in collaboration with intel - cisco · july. aug. sept. nov. dec. jan. march. may. oct. feb. 2014....

28
Cisco Confidential 1 © 2015 Cisco and/or its affiliates. All rights reserved. In Collaboration with Intel ®

Upload: others

Post on 23-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved.

In Collaboration with Intel®

Page 2: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Why Cyber Security?Why Now?

Stuart MoultonRegional Sales Manager UKI Security Team

04/03/2015 In Collaboration with Intel®

Page 3: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 3© 2015 Cisco and/or its affiliates. All rights reserved.

Behind the Headlines

Page 4: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.

IT Sprawl

$

3.355%

MobileDevices Per Knowledge Worker*

IP Traffic Mobile by 2017**

54544%

CloudCloud AppsPer Organization*

Annual Cloud WorkloadGrowth***

Growth in M2M IP Traffic 2013–18**

50B Connected“Smart Objects” by 2020*

36X

IoE

Page 5: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved.

Industrialization of Hacking • There is a multi-billion dollar global industry targeting your prized assets

$450 Billionto

$1 TrillionSocial Security

$1

MobileMalware

$150

$Bank

Account Info>$1000 depending

on account type and balance

FacebookAccounts$1 for an

account with 15 friends

Credit CardData

$0.25-$60

MalwareDevelopment

$2500(commercial

malware)

DDoS

DDoS asA Service~$7/hour

Spam$50/500K

emails MedicalRecords

>$50

Exploits$1000-$300K

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Page 6: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved.

Threat Landscape Demands More Than Application Control

avoids detection, and attacks swiftly

It is a Communitythat hides in plain sight,

100%of companies connect to domains that host

malicious files or services

54%of breaches

remain undiscoveredfor months

60%of data is stolen in hours

Page 7: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved.

Now What?

Evolve your strategy

“In the midst of chaos, there is also opportunity.”

– Sun Tzu

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Page 8: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 8© 2015 Cisco and/or its affiliates. All rights reserved.

Highly motivatedcybercriminals

Changingbusiness models

Dynamic threatlandscape

Think Like an Attacker

© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

Page 9: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved.

Specialized Threat Analysis and Protection A New Market Definition and Tornado Opportunity

Infonetics

“The specialized threat analysis and protection (STAP) market is a competitive market drawing revenue from the following logical markets of IDC's security taxonomy: Web, messaging, endpoint, network, and security and vulnerability management (forensics). Products within this market must use a predominantly signature-less technology (i.e., sandboxing, emulation, big data analytics, containerization) to detect malicious activity. These solutions can be based at the network level, on the endpoint, or both, and scan both inbound and outbound traffic for anomalies including botnet and command and control traffic. This market also includes products that allow for the reverse engineering and forensic analysis of discovered malware.”

A 42.2% CAGR in Contrast to a 6% CAGR by 2017 Would Indicate

as a Potential Tornado Market Is Either Started or Is on the Horizon

42.2

Page 10: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved.

Why Cisco?

We built the human network to connect people, process and things

We have a rich history of solving our customers most important business challenges

A comprehensive Threat-Centric approach to solving security challenges with advanced products and services across the entire threat continuum

Page 11: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved.

Oct

Jan

Feb

April

June

July

AugSept

NovDec

Jan

March

May

Oct

Oct2013Cisco acquires Sourcefire

Dec2014Cisco to acquire Neohapsis

Integration

Page 12: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 12© 2015 Cisco and/or its affiliates. All rights reserved.

Oct

Jan

Feb

April

June

July

AugSept

NovDec

Jan

March

May

Oct

Jan20142014 Cisco Annual Security Report

Feb2014Sourcefire AMP Everywhere integrated into Email/Web Appliances –OpenAppID lanquage

June2014Cisco acquires ThreatGRID

July2014GSSO launched

Aug2014• TALOS • Cisco 2015 Mid Year Security

Report • Identity Security Engine 1.3

Any Connect 4.0Ecosystem & pxGridCyber Threat Defense 2.0

Sept2014SourcefireFirePOWERintegrated into ASA Firewall – first adaptive security appliance

Nov2014• Version 8.5 of AsyncOS for

Cisco Web Security Appliances • Cisco CWS Go-To-Market (GTM)

Advanced Malware Protection (AMP) and Cognitive Threat Analytics (CTA) for CWS through the ScanSafeRoute-to-Market (RTM)

Dec2014Launched 1. Snort 3.0 Alpha 2. New Email Encryption Service: 3. AMP on Cloud Web Security

(CWS) & Log extraction

Jan2015• ThreatGRID products

integrated into the Cisco Security Product Portfolio

• 2015 Annual Security Report

Innovation

Page 13: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved.

