SlideShare uma empresa Scribd logo
1 de 37
Baixar para ler offline
Enterprise	
  Networks	
  Security	
  
Leverage	
  the	
  Network	
  to	
  Protect	
  Against	
  and	
  Mi;gate	
  Threats	
  	
  
Fernando Lucato / Heitor Silva
Business Development – Enterprise Networks LATAM
•  Industry	
  trends	
  and	
  business	
  drivers	
  
•  Enterprise	
  Networks	
  priori;es	
  and	
  focus	
  areas	
  
•  Securing	
  Enterprise	
  Networks	
  
•  Products	
  within	
  the	
  solu;on	
  	
  
•  Use	
  cases	
  	
  
•  Demo	
  
•  Q&A	
  
Agenda	
  
	
  
Industry	
  trends	
  and	
  business	
  drivers	
  	
  
852%	
  
Revenue	
  Growth	
  	
  
2005	
  to	
  2013	
  
Bookstore	
   Taxi	
   Music	
   Newspaper	
  Point-­‐of-­‐Sale	
  
200	
  
Ci;es	
  
45	
  
Countries	
  
40	
  Million	
  
Subscribers	
  
$30B	
  
Forecasted	
  Transac;ons	
  
in	
  2014	
  
31%	
  
of	
  WW	
  Digital	
  	
  
Ad	
  Revenue	
  
Digi;za;on	
  disrup;ng	
  well	
  established	
  businesses	
  
The	
  digital	
  businesses	
  are	
  disrup;ng	
  the	
  market	
  
0
2
4
6
8
10
12
14
2014 2015 2016 2017 2018 2019
Gaming (0.03% , 0.05% )
File Sharing (16.0% , 5.2% )
Web/Data (23.2% , 13.2% )
IP VoD (6.0% , 10.3% )
Internet Video (54.8% , 71.2% )
Video	
  traffic	
  growth	
  (La;n	
  America)	
  
By	
  2019,	
  IP	
  Video	
  will	
  represent	
  82%	
  of	
  traffic	
  
Source:	
  Cisco	
  VNI	
  Global	
  IP	
  Traffic	
  Forecast,	
  2014–2019	
  
25%	
  CAGR	
  2014–2019	
  
Exabytes	
  per	
  
Month	
  
*	
  Figures	
  (n)	
  refer	
  to	
  2014,	
  2019	
  traffic	
  shares	
  	
  	
  
SD	
  2	
  Mbps	
  
HD	
  7.2	
  Mbps	
  
UHD	
  18	
  Mbps	
  
10
33
77
146
245
371
0
50
100
150
200
250
300
350
400
2014 2015 2016 2017 2018 2019
Connetced	
  
4Ks	
  TVs	
  (M)	
  
Source:	
  Cisco	
  VNI	
  Global	
  IP	
  Traffic	
  Forecast,	
  2014–2019	
  
Video	
  defini;on	
  increment	
  
By2019,	
  more	
  than	
  31%	
  of	
  the	
  connected	
  TVs	
  will	
  be	
  4K	
  
And	
  speed	
  is	
  an	
  obsession	
  for	
  networks	
  users…	
  
68%	
  of	
  all	
  broadband	
  access	
  by	
  
2019	
  
Online	
  Video	
  	
  
(HD	
  movie	
  download)	
  
22	
  minutes	
  
(UHD	
  movie	
  download)	
  
2	
  hours	
  
10	
  Mbps	
  
33%	
  of	
  all	
  broadband	
  access	
  by	
  
2019	
  
Online	
  Video	
  	
  
(HD	
  movie	
  download)	
  
9	
  minutes	
  
(UHD	
  movie	
  download)	
  
48	
  minutes	
  
25	
  Mbps	
  
7%	
  of	
  all	
  broadband	
  access	
  by	
  
2019	
  
Online	
  Video	
  	
  
(HD	
  movie	
  download)	
  
2	
  minutes	
  
(UHD	
  movie	
  download)	
  
12	
  minutes	
  
100	
  Mbps	
  
Enterprise	
  Networks	
  priori;es	
  and	
  focus	
  areas	
  
Wireless as a
primary
connectivity
Enterprise	
  Networks	
  focus	
  areas	
  
Digitization story Intelligent WAN Cloud and new
consumption
models
Security	
  everywhere	
  
Network	
  
Security	
  
Unified	
  Access	
   Intelligent	
  
WAN	
  
ACI	
  –	
  Policy	
  based	
  
Automa;on	
  
Foundational Architectures
IT	
  
TransformaTon	
  
Security	
  &	
  
	
  Compliance	
  
Customer	
  
Experience	
  
Workforce	
  
Experience	
  
Driving	
  business	
  outcomes	
  approach	
  
Securing	
  Enterprise	
  Networks	
  
Changing
Business Models
Dynamic
Threat Landscape
Complexity
and Fragmentation
New	
  Networks	
  Mean	
  New	
  Security	
  Challenges	
  	
  
Organizations lack visibility
into which and how many
devices are on their Network
Services are moving to the
Cloud at a faster rate than IT
can keep up
Over 50 billion connected
“smart objects” by 2020.
Acquisitions, joint ventures,
and partnerships are
increasing in regularity.
ENTERPRISE
MOBILITY
ACQUISITIONS AND
PARTNERSHIPS
CLOUD
INTERNET OF
THINGS
It’s	
  Not	
  “IF”	
  You	
  Will	
  Be	
  Breached…It’s	
  “WHEN.”	
  
