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Video Consumer
Not long ago, content delivery was fairly straightforward
Service Provider
Take 7
Content Creators
Video Consumer
Service Provider
Take 7
Content Creators
Creation Distribution Consumption
6 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Today, delivery methods are much more open
Creation Distribution Consumption
Regional Head End
Service Provider / Head End
Content Creators
Take 7
Video Consumer
3rd Party Sources
www…
www…
www…
Key: IP www… Set top box (STB)
Employees & endpoints
Content Delivery Network (CDN)
Video content data centers
Corporate data centers Cable Satellite Telecommunications
7 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Key: IP www… Set top box (STB)
Employees & endpoints
Content Delivery Network (CDN)
Video content data centers
Corporate data centers Cable Satellite Telecommunications
Creation Distribution Consumption
www…
Regional Head End
www…
Service Provider / Head End
Content Creators
Take 7
3rd Party Sources
Video Consumer
www…
the cleanup cost from the data breaches it's suffered to cost at least $171 million. Sony said the data breach costs will affect revenues for its fiscal 2011 year, which ends on March 31, 2012.According to a statement released by Sony's investor relations group, "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million. But those costs could go much higher, the company warned investors during a call on Monday. "So far, we have not received any confirmed reports of customer identity theft issues, nor confirmed any misuse of credit cards from the cyber attack. Those are key variables, and if that changes, the costs could change," said Sony, as reported by Joystiq, which saw a transcript of the call. Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network (PSN), Qriocity, Sony Online Entertainment, and other sites. On Sunday, new revelations surfaced that Sony apparently also suffered another data breach earlier this month, after hackers cracked Sony BMG's website in Greece. That would make it the seventh data breach suffered by Sony since April 2011.In this breach, which occurred on May 5, attackers obtained information about more than 8,000 website users, according to The Hackers News, which received a copy of the website's SQL database from "b4d_vipera," the hacker who took responsibility for the breach. The attacker also leaked a sample of the purloined database--containing 450 records--to Pastebin. It contains usernames, passwords for the Sony website, and email addresses. Security experts recommend that anyone with a Sony BMG account in Greece immediately change their Sony password, and any other uses of the same password online. The attacker said he exploited the Greek Sony website using a SQL injection attack against the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL injection attacks, which exploit website databases that haven't been patched against known vulnerabilities, are much favored by attackers, in part for their simplicity. "It's not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. In the wake of numerous data breaches involving more than 100 million user accounts, Sony is still attempting to get its systems fully secured and back online. Some of its Web properties, such as PlayStation Store, remain offline. On Wednesday, Sony also deactivated online password resets for PSN and Qriocity, saying its password system couldn't handle the load. But rumors that the password reset site had been compromised by attackers weren't true, said Patrick Seybold, Sony's senior director of corporate communications and social media, in a blog post. "Contrary to some reports, there was no hack involved. In the process of resetting of passwords there was a URL exploit that we have subsequently fixed.“ While Sony works to get its online password-reset process reestablished, Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said. Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said. MN users can reset their passwords via their PlayStation
Sony Data Breach Cleanup
To Cost $171 Million
Netflix's 'Breaking Bad' First Episode
Becomes First 4K Leak: Pirates Feast On 18GB Torrent
Maryland station the
victim of cyber attack
TV5Monde in chaos as data breach costs roll into the millions
Attackers are taking advantage of the open delivery and new attack vectors
20 Million Watched World Cup on Illegal Streams
“Game of Thrones” the most pirated TV show on the air
Trend Sources: 2014 Verizon Data Breach Investigations Report, Juniper Research, Creative Future
Microsoft’s Xbox Live hit
with possible data breach
Growing piracy concern
24% of worldwide data traffic is related to pirate sites
Significant financial loss
$2.1 trillion is the expected loss due to data breaches by 2019
Stealthier data threats
60% of data is stolen in hours
54% of breaches remain undiscovered for months
8 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Key: IP www… Set top box (STB)
Employees & endpoints
Content Delivery Network (CDN)
Video content data centers
Corporate data centers Cable Satellite Telecommunications
Creation Distribution Consumption Creation Distribution Consumption
Regional Head End
Service Provider / Head End
Content Creators
3rd Party Sources
Video Consumer
www…
www…
www…
Take 7
Stealing or leaking video content
Hacking networks for content
Stealing user credentials to gain access to content
Accessing content by hacking corporate data centers or compromising broadcast networks
Pirating distributed content
Offering full-service streaming networks, reselling your content
