SlideShare a Scribd company logo
Cisco Advanced Threat Security 
Steve Gindi 
v1.2 
Cyber Security For The Real World
Advanced Threat Security 
What is Advanced Malware? 
• Advance Malware is sophisticated malware designed to bypass traditional 
POINT IN TIME defenses such as Anti-Malware Engines, Sandboxes, etc. 
Malware utilizes techniques such as Encryption, Polymorphism, Sleep 
Techniques. Also known as Zero Hour Exploits, Advanced Persistent Threats. 
• Attack surface is typically found with Email and Web based traffic. 
• Top 5 Security Concern for CIO/CSO’s. 
• Very Public Hacks in 2013/2014 that affects Brand. 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 2
The Way We Do Business Is Changing 
Making it more difficult to protect your network 
Mobile Coffee shop Corporate Home Airport 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 3
The Industrialization of Hacking 
Hacking Becomes 
an Industry 
Sophisticated Attacks, 
Complex Landscape 
Phishing, Low 
Sophistication 
1990 1995 2000 2005 2010 2015 2020 
Viruses 
1990–2000 
Worms 
2000–2005 
Spyware and Rootkits 
2005–Today 
APTs Cyberware 
Today + 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 4
Most dangerous threats 
Approach 
Tactic 
Impact 
Threat 
vector 
Watering hole Spear phishing Dropper 
Infect or inject a trusted site 
Conduct reconnaissance 
on a target 
Deliver an exploit that will attack 
Target users through 
compromised links 
Leverage social engineering 
Deliver an exploit that will attack 
Deliver malware with stealth and 
self-deleting programs 
Gain access through DLL injection 
and control firewalls, antivirus, ect 
Compromises system control, 
personal data and authorizations 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 5
The Silver Bullet Does Not Exist… 
Application 
Control 
Sandboxing 
“Detect the 
Unknown” 
“Fix the Firewall” 
“Captive Portal” 
IDS / IPS 
UTM 
PKI 
“No key, no access” 
“It matches the pattern” 
NAC 
“No false positives, 
no false negatives.” 
FW/VPN 
AV 
“Block or Allow” 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 6
Perfect Fit for The New Security Model 
Attack Continuum 
BEFORE 
Discover 
Enforce 
Harden 
AFTER 
Scope 
Contain 
Remediate 
DURING 
Detect 
Block 
Defend 
Advanced Malware Protection 
NGIPS 
Network Behavior Analysis 
ESA/WSA 
Firewall 
NGFW 
NAC 
+ 
Identity 
Services 
VPN 
UTM 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 7
Cisco - Advanced Threat Security 
v1.2
Why are we still Struggling??!!??!! 
Complexity Visibility Cost 
• Multi-Vendor 
• Redundancy 
• Training 
• Hardware 
• Power 
• Rack Space 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 9
engineers, technicians, and researchers 
PH.D., CCIE, CISSP, AND MSCE users 
AnyConnect® 
600+ 
80+ 
Cisco 
IPS 
Cisco ESA Cisco ASA Cisco WSA 
Control 
Cisco 
Cisco 
CWS 
WWW 
TALOS 
Outstanding Cloud-based Global Threat Intelligence 
Endpoints 
24x7x365 
operations 
40+ 
languages 
Devices 
Networks 
Visibility 
WWW 
Web 
Email 
IPS 
1.6 million 
global sensors 
100 TB 
of data received per day 
150 million+ 
deployed endpoints 
35% 
worldwide email traffic 
13 billion 
web requests 
More than US$100 
million 
spent on dynamic research and development 
3- to 5- 
minute updates 
5,500+ 
IPS signatures produced 
8 million+ 
rules per day 
200+ 
parameters tracked 
70+ 
publications produced 
Cisco® SIO 
Information 
Actions 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 10
Cisco Email Security Architecture 
Inbound Protection Outbound Control 
Threat Defense 
Antispam 
Antivirus and Virus Outbreak Filter 
Data Security 
Data Loss Prevention 
Encryption 
Flexible Deployment Options Appliance Virtual 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 11
Gartner Magic Quadrant for Secure Email Gateway, 2014 
The Magic Quadrant is copyrighted 2014 by Gartner, 
Inc. and is reused with permission. The Magic 
Quadrant is a graphical representation of a 
marketplace at and for a specific time period. It 
depicts Gartner’s analysis of how certain vendors 
measure against criteria for that marketplace, as 
defined by Gartner. Gartner does not endorse any 
vendor product or service depicted in the Magic 
Quadrant, and does not advise technology users to 
select only those vendors placed in the "Leaders” 
quadrant. The Magic Quadrant is intended solely as 
a research tool, and is not meant to be a specific 
guide to action. Gartner disclaims all warranties, 
express or implied, with respect to this research, 
including any warranties of merchantability or fitness 
for a particular purpose. 
This Magic Quadrant graphic was published by 
Gartner, Inc. as part of a larger research note and 
should be evaluated in the context of the entire 