Expanded	
  Enterprise	
  Acack	
  Surface	
  
Network	
  Threats	
  Are	
  Gedng	
  Smarter	
  
1990	
   2020	
  2015	
  2010	
  2005	
  2000	
  1995	
  
Phishing,	
  Low	
  
Sophis;ca;on	
  	
  
Hacking	
  Becomes	
  
an	
  Industry	
  
Sophis;cated	
  
Acacks,	
  Complex	
  
Landscape	
  
Viruses	
  
1990–2000	
  
Worms	
  
2000–2005	
  
Spyware	
  and	
  Rootkits	
  
2005–Today	
  
APTs	
  Cyberware	
  
Today	
  +	
  
Criminals	
  Know	
  More	
  About	
  Your	
  Network	
  Than	
  You	
  Do	
  
Custom	
  Malware	
  Remains	
  Dormant	
  for	
  Months	
  to	
  Learn	
  Vulnerabili;es	
  in	
  the	
  Network	
  and	
  then	
  Acack	
  those	
  Vulnerabili;es.	
  
Cisco	
  Confiden;al	
   14	
  ©	
  2013-­‐2014	
  	
  Cisco	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  
You	
  Can’t	
  Defend	
  Against	
  What	
  You	
  Can’t	
  See	
  
	
  
	
   01010
10010
11	
  
01010
10010
11	
  
01010
10010
11	
  
01010
10010
11	
  
Solu;on	
  Overview	
  	
  
Cisco’s	
  Threat-­‐Centric	
  Approach	
  to	
  Security	
  
BEFORE AFTERDURING
Network as a Sensor
Flexible	
  NetFlow	
  u	
  Lancope	
  StealthWatch	
  u	
  ISE	
  	
  
Network as an Enforcer
Flexible	
  NetFlow	
  u	
  Lancope	
  StealthWatch	
  	
  u Cisco TrustSec u ISE
Cisco	
  Network	
  as	
  a	
  Sensor	
  (NaaS)	
  
Detect	
  Anomalous	
  Traffic	
  Flows,	
  Malware	
  
IdenTfy	
  User	
  Access	
  Policy	
  ViolaTons	
  
Obtain	
  Broad	
  Visibility	
  into	
  All	
  Network	
  Traffic	
  
Cisco	
  Network	
  as	
  an	
  Enforcer	
  (NaaE)	
  
Implement	
  Access	
  Controls	
  to	
  Secure	
  Resources	
  
Contain	
  the	
  Scope	
  of	
  an	
  Aeack	
  on	
  the	
  Network	
  
QuaranTne	
  Threats,	
  Reduce	
  Time-­‐to-­‐RemediaTon	
  
Network	
  as	
  a	
  Sensor	
  (NaaS)	
  
Ø  Cisco	
  Networking	
  Porlolio	
  
Ø  Cisco	
  NetFlow	
  
Ø  Lancope	
  StealthWatch	
  
Ø  Cisco	
  Iden;ty	
  Services	
  Engine	
  (ISE)	
  
	
  
	
  
	
  
Deeper	
  Visibility	
  and	
  Greater	
  Defense	
  against	
  
Network	
  Threats	
  
	
  
	
  
Network	
  as	
  an	
  Enforcer	
  (NaaE)	
  
Ø  Cisco	
  Networking	
  Porlolio	
  
Ø  Cisco	
  NetFlow	
  
Ø  Lancope	
  StealthWatch	
  
Ø  Cisco	
  Iden;ty	
  Services	
  Engine	
  (ISE)	
  
Ø  Cisco	
  TrustSec	
  Somware-­‐Defined	
  Segmenta;on	
  
	
  
NetFlow	
  for	
  Dynamic	
  Network	
  Awareness	
  
Understand	
  Network	
  Behavior	
  and	
  Establish	
  a	
  Network’s	
  Normal	
  
	
  
Network Flows Highlight Attack Signatures
A	
  Powerful	
  InformaTon	
  Source	
  	
  
for	
  Every	
  Network	
  ConversaTon	
  
Each	
  and	
  Every	
  Network	
  Conversa;on	
  	
  
over	
  an	
  Extended	
  Period	
  of	
  Time	
  
Source	
  and	
  Des;na;on	
  IP	
  Address,	
  IP	
  Ports,	
  	
  
Time,	
  Data	
  Transferred,	
  and	
  More	
  
Stored	
  for	
  Future	
  Analysis	
  	
  
A	
  CriTcal	
  Tool	
  
	
  to	
  IdenTfy	
  a	
  Security	
  Breach	
  
Iden;fy	
  Anomalous	
  Ac;vity	
  	
  
Reconstruct	
  the	
  Sequence	
  of	
  Events	
  
Forensic	
  Evidence	
  and	
  Regulatory	
  Compliance	
  
NetFlow	
  for	
  Full	
  Details,	
  NetFlow-­‐Lite	
  for	
  1/n	
  Samples	
  
	
  
Lancope	
  StealthWatch	
  System	
  
Network	
  Reconnaissance	
  Using	
  Dynamic	
  NetFlow	
  Analysis	
  
Monitor	
   Detect	
   Analyze	
   Respond	
  
Ø  Understand	
  your	
  
network	
  normal	
  
Ø  Gain	
  real-­‐;me	
  
situa;onal	
  awareness	
  of	
  
all	
  traffic	
  
Ø  Leverage	
  Network	
  
Behavior	
  Anomaly	
  
detec;on	
  &	
  analy;cs	
  
Ø  Detect	
  behaviors	
  linked	
  
to	
  APTs,	
  insider	
  
threats,	
  DDoS,	
  and	
  
malware	
  
Ø  Collect	
  &	
  Analyze	
  
holis;c	
  network	
  audit	
  
trails	
  
Ø  Achieve	
  faster	
  root	
  
cause	
  analysis	
  to	
  
conduct	
  thorough	
  
forensic	
  inves;ga;ons	
  
Ø  Accelerate	
  network	
  
troubleshoo;ng	
  &	
  threat	
  
mi;ga;on	
  
Ø  Respond	
  quickly	
  to	
  threats	
  
by	
  taking	
  ac;on	
  to	
  
quaran;ne	
  through	
  Cisco	
  
ISE	
  
Cisco	
  Iden;ty	
  Services	
  Engine	
  (ISE)	
  