Oct

Jan

Feb

April

June

July

AugSept

NovDec

Jan

March

May

Oct

Feb201410th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year (Gold) and CSO (Silver)

April2014'NSS Labs Breach Detection Report and SVM for AMP

July2014Leader in Gartner MQ for Secure Email Gateways

Sept2014NSS Labs NGFW Report and SVM

Champion: Info-Tech 2014 NAC Vendor Landscape

Jan2015Leader in Gartner Magic Quadrant for IPS

Validation

Page 14: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved.

Security Challenges in the DC

Page 15: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved.

Changing Business models and competitive environments are driving IT organizations around the globe down and evolutionary path in their data centers. The result: There is a challenge between achieving business value and protecting these highly prized targets.

Security Challenges in the Data Center

Page 16: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 16© 2015 Cisco and/or its affiliates. All rights reserved.

Benefits of Virtualization vs. Security Concerns

Consolidation

OPEX reduction

Agility

Scalability

VS.

VS.

VS.

VS.

VM sprawl

No traffic visibility between VMs

Regulatory compliance

Securitybottlenecks

Page 17: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved.

What IT Buyers Want

78%

74%

57%

consider the adoption of server virtualization tech to be a very important driver for purchasing new security solutions

consider the need for security solutions compatible with SDN as a key driver

are looking for consistent security across virtual and non-virtual environments

Page 18: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 18© 2015 Cisco and/or its affiliates. All rights reserved.

Performance Demands vs. Security Concerns

want to upgrade their security products to match network performance

indicate that upgrading security appliances to gain access to high-speed network interfaces is a main concern

want to deploy solutions that support more total and concurrent sessions

70%

77%

73%

Page 19: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 19© 2015 Cisco and/or its affiliates. All rights reserved.

Secure Data Center for the Enterprise CVD Portfolio

Page 20: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved.

Security Challenges for IOT

Page 21: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 21© 2015 Cisco and/or its affiliates. All rights reserved.

EMEA partners see potential in IoT

Source: Canalys quick poll, 177 IT channel respondents, January 2015

Which of the following technology trends will be most beneficial for the channel in 2015?

Internet of Things

57%

3D printing

20%

Wearables

16%

Drones

5%

Robotics

2%(Percentage

of responses)

Page 22: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 22© 2015 Cisco and/or its affiliates. All rights reserved.

Number of devices increases attack surface

1 Device visibility

Default passwords and settings

Disparate software and standards

2

3

Volume-led security issues

Page 23: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 23© 2015 Cisco and/or its affiliates. All rights reserved.

IoT requires a modern approach to security

Security by design

Behavioral analytics

Domain-based

architecture

Policies, protocols and

legislation

Page 24: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 24© 2015 Cisco and/or its affiliates. All rights reserved.

Example of IOT: Modern Industrial Control System (ICS)

Mainly“normal office”

environment

Datacenters

Network

ICS world

Page 25: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 25© 2015 Cisco and/or its affiliates. All rights reserved.

Pike Research: ICS Security Market US $4.1B

Utility Investment reports that a new Pike Research study, Industrial Control System Security, estimates the ICS Security market to total $4.1B between 2011-2018.

Estimate does not reflect Stuxnetacceleration.

Page 26: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 26© 2015 Cisco and/or its affiliates. All rights reserved.

Our solutions mapped to ICS

• Physical Security• ASA NG• SF + AMP• CTD • ISE• TrustSec

• Physical Security• Field Network• Embedded

Networks• ASA NG• SF+AMP• Genesis Black Box

• Physical Security• Wireless Solutions• Networking Solutions

• Physical Security• UCS, ACI• Wireless Solutions• ISE• TrustSec• VPN Solutions

• Plant Switching • Plant Routing• VPN solutions

Page 27: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Cisco Confidential 27© 2015 Cisco and/or its affiliates. All rights reserved.

Security Increases DC Deal Size

Average DC Deal$370K

Incremental Security$150K

Secure DCTotal Deal

Size$520K

ACINexusUCSMDS

ASA 5585-X

ASAvVSG

NGIPS

41%Increase in deal

size

The Data Center Security Market will be worth up to US$13.8 Billion By 2018 - This is a SIGNIFICANT growth opportunity

And Cisco has the most powerful suite of purpose-built DC security solutions in the industry…

Page 28: In Collaboration with Intel - Cisco · July. Aug. Sept. Nov. Dec. Jan. March. May. Oct. Feb. 2014. 10th Annual 2014 Info Security's Global Excellence Awards: Security/IT Dept of Year

Thank you.