report. The Gartner report is available upon request 
from Cisco. 
Source: Magic Quadrant for Secure Email 
Gateways: http://www.gartner.com/technology/ 
reprints.do?id=1-1GT4N4C&ct=130702&st=sb 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 12
Cisco Web Security Architecture 
WWW 
Cisco Security Intelligence Operations (SIO) 
PROTECTION CONTROL 
URL 
Filtering 
Application 
Visibility and 
Control (AVC) 
*Data Loss 
Prevention 
(DLP) 
Layer 4 Traffic 
Monitoring 
(On-premises) 
Malware 
Protection 
Centralized Management & Reporting 
WWW Allow 
Limited Access 
WWW WWW 
Block 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 13
Gartner Magic Quadrant for Secure Web Gateway, 2014 
The Magic Quadrant is copyrighted 2014 by Gartner, 
Inc. and is reused with permission. The Magic 
Quadrant is a graphical representation of a 
marketplace at and for a specific time period. It 
depicts Gartner’s analysis of how certain vendors 
measure against criteria for that marketplace, as 
defined by Gartner. Gartner does not endorse any 
vendor product or service depicted in the Magic 
Quadrant, and does not advise technology users to 
select only those vendors placed in the "Leaders” 
quadrant. The Magic Quadrant is intended solely as 
a research tool, and is not meant to be a specific 
guide to action. Gartner disclaims all warranties, 
express or implied, with respect to this research, 
including any warranties of merchantability or fitness 
for a particular purpose. 
This Magic Quadrant graphic was published by 
Gartner, Inc. as part of a larger research note and 
should be evaluated in the context of the entire 
report. The Gartner report is available upon request 
from Cisco. 
Source: Magic Quadrant for Secure Web 
Gateways: http://www.gartner.com/technology/ 
reprints.do?id=1-1VSLKXG&ct=140624&st=sb 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 14
Cisco Next Gen Firewall Architecture 
Cisco Collective Security Intelligence Enabled 
FireSIGHT 
Analytics & Automation 
CISCO ASA 
WWW 
URL Filtering 
(subscription) 
Identity-Policy Control & 
VPN 
Advanced Malware 
Protection 
(subscription) 
Intrusion Prevention 
(subscription) 
Application 
Visibility &Control 
Clustering & 
High Availability 
Network Firewall 
Routing | Switching 
Built-in Network 
Profiling 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 15
NSS Labs: Next Generation Firewall 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 16
AMP on Email, Web & Firewall 
• Blocks known and unknown files 
• Reputation verdicts delivered by AMP cloud intelligence network 
• Behavioral analysis of unknown files 
• Looks for suspicious behavior 
• Feeds intelligence back to AMP cloud 
• Continuous analysis of files that have traversed the gateway 
• Retrospective alerting after an attack when file is determined 
to be malicious 
File 
Reputation 
File 
Sandboxing 
File 
Retrospection 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 17
Point-in-time 
Detection 
Antivirus 
Sandboxing 
Initial Disposition = Clean 
Initial Disposition = Clean 
AMP 
Blind to scope 
of compromise 
Analysis Stops 
Never 100% 
Sleep Techniques 
Unknown Protocols 
Encryption 
Polymorphism 
Actual Disposition = Bad = Too Late!! 
Retrospective Detection, 
Analysis Continues 
Actual Disposition = Bad = Blocked 
AMP is unique in the way it 
reevaluates information. If new 
data shows known-good files 
actually aren't good or have 
turned bad, AMP re-mines its 
data set and automatically 
transmits notifications to 
customers to trigger 
remediation. 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 18
NSS Labs: Advanced Malware Protection 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 19
AMP Everywhere 
Secure Gateway Network Appliance Endpoint 
• Stops threats before they 
enter the network 
• Easy activation 
• File Trajectory & 
Retrospective Security 
• Ideal for new or existing 
Cisco Email or Web Security 
customers 
• Effective upsell for all 
existing customers 
• Wide visibility inside the 
network with File Trajectory 
& Retrospective Security 
• Layered with network threat 
defense (IPS/NGFW) & 
event correlation 
• Broad selection of features-before, 
during and after an 
attack 
• Ideal for IPS/NGFW 
customers 
• Granular visibility and control 
at the endpoint level with 
Device Trajectory, File 
Trajectory & Retrospective 
Security 
• Protection for mobile and 
remote devices 
• For advanced customers 
wanting comprehensive 
threat protection, 
investigation & response 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 20
Why Cisco?? 
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 21
© 2013-2014 Cisco and/or its affiliates. All rights reserved. 22

