SlideShare a Scribd company logo
Next Generation Security
Fuat KILIÇ
Consulting Systems Engineer -
Security
Ali Fuat TÜRKAY
Product Sales Specialist -
Security
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Cisco and/or its affiliates. All rights reserved. Cisco Public
All were smart. All had security.
All were seriously compromised.
Today’s Real World: Threats are evolving and evading traditional
defense
Cisco and/or its affiliates. All rights reserved. Cisco Public
What would you do if you knew you would be compromised?!
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Network Endpoint Mobile Virtual Email & Web
ContinuousPoint-in-time
Attack Continuum
Cloud
Cisco and/or its affiliates. All rights reserved. Cisco Public
The Silver Bullet Does Not Exist…
“Captive Portal”
“It matches the pattern”
“No false positives,
no false negatives.”
Application
Control
FW/VPN
IDS / IPS
UTM
NAC
AV
PKI
“Block or Allow”
“Fix the Firewall”
“No key, no access”
Sandboxing
“Detect the
Unknown”
Cisco and/or its affiliates. All rights reserved. Cisco Public
Customer Value Proposition
Cisco
Security
Solutions
Unmatched
Visibility
Advanced
Threat Protection
Consistent
Control
Flexibility
& Choice
Cisco’s Strategy
Integrated Platform for Defense, Discovery and Remediation
Firewall Content Gateways Integrated Platform Virtual Cloud
Device
Data
Center
Network
Access Control
Firewall
Content Aware
Applications
Context Aware
Identity, Data,
Location
Threat Aware
Malware, APT
Cisco and/or its affiliates. All rights reserved. Cisco Public
Gartner Defines Next-Generation IPS
8
NGIPS Definition
•  Standard First-Gen IPS
•  Context Awareness
•  Application Awareness
and full-stack visibility
•  Content Awareness
•  Adaptive Engine
Download at Sourcefire.com
*Source: “Defining Next-Generation Network Intrusion Prevention” Gartner, October 7, 2011
Cisco and/or its affiliates. All rights reserved.Presentation_ID Cisco Public
FirePOWER Platform
http://
http://WWW WWW
WWW
WWW
FireSIGHT Management
Center
FireSIGHT Management Center
•  Context Awareness
•  Operating System Identification
•  Fingerprint Applications (Web, Protocol & Client Versions)
•  Service Enumeration (HTTP, SMPT, RDP…etc)
•  Users Awareness
•  24x7 Monitoring (Passive & Inline)
•  Identify Assets Potential Vulnerabilities (Weakness)
•  Leveraging Visibility/vulnerabilities to “Adapt”
•  Access Control Rules Enforcement
•  Alerting, Correlation & Packets Capture
FirePOWER Platform/Services
•  Inspect, Detect, Drop, Allow…etc
•  IPS, Application Control, Malware Inspection & URL
Rating
•  Inline, Passive & Hybrid
Context Awareness in Intrusion Events
Cisco and/or its affiliates. All rights reserved. Cisco Public
FireSIGHT – Unique Visibility
Typical
NGFW
Cisco
FireSIGHT
System
Typical
IPS
Cisco and/or its affiliates. All rights reserved. Cisco Public
Building Host Profile
OS & version
Identified
Server applications
and version
Client Applications
Who is at the host
Client Version
Application
What other systems /
IPs did user have,
when?
§  Converting Data into Information
Cisco and/or its affiliates. All rights reserved. Cisco Public
FireSIGHT Impact Assessment
Correlates all intrusion events
to an impact of the attack against the target
Impact Flag
Administrator
Action
Why
1 Act immediately,
vulnerable
Event corresponds
to vulnerability
mapped to host
2 Investigate,
potentially vulnerable
