wwt: tanium and cisco solutions presentation from cisco live 2017
TRANSCRIPT
Tanium & CiscoCombining Powerhouse InnovatorsFor Maximum Security
Kent NoyesPrincipal Architect - Security
• 25 Years in the Industry
• BS Computer Science
• CCIE #8226
• Has held nearly every engineering position at WWT
FUN FACT
Lead Singer for a Rock Band
What is Tanium?
15-Second Visibility and Control.
Over Every Endpoint.
Even Across the Largest Global Networks.
SCALABILITYSPEED SIMPLICITY
Incredible ROI PotentialFinancials are based on a large Fortune 500 organization with 50,000 employees
ROI is within 1 year of implementation
Use Case Description Est. Savings Est. ROI
Windows 10
Migration
Seamless migration to Windows 10 pairing CPMigrator and Tanium – optimize
security, enable zero-touch migration, reduce risk and complexity
$2.0M 25%
Software License
Reclamation
Identify and reduce unused licensing entitlements (MS, Adobe, etc.)
Tanium estimates over 20% of endpoints have unused licenses
$900K 12%
Security Tool
Consolidation
Consolidate a splintered security landscape by reducing the need for multiple,
individual point solutions
$660K 9%
Infrastructure
Consolidation
Research shows 10-15% of servers are unused – despite efforts to consolidate
datacenters
$945K 13%
IT Personnel
Optimization
Complete endpoint visibility, speed to act at scale and a unified, extensible platform –
security and ops teams are optimized to focus on more critical tasks
$910K 12%
Unmanaged Asset
Identification
Research shows TCO for unmanaged end-user devices (i.e. PC) increases
significantly each year when networks are unmanaged or poorly managed
$2.1M 29%
Security Breach
Mitigation
Efficiency in threat identification and remediation allows organizations to reduce
exposure to reputation and direct costs tied to a security breach
$500K-$5M 30-150%
Tanium-Cisco Integration to Automate Endpoint Security
Challenges: Network Hygiene - starts at the endpoint Lacking near real-time policy enforcement on connect Port security inconsistent, static, manufactured Responding in days or weeks instead of minutes or hours Inefficient lifecycle for connected endpoints
Endpoint Security Lifecycle
Compromised Endpoint
IdentityServicesEngine
1. Detect
2. Notify
3. Network
Quarantine
4. Remediate
Endpoint Security Automation
Non-Compliant Endpoint
IdentityServicesEngine
2. Compliant?
3. Notify
4. Network
Quarantine
5. Update
1. Connect
PRESENTATION TAKEAWAYS
Tanium manages endpoints with unmatched speed
Tanium and Cisco ISE can work together to quarantine & remediate
Tanium can hunt on behalf of Cisco’s extensive Threat Intel
THANK YOUAUDIENCE Q&A
REFERENCES
www.tanium.comwww.cisco.com/go/threatgridwww.cisco.com/go/isehttps://www2.wwt.com/solution/security/