More Related Content

PDF
Next Generation Security
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PDF
Cisco Security Architecture
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Cisco amp for meraki
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PDF
Presentation cisco cloud security strategy
PDF
Cisco Security Presentation
Next Generation Security
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Security Architecture
Sourcefire Webinar - NEW GENERATION IPS
Cisco amp for meraki
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Presentation cisco cloud security strategy
Cisco Security Presentation

What's hot (20)

PDF
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PDF
SourceFire IPS Overview
PDF
Cisco umbrella overview
PPTX
IPS Best Practices
PDF
The Network as a Sensor, Cisco and Lancope
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Cisco's 2016 Annual Security report
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PDF
Cisco ASA con fire power services
PDF
Tomorrow Starts Here - Security Everywhere
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
PDF
Cisco NGFW AMP
PDF
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
PDF
Cisco amp for endpoints
PDF
Presentation cisco iron port email & web security
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Building Up Network Security: Intrusion Prevention and Sourcefire
SourceFire IPS Overview
Cisco umbrella overview
IPS Best Practices
The Network as a Sensor, Cisco and Lancope
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
Scalar Security Roadshow - Toronto Presentation
Cisco's 2016 Annual Security report
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Cisco ASA con fire power services
Tomorrow Starts Here - Security Everywhere
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
TechWiseTV Workshop: OpenDNS and AnyConnect
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cisco NGFW AMP
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
Cisco amp for endpoints
Presentation cisco iron port email & web security
Ad

Viewers also liked (15)

PPTX
PDF
2014 the future evolution of cybersecurity
PDF
Cyber Threat Taxonomy Matrix APR 2014
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PDF
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
PPTX
5 Network Security Threats Facing Businesses Today
PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
PPTX
Managed Security Services Overview
PDF
Cisco contact center
PPTX
Cisco ASA Firepower
PPTX
Data Consult Managed Security Services
PDF
Building a Security Architecture
PDF
Secure collab on premise
PDF
Gartner Magic Quadrant for Secure Email Gateways 2014
PPTX
The Cyber Threat Intelligence Matrix
2014 the future evolution of cybersecurity
Cyber Threat Taxonomy Matrix APR 2014
Mark Arena - Cyber Threat Intelligence #uisgcon9
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
5 Network Security Threats Facing Businesses Today
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
Managed Security Services Overview
Cisco contact center
Cisco ASA Firepower
Data Consult Managed Security Services
Building a Security Architecture
Secure collab on premise
Gartner Magic Quadrant for Secure Email Gateways 2014
The Cyber Threat Intelligence Matrix
Ad

Similar to Advanced threat security - Cyber Security For The Real World (20)

PDF
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
PPTX
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
PDF
Cisco Network Insider Series: Securing Your Branch for DIA
PDF
Presentación - Cisco ASA with FirePOWER Services
PDF
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
PDF
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PDF
Cisco Live Cancun PR Session
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PPTX
Securing Beyond the Cloud Generation
PPTX
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
Scalar Security Roadshow - Ottawa Presentation
PDF
Using Your Network as a Sensor for Enhanced Visibility and Security
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Cisco Content Security
PDF
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
PPTX
Check Point: From Branch to Data Center
PPTX
Rik Ferguson
PPT
Palo Alto Networks Soc Ent Okt2009
PDF
Visibility and Automation for Enhanced Security
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Cisco Network Insider Series: Securing Your Branch for DIA
Presentación - Cisco ASA with FirePOWER Services
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Cisco Live Cancun PR Session
During the Next Generation Network and Data Centre – Now and into the Future ...
Securing Beyond the Cloud Generation
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Ottawa Presentation
Using Your Network as a Sensor for Enhanced Visibility and Security
Scalar Security Roadshow - Calgary Presentation
Cisco Content Security
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Check Point: From Branch to Data Center
Rik Ferguson
Palo Alto Networks Soc Ent Okt2009
Visibility and Automation for Enhanced Security

More from Cisco Canada (20)