Relevant port open
or protocol in use,
but no vuln mapped
3
Good to know,
currently not
vulnerable
Relevant port not
open or protocol
not in use
4 Good to know,
unknown target
Monitored network,
but unknown host
0 Good to know,
unknown network
Unmonitored network
Cisco and/or its affiliates. All rights reserved. Cisco Public
Indications of Compromise (IoCs)
IPS Events
Malware Backdoors
Exploit Kits
Web App Attacks
CnC Connections
Admin Privilege Escalations
SI Events
Connections
to Known CnC IPs
Malware Events
Malware Detections
Office/PDF/Java Compromises
Malware Executions
Dropper Infections
Cisco and/or its affiliates. All rights reserved. Cisco Public
Gartner Leadership
Sourcefire has
been a leader in
the Gartner Magic
Quadrant for IPS
since 2006.
As of December 2013
Source: Gartner (December 2013)
Radware
StoneSoft (McAfee)
IBM
Cisco HP
McAfee
Sourcefire
(Cisco)
HuaweiEnterasys Networks
(Extreme Networks)
NSFOCUS
Information Technology
challengers
abilityto
execute
leaders
visionariesniche players
vision
Cisco and/or its affiliates. All rights reserved. Cisco Public
2012 NSS Labs SVM for IPS
Cisco and/or its affiliates. All rights reserved. Cisco Public
2013 NSS Labs SVM for IPS
Cisco and/or its affiliates. All rights reserved. Cisco Public
ASA with FirePOWER Services Available Now!!
Industry’s First Threat-Focused NGFW
#1 Cisco Security announcement of the year!
•  Integrating defense layers helps organizations
get the best visibility
•  Enable dynamic controls
to automatically adapt
•  Protect against advanced threats
across the entire attack continuum
Proven Cisco ASA firewalling
Industry leading NGIPS and AMP
Cisco ASA with FirePOWER Services
Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved.
NSS Labs – Next-Generation Firewall Security Value Map
Source: NSS Labs 2014
The NGFW Security Value
Map shows the placement of
Cisco ASA with FirePOWER
Services and the
FirePOWER 8350 as
compared to other vendors.
All three products achieved
99.2 percent in security
effectiveness and now all
can be confident that they
will receive the best
protections possible
regardless of deployment.
Cisco and/or its affiliates. All rights reserved. Cisco Public
SecurityEffectiveness
TCO per Protected-Mbps
The Results
CiscoAMP is a Leader in Security Effectiveness and TCO and offers Best Protection Value
Cisco Advanced
Malware Protection
Best Protection Value
99.0% Breach
Detection Rating
Lowest TCO per
Protected-Mbps
NSS Labs Security Value Map (SVM) for Breach Detection Systems
Fire and ISE
Cisco Confidential 21© 2013-2014 Cisco and/or its affiliates. All rights reserved.
EPS REST API
Threat Detection
•  IDS Sig
•  Malware
•  Traffic
•  Application
•  And Many More..
Automagical, Dynamic, Squirrely Threat/Malware/Attack Response/Defense
Quarantine Action
•  VLAN Assignment
•  dACLs
•  SGT
•  QoS TAG
ISE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Network as a Sensor
© 2014 Lancope, Inc. All rights reserved.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2014 Lancope, Inc. All rights reserved.
Flow – The Network Phone Bill
Flow CacheDestination IP
Origin IP
Destination Port
Origin Port
L3 Protocol
DSCP
Flow Info Packet Bytes/Packet
Origin IP , Port,
Proto...
11000 1528
… … …
… … …
Monthly Statement
Bill At-A-Glance
Flow Record
Telephone Bill
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Internet	
  