Adding	
  Visibility	
  and	
  Context	
  to	
  NetFlow	
  	
  
INTEGRATED
PARTNER CONTEXT
NETWORK / USER
CONTEXT
How
WhatWho
WhereWhen
SEND	
  CONTEXTUAL	
  DATA	
  COLLECTED	
  FROM	
  USERS,	
  DEVICES,	
  AND	
  NETWORKS	
  
TO	
  LANCOPE	
  FOR	
  ADVANCED	
  INSIGHTS	
  AND	
  NETFLOW	
  ANALYTICS	
  
What	
  Can	
  Cisco	
  NaaS	
  and	
  NaaE	
  Offer	
  You?	
  
Consistent	
  	
  
Control	
  
Complexity	
  	
  
ReducTon	
  
Consistent	
  Policies	
  
Across	
  the	
  	
  
Network	
  and	
  	
  
Data	
  Center	
  
Fits	
  and	
  Adapts	
  	
  
to	
  Changing	
  
Business	
  Models	
  	
  
Global	
  Intelligence	
  
With	
  the	
  Right	
  
Context	
  
Detects	
  and	
  Stops	
  
Advanced	
  Threats	
  
Advanced	
  Threat	
  
ProtecTon	
  
Unmatched	
  
Visibility	
  
Network	
  as	
  a	
  Sensor/Network	
  as	
  an	
  Enforcer	
  
Use	
  Cases	
  
Customer	
  Case	
  Study	
  -­‐	
  Network	
  as	
  a	
  Sensor	
  
Industry:	
  Retail	
  	
  
Company:	
  Large	
  Known	
  Global	
  Retailer	
  	
  
Exis2ng	
  Environment:	
  
•  Large	
  Cisco	
  Switch	
  &	
  Router	
  Footprint	
  
•  ASA	
  &	
  ISE	
  
	
  	
  
Customer	
  Challenges:	
  
•  Limited	
  visibility	
  &	
  intelligence	
  across	
  their	
  highly-­‐distributed	
  retail	
  footprint	
  	
  
•  Lack	
  of	
  ability	
  to	
  correlate	
  numerous	
  data	
  sets	
  
	
  	
  
	
  Results:	
  
•  Amer	
  deploying	
  Cisco	
  Nellow,	
  Lancope	
  Stealth	
  Watch	
  and	
  Cisco	
  ISE	
  	
  
•  Gains	
  Retail	
  Point-­‐of-­‐Presence	
  Visibility	
  
•  Deeper	
  Understanding	
  into	
  Network	
  Applica;on	
  Usage	
  
Customer	
  Case	
  Study	
  -­‐	
  Network	
  as	
  an	
  Enforcer	
  
Industry:	
  Banking	
  	
  
Company:	
  Large	
  Known	
  Global	
  Bank	
  
Exis2ng	
  Environment:	
  
•  Large	
  Cisco	
  Switch	
  &	
  Router	
  Footprint	
  
	
  	
  
Customer	
  Challenges:	
  
•  Visibility	
  into	
  the	
  network	
  and	
  rogue	
  devices	
  
•  Policy	
  enforcement	
  of	
  user	
  to	
  data	
  center	
  policies	
  	
  
•  Mee;ng	
  compliance	
  audits	
  	
  
	
  	
  
	
  Results:	
  
•  Amer	
  deploying	
  Lancope	
  Stealth	
  Watch	
  Cisco	
  ISE	
  and	
  Cisco	
  TrustSec	
  	
  
•  Gain	
  Deep	
  Visibility	
  into	
  Network	
  Access	
  and	
  Devices	
  	
  
•  Segment	
  Network	
  Access	
  and	
  Assets	
  using	
  Business	
  Role	
  Based	
  Policies	
  
•  Accelerated	
  ;me	
  to	
  Compliance	
  Audits	
  	
  
Solu;on	
  descrip;on	
  and	
  demo	
  
Behavioral	
  Analysis	
  
•  Leverages	
  knowledge	
  of	
  known	
  bad	
  
behaviour	
  
Anomaly	
  DetecTon	
  
•  Iden;fy	
  a	
  change	
  from	
  
“normal”	
  
Behavioral	
  Analysis	
  &	
  Anomaly	
  Detec;on	
  
Solu;on	
  Architecture	
  
StealthWatch	
  
Management	
  
Console	
  
UDP	
  Director	
  
FlowCollector	
  
NetFlow,	
  
syslog,	
  SNMP	
   NetFlow	
  enabled	
  
infrastructure	
  
FlowSensor	
  
VMware	
  ESX	
  with	
  
FlowSensor	
  VE	
  
User	
  and	
  Device	
  
Informa;on	
  
StealthWatch	
  
IDen;ty	
  Cisco	
  ISE	
  
Feeds	
  of	
  emerging	
  threat	
  
informa;on	
  
Unified View:
Security and Network
Monitoring
NaaS:	
  Powered	
  by	
  StealthWatch
Denial	
  of	
  Service	
  
SYN	
  Half	
  Open;	
  ICMP/UDP/Port	
  Flood	
  
Worm	
  PropagaTon	
  
Worm	
  Infected	
  Host	
  Scans	
  and	
  Connects	
  to	
  the	
  Same	
  Port	
  Across	
  MulTple	
  
Subnets,	
  Other	
  Hosts	
  Imitate	
  the	
  Same	
  Above	
  Behavior	
  
FragmentaTon	
  Aeack	
  
Host	
  Sending	
  Abnormal	
  #	
  Malformed	
  Fragments.	
  