Sharing decryption keys and hacking apps to give illegal access to content
2-5693-45-66
00I I000III00II I0II00II I0I000
0I I000I0II00II I0I000
00I I000II00II I00I I000
9 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Key: IP www… Set top box (STB)
Employees & endpoints
Content Delivery Network (CDN)
Video content data centers
Corporate data centers Cable Satellite Telecommunications
Creation Distribution Consumption Creation Distribution Consumption
Regional Head End
Service Provider / Head End
Content Creators
3rd Party Sources
Video Consumer
www…
www…
www…
Take 7
Impacting customer experience
Obstructing service performance Altering content or disrupting the service
Targeting specific businesses with Denial of Service (DoS) from the end device
Inhibiting quality and performance of content delivery
00I I000III00II I0II00II I0
Disrupting service with Denial of Service (DoS) or infrastructure attacks
Modifying content or taking control of content during live broadcasts
00I I000III00II I0II00II I0
00I I000III00II I0II00II I0
10 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Key: IP www… Set top box (STB)
Employees & endpoints
Content Delivery Network (CDN)
Video content data centers
Corporate data centers Cable Satellite Telecommunications
Creation Distribution Consumption Creation Distribution Consumption
Regional Head End
Service Provider / Head End
Content Creators
3rd Party Sources
Video Consumer
www…
www…
www…
Take 7
Compromising your business and stealing confidential data
Hacking into your infrastructure
Stealing billing data and customer information, such as credit card numbers and personal identification data
Altering security settings and breaking the protection of your video services or other business functions
00I I000III00II I0II00II I0 2-5693-45-66
11 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Protecting your business
What’s needed is a comprehensive approach to security
Protecting your service
I000III00II I0II00II I0
www…
Protecting your content Take 7
12 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
That adapts to a changing threat landscape
Protecting your business
Protecting your service
Protecting your content
13 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
And supports the video delivery system you have worked hard to develop
Efficient Flexible Responsive
Protecting your business
Protecting your service
Protecting your content
14 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Protecting your business
Protecting your service
Protecting your content
Only Cisco delivers that security
Video Service
Protection Anti-Piracy Services
Data Center Security
15 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Video Service Protection
Anti-Piracy Services
Data Center Security
Our job is to ensure that you can focus on your business
We provide the best security components…
#1 in video security solutions
#1 in data center security
solutions
…that work together to provide protection across your business
Multi-layered, comprehensive
security
Enhanced protection with
common toolset
Cisco is a true partner, offering both security technologies and services to create a solution that addresses your business needs
16 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Video Service Protection
17 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
I00I I000III00II I0II00II I0I000
I00I I000III00II I0II00II I0I000
Cisco provides video service protection to help you monetize on industry opportunities
VGE OTT Security for ‘Over the Top’ delivery to any screen
VGE Connected Security for 2-way Cable/Telco networks
VGE Hybrid Security for hybrid 1 / 1.5 / 2-way satellite and IP networks
Enable premium content delivery and multiscreen experiences with a powerful security solution built on CA and multi-DRM
VGE
VGE
VideoGuard Everywhere (VGE)
I00I I000III00II I0II00II I0I000
I00I I000III00II I0II00II I0I000
18 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Maximize protection with a proven and robust solution
Used today in 1 of 3 pay TV homes worldwide
460 software/hardware security engineers
Studio-approved security
Protecting over $100 billion in customer revenue
300M active client devices >4.5M active mobile devices in a single OTT deployment
8 years of proven global DCAS deployments
Longest unhacked record, over 10 years
19 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Increase flexibility with a standards-based, scalable solution
Compatible with most popular managed and unmanaged devices
Supports multiple DRM deployments to reach every device while enabling consistent UX
Supports industry standard encryption, content formats, cloud technologies
Supports multiple application development platforms and language
Security support for advanced features and business policies
20 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reduce your TCO and time to market
Simplify operations
Reduce the complexity of securing your content
Streamline security management
Configure the solution faster
Deploy faster
Go to market quickly
Incorporate the latest technologies
Reduce in-house development
Lower operating costs
Minimize upfront costs
Pay up to 80% less per STB client
Realize savings of 25% for OTT deployments
21 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Anti-piracy Services
21 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
22 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco helps protect video content after distribution and eliminate piracy
Global team of 40+ researchers
6 continents and 20+ languages
20+ years experience
Streaming Piracy Prevention (SPP)
Operational Security Services (OpSec)