Atlant
a	
  
San	
  Jose	
  
New	
  York	
  
Remote	
  Sites	
  
WAN	
  
Firewall	
  
&	
  IPS	
  
Datacenter	
  
DMZ	
  
User	
  Network	
  
3G
Internet
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Internet	
  
Atlant
a	
  
San	
  Jose	
  
New	
  York	
  
NetFlo
w	
  
Remote	
  Sites	
  
NetFlo
w	
  
NetFlow	
  
WAN	
  
NetFlow	
  
Firewall	
  
Datacenter	
  
NetFlow	
  
NetFlow	
   NetFlow	
  
DMZ	
  
NetFlo
w	
  
NetFlo
w	
  
User	
  
Network	
  
3G
Internet
NetFlo
w	
  
NetFlo
w	
  
NetFlo
w	
  
NetFlow	
  
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
© 2014 Lancope, Inc. All rights reserved.
How CTD Analyzes Devices
31
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
•  Cisco Bulut ve mobilite gibi günlük hayatımızı oldukça değiştiren trendlern ışığında, gereken güvenlik
uzmanlığı ve eğitimi alanında aşağıdaki yenilikleri, uzmanların, mühendislerin ve operasyon ekiplerinin
eğitimi için yayınlamıştır:
• Yenilenen CCNP Güvenlik sertifikasyon programı
• Yeni Cisco Sibergüvenlik Uzmanlığı
• Daha önceki Cisco Güvenlik Uzmanlığı sertifikasyonunun sonlanması
• Yeni ve güncellenmiş ürün eğitimleri
•  Yeniden dizayn edilen CCNP Security sertifikasyonu, bugün çok daha geniş bir bkış açısıyla, uçtan uça
mimari kurmaları gereken güvenlik uzmanlarını hedeflemektedir:
•  300-206 Implementing Cisco Edge Network Security Solutions (SENSS)
•  300-207 Implementing Cisco Threat Control Solutions (SITCS)
•  300-208 Implementing Cisco Secure Access Solutions (SISAS)
•  300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security

More Related Content

PPTX
Developing A Cyber Security Incident Response Program
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PDF
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
PDF
Advanced threat security - Cyber Security For The Real World
PDF
Microsoft Avanced Threat Analytics
PDF
Next Generation Security
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PPTX
Как автоматизировать, то что находит аналитик SOC
Developing A Cyber Security Incident Response Program
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
Advanced threat security - Cyber Security For The Real World
Microsoft Avanced Threat Analytics
Next Generation Security
Sourcefire Webinar - NEW GENERATION IPS
Как автоматизировать, то что находит аналитик SOC

What's hot (20)

PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PDF
Cisco Security Architecture
PDF
Bir macOS APT Senaryosu
PDF
SourceFire IPS Overview
PDF
Mobile Application Penetration Testing
PDF
Cisco ASA con fire power services
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PPTX
IPS Best Practices
PDF
Presentation cisco cloud security strategy
PDF
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
PDF
Presentación - Cisco ASA with FirePOWER Services
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
PDF
Check point response to Cisco NGFW competitive
PDF
Cisco Security Presentation
PDF
Хакеро-машинный интерфейс
PDF
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
PDF
Cisco amp for meraki
PPTX
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
PDF
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Security Architecture
Bir macOS APT Senaryosu
SourceFire IPS Overview
Mobile Application Penetration Testing
Cisco ASA con fire power services
Building Up Network Security: Intrusion Prevention and Sourcefire
IPS Best Practices
Presentation cisco cloud security strategy
8 Ocak 2015 SOME Etkinligi - BGA Cyber Security Incident Response Team
Presentación - Cisco ASA with FirePOWER Services
Scalar Security Roadshow - Toronto Presentation
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Check point response to Cisco NGFW competitive
Cisco Security Presentation
Хакеро-машинный интерфейс
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
Cisco amp for meraki
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Ad

Viewers also liked (20)

