logicom solutions & cisco outmaneuvering malware · advanced malware protection (amp)...
TRANSCRIPT
Logicom Solutions & CiscoOutmaneuvering malware
Harrys Tsiartas
CTO
Logicom Solutions
• Security elements
Holistic security approach
PROCESSESBusiness activities, work practices, workflows.
TECHNOLOGYIT, devices, operating systems, applications, files.
PEOPLEStaff and management, shareholders, customers,
service providers, consultants, authorities.
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data
Cente
r
Cam
pus
Cisco Security: Network, Endpoint & Cloud
Email/Web
Security
Cloudlock
Identity
Services
Engine
Firepower
NGFW
Advanced Malware
Protection
Anyconnect
VPN
Umbrella
StealthwatchTetration
Umbrella
Duo
Stealthwatch
On-PremisePerimeter Cloud
Endpoint
Security
Umbrella
Network
ISR/ASR
Advanced
Malware
Umbrella
WebW W W
ISE
NGFW/ NGIPS
Threat Grid
Stealthwatch
Event
Threat Intel
Policy
Context
Meraki
Cloudlock
Solution Integration: Cisco Portfolio
Standards regulations to watch for 2019
GDPR
Privacy by design by default, state of the ART,
TLS 1.3
MITM not possible anymore, Privacy wins!, Whats next?
WPA3
More secure, but will take a bit longer for adoption
802.1AE aka MACsec, adopt now!
Top Ten List on Ransonmware protection
1. Backup2. Patch3. Educate users on attack
methods4. Protect your network5. Segment network access
6. Keep a close eye on the network activity
7. Prevent infiltrations8. Arm your endpoints9. Gain real-time threat intelligence10.Don’t pay the ransom
Advanced Malware Protection (AMP)
architecture
Detect and contain advanced threats quickly
AMP Threat
Intelligence Cloud
Meraki® MX
ISR w/
FirePOWER
Services
Cisco® ASA w/ FirePOWER™
Services
FirePOWER NGIPS Appliance
Threat Grid Malware Analysis Private Cloud
Virtual Appliance
Cloud Email Security and
Email Security Appliance
Endpoints
AnyConnect®Windows OS Android MobileCentOS, Red Hat
and LinuxVirtual MAC OS
CWS and Web Security
ApplianceNetwork
Edge
Data
Center
Private
CWS
Remote Endpoints
Deploy easily with
multiple platform options
Leverage threat intelligence
and dynamic malware analysis