VideoGuard Everywhere 00I I000III00II I0II00II I0
SPP
Ensure that others don’t profit off of your content illegally
OpSec
2-5693-45-66 0I I000I0II00I00I000 00I0II00II I00II000I I000
23 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Verify the pirate’s ID by sending a unique
command to the suspicious source
Identify piracy source with advanced fingerprint
techniques
Eliminate the piracy by deactivating subscriber access to content
Locate illegal streams automatically with StreamLocator or with OpSec
Terminate piracy automatically upon detection
Locate Identify
Eliminate Verify
LIVE Cycle
24 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco security experts proactively address potential piracy
Scour forums for leads on pirate live streaming activity
Anticipate what pirates will do next and adjust security accordingly
Provide feedback to help improve anti-streaming technologies
Develop techniques to address credential sharing piracy
Picture
25 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data Center Security
26 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco solutions address advanced threats
DURING Detect Block
Defend
AFTER Scope
Contain Remediate
BEFORE Discover Enforce Harden
NGFW
Policy & Access
AnyConnect NGIPS
Web/Email Security
Advanced Malware Protection
Threat Grid (Sandboxing)
Lancope StealthWatch
Talos
Security Services
27 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Next-Generation Firewall (NGFW) Web Security
Cisco provides protection across video data centers and corporate IT
Lancope StealthWatch
AnyConnect
Policy & Access
Advanced Malware Protection
Next-Generation Intrusion Prevention System (NGIPS)
Threat Grid (Sandboxing)
Email Security
2-5693-45-66
Protect video content, infrastructure, and customer information
Data Center Security
Threat Grid (Sandboxing) AnyConnect Talos
Talos
Corporate network Video head end Web Security Email Security
NGFW Policy & Access NGIPS AMP
Lancope StealthWatch
28 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Gain enhanced visibility and control over your entire network
Cisco solutions: Next-Gen Firewall: ASA with Firepower Services
Next-Gen Intrusion Prevention System Policy & Access Lancope StealthWatch
See and control all video and corporate traffic
Eliminate unauthorized access of video content and customer data
Quickly and easily segment users and grant access based on category or role
Discover hidden threats or potential video content or data thefts
29 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco solutions: Email Security Web Security
Protect the pathways in and out of your network
AnyConnect
Block access to potentially malicious web pages, page objects, and emails
Prevent specific file types or information from being sent via email
Analyze and block traffic crossing any port into your network
Protect video content and data while working with remote branches, mobile workers, and 3rd parties
30 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco solutions:
Identify the latest and most advanced attacks
Next-Gen Intrusion Prevention System
Advanced Malware Protection (AMP)
Threat Grid (Sandboxing)
Protect against hidden malware or targeted attacks that introduce latency and service issues
Address new potential attacks and discover malware quickly by analyzing files in real time
Ensure that your security is always up to date against the latest threats
Lancope StealthWatch Talos
31 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco solutions:
Remediate quickly after an attack
AMP Retrospective Security Lancope StealthWatch
Discover where a file entered the network to address that vulnerability
Determine how long the file has been in your network to adjust remediation
Trace the file’s location and actions over time to address all affected areas
Determine how to remove the file to prevent continued attack
32 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Bringing it all together
33 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco provides end-to-end video security
Video Service Protection
Anti-Piracy Services
Data Center Security
34 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Improve protection
Simplify security
Cisco offers a variety of security services
Advisory Integration
Managed Services
• Research & Assessments • Architecture & Design • Program Strategy
• Integration • Migration Optimization
• Product Support • Hosted Security • Managed Security
Leverage extensive security experience
Evaluate security effectiveness with vulnerability assessments
Proactively address the latest evolving threats
Reduce the complexity of threat defense
Automatically keep solutions up to date
Minimize the impact of security on your network performance
35 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
We are positioned to meet today’s needs
Deep experience 20+ years experience as a trusted security partner
Global scale and reach 380 sites in 165+ countries
Great Partners Nearly 70,000 channel partners
Experts in IP 90% of Internet traffic goes over Cisco infrastructure
36 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
And are already addressing future security challenges Updating security solutions with learnings from anti-piracy teams
Incorporating security measures for practices not yet widely adopted
Integrating solutions for more comprehensive, end-to-end security
37 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Get started today with Cisco
Identify security gaps in your business 1
Learn more about our video and data center security solutions 2
Work with a Cisco engineer to plan a deployment 3
top related