PDF
8 Ocak 2015 SOME Etkinligi - BGA Bankalar İçin Some Kurulumu
PDF
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
PDF
İstSec 2015 - Norm shield why
PDF
IstSec'14 - Çağrı ERSEN - Açık Kaynak Sistemlerle Siber Saldırı Gözetleme Sis...
PDF
8 Ocak 2015 SOME Etkinligi - BGA Bank Vulnerable Web Application
PDF
BGA SOME/SOC Etkinliği - APT Tehditlerine Karşı 7/24 Güvenlik İzlemesi (SOC)
PDF
Hosting Ortamlarında Açık Kaynak Yazılımlar Kullanılarak Saldırı Tespiti ve A...
PDF
İstSec'14 - Hamza Şamlıoğlu - Sosyal Medya ve Siber Riskler
PDF
Bilgi Güvenliğinde Sızma Testleri
PDF
IstSec'14 - Huzeyfe ÖNAL - Siber Tehditler Karşısında Kurumsal SOME Kurulumu ...
PDF
Malwarebytes - Global Impact of Ransomware on Business
PPT
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
PDF
AGILE SECURITY™ Security for the Real World
PDF
Malwarebytes Logo Redesign Process
PDF
Calidad de vida saludable (y responsable).
PDF
NOTA DE PRENSA: EL 70% DEL FRAUDE AL SEGURO DEL MÓVIL CORRESPONDE A DENUNCIAS...
PDF
(1) Curso sobre el software estadístico R. Introducción al entorno R
PDF
The Science of Games at IST
PDF
Tecnica n°084 desecha el apego al cuerpo
PDF
Monitoring photovoltaique GANTNER INSTRUMENTS FRANCE
8 Ocak 2015 SOME Etkinligi - BGA Bankalar İçin Some Kurulumu
IstSec'14 - İbrahim BALİÇ - Automated Malware Analysis
İstSec 2015 - Norm shield why
IstSec'14 - Çağrı ERSEN - Açık Kaynak Sistemlerle Siber Saldırı Gözetleme Sis...
8 Ocak 2015 SOME Etkinligi - BGA Bank Vulnerable Web Application
BGA SOME/SOC Etkinliği - APT Tehditlerine Karşı 7/24 Güvenlik İzlemesi (SOC)
Hosting Ortamlarında Açık Kaynak Yazılımlar Kullanılarak Saldırı Tespiti ve A...
İstSec'14 - Hamza Şamlıoğlu - Sosyal Medya ve Siber Riskler
Bilgi Güvenliğinde Sızma Testleri
IstSec'14 - Huzeyfe ÖNAL - Siber Tehditler Karşısında Kurumsal SOME Kurulumu ...
Malwarebytes - Global Impact of Ransomware on Business
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
AGILE SECURITY™ Security for the Real World
Malwarebytes Logo Redesign Process
Calidad de vida saludable (y responsable).
NOTA DE PRENSA: EL 70% DEL FRAUDE AL SEGURO DEL MÓVIL CORRESPONDE A DENUNCIAS...
(1) Curso sobre el software estadístico R. Introducción al entorno R
The Science of Games at IST
Tecnica n°084 desecha el apego al cuerpo
Monitoring photovoltaique GANTNER INSTRUMENTS FRANCE
Ad

Similar to 8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security (20)

PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PDF
Putting firepower into the next generation firewall
PPTX
Scalar Security Roadshow - Calgary Presentation
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
Cisco, Sourcefire and Lancope - Better Together
PDF
Building a Security Architecture
PDF
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
PDF
Midsize Business Solutions: Cybersecurity
PDF
CiscoACI-BRKACI-3004presentationUploaded.pdf
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PDF
Scalar Security Roadshow - Ottawa Presentation
PDF
Cisco Live Cancun PR Session
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PDF
Putting Firepower Into The Next Generation Firewall
PPTX
Isday 2017 - Atelier Cisco
PDF
Cisco Next Generation Firewall with Firepower
PDF
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
PDF
Putting Firepower into the Next Generation Firewall
PDF
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
PDF
Protegendo sua rede
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Putting firepower into the next generation firewall
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Vancouver Presentation
Cisco, Sourcefire and Lancope - Better Together
Building a Security Architecture
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Midsize Business Solutions: Cybersecurity
CiscoACI-BRKACI-3004presentationUploaded.pdf
During the Next Generation Network and Data Centre – Now and into the Future ...
Scalar Security Roadshow - Ottawa Presentation
Cisco Live Cancun PR Session
ASA Firepower NGFW Update and Deployment Scenarios
Putting Firepower Into The Next Generation Firewall
Isday 2017 - Atelier Cisco
Cisco Next Generation Firewall with Firepower
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Putting Firepower into the Next Generation Firewall
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Protegendo sua rede

