Cisco Confidential 1 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
From the Browser to the Boardroom
Browser Mobile Work Office Small Group Spaces
Larger Spaces
Boardrooms
Cisco Confidential 2 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
From the Browser to the Boardroom
Browser Mobile Work Office Small Group Spaces
Larger Spaces
Boardrooms
Cisco Confidential 3 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Any Device to Any Cloud
Public Cloud Private Cloud
Public Cloud
Cisco Confidential 4 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Proliferation of Attack Vectors
Cloud/SaaS Applications | Off-net Users | Explosion of Data | Internet of Things
Public Cloud Private Cloud
Public Cloud
Cisco Confidential 5 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Internet of Things…and Everything EVERY COMPANY BECOMES A TECHNOLOGY COMPANY,
EVERY COMPANY BECOMES A SECURITY COMPANY
(2 of 3)
Cisco Confidential 6 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
APTs Cyberware
Spyware & Rootkits Worms Viruses
2010 2000 2005 Today +
The Industrialization of Hacking
Anti-virus (Host)
IDS/IPS (Network)
Anti-malware (Host+Network)
Intelligence and Analytics (Host+Network+Cloud)
Enterprise Response
Cisco Confidential 7 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The Problem is THREATS
Cisco Confidential 8 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The New Security Model
BEFORE Discover Enforce Harden
AFTER Scope Contain
Remediate
Attack Continuum
Detect Block
Defend
DURING
Network Endpoint Mobile Virtual Cloud
Point in Time Continuous
Cisco Confidential 9 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
The New Security Model
BEFORE Discover Enforce Harden
AFTER Scope Contain
Remediate
Attack Continuum
Detect Block
Defend
DURING
Spend Shift
60% 30% 10%
Point in Time Continuous
Cisco Confidential 10 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Advanced Services
Covering the Entire Attack Continuum
Attack Continuum
NGFW
Secure Access + Identity Services
UTM Web Security
Email Security
Network Behavior Analysis
Firewall VPN NGIPS Advanced Malware Protection
BEFORE Discover Enforce Harden
AFTER Scope Contain
Remediate
Detect Block
Defend
DURING
Cisco Confidential 11 © 2013-2014 Cisco and/or its affiliates. All rights reserved.
Reduce Complexity and Increase Capability
Collective Security Intelligence
Centralized Management Appliances, Virtual
Network Control Platform
Device Control Platform
Cloud Services Control Platform
Appliances, Virtual Host, Mobile, Virtual Hosted