syscom global solutions inc

Post on 11-May-2022

7 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Company Name:SYSCOM GLOBAL SOLUTIONS INC.

CEO:Seishi Sato

Incorporation:May 24th, 1990

Capital:$3,200,000.00

Stock Holders:• Seishi Sato, President & CEOー 199 shares (66.3%)

• ITOCHU Techno-Solutions America, Inc. ー101shares (33.7%)

Employees:150+ (70% engineers)

Headquarters: New York, NY

Branches: Los Angeles, Silicon Valley & Tokyo

©2021 SYSCOM GLOBAL SOLUTIONS INC. All Rights Reserved.

SYSCOM Company Profile

SYSCOM Solution & Service Overview

Consulting

Project Management

System Management

Incident Management

Account Management

ERP Solution - ERP (Microsoft Dynamics 365)- Consulting / PMO / SES

DX Solution - MS Power Platform - AI, BI / RPA / CRM / EDI /

WMS

Security Solution- Next-Gen Security- Threat Defense Lifecycle

(TDL)

Cloud Solution - Private Cloud by Clavis- Microsoft 365 - Azure- AWS System Integration

- Network - Server/Storage- VoIP

©2021 SYSCOM GLOBAL SOLUTIONS INC. All Rights Reserved. 3

Cisco Meraki & Duo

4

Introduction to Cloud-Managed Switching

Simplifying IT with Cloud Management

A complete cloud -managed IT solutionWire le ss, switching, security, SD-WAN, endpoint management, and security camerasIntegrated hardware , software , and cloud se rvices

Leader in cloud-managed ITAmong Cisco’s faste st growing portfolios

420k+Unique customers

5.7M+Meraki devices

online

30M+API calls per day

6

Delivered by MerakiMX Security & SD-WAN Appliances

7

Delivered by MerakiMX Security & SD-WAN Appliances

1.5 million malware samples/day

600 billion email messages / day

16 billion web requests / day

Honeypots

Open source communities

Internalvulnerability discovery

Telemetry

Internet-wide scanning

Over 250 full timethreat researchers

Millions of telemetry agents

4 global data centers

Over 100 threat intelligence partners

Over 1,100 threat traps

Supported by Cisco Talos Threat Intelligence

NEW

MX AppliancesCost-effective gigabitSD-WAN branch connectivity

RECOMMENDED USESmall branch

WAN PORTS×1 Gigabit Ethernet SFP×2 Gigabit Ethernet RJ45

FIREWALL THROUGHPUT1Gbps

SITE-TO-SITE VPN THROUGHPUT500Mbps

RECOMMENDED USESmall-medium branch

WAN PORTS×2 Gigabit Ethernet SFP×2 Gigabit Ethernet RJ45

FIREWALL THROUGHPUT1Gbps

SITE-TO-SITE VPN THROUGHPUT500Mbps

RECOMMENDED USEMedium-large branch

WAN PORTS×2 10 Gigabit Ethernet SFP+×2 2.5 Gigabit Ethernet RJ45

FIREWALL THROUGHPUT2Gbps

SITE-TO-SITE VPN THROUGHPUT800Mbps

RECOMMENDED USELarge branch

WAN PORTS×2 10 Gigabit Ethernet SFP+×2 2.5 Gigabit Ethernet RJ45

FIREWALL THROUGHPUT3Gbps

SITE-TO-SITE VPN THROUGHPUT1Gbps

MX75

$1,995

MX85$2,495

MX95

$4,995

MX105

$7,495

Available from 6 July 2021

Meraki Insights

10

Introduction to Cloud-Managed Switching

Why Customers Choose MerakiIntuitive, centralized management• All Meraki devices are configured through a single-pane-of-glass• No training or complex command line script required• Visualize and manage all switch ports on the Meraki dashboard

with Virtual Stacking

Easie st to deploy, manage , and configure

• Zero-touch provisioning for multi-site deployment

• Customizable Meraki APIs for automated site se tups

• Seamless firmware update s from the cloud

Industry-leading visibility

• Use r, application, and device analytics

• Network -wide monitoring and alerts to reduce re sponse times

• Remote packe t capture and othe r diagnostics tools

Your SASE Journey withCisco Meraki

Cisco’s SASE

Solution

Delivered by MerakiMX Security & SD-WAN Appliances

Best-in-class Cisco Umbrella security & Duo’s ZeroTrust

Agenda

● MFA in the world today

● How is Duo helping?

● Duo Product

● Duo + Meraki

Modern Perimeter

Traditional Perimeter

Corporate Networks;On-site Users, Endpoints,

Server, and Apps

Cloud Applications

Hybrid Cloud

Personal Devices

Vendors & Contractors

Mobile Devices

Remote Employees

Protect organizations by verifying the identity of usersand the health of their devices before connecting to the applications they need.

Every Application

Trusted Devices

Trusted Users

Visibility & Policies

Zero -Trust Model: Focus on Access

Security Risks Persistwith Credential Theft

of breaches leverage either stolen or weak

passwordsSource: Verizon, 10th edition of the Data Breach Investigations Report

81%Compromised credentials is a major security risk

Cumbersome tokens and one-time passwords;

not user friendly

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Why Duo?

World’s Easiest and Most Secure MFA

Instantly integrates with all apps

Users self-enroll in minutes

Users authenticate in seconds; no codes to enter

Unified Access Vision

● Who is the user?● What’s their role?● Privileged User?

● Up to date? ● Securely configured?● Corporate Issued or

BYOD?

● Cloud and On-Premise Apps

● Single Sign On● Consistent End User

Experience

Trusted Users

Trusted Devices

Every Application

Verify the identity of users and the health of their devices before they access your applications

Duo MFA

Device Insight Policies

1 2 3

REST APIS

WEB SDK

RADIUS

SAML

OIDC

CustomVPN RA SSO

RRAS

Multicloud Email/MSFT On-Prem

Start Here Then Expand

Duo Supports Thousands of Work Applications

Learn more about application integrations

Complete VisibilityGain complete visibility into all your devices.

NEWAssess Security PostureEasily identify device security posture.

● Is it managed?

● Is it running up to date software?

● Is it encrypted?

● Is it passcode protected?

● Is the firewall enabled?

● Is biometric enabled?

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Duo + Meraki = Better

Together

Allow Access For Only Managed Devices

● Check if the device is enrolled in System Manager

● Restrict BYOD access to sensitive applications

● Provide compliant device access on and off network

CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.

Thank You!

top related