Botnet	
  DetecTon	
  
When	
  Inside	
  Host	
  Talks	
  to	
  Outside	
  C&C	
  Server	
  	
  
for	
  an	
  Extended	
  Period	
  of	
  Time	
  
Host	
  ReputaTon	
  Change	
  
Inside	
  Host	
  PotenTally	
  Compromised	
  or	
  
Received	
  Abnormal	
  Scans	
  or	
  Other	
  Malicious	
  Aeacks	
  
Network	
  Scanning	
  
TCP,	
  UDP,	
  Port	
  Scanning	
  Across	
  MulTple	
  Hosts	
  
Data	
  ExfiltraTon	
  
Large	
  Outbound	
  File	
  Transfer	
  VS.	
  Baseline	
  
Policy	
  Defined	
  Role-­‐Based	
  Segmenta;on	
  
Flexible	
  and	
  Scalable	
  	
  Policy	
  Enforcement	
  
Switch	
   Router	
   DC	
  FW	
   DC	
  Switch	
  
Simplified	
  Access	
  Management	
  
Accelerated	
  Security	
  Opera;ons	
  
Consistent	
  Policy	
  Anywhere	
  
Who	
  can	
  talk	
  to	
  whom	
  
Who	
  can	
  access	
  protected	
  assets	
  
How	
  systems	
  can	
  talk	
  to	
  other	
  systems	
  
Desired	
  Policy	
  
NaaE:	
  Segmenta;on	
  via	
  TrustSec	
  
StealthWatch	
  Capabili;es	
  Summary	
  
Visibility	
  
• Context-­‐aware	
  
visibility	
  into	
  
network,	
  applica;on	
  
and	
  user	
  ac;vity	
  
• BYOD	
  
• Cloud	
  monitoring	
  
• IPv6	
  
• East-­‐West	
  Traffic	
  
monitoring	
  
• Network	
  
segmenta;on	
  
Threat	
  DetecTon	
  
• Advanced	
  Persistent	
  
Threats	
  
• Botnet	
  (CnC)	
  
Detec;on	
  
• Data	
  Exfiltra;on	
  
• Network	
  
Reconnaissance	
  
• Insider	
  Threat	
  
• DDoS	
  
• Malware	
  
• Network	
  Behavior	
  
Anomaly	
  Detec;on	
  
• SLIC	
  threat	
  feed	
  
Incident	
  Response	
  
• In-­‐depth,	
  flow-­‐
based	
  forensic	
  
analysis	
  	
  of	
  
suspicious	
  incidents	
  
• Scalable	
  repository	
  
of	
  security	
  
informa;on	
  
• Retrace	
  the	
  step-­‐by-­‐
step	
  ac;ons	
  of	
  a	
  
poten;al	
  acacker	
  
• On-­‐demand	
  packet	
  
capture	
  
Network	
  DiagnosTcs	
  
• Applica;on	
  
Awareness	
  
• Capacity	
  Planning	
  
• Performance	
  
Monitoring	
  
• Troubleshoo;ng	
  
User	
  Monitoring	
  
• Cisco	
  ISE	
  
• Monitor	
  privileged	
  
access	
  
• Policy	
  enforcement	
  
Cisco	
  Confiden;al	
   33	
  ©	
  2013-­‐2014	
  	
  Cisco	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  
Thank	
  you!	
  
	
  
Fernando	
  Lucato	
  
flucato@cisco.com	
  
+55	
  11	
  5508-­‐6348	
  
	
  
Heitor	
  Silva	
  
hesilva@cisco.com	
  
+55	
  11	
  5508-­‐1506	
  
TradiTonal	
  Security	
  Policy	
  
Cisco	
  TrustSec	
  Somware-­‐Defined	
  Segmenta;on	
  
Provide	
  Role-­‐Based	
  Segmenta;on	
  to	
  Control	
  Access	
  and	
  Contain	
  Threats	
  
TrustSec	
  Security	
  Policy	
  
SegmentaTon	
  Policy	
  Enforced	
  Across	
  the	
  Extended	
  Network	
  
Switch	
   Router	
   VPN	
  &	
  	
  
Firewall	
  
DC	
  Switch	
   Wireless	
  
Controller	
  
Simplifies	
  Firewall	
  Rule,	
  ACL,	
  VLAN	
  Management	
  
Prevents	
  Lateral	
  Movement	
  of	
  Poten;al	
  Threats	
  
Eliminates	
  Costly	
  Network	
  Re-­‐architecture	
  
Segmenta;on	
  is	
  Powerful	
  Security	
  Tool	
  
“Network segmentation… is one of the most effective
controls an agency can implement to mitigate the second
stage of a network intrusion, propagation or lateral
movement”
“Good network and role segmentation will do wonders for
containing an incident.”
“Effective network segmentation… reduces the extent to
which an adversary can move across the network”
“Segregate networks, limit allowed protocols usage and limit
users’ excessive privileges.”
2014 DATA BREACH
INVESTIVATIONS REPORT
The Untold Story of the Target Attack
Step by Step
Aortato Labs, August 2014
Bringing	
  It	
  All	
  Together	
  
Architec;ng	
  Network	
  as	
  a	
  Sensor	
  and	
  Network	
  as	
  an	
  Enforcer	
  	
  
Network Sensor
(Lancope)
NGFW
Campus/DC
Switches/WLC
Cisco Routers /
3rd Vendor Devices
Threat
NGIPS
API
API (pxGrid)
ISE
Network Sensors Network Enforcers
Policy & Context
Sharing
TrustSec
Security Group Tag
Cisco Collective
Security Intelligence
Confidential
Data

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Security course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislationSecurity course: exclusive 5G SA pitfalls and new changes to legislation
Security course: exclusive 5G SA pitfalls and new changes to legislation
 