More from BGA Cyber Security (20)

PDF
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
PDF
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
PDF
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
PDF
3. parti firma risklerinden nasıl korunulur?
PDF
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
PDF
Webinar: Popüler black marketler
PDF
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
PDF
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
PDF
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
PDF
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
PDF
Open Source Soc Araçları Eğitimi 2020-II
PDF
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
PDF
Hacklenmiş Windows Sistem Analizi
PDF
Open Source SOC Kurulumu
PDF
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
PDF
Siber Fidye 2020 Raporu
PDF
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
PDF
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
PDF
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
PDF
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama
WEBSOCKET Protokolünün Derinlemesine İncelenmesi
Tatil Öncesi Güvenlik Kontrol Listesi.pdf
Ücretsiz Bilgi Güvenliği Farkındalık Eğitimi
3. parti firma risklerinden nasıl korunulur?
Bir Ransomware Saldırısının Anatomisi. A'dan Z'ye Ransomware Saldırıları
Webinar: Popüler black marketler
Webinar: SOC Ekipleri için MITRE ATT&CK Kullanım Senaryoları
Açık Kaynak Kodlu Çözümler Kullanarak SOC Yönetimi SOAR & IRM Webinar - 2020
DNS Protokolüne Yönelik Güncel Saldırı Teknikleri & Çözüm Önerileri
Webinar: Siber Güvenlikte Olgunluk Seviyesini Arttırmak
Open Source Soc Araçları Eğitimi 2020-II
Webinar Sunumu: Saldırı, Savunma ve Loglama Açısından Konteyner Güvenliği
Hacklenmiş Windows Sistem Analizi
Open Source SOC Kurulumu
RAKAMLARIN DİLİ İLE 2020 YILI SIZMA TESTLERİ
Siber Fidye 2020 Raporu
BGA Türkiye Bankacılık Sektörü 1. Çeyrek Phishing Raporu
SOC Kurulumu ve Yönetimi İçin Açık Kaynak Kodlu Çözümler
Veri Sızıntıları İçinden Bilgi Toplama: Distributed Denial of Secrets
Aktif Dizin (Active Directory) Güvenlik Testleri - I: Bilgi Toplama

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Modernizing your data center with Dell and AMD
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Modernizing your data center with Dell and AMD
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity

