in collaboration with intel - cisco · july. aug. sept. nov. dec. jan. march. may. oct. feb. 2014....
TRANSCRIPT
Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved.
In Collaboration with Intel®
Why Cyber Security?Why Now?
Stuart MoultonRegional Sales Manager UKI Security Team
04/03/2015 In Collaboration with Intel®
Cisco Confidential 3© 2015 Cisco and/or its affiliates. All rights reserved.
Behind the Headlines
Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.
IT Sprawl
$
3.355%
MobileDevices Per Knowledge Worker*
IP Traffic Mobile by 2017**
54544%
CloudCloud AppsPer Organization*
Annual Cloud WorkloadGrowth***
Growth in M2M IP Traffic 2013–18**
50B Connected“Smart Objects” by 2020*
36X
IoE
Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved.
Industrialization of Hacking • There is a multi-billion dollar global industry targeting your prized assets
$450 Billionto
$1 TrillionSocial Security
$1
MobileMalware
$150
$Bank
Account Info>$1000 depending
on account type and balance
FacebookAccounts$1 for an
account with 15 friends
Credit CardData
$0.25-$60
MalwareDevelopment
$2500(commercial
malware)
DDoS
DDoS asA Service~$7/hour
Spam$50/500K
emails MedicalRecords
>$50
Exploits$1000-$300K
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved.
Threat Landscape Demands More Than Application Control
avoids detection, and attacks swiftly
It is a Communitythat hides in plain sight,
100%of companies connect to domains that host
malicious files or services
54%of breaches
remain undiscoveredfor months
60%of data is stolen in hours
Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved.
Now What?
Evolve your strategy
“In the midst of chaos, there is also opportunity.”
– Sun Tzu
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Cisco Confidential 8© 2015 Cisco and/or its affiliates. All rights reserved.
Highly motivatedcybercriminals
Changingbusiness models
Dynamic threatlandscape
Think Like an Attacker
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved.
Specialized Threat Analysis and Protection A New Market Definition and Tornado Opportunity
Infonetics
“The specialized threat analysis and protection (STAP) market is a competitive market drawing revenue from the following logical markets of IDC's security taxonomy: Web, messaging, endpoint, network, and security and vulnerability management (forensics). Products within this market must use a predominantly signature-less technology (i.e., sandboxing, emulation, big data analytics, containerization) to detect malicious activity. These solutions can be based at the network level, on the endpoint, or both, and scan both inbound and outbound traffic for anomalies including botnet and command and control traffic. This market also includes products that allow for the reverse engineering and forensic analysis of discovered malware.”
A 42.2% CAGR in Contrast to a 6% CAGR by 2017 Would Indicate
as a Potential Tornado Market Is Either Started or Is on the Horizon
42.2
Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved.
Why Cisco?
We built the human network to connect people, process and things
We have a rich history of solving our customers most important business challenges
A comprehensive Threat-Centric approach to solving security challenges with advanced products and services across the entire threat continuum
Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved.
Oct
Jan
Feb
April
June
July
AugSept
NovDec
Jan
March
May
Oct
Oct2013Cisco acquires Sourcefire
Dec2014Cisco to acquire Neohapsis
Integration
Cisco Confidential 12© 2015 Cisco and/or its affiliates. All rights reserved.
Oct
Jan
Feb
April
June
July
AugSept
NovDec
Jan
March
May
Oct
Jan20142014 Cisco Annual Security Report
Feb2014Sourcefire AMP Everywhere integrated into Email/Web Appliances –OpenAppID lanquage
June2014Cisco acquires ThreatGRID
July2014GSSO launched
Aug2014• TALOS • Cisco 2015 Mid Year Security
Report • Identity Security Engine 1.3
Any Connect 4.0Ecosystem & pxGridCyber Threat Defense 2.0
Sept2014SourcefireFirePOWERintegrated into ASA Firewall – first adaptive security appliance
Nov2014• Version 8.5 of AsyncOS for
Cisco Web Security Appliances • Cisco CWS Go-To-Market (GTM)
Advanced Malware Protection (AMP) and Cognitive Threat Analytics (CTA) for CWS through the ScanSafeRoute-to-Market (RTM)
Dec2014Launched 1. Snort 3.0 Alpha 2. New Email Encryption Service: 3. AMP on Cloud Web Security
(CWS) & Log extraction
Jan2015• ThreatGRID products
integrated into the Cisco Security Product Portfolio
• 2015 Annual Security Report
Innovation
Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved.
