Page 1
1 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Ljupcho Joshevski Technical Lead, EMEAR-Central Theatre Global Security Sales Organization Nov 3rd, 2015
Cisco Day - Macedonia
The Future of Cisco Security
Page 2
2 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 20© 201515 CCC5 Ciscoisiscoooo aaandndd/o/or or itsits ts s aaffiilialiatliaatl esees. s. . AAAll All rigrigrighghrighhr ttsts s rs reeserseerrervved.ed.d.d.d. CisCisCisisiscco Co Co CConfonfnfiffiddenenentntiiaal al
Behind the Headlines
uurity BBreach in Federal Banking Networks tMajor Retailer CCredi
2 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 3
3 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3© 20© 201515 CC5 CCiscissc
$
3.3 55%
Mobile
Devices Per Knowledge Worker*
IP Traffic Mobile by 2017**
* Cisco IBSGG, **, ** CisCisCi co 2013 VNI, *** IDC * Cisc
545 44%
Cloud Cloud Apps Per Organization*
Annual Cloud Workload Growth***
* Skyhigh Networks Industry Report, ** Cisco Global Cloud Index, *** Cisco VNI Global Mobile Data Traffic Forecast,
co aananda /or its affiaffiliatates.es. All rightsts rreserserved. Cisccoco CConfidenttiaial
Growth in M2M IP Traffic 2013–18**
50B Connected “Smart Objects” by 2020*
36X * Cisco IBSGG *, ** CisCisscco VNI: Global Mobile Data TTTraraffficic Forecast 202013-2-200118
IoE
IT Sprawl
Page 4
4 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
There is a multi-billion dollar global industry targeting your prized assets
$450 Billion to
$1 Trillion Social Security
$1
Mobile Malware
$150
$ Bank
Account Info >$1000 depending
on account type and balance
Facebook Accounts $1 for an
account with 15 friends
Credit Card Data
$0.25-$60
Malware Development
$2500 (commercial
malware)
DDoS
DDoS as A Service ~$7/hour
Spam $50/500K
emails
Medical Records
>$50
Exploits $1000- $300K
Industrialization of Hacking
4 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 5
5 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 5©© 20© 2000©©© 22020©© 20© 2020© 20© 2©© 220©© 220©© 220© 2202020© 2© 2015 C15 C155 CCC151 CC15 C15 C115 C15 CCCCC115 CC11515 C5 C5 C15 C5 CC15 CC1515 Ciiscococoiisccoiscoiiscisis oiscoscoscoscoisiisiscocoisco aananddandanandandandnd//o/oror/orro/oooroor /o ititsitssits its afffiafffiaaffiaf liaiatl eees.ss. es.. AAAlAllAll A l Alll righrighhhghghg ts resserserrrvedveededddveed.d.vv CCCissCCisC coo CCCCc Coonfififidddenten ial
“In the midst of chaos, there is also opportunity.” – Sun Tzu
Evolve Your Strategy Now What?
5 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 6
6 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Highly motivated cybercriminals
Changing business models
Dynamic threat landscape
Think Like an Attacker
6 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 7
7 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Point in Time
Solution
Fragmented
Complex
Requires additional management
7 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 8
8 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Scope
Contain
Remediate
Continuous Solution
Discover
Enforce
Harden
Detect
Block
Defend
8 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 9
9 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Pervasive
Continuous
Always On
Complete Solution
Complete Solution
9 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 10
10 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Advanced Malware Protection
Network Behavior Analysis
NGFW
UTM
NAC + Identity Services
VPN
Firewall NGIPS
Web Security
Email Security
Continuous Solution
10 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 11
11 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1111© 20© 20115 C5 C15 Ciscoiscoiscosiscosco aanaandnd/or or itsits s affiaffiliata es. All rights rreesererrvved.veved CisC co Cco Confionfidddentdenttial lial
Why Cisco?
We built the human network to connect people, process and things
We have a rich history of solving our customers most important business challenges
A comprehensive Threat-Centric approach to solving security challenges with advanced products and services across the entire threat continuum
11 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 12
12 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Integration
Oct
Jan
Feb
April
June
July
Aug Sept
Nov Dec
Jan
March
May
Oct
Oct 2013 • Cisco acquires
Sourcefire
Dec 2014 • Cisco to acquire
Neohapsis
June 2014 • Cisco acquires
ThreatGRID
12 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 13
13 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Oct
Jan
Feb
April
June
July
Aug Sept
Nov Dec
Jan
March
May
Oct
IIInnnteeggrraattion Innovation
Jan 2014 • 2014 Cisco Annual Security Report
J
Feb 2014 • AMP Everywhere
integrated into Email/Web Appliances
• OpenAppID lanquage
July 2014 • GSSO
launched
Aug 2014 • TALOS • Cisco 2015 Mid Year Security Report • Identity Security Engine 1.3
Any Connect 4.0 Ecosystem & pxGrid Cyber Threat Defense 2.0
Sept 2014 • Sourcefire
FirePOWER integrated into ASA Firewall – first adaptive security appliance
Nov 2014 • Version 8.5 of AsyncOS for
Cisco Web Security Appliances • Cisco CWS Go-To-Market (GTM)
Advanced Malware Protection (AMP) and Cognitive Threat Analytics (CTA) for CWS through the ScanSafe Route-to-Market (RTM)
Dec 2014 • Snort 3.0 Alpha • New Email Encryption Service: • AMP on Cloud Web Security
(CWS) & Log extraction
Jan 2015 • ThreatGRID products
integrated into the Cisco Security Product Portfolio
• 2015 Annual Security Report
13 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 14
14 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Oct
Jan
Feb
April
June
July
Aug Sept
Nov Dec
Jan
March
May
Oct
IIInnnteeggrraattion IIInnnnoovvaattion Validation
Feb 2014 • 10th Annual 2014 Info
Security's Global Excellence Awards: Security/IT Dept of Year (Gold) CSO (Silver)
April 2014 • NSS Labs Breach
Detection Report and SVM for AMP
July 2014 • Leader in Gartner
MQ for Secure Email Gateways
Sept 2014 • NSS Labs NGFW
Report and SVM
• Champion: Info-Tech 2014 NAC Vendor Landscape
Jan 2015 • Leader in Gartner Magic
Quadrant for IPS
14 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 15
15 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 16
16 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What is your risk tolerance?
Where do you think your greatest vulnerabilities lie?
Are you concerned about IT Sprawl and the Industrialization of Hacking?
16 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 17
17 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Thank You