preparing for the unthinkable
play

Preparing for the Unthinkable Cyber Security Chicago 2018 Agenda - PowerPoint PPT Presentation

Preparing for the Unthinkable Cyber Security Chicago 2018 Agenda Introduction Security Landscape Meraki Security Demo Security Landscape The Growing Importance of Security MALWARE HAS RISEN BY MORE THAN 10X IN THE LAST YEAR 70% M ALW AR E


  1. Preparing for the Unthinkable Cyber Security Chicago 2018

  2. Agenda Introduction Security Landscape Meraki Security Demo

  3. Security Landscape

  4. The Growing Importance of Security MALWARE HAS RISEN BY MORE THAN 10X IN THE LAST YEAR 70% M ALW AR E VO LUM E Percentage of organizations using more than 5 security vendors. Up from 55% in 2016 74% 2017 2016 74% of security issues require people and/or policies to address, with only 26% being addressed by products Source: Cisco 2018 Security Capabilities Benchmark Study

  5. Security IT professionals have little time 44% of alerts are not investigated Lack of headcount • Lack of trained personnel • Budget constraints • Source: Cisco 2018 Security Capabilities Benchmark Study

  6. Significant damages from cyber-attacks 53% of attacks result in >$500,000 damages Lost revenue • Lost customers • Lost opportunities • Out of pocket costs • Source: Cisco 2018 Security Capabilities Benchmark Study

  7. Endpoint vulnerabilities Intrusion Phishing Insider Threats Ransomware Malware APT & DDoS ? SW Vulnerabilities Man in the Middle

  8. Meraki

  9. O U R M I S S I O N : Simplifying powerful technology to free passionate people to focus on their mission

  10. Simplifying IT with Cloud Management A complete cloud-managed IT solution Wireless, switching, security, SD-WAN, unified endpoint management (UEM), and security cameras Integrated hardware, software, and cloud services Leader in cloud-managed IT Among Cisco’s fastest growing portfolios 350k+ 4.5M+ 5.5M+ Unique customers Meraki devices Active Meraki online dashboard users

  11. Benefits of a cloud-managed solution Management Data User Traffic SECURITY RELIABILITY WAN / Internet Security & SD-WAN Appliances SCALABILITY Switches Security Cameras FUTURE-PROOFING Access Points Systems Manager

  12. Zero Touch Provisioning One-time remote, web- No pre-staging Unbox and plug in based configuration No onsite configuration devices at required locations Configuration templates simplify large multi-site deployments

  13. Meraki MX

  14. One unified platform Industry Leading SD-WAN Meets Industry Leading Security

  15. Unified threat management and connectivity

  16. Simplification Cisco Meraki MX Powerful security that’s easy to implement • Robust suite of Cisco Security technologies • Intuitive GUI-based configuration • Seamless updates from the cloud Exceptional scalability • Zero-touch provisioning with cloud brokered VPN • Easy centralized management with built-in remote troubleshooting tools • Multi-location configuration templates Industry-leading visibility • Fingerprints users, applications, devices, and threats • Monitor one location or an entire deployment • Unified monitoring and reporting with other Cisco Meraki technologies

  17. Meraki Security

  18. Built-in ironclad security

  19. Advanced Malware Protection for Meraki MX Enhanced Threat Defense Contextual Visibility Rapid Detection Ease of Management Enable best-in-class malware Automatic protection against Security Center makes it easy Automatic alerting when a an ever-growing list of known to ensure you have the latest downloaded file is found to be protection with just two clicks malicious files, plus malware information about attacks on malicious after the fact sandboxing with Threat Grid your network ▪ 220 million known malicious files ▪ 407 million known clean files ▪ 1.5 million new incoming malware samples per day ▪ 1.6 million devices using AMP globally 3.1 billion lookup requests per day ▪ Cloud-Managed Security & SD-WAN Appliances

  20. How it all fits together Meraki Meraki Integrations Interoperability Meraki MX Cisco ISE

  21. Backed by Cisco Talos threat intelligence 1.5 million malware 600 billion email Over 250 full time samples / day messages / day threat researchers Millions of 16 billion web Internet-wide telemetry requests / day scanning agents 4 global data centers Telemetry Honeypots Over 100 threat intelligence partners Over 1100 threat Open source Internal traps vulnerability discovery communities

  22. Talos stays ahead of threats ?

  23. An anti-fragile architecture delivered by the cloud ?

  24. Security at work

  25. VPNFilter Malware – May 2018 Source: Talos Blog. “New VPNFilter malware targets at least 500K networking devices worldwide” May 23, 2018

  26. VPNFilter Technical Breakdown Source: Talos Blog. “New VPNFilter malware targets at least 500K networking devices worldwide” May 23, 2018

  27. Meraki MX URL Blocking & L3 Firewall

  28. How MX Blocks VPNFilter Malware

  29. How MX Blocks WannaCry Malware

  30. Demo

  31. Endpoint vulnerabilities Intrusion Phishing Insider Threats Ransomware Malware APT & DDoS ? SW Vulnerabilities Man in the Middle

  32. Meraki full-stack security

  33. Managed with a single pane of glass

  34. Questions? Visit Meraki at booth #150

  35. Thank You!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend