logicom solutions & cisco outmaneuvering malware · advanced malware protection (amp)...

8
Logicom Solutions & Cisco Outmaneuvering malware Harrys Tsiartas CTO Logicom Solutions

Upload: others

Post on 06-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Logicom Solutions & CiscoOutmaneuvering malware

Harrys Tsiartas

CTO

Logicom Solutions

Page 2: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

• Security elements

Holistic security approach

PROCESSESBusiness activities, work practices, workflows.

TECHNOLOGYIT, devices, operating systems, applications, files.

PEOPLEStaff and management, shareholders, customers,

service providers, consultants, authorities.

Page 3: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Data

Cente

r

Cam

pus

Cisco Security: Network, Endpoint & Cloud

Email/Web

Security

Cloudlock

Identity

Services

Engine

Firepower

NGFW

Advanced Malware

Protection

Anyconnect

VPN

Umbrella

StealthwatchTetration

Umbrella

Duo

Stealthwatch

On-PremisePerimeter Cloud

Endpoint

Email

Security

Umbrella

Page 4: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Network

ISR/ASR

Advanced

Malware

Umbrella

WebW W W

ISE

Email

NGFW/ NGIPS

Threat Grid

Stealthwatch

Event

Threat Intel

Policy

Context

Meraki

Cloudlock

Solution Integration: Cisco Portfolio

Page 5: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Standards regulations to watch for 2019

GDPR

Privacy by design by default, state of the ART,

TLS 1.3

MITM not possible anymore, Privacy wins!, Whats next?

WPA3

More secure, but will take a bit longer for adoption

802.1AE aka MACsec, adopt now!

Page 6: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Top Ten List on Ransonmware protection

1. Backup2. Patch3. Educate users on attack

methods4. Protect your network5. Segment network access

6. Keep a close eye on the network activity

7. Prevent infiltrations8. Arm your endpoints9. Gain real-time threat intelligence10.Don’t pay the ransom

Page 7: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Advanced Malware Protection (AMP)

architecture

Detect and contain advanced threats quickly

AMP Threat

Intelligence Cloud

Meraki® MX

ISR w/

FirePOWER

Services

Cisco® ASA w/ FirePOWER™

Services

FirePOWER NGIPS Appliance

Threat Grid Malware Analysis Private Cloud

Virtual Appliance

Cloud Email Security and

Email Security Appliance

Endpoints

AnyConnect®Windows OS Android MobileCentOS, Red Hat

and LinuxVirtual MAC OS

CWS and Web Security

ApplianceNetwork

Edge

Data

Center

Private

CWS

Remote Endpoints

Deploy easily with

multiple platform options

Leverage threat intelligence

and dynamic malware analysis

Page 8: Logicom Solutions & Cisco Outmaneuvering malware · Advanced Malware Protection (AMP) architecture Detect and contain advanced threats quickly AMP Threat Intelligence Cloud Meraki®

Business Consulting Services

Harrys Tsiartas

Logicom Solutions

CTO

: [email protected]