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive networkCiena - the journey to the adaptive network
Ciena - the journey to the adaptive network
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems Top 7 Security Measures for IoT Systems
Top 7 Security Measures for IoT Systems
 
Palo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-shortPalo alto networks_customer_overview_november2011-short
Palo alto networks_customer_overview_november2011-short
 
F5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhereF5 networks the_expectation_of_ssl_everywhere
F5 networks the_expectation_of_ssl_everywhere
 
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive toolOpen Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Defending the campus juniper nerworks
Defending the campus juniper nerworksDefending the campus juniper nerworks
Defending the campus juniper nerworks
 
Axoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing ServicesAxoss Wireless Penetration Testing Services
Axoss Wireless Penetration Testing Services
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 

Destaque

Ferramentas livres para teste de invasao
Ferramentas livres para teste de invasao Ferramentas livres para teste de invasao
Ferramentas livres para teste de invasao
gleydsonslim
 

Destaque (20)

MITSUBISHI ELETRIC
MITSUBISHI ELETRICMITSUBISHI ELETRIC
MITSUBISHI ELETRIC
 
O inimigo interno - Information security
O inimigo interno - Information securityO inimigo interno - Information security
O inimigo interno - Information security
 
Unidade 1.1 segurança e segurança física
Unidade 1.1   segurança e segurança física Unidade 1.1   segurança e segurança física
Unidade 1.1 segurança e segurança física
 
CLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau BrancoCLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau Branco
 
Whatscorp. Aplicativo de mensagens para Empresas e Organizações
Whatscorp. Aplicativo de mensagens para Empresas e OrganizaçõesWhatscorp. Aplicativo de mensagens para Empresas e Organizações
Whatscorp. Aplicativo de mensagens para Empresas e Organizações
 
Segurança da Informação
Segurança da InformaçãoSegurança da Informação
Segurança da Informação
 
Apresentação Workshop - Análise de Vulnerabilidades
Apresentação Workshop - Análise de VulnerabilidadesApresentação Workshop - Análise de Vulnerabilidades
Apresentação Workshop - Análise de Vulnerabilidades
 
Segurança em Plataforma Microsoft
Segurança em Plataforma MicrosoftSegurança em Plataforma Microsoft
Segurança em Plataforma Microsoft
 
Segurança de sistema firewall
Segurança de sistema   firewallSegurança de sistema   firewall
Segurança de sistema firewall
 
Ferramentas livres para teste de invasao
Ferramentas livres para teste de invasao Ferramentas livres para teste de invasao
Ferramentas livres para teste de invasao
 
Panorama de Segurança na Internet das Coisas
Panorama de Segurança na Internet das CoisasPanorama de Segurança na Internet das Coisas
Panorama de Segurança na Internet das Coisas
 
CLASS 2016 - Palestra Renato Mendes
CLASS 2016 - Palestra Renato Mendes CLASS 2016 - Palestra Renato Mendes
CLASS 2016 - Palestra Renato Mendes
 
Redes Convergentes DIAT Vs NovaGenesis
Redes Convergentes DIAT Vs NovaGenesisRedes Convergentes DIAT Vs NovaGenesis
Redes Convergentes DIAT Vs NovaGenesis
 
Segurança na internet
Segurança na internet Segurança na internet
Segurança na internet
 
Modelo alternativo às franquias de dados - Provedores de Internet
Modelo alternativo às franquias de dados - Provedores de InternetModelo alternativo às franquias de dados - Provedores de Internet
Modelo alternativo às franquias de dados - Provedores de Internet
 
Resposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEMResposta a Incidentes de Segurança com ferramentas SIEM
Resposta a Incidentes de Segurança com ferramentas SIEM
 
Sistemas Computacionais Aula 9 - Auditoria e Segurança em Sistemas de Informa...
Sistemas Computacionais Aula 9 - Auditoria e Segurança em Sistemas de Informa...Sistemas Computacionais Aula 9 - Auditoria e Segurança em Sistemas de Informa...
Sistemas Computacionais Aula 9 - Auditoria e Segurança em Sistemas de Informa...
 
Deep Web 101 – Vasculhando as profundezas da Internet
Deep Web 101 – Vasculhando as profundezas da InternetDeep Web 101 – Vasculhando as profundezas da Internet
Deep Web 101 – Vasculhando as profundezas da Internet
 
Trabalho Firewall
Trabalho FirewallTrabalho Firewall
Trabalho Firewall
 
Sistemas de segurança
Sistemas de segurançaSistemas de segurança
Sistemas de segurança
 

Semelhante a A rede como um sensor de segurança

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
 

Semelhante a A rede como um sensor de segurança (20)

Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
A modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
 
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocenceCisco Connect Ottawa 2018 dna assurance shortest path to network innocence
Cisco Connect Ottawa 2018 dna assurance shortest path to network innocence
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Stephen Wallo
Stephen WalloStephen Wallo
Stephen Wallo
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 

Mais de Cisco do Brasil

Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
Cisco do Brasil
 

Mais de Cisco do Brasil (20)

Revista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficialRevista Cisco Live ed 25 oficial
Revista Cisco Live ed 25 oficial
 
Revista Cisco Live Ed 24
Revista Cisco Live Ed 24Revista Cisco Live Ed 24
Revista Cisco Live Ed 24
 
Revista Cisco Live Ed 23
Revista Cisco Live Ed 23Revista Cisco Live Ed 23
Revista Cisco Live Ed 23
 
Revista Cisco Live Ed 22
Revista Cisco Live Ed 22Revista Cisco Live Ed 22
Revista Cisco Live Ed 22
 
Revista Cisco Live Ed 21
Revista Cisco Live Ed 21Revista Cisco Live Ed 21
Revista Cisco Live Ed 21
 
Revista cisco live ed 20
Revista cisco live ed 20Revista cisco live ed 20
Revista cisco live ed 20
 
O seu DNS está protegido
O seu DNS está protegidoO seu DNS está protegido
O seu DNS está protegido
 
Cisco Live Magazine ed 19
Cisco Live Magazine ed 19Cisco Live Magazine ed 19
Cisco Live Magazine ed 19
 
Rio 2016 em Números - Cisco
Rio 2016 em Números - CiscoRio 2016 em Números - Cisco
Rio 2016 em Números - Cisco
 
Cisco Tetration Analytics
Cisco Tetration AnalyticsCisco Tetration Analytics
Cisco Tetration Analytics
 
Revista Cisco Live ed 18
Revista Cisco Live ed 18Revista Cisco Live ed 18
Revista Cisco Live ed 18
 
Brazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investmentsBrazilian Scenario - Trends and Challenges to keep IT investments
Brazilian Scenario - Trends and Challenges to keep IT investments
 
Cloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a criseCloud Computing: a chave para inovar durante a crise
Cloud Computing: a chave para inovar durante a crise
 
Vença o jogo da rede
Vença o jogo da redeVença o jogo da rede
Vença o jogo da rede
 
Transforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovaçãoTransforme sua rede em um mecanismo de inovação
Transforme sua rede em um mecanismo de inovação
 
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local5 perguntas para ajudar você a escolher  uma rede na nuvem ou no local
5 perguntas para ajudar você a escolher uma rede na nuvem ou no local
 
5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede5 principais maneiras de extrair informações da sua rede
5 principais maneiras de extrair informações da sua rede
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento5 formas de simplificar as operações e economizar seu orçamento
5 formas de simplificar as operações e economizar seu orçamento
 
A transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisasA transformação digital com a internet de todas as coisas
A transformação digital com a internet de todas as coisas
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