8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security

  • 1. Next Generation Security Fuat KILIÇ Consulting Systems Engineer - Security Ali Fuat TÜRKAY Product Sales Specialist - Security
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Cisco and/or its affiliates. All rights reserved. Cisco Public All were smart. All had security. All were seriously compromised. Today’s Real World: Threats are evolving and evading traditional defense
  • 4. Cisco and/or its affiliates. All rights reserved. Cisco Public What would you do if you knew you would be compromised?! BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Network Endpoint Mobile Virtual Email & Web ContinuousPoint-in-time Attack Continuum Cloud
  • 5. Cisco and/or its affiliates. All rights reserved. Cisco Public The Silver Bullet Does Not Exist… “Captive Portal” “It matches the pattern” “No false positives, no false negatives.” Application Control FW/VPN IDS / IPS UTM NAC AV PKI “Block or Allow” “Fix the Firewall” “No key, no access” Sandboxing “Detect the Unknown”
  • 6. Cisco and/or its affiliates. All rights reserved. Cisco Public Customer Value Proposition Cisco Security Solutions Unmatched Visibility Advanced Threat Protection Consistent Control Flexibility & Choice
  • 7. Cisco’s Strategy Integrated Platform for Defense, Discovery and Remediation Firewall Content Gateways Integrated Platform Virtual Cloud Device Data Center Network Access Control Firewall Content Aware Applications Context Aware Identity, Data, Location Threat Aware Malware, APT
  • 8. Cisco and/or its affiliates. All rights reserved. Cisco Public Gartner Defines Next-Generation IPS 8 NGIPS Definition •  Standard First-Gen IPS •  Context Awareness •  Application Awareness and full-stack visibility •  Content Awareness •  Adaptive Engine Download at Sourcefire.com *Source: “Defining Next-Generation Network Intrusion Prevention” Gartner, October 7, 2011
  • 9. Cisco and/or its affiliates. All rights reserved.Presentation_ID Cisco Public FirePOWER Platform http:// http://WWW WWW WWW WWW FireSIGHT Management Center FireSIGHT Management Center •  Context Awareness •  Operating System Identification •  Fingerprint Applications (Web, Protocol & Client Versions) •  Service Enumeration (HTTP, SMPT, RDP…etc) •  Users Awareness •  24x7 Monitoring (Passive & Inline) •  Identify Assets Potential Vulnerabilities (Weakness) •  Leveraging Visibility/vulnerabilities to “Adapt” •  Access Control Rules Enforcement •  Alerting, Correlation & Packets Capture FirePOWER Platform/Services •  Inspect, Detect, Drop, Allow…etc •  IPS, Application Control, Malware Inspection & URL Rating •  Inline, Passive & Hybrid Context Awareness in Intrusion Events
  • 10. Cisco and/or its affiliates. All rights reserved. Cisco Public FireSIGHT – Unique Visibility Typical NGFW Cisco FireSIGHT System Typical IPS
  • 11. Cisco and/or its affiliates. All rights reserved. Cisco Public Building Host Profile OS & version Identified Server applications and version Client Applications Who is at the host Client Version Application What other systems / IPs did user have, when? §  Converting Data into Information
  • 12. Cisco and/or its affiliates. All rights reserved. Cisco Public FireSIGHT Impact Assessment Correlates all intrusion events to an impact of the attack against the target Impact Flag Administrator Action Why 1 Act immediately, vulnerable Event corresponds to vulnerability mapped to host 2 Investigate, potentially vulnerable Relevant port open or protocol in use, but no vuln mapped 3 Good to know, currently not vulnerable Relevant port not open or protocol not in use 4 Good to know, unknown target Monitored network, but unknown host 0 Good to know, unknown network Unmonitored network
  • 13. Cisco and/or its affiliates. All rights reserved. Cisco Public Indications of Compromise (IoCs) IPS Events Malware Backdoors Exploit Kits Web App Attacks CnC Connections Admin Privilege Escalations SI Events Connections to Known CnC IPs Malware Events Malware Detections Office/PDF/Java Compromises Malware Executions Dropper Infections
