Preparing for the Unthinkable Cyber Security Chicago 2018 Agenda - - PowerPoint PPT Presentation

preparing for the unthinkable
SMART_READER_LITE
LIVE PREVIEW

Preparing for the Unthinkable Cyber Security Chicago 2018 Agenda - - PowerPoint PPT Presentation

Preparing for the Unthinkable Cyber Security Chicago 2018 Agenda Introduction Security Landscape Meraki Security Demo Security Landscape The Growing Importance of Security MALWARE HAS RISEN BY MORE THAN 10X IN THE LAST YEAR 70% M ALW AR E


slide-1
SLIDE 1

Preparing for the Unthinkable

Cyber Security Chicago 2018

slide-2
SLIDE 2

Agenda

Introduction Security Landscape Meraki Security Demo

slide-3
SLIDE 3

Security Landscape

slide-4
SLIDE 4

The Growing Importance of Security

70%

M ALW AR E VO LUM E 2016 2017

Percentage of organizations using more than 5 security vendors. Up from 55% in 2016 74% of security issues require people and/or policies to address, with only 26% being addressed by products MALWARE HAS RISEN BY MORE THAN 10X IN THE LAST YEAR

74%

Source: Cisco 2018 Security Capabilities Benchmark Study

slide-5
SLIDE 5

Security IT professionals have little time

44% of alerts are not investigated

  • Lack of headcount
  • Lack of trained personnel
  • Budget constraints

Source: Cisco 2018 Security Capabilities Benchmark Study

slide-6
SLIDE 6

Significant damages from cyber-attacks

53% of attacks result in >$500,000 damages

  • Lost revenue
  • Lost customers
  • Lost opportunities
  • Out of pocket costs

Source: Cisco 2018 Security Capabilities Benchmark Study

slide-7
SLIDE 7

Malware Phishing Intrusion Insider Threats SW Vulnerabilities Ransomware APT & DDoS Man in the Middle Endpoint vulnerabilities

?

slide-8
SLIDE 8

Meraki

slide-9
SLIDE 9

O U R M I S S I O N :

Simplifying powerful technology to free passionate people to focus on their mission

slide-10
SLIDE 10

Simplifying IT with Cloud Management

A complete cloud-managed IT solution

Wireless, switching, security, SD-WAN, unified endpoint management (UEM), and security cameras Integrated hardware, software, and cloud services

Leader in cloud-managed IT

Among Cisco’s fastest growing portfolios

350k+

Unique customers

4.5M+

Meraki devices

  • nline

5.5M+

Active Meraki dashboard users

slide-11
SLIDE 11

Benefits of a cloud-managed solution

WAN / Internet

Management Data User Traffic

Security & SD-WAN Appliances Switches Access Points Systems Manager Security Cameras

RELIABILITY SECURITY SCALABILITY FUTURE-PROOFING

slide-12
SLIDE 12

Zero Touch Provisioning

One-time remote, web- based configuration Configuration templates simplify large multi-site deployments No pre-staging No onsite configuration Unbox and plug in devices at required locations

slide-13
SLIDE 13

Meraki MX

slide-14
SLIDE 14

Industry Leading SD-WAN Meets Industry Leading Security

One unified platform

slide-15
SLIDE 15

Unified threat management and connectivity

slide-16
SLIDE 16

Simplification Cisco Meraki MX

Powerful security that’s easy to implement

  • Robust suite of Cisco Security technologies
  • Intuitive GUI-based configuration
  • Seamless updates from the cloud

Exceptional scalability

  • Zero-touch provisioning with cloud brokered VPN
  • Easy centralized management with built-in remote

troubleshooting tools

  • Multi-location configuration templates

Industry-leading visibility

  • Fingerprints users, applications, devices, and threats
  • Monitor one location or an entire deployment
  • Unified monitoring and reporting with other Cisco Meraki

technologies

slide-17
SLIDE 17

Meraki Security

slide-18
SLIDE 18

Built-in ironclad security

slide-19
SLIDE 19

Advanced Malware Protection for Meraki MX

Enhanced Threat Defense Contextual Visibility Rapid Detection Ease of Management

Automatic protection against an ever-growing list of known malicious files, plus malware sandboxing with Threat Grid Security Center makes it easy to ensure you have the latest information about attacks on your network Automatic alerting when a downloaded file is found to be malicious after the fact Enable best-in-class malware protection with just two clicks

▪ 220 million known malicious files ▪ 407 million known clean files ▪ 1.5 million new incoming malware samples per day ▪ 1.6 million devices using AMP globally ▪ 3.1 billion lookup requests per day

Cloud-Managed Security & SD-WAN Appliances

slide-20
SLIDE 20

Meraki Interoperability Meraki Integrations Cisco ISE

How it all fits together

Meraki MX

slide-21
SLIDE 21

1.5 million malware samples / day 600 billion email messages / day 16 billion web requests / day Honeypots Open source communities Internal vulnerability discovery Telemetry Internet-wide scanning

Backed by Cisco Talos threat intelligence

Over 250 full time threat researchers Millions of telemetry agents 4 global data centers Over 100 threat intelligence partners Over 1100 threat traps

slide-22
SLIDE 22

Talos stays ahead of threats

?

slide-23
SLIDE 23

An anti-fragile architecture delivered by the cloud

?

slide-24
SLIDE 24

Security at work

slide-25
SLIDE 25

VPNFilter Malware – May 2018

Source: Talos Blog. “New VPNFilter malware targets at least 500K networking devices worldwide” May 23, 2018

slide-26
SLIDE 26

VPNFilter Technical Breakdown

Source: Talos Blog. “New VPNFilter malware targets at least 500K networking devices worldwide” May 23, 2018

slide-27
SLIDE 27

Meraki MX URL Blocking & L3 Firewall

slide-28
SLIDE 28

How MX Blocks VPNFilter Malware

slide-29
SLIDE 29

How MX Blocks WannaCry Malware

slide-30
SLIDE 30

Demo

slide-31
SLIDE 31

Malware Phishing Intrusion Insider Threats SW Vulnerabilities Ransomware APT & DDoS Man in the Middle Endpoint vulnerabilities

?

slide-32
SLIDE 32

Meraki full-stack security

slide-33
SLIDE 33

Managed with a single pane of glass

slide-34
SLIDE 34

Questions?

Visit Meraki at booth #150

slide-35
SLIDE 35

Thank You!