A rede como um sensor de segurança

  • 1. Enterprise  Networks  Security   Leverage  the  Network  to  Protect  Against  and  Mi;gate  Threats     Fernando Lucato / Heitor Silva Business Development – Enterprise Networks LATAM
  • 2. •  Industry  trends  and  business  drivers   •  Enterprise  Networks  priori;es  and  focus  areas   •  Securing  Enterprise  Networks   •  Products  within  the  solu;on     •  Use  cases     •  Demo   •  Q&A   Agenda    
  • 3. Industry  trends  and  business  drivers    
  • 4. 852%   Revenue  Growth     2005  to  2013   Bookstore   Taxi   Music   Newspaper  Point-­‐of-­‐Sale   200   Ci;es   45   Countries   40  Million   Subscribers   $30B   Forecasted  Transac;ons   in  2014   31%   of  WW  Digital     Ad  Revenue   Digi;za;on  disrup;ng  well  established  businesses   The  digital  businesses  are  disrup;ng  the  market  
  • 5. 0 2 4 6 8 10 12 14 2014 2015 2016 2017 2018 2019 Gaming (0.03% , 0.05% ) File Sharing (16.0% , 5.2% ) Web/Data (23.2% , 13.2% ) IP VoD (6.0% , 10.3% ) Internet Video (54.8% , 71.2% ) Video  traffic  growth  (La;n  America)   By  2019,  IP  Video  will  represent  82%  of  traffic   Source:  Cisco  VNI  Global  IP  Traffic  Forecast,  2014–2019   25%  CAGR  2014–2019   Exabytes  per   Month   *  Figures  (n)  refer  to  2014,  2019  traffic  shares      
  • 6. SD  2  Mbps   HD  7.2  Mbps   UHD  18  Mbps   10 33 77 146 245 371 0 50 100 150 200 250 300 350 400 2014 2015 2016 2017 2018 2019 Connetced   4Ks  TVs  (M)   Source:  Cisco  VNI  Global  IP  Traffic  Forecast,  2014–2019   Video  defini;on  increment   By2019,  more  than  31%  of  the  connected  TVs  will  be  4K  
  • 7. And  speed  is  an  obsession  for  networks  users…   68%  of  all  broadband  access  by   2019   Online  Video     (HD  movie  download)   22  minutes   (UHD  movie  download)   2  hours   10  Mbps   33%  of  all  broadband  access  by   2019   Online  Video     (HD  movie  download)   9  minutes   (UHD  movie  download)   48  minutes   25  Mbps   7%  of  all  broadband  access  by   2019   Online  Video     (HD  movie  download)   2  minutes   (UHD  movie  download)   12  minutes   100  Mbps  
  • 8. Enterprise  Networks  priori;es  and  focus  areas  
  • 9. Wireless as a primary connectivity Enterprise  Networks  focus  areas   Digitization story Intelligent WAN Cloud and new consumption models Security  everywhere  
  • 10. Network   Security   Unified  Access   Intelligent   WAN   ACI  –  Policy  based   Automa;on   Foundational Architectures IT   TransformaTon   Security  &    Compliance   Customer   Experience   Workforce   Experience   Driving  business  outcomes  approach  
  • 12. Changing Business Models Dynamic Threat Landscape Complexity and Fragmentation New  Networks  Mean  New  Security  Challenges     Organizations lack visibility into which and how many devices are on their Network Services are moving to the Cloud at a faster rate than IT can keep up Over 50 billion connected “smart objects” by 2020. Acquisitions, joint ventures, and partnerships are increasing in regularity. ENTERPRISE MOBILITY ACQUISITIONS AND PARTNERSHIPS CLOUD INTERNET OF THINGS It’s  Not  “IF”  You  Will  Be  Breached…It’s  “WHEN.”   Expanded  Enterprise  Acack  Surface  
  • 13. Network  Threats  Are  Gedng  Smarter   1990   2020  2015  2010  2005  2000  1995   Phishing,  Low   Sophis;ca;on     Hacking  Becomes   an  Industry   Sophis;cated   Acacks,  Complex   Landscape   Viruses   1990–2000   Worms   2000–2005   Spyware  and  Rootkits   2005–Today   APTs  Cyberware   Today  +   Criminals  Know  More  About  Your  Network  Than  You  Do   Custom  Malware  Remains  Dormant  for  Months  to  Learn  Vulnerabili;es  in  the  Network  and  then  Acack  those  Vulnerabili;es.  
  • 14. Cisco  Confiden;al   14  ©  2013-­‐2014    Cisco  and/or  its  affiliates.  All  rights  reserved.   You  Can’t  Defend  Against  What  You  Can’t  See       01010 10010 11   01010 10010 11   01010 10010 11   01010 10010 11  
  • 16. Cisco’s  Threat-­‐Centric  Approach  to  Security   BEFORE AFTERDURING Network as a Sensor Flexible  NetFlow  u  Lancope  StealthWatch  u  ISE     Network as an Enforcer Flexible  NetFlow  u  Lancope  StealthWatch    u Cisco TrustSec u ISE
  • 17. Cisco  Network  as  a  Sensor  (NaaS)   Detect  Anomalous  Traffic  Flows,  Malware   IdenTfy  User  Access  Policy  ViolaTons   Obtain  Broad  Visibility  into  All  Network  Traffic  
  • 18. Cisco  Network  as  an  Enforcer  (NaaE)   Implement  Access  Controls  to  Secure  Resources   Contain  the  Scope  of  an  Aeack  on  the  Network   QuaranTne  Threats,  Reduce  Time-­‐to-­‐RemediaTon  
  • 19. Network  as  a  Sensor  (NaaS)   Ø  Cisco  Networking  Porlolio   Ø  Cisco  NetFlow   Ø  Lancope  StealthWatch   Ø  Cisco  Iden;ty  Services  Engine  (ISE)         Deeper  Visibility  and  Greater  Defense  against   Network  Threats       Network  as  an  Enforcer  (NaaE)   Ø  Cisco  Networking  Porlolio   Ø  Cisco  NetFlow   Ø  Lancope  StealthWatch   Ø  Cisco  Iden;ty  Services  Engine  (ISE)   Ø  Cisco  TrustSec  Somware-­‐Defined  Segmenta;on    
  • 20. NetFlow  for  Dynamic  Network  Awareness   Understand  Network  Behavior  and  Establish  a  Network’s  Normal     Network Flows Highlight Attack Signatures A  Powerful  InformaTon  Source     for  Every  Network  ConversaTon   Each  and  Every  Network  Conversa;on     over  an  Extended  Period  of  Time   Source  and  Des;na;on  IP  Address,  IP  Ports,     Time,  Data  Transferred,  and  More   Stored  for  Future  Analysis     A  CriTcal  Tool    to  IdenTfy  a  Security  Breach   Iden;fy  Anomalous  Ac;vity     Reconstruct  the  Sequence  of  Events   Forensic  Evidence  and  Regulatory  Compliance   NetFlow  for  Full  Details,  NetFlow-­‐Lite  for  1/n  Samples    
  • 21. Lancope  StealthWatch  System   Network  Reconnaissance  Using  Dynamic  NetFlow  Analysis   Monitor   Detect   Analyze   Respond   Ø  Understand  your   network  normal   Ø  Gain  real-­‐;me   situa;onal  awareness  of   all  traffic   Ø  Leverage  Network   Behavior  Anomaly   detec;on  &  analy;cs   Ø  Detect  behaviors  linked   to  APTs,  insider   threats,  DDoS,  and   malware   Ø  Collect  &  Analyze   holis;c  network  audit   trails   Ø  Achieve  faster  root   cause  analysis  to   conduct  thorough   forensic  inves;ga;ons   Ø  Accelerate  network   troubleshoo;ng  &  threat   mi;ga;on   Ø  Respond  quickly  to  threats   by  taking  ac;on  to   quaran;ne  through  Cisco   ISE  
