Cisco Connect 2018 Malaysia - Changing the equation-cybersecurity in digital business

Please download to get full document.

View again

All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
 5
 
  1. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Call Whiteboard Input 2. Marc Blackmer Director,…
Related documents
Share
Transcript
  • 1. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Call Whiteboard Input
  • 2. Marc Blackmer Director, Security Business Group March 2018 Changing the Equation Cybersecurity in Digital Business
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Data is currency
  • 4. © 2017 Cisco and/or its affiliates. All rights reserved. TirelessRelentless vs
  • 5. © 2017 Cisco and/or its affiliates. All rights reserved. Tireless Vs Relentless Change
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Information overload Skills gap Evolving threats
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. How can we change the equation?
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Are We Secure?
  • 9. © 2017 Cisco and/or its affiliates. All rights reserved. Time ResponseDetectionThreat How effective are we?
  • 10. © 2017 Cisco and/or its affiliates. All rights reserved. Protecting the world as it is
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Change the Equation: ask the right questions How do you control who gets onto your network? How do you find and contain problems fast? How do you simplify network segmentation? How do you protect users wherever they work? How do you stop threats at the edge?
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Security Architecture Endpoint CloudNetwork Threat Intelligence Services
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Malware in Encrypted Traffic Security AND Privacy Detection Accuracy Detecting encrypted threats
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. See once Threat Detect/Block1 Analyse2 See it once, protect everywhere Endpoint Security intelligence Enforce everywhere 3 Endpoint CloudNetwork
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Today’s perimeter
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. WANNACRY
  • 17. © 2017 Cisco and/or its affiliates. All rights reserved. Threat intelligence: get smarter every day Cisco detects vulnerabilities Customers are protected Customers already protected Plus Cisco caught the payload and Cisco blocked the callout 2017 Talos detects exploits Customers are protected Microsoft vulnerability identified Mar 14 Shadow Brokers exploit leaked Apr 14 WannaCry ransomware released May 12
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved.
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved.© 2017 Cisco and/or its affiliates. All rights reserved. Thank you
  • 20. © 2017 Cisco and/or its affiliates. All rights reserved. Today, data is where the money is
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Next Generation Endpoint Security Prevent Prevent attacks and block malware in real time Detect Continuously monitor to reduce time to detection Respond Accelerate investigations and remediate faster and more effectively
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. It’s a multi-cloud era
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Multi-cloud transformation PUBLIC PRIVATE User/PC Campus/ branch WAN Data center Internet Cloud Consumer User access Provider Applications Cloud SaaS
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Multi-cloud transformation WANCampus/ branch Cloud edge PUBLIC Public cloud SaaS Internet DC User/devices End to end Enterprise Edge
  • 25. © 2017 Cisco and/or its affiliates. All rights reserved. Would you fly in a plane made of 50 different planes?
  • Related Search
    We Need Your Support
    Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

    Thanks to everyone for your continued support.

    No, Thanks