  • 14. Cisco and/or its affiliates. All rights reserved. Cisco Public Gartner Leadership Sourcefire has been a leader in the Gartner Magic Quadrant for IPS since 2006. As of December 2013 Source: Gartner (December 2013) Radware StoneSoft (McAfee) IBM Cisco HP McAfee Sourcefire (Cisco) HuaweiEnterasys Networks (Extreme Networks) NSFOCUS Information Technology challengers abilityto execute leaders visionariesniche players vision
  • 15. Cisco and/or its affiliates. All rights reserved. Cisco Public 2012 NSS Labs SVM for IPS
  • 16. Cisco and/or its affiliates. All rights reserved. Cisco Public 2013 NSS Labs SVM for IPS
  • 17. Cisco and/or its affiliates. All rights reserved. Cisco Public ASA with FirePOWER Services Available Now!! Industry’s First Threat-Focused NGFW #1 Cisco Security announcement of the year! •  Integrating defense layers helps organizations get the best visibility •  Enable dynamic controls to automatically adapt •  Protect against advanced threats across the entire attack continuum Proven Cisco ASA firewalling Industry leading NGIPS and AMP Cisco ASA with FirePOWER Services
  • 18. Cisco Confidential 18© 2013-2014 Cisco and/or its affiliates. All rights reserved. NSS Labs – Next-Generation Firewall Security Value Map Source: NSS Labs 2014 The NGFW Security Value Map shows the placement of Cisco ASA with FirePOWER Services and the FirePOWER 8350 as compared to other vendors. All three products achieved 99.2 percent in security effectiveness and now all can be confident that they will receive the best protections possible regardless of deployment.
  • 19. Cisco and/or its affiliates. All rights reserved. Cisco Public SecurityEffectiveness TCO per Protected-Mbps The Results CiscoAMP is a Leader in Security Effectiveness and TCO and offers Best Protection Value Cisco Advanced Malware Protection Best Protection Value 99.0% Breach Detection Rating Lowest TCO per Protected-Mbps NSS Labs Security Value Map (SVM) for Breach Detection Systems
  • 21. Cisco Confidential 21© 2013-2014 Cisco and/or its affiliates. All rights reserved. EPS REST API Threat Detection •  IDS Sig •  Malware •  Traffic •  Application •  And Many More.. Automagical, Dynamic, Squirrely Threat/Malware/Attack Response/Defense Quarantine Action •  VLAN Assignment •  dACLs •  SGT •  QoS TAG ISE
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Network as a Sensor © 2014 Lancope, Inc. All rights reserved.
  • 23. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 © 2014 Lancope, Inc. All rights reserved. Flow – The Network Phone Bill Flow CacheDestination IP Origin IP Destination Port Origin Port L3 Protocol DSCP Flow Info Packet Bytes/Packet Origin IP , Port, Proto... 11000 1528 … … … … … … Monthly Statement Bill At-A-Glance Flow Record Telephone Bill
  • 24. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Internet   Atlant a   San  Jose   New  York   Remote  Sites   WAN   Firewall   &  IPS   Datacenter   DMZ   User  Network   3G Internet
  • 25. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Internet   Atlant a   San  Jose   New  York   NetFlo w   Remote  Sites   NetFlo w   NetFlow   WAN   NetFlow   Firewall   Datacenter   NetFlow   NetFlow   NetFlow   DMZ   NetFlo w   NetFlo w   User   Network   3G Internet NetFlo w   NetFlo w   NetFlo w   NetFlow  
  • 26. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 © 2014 Lancope, Inc. All rights reserved. How CTD Analyzes Devices 31
  • 27. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 •  Cisco Bulut ve mobilite gibi günlük hayatımızı oldukça değiştiren trendlern ışığında, gereken güvenlik uzmanlığı ve eğitimi alanında aşağıdaki yenilikleri, uzmanların, mühendislerin ve operasyon ekiplerinin eğitimi için yayınlamıştır: • Yenilenen CCNP Güvenlik sertifikasyon programı • Yeni Cisco Sibergüvenlik Uzmanlığı • Daha önceki Cisco Güvenlik Uzmanlığı sertifikasyonunun sonlanması • Yeni ve güncellenmiş ürün eğitimleri •  Yeniden dizayn edilen CCNP Security sertifikasyonu, bugün çok daha geniş bir bkış açısıyla, uçtan uça mimari kurmaları gereken güvenlik uzmanlarını hedeflemektedir: •  300-206 Implementing Cisco Edge Network Security Solutions (SENSS) •  300-207 Implementing Cisco Threat Control Solutions (SITCS) •  300-208 Implementing Cisco Secure Access Solutions (SISAS) •  300-209 Implementing Cisco Secure Mobility Solutions (SIMOS)