  • 22. Cisco  Iden;ty  Services  Engine  (ISE)   Adding  Visibility  and  Context  to  NetFlow     INTEGRATED PARTNER CONTEXT NETWORK / USER CONTEXT How WhatWho WhereWhen SEND  CONTEXTUAL  DATA  COLLECTED  FROM  USERS,  DEVICES,  AND  NETWORKS   TO  LANCOPE  FOR  ADVANCED  INSIGHTS  AND  NETFLOW  ANALYTICS  
  • 23. What  Can  Cisco  NaaS  and  NaaE  Offer  You?   Consistent     Control   Complexity     ReducTon   Consistent  Policies   Across  the     Network  and     Data  Center   Fits  and  Adapts     to  Changing   Business  Models     Global  Intelligence   With  the  Right   Context   Detects  and  Stops   Advanced  Threats   Advanced  Threat   ProtecTon   Unmatched   Visibility  
  • 24. Network  as  a  Sensor/Network  as  an  Enforcer   Use  Cases  
  • 25. Customer  Case  Study  -­‐  Network  as  a  Sensor   Industry:  Retail     Company:  Large  Known  Global  Retailer     Exis2ng  Environment:   •  Large  Cisco  Switch  &  Router  Footprint   •  ASA  &  ISE       Customer  Challenges:   •  Limited  visibility  &  intelligence  across  their  highly-­‐distributed  retail  footprint     •  Lack  of  ability  to  correlate  numerous  data  sets        Results:   •  Amer  deploying  Cisco  Nellow,  Lancope  Stealth  Watch  and  Cisco  ISE     •  Gains  Retail  Point-­‐of-­‐Presence  Visibility   •  Deeper  Understanding  into  Network  Applica;on  Usage  
  • 26. Customer  Case  Study  -­‐  Network  as  an  Enforcer   Industry:  Banking     Company:  Large  Known  Global  Bank   Exis2ng  Environment:   •  Large  Cisco  Switch  &  Router  Footprint       Customer  Challenges:   •  Visibility  into  the  network  and  rogue  devices   •  Policy  enforcement  of  user  to  data  center  policies     •  Mee;ng  compliance  audits          Results:   •  Amer  deploying  Lancope  Stealth  Watch  Cisco  ISE  and  Cisco  TrustSec     •  Gain  Deep  Visibility  into  Network  Access  and  Devices     •  Segment  Network  Access  and  Assets  using  Business  Role  Based  Policies   •  Accelerated  ;me  to  Compliance  Audits    
  • 28. Behavioral  Analysis   •  Leverages  knowledge  of  known  bad   behaviour   Anomaly  DetecTon   •  Iden;fy  a  change  from   “normal”   Behavioral  Analysis  &  Anomaly  Detec;on  
  • 29. Solu;on  Architecture   StealthWatch   Management   Console   UDP  Director   FlowCollector   NetFlow,   syslog,  SNMP   NetFlow  enabled   infrastructure   FlowSensor   VMware  ESX  with   FlowSensor  VE   User  and  Device   Informa;on   StealthWatch   IDen;ty  Cisco  ISE   Feeds  of  emerging  threat   informa;on   Unified View: Security and Network Monitoring
  • 30. NaaS:  Powered  by  StealthWatch Denial  of  Service   SYN  Half  Open;  ICMP/UDP/Port  Flood   Worm  PropagaTon   Worm  Infected  Host  Scans  and  Connects  to  the  Same  Port  Across  MulTple   Subnets,  Other  Hosts  Imitate  the  Same  Above  Behavior   FragmentaTon  Aeack   Host  Sending  Abnormal  #  Malformed  Fragments.   Botnet  DetecTon   When  Inside  Host  Talks  to  Outside  C&C  Server     for  an  Extended  Period  of  Time   Host  ReputaTon  Change   Inside  Host  PotenTally  Compromised  or   Received  Abnormal  Scans  or  Other  Malicious  Aeacks   Network  Scanning   TCP,  UDP,  Port  Scanning  Across  MulTple  Hosts   Data  ExfiltraTon   Large  Outbound  File  Transfer  VS.  Baseline  
  • 31. Policy  Defined  Role-­‐Based  Segmenta;on   Flexible  and  Scalable    Policy  Enforcement   Switch   Router   DC  FW   DC  Switch   Simplified  Access  Management   Accelerated  Security  Opera;ons   Consistent  Policy  Anywhere   Who  can  talk  to  whom   Who  can  access  protected  assets   How  systems  can  talk  to  other  systems   Desired  Policy   NaaE:  Segmenta;on  via  TrustSec  
  • 32. StealthWatch  Capabili;es  Summary   Visibility   • Context-­‐aware   visibility  into   network,  applica;on   and  user  ac;vity   • BYOD   • Cloud  monitoring   • IPv6   • East-­‐West  Traffic   monitoring   • Network   segmenta;on   Threat  DetecTon   • Advanced  Persistent   Threats   • Botnet  (CnC)   Detec;on   • Data  Exfiltra;on   • Network   Reconnaissance   • Insider  Threat   • DDoS   • Malware   • Network  Behavior   Anomaly  Detec;on   • SLIC  threat  feed   Incident  Response   • In-­‐depth,  flow-­‐ based  forensic   analysis    of   suspicious  incidents   • Scalable  repository   of  security   informa;on   • Retrace  the  step-­‐by-­‐ step  ac;ons  of  a   poten;al  acacker   • On-­‐demand  packet   capture   Network  DiagnosTcs   • Applica;on   Awareness   • Capacity  Planning   • Performance   Monitoring   • Troubleshoo;ng   User  Monitoring   • Cisco  ISE   • Monitor  privileged   access   • Policy  enforcement  
  • 33. Cisco  Confiden;al   33  ©  2013-­‐2014    Cisco  and/or  its  affiliates.  All  rights  reserved.   Thank  you!     Fernando  Lucato   flucato@cisco.com   +55  11  5508-­‐6348     Heitor  Silva   hesilva@cisco.com   +55  11  5508-­‐1506  
  • 34.
  • 35. TradiTonal  Security  Policy   Cisco  TrustSec  Somware-­‐Defined  Segmenta;on   Provide  Role-­‐Based  Segmenta;on  to  Control  Access  and  Contain  Threats   TrustSec  Security  Policy   SegmentaTon  Policy  Enforced  Across  the  Extended  Network   Switch   Router   VPN  &     Firewall   DC  Switch   Wireless   Controller   Simplifies  Firewall  Rule,  ACL,  VLAN  Management   Prevents  Lateral  Movement  of  Poten;al  Threats   Eliminates  Costly  Network  Re-­‐architecture  
  • 36. Segmenta;on  is  Powerful  Security  Tool   “Network segmentation… is one of the most effective controls an agency can implement to mitigate the second stage of a network intrusion, propagation or lateral movement” “Good network and role segmentation will do wonders for containing an incident.” “Effective network segmentation… reduces the extent to which an adversary can move across the network” “Segregate networks, limit allowed protocols usage and limit users’ excessive privileges.” 2014 DATA BREACH INVESTIVATIONS REPORT The Untold Story of the Target Attack Step by Step Aortato Labs, August 2014
  • 37. Bringing  It  All  Together   Architec;ng  Network  as  a  Sensor  and  Network  as  an  Enforcer     Network Sensor (Lancope) NGFW Campus/DC Switches/WLC Cisco Routers / 3rd Vendor Devices Threat NGIPS API API (pxGrid) ISE Network Sensors Network Enforcers Policy & Context Sharing TrustSec Security Group Tag Cisco Collective Security Intelligence Confidential Data