Oct
Jan
Feb
April
June
July
AugSept
NovDec
Jan
March
May
Oct
Feb201410th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year (Gold) and CSO (Silver)
April2014'NSS Labs Breach Detection Report and SVM for AMP
July2014Leader in Gartner MQ for Secure Email Gateways
Sept2014NSS Labs NGFW Report and SVM
Champion: Info-Tech 2014 NAC Vendor Landscape
Jan2015Leader in Gartner Magic Quadrant for IPS
Validation
Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved.
Security Challenges in the DC
Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved.
Changing Business models and competitive environments are driving IT organizations around the globe down and evolutionary path in their data centers. The result: There is a challenge between achieving business value and protecting these highly prized targets.
Security Challenges in the Data Center
Cisco Confidential 16© 2015 Cisco and/or its affiliates. All rights reserved.
Benefits of Virtualization vs. Security Concerns
Consolidation
OPEX reduction
Agility
Scalability
VS.
VS.
VS.
VS.
VM sprawl
No traffic visibility between VMs
Regulatory compliance
Securitybottlenecks
Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved.
What IT Buyers Want
78%
74%
57%
consider the adoption of server virtualization tech to be a very important driver for purchasing new security solutions
consider the need for security solutions compatible with SDN as a key driver
are looking for consistent security across virtual and non-virtual environments
Cisco Confidential 18© 2015 Cisco and/or its affiliates. All rights reserved.
Performance Demands vs. Security Concerns
want to upgrade their security products to match network performance
indicate that upgrading security appliances to gain access to high-speed network interfaces is a main concern
want to deploy solutions that support more total and concurrent sessions
70%
77%
73%
Cisco Confidential 19© 2015 Cisco and/or its affiliates. All rights reserved.
Secure Data Center for the Enterprise CVD Portfolio
Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved.
Security Challenges for IOT
Cisco Confidential 21© 2015 Cisco and/or its affiliates. All rights reserved.
EMEA partners see potential in IoT
Source: Canalys quick poll, 177 IT channel respondents, January 2015
Which of the following technology trends will be most beneficial for the channel in 2015?
Internet of Things
57%
3D printing
20%
Wearables
16%
Drones
5%
Robotics
2%(Percentage
of responses)
Cisco Confidential 22© 2015 Cisco and/or its affiliates. All rights reserved.
Number of devices increases attack surface
1 Device visibility
Default passwords and settings
Disparate software and standards
2
3
Volume-led security issues
Cisco Confidential 23© 2015 Cisco and/or its affiliates. All rights reserved.
IoT requires a modern approach to security
Security by design
Behavioral analytics
Domain-based
architecture
Policies, protocols and
legislation
Cisco Confidential 24© 2015 Cisco and/or its affiliates. All rights reserved.
Example of IOT: Modern Industrial Control System (ICS)
Mainly“normal office”
environment
Datacenters
Network
ICS world
Cisco Confidential 25© 2015 Cisco and/or its affiliates. All rights reserved.
Pike Research: ICS Security Market US $4.1B
Utility Investment reports that a new Pike Research study, Industrial Control System Security, estimates the ICS Security market to total $4.1B between 2011-2018.
Estimate does not reflect Stuxnetacceleration.
Cisco Confidential 26© 2015 Cisco and/or its affiliates. All rights reserved.
Our solutions mapped to ICS
• Physical Security• ASA NG• SF + AMP• CTD • ISE• TrustSec
• Physical Security• Field Network• Embedded
Networks• ASA NG• SF+AMP• Genesis Black Box
• Physical Security• Wireless Solutions• Networking Solutions
• Physical Security• UCS, ACI• Wireless Solutions• ISE• TrustSec• VPN Solutions
• Plant Switching • Plant Routing• VPN solutions
Cisco Confidential 27© 2015 Cisco and/or its affiliates. All rights reserved.
Security Increases DC Deal Size
Average DC Deal$370K
Incremental Security$150K
Secure DCTotal Deal
Size$520K
ACINexusUCSMDS
ASA 5585-X
ASAvVSG
NGIPS
41%Increase in deal
size
The Data Center Security Market will be worth up to US$13.8 Billion By 2018 - This is a SIGNIFICANT growth opportunity
And Cisco has the most powerful suite of purpose-built DC security solutions in the industry…
Thank you.