Issuu on Google+

Proteção, Mobilidade e Integração

Thiago Cunha - Product Sales Specialist Security © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

1


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2


Não Permitir Acesso Remoto? Não Permitir Dispositivos Móveis? Não Permitir Redes Sociais? Não Permitir Acesso à Visitantes?

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

3


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

4


LOCALIZAÇÃO © 2012 Cisco and/or its affiliates. All rights reserved.

DISPOSITIVO

APLICAÇÕES Cisco Confidential

5


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

6


• PWN Plug

Access Point “Rogue”

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

7


AS AMEAÇAS EVOLUEM

Enterprise Response

Antivirus (HostBased)

IDS/IPS Intelligence Reputation (Global) (Network and Analytics and Sandboxing Perimeter) (Cloud)

Worms

Spyware & Rootkits

APTs Cyberware

Increased Attack Surface

2000

2006

2013

“Amanhã”

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

8


PLANEJAR

INFECTAR ESPALHAR

EXPLORAR ATACAR

ROUBAR DIFAMAR

HACKER Hacker determina um possível ponto de entrada, formula um plano de ataque

© 2012 Cisco and/or its affiliates. All rights reserved.

Hacker explora vulnerabilidades e entrega suas “armas”.

Malware se move lateralmente através da rede interna em busca de recursos e dados.

Hackers tomam a ação de extrair dados, executam fraudes financeiras ou prejudicam a imagem da empresa Cisco Confidential

9


Š 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

13


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14


Segurança dos Dispositivos Móveis Segurança dos Dados e Aplicações Proteção contra Novas Ameaças

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

15


Roteia TODAS as Requisições

Origem de TODOS os Dados

Conduz TODOS os Dispositivos

Acomoda TODOS os Formatos

Controla TODO o Fluxo Envolve TODOS os Usuários

Enxerga TODO o Tráfego

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16


Infra Estrutura Cisco Está Preparada para Diversos Cenários

Controle de Acesso

Identidade 1

Profiling HTTP

IEEE 802.1x EAP User Authentication

NetFlow SNMP 2

Company Asset

© 2012 Cisco and/or its affiliates. All rights reserved.

Corporate Resources

4

Wireless LAN Controller

Personal Asset

RADIUS

Profiling to Identify Device

HQ

2:38 p.m.

DNS

VLAN 10 VLAN 20

Policy Decision

Internet Only

3

5

Posture of the Device

Enforce Policy in the Network

Unified Access Management

DHCP

6

Full or Partial Access Granted

Cisco Confidential

17


Netflow

GUI Unificada

Cisco Switches, Routers e Firewalls

Analisa Ameaças e Contextualiza

Lancope StealthWatch

Rede interna e Borda

NetFlow

Dados de Potenciais Ameaças Soluções Cisco - Identidade Dispositivos, Postura, NAT, Aplicações © 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18


Cloud Appliance

Virtual

WAN/LAN WAN/LAN

VPN 3G/LTE VPN

HOME

WAN/LAN

MOBILE USER

HEADQUARTERS

WAN/LAN

CAMPUS BRANCH

INTERNET CAFÉ © 2012 Cisco and/or its affiliates. All rights reserved.

PUBLIC WIFI

Cisco Confidential

19


REGRAS DO NEGÓCIO

Colaboração

REGRAS DE SEGURANÇA

Defesa Contra Ameaças

Agilidade nos Negócios

Compliance

Eficiência Operacional

Dispositivos Móveis

© 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

20


Š 2012 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21


Cisco fraudes