PDF
Cisco connect montreal 2018 net devops
PDF
Cisco connect montreal 2018 iot demo kinetic fr
PPTX
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
PDF
Cisco connect montreal 2018 vision mondiale analyse locale
PDF
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
PDF
Cisco connect montreal 2018 collaboration les services webex hybrides
PDF
Integration cisco et microsoft connect montreal 2018
PDF
Cisco connect montreal 2018 compute v final
PDF
Cisco connect montreal 2018 saalvare md-program-xr-v2
PDF
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
PDF
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect Toronto 2018 DevNet Overview
PDF
Cisco Connect Toronto 2018 DNA assurance
PDF
Cisco Connect Toronto 2018 network-slicing
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco Connect Toronto 2018 sixty to zero
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco connect montreal 2018 collaboration les services webex hybrides
Integration cisco et microsoft connect montreal 2018
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 sixty to zero

Recently uploaded (20)

PDF
Advanced IT Governance
PDF
Electronic commerce courselecture one. Pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Cloud computing and distributed systems.
Advanced IT Governance
Electronic commerce courselecture one. Pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
“AI and Expert System Decision Support & Business Intelligence Systems”
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Machine learning based COVID-19 study performance prediction
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Network Security Unit 5.pdf for BCA BBA.
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Cloud computing and distributed systems.

Advanced threat security - Cyber Security For The Real World

  • 1. Cisco Advanced Threat Security Steve Gindi v1.2 Cyber Security For The Real World
  • 2. Advanced Threat Security What is Advanced Malware? • Advance Malware is sophisticated malware designed to bypass traditional POINT IN TIME defenses such as Anti-Malware Engines, Sandboxes, etc. Malware utilizes techniques such as Encryption, Polymorphism, Sleep Techniques. Also known as Zero Hour Exploits, Advanced Persistent Threats. • Attack surface is typically found with Email and Web based traffic. • Top 5 Security Concern for CIO/CSO’s. • Very Public Hacks in 2013/2014 that affects Brand. © 2013-2014 Cisco and/or its affiliates. All rights reserved. 2
  • 3. The Way We Do Business Is Changing Making it more difficult to protect your network Mobile Coffee shop Corporate Home Airport © 2013-2014 Cisco and/or its affiliates. All rights reserved. 3
  • 4. The Industrialization of Hacking Hacking Becomes an Industry Sophisticated Attacks, Complex Landscape Phishing, Low Sophistication 1990 1995 2000 2005 2010 2015 2020 Viruses 1990–2000 Worms 2000–2005 Spyware and Rootkits 2005–Today APTs Cyberware Today + © 2013-2014 Cisco and/or its affiliates. All rights reserved. 4
  • 5. Most dangerous threats Approach Tactic Impact Threat vector Watering hole Spear phishing Dropper Infect or inject a trusted site Conduct reconnaissance on a target Deliver an exploit that will attack Target users through compromised links Leverage social engineering Deliver an exploit that will attack Deliver malware with stealth and self-deleting programs Gain access through DLL injection and control firewalls, antivirus, ect Compromises system control, personal data and authorizations © 2013-2014 Cisco and/or its affiliates. All rights reserved. 5
  • 6. The Silver Bullet Does Not Exist… Application Control Sandboxing “Detect the Unknown” “Fix the Firewall” “Captive Portal” IDS / IPS UTM PKI “No key, no access” “It matches the pattern” NAC “No false positives, no false negatives.” FW/VPN AV “Block or Allow” © 2013-2014 Cisco and/or its affiliates. All rights reserved. 6
  • 7. Perfect Fit for The New Security Model Attack Continuum BEFORE Discover Enforce Harden AFTER Scope Contain Remediate DURING Detect Block Defend Advanced Malware Protection NGIPS Network Behavior Analysis ESA/WSA Firewall NGFW NAC + Identity Services VPN UTM © 2013-2014 Cisco and/or its affiliates. All rights reserved. 7
  • 8. Cisco - Advanced Threat Security v1.2
  • 9. Why are we still Struggling??!!??!! Complexity Visibility Cost • Multi-Vendor • Redundancy • Training • Hardware • Power • Rack Space © 2013-2014 Cisco and/or its affiliates. All rights reserved. 9
  • 10. engineers, technicians, and researchers PH.D., CCIE, CISSP, AND MSCE users AnyConnect® 600+ 80+ Cisco IPS Cisco ESA Cisco ASA Cisco WSA Control Cisco Cisco CWS WWW TALOS Outstanding Cloud-based Global Threat Intelligence Endpoints 24x7x365 operations 40+ languages Devices Networks Visibility WWW Web Email IPS 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints 35% worldwide email traffic 13 billion web requests More than US$100 million spent on dynamic research and development 3- to 5- minute updates 5,500+ IPS signatures produced 8 million+ rules per day 200+ parameters tracked 70+ publications produced Cisco® SIO Information Actions © 2013-2014 Cisco and/or its affiliates. All rights reserved. 10
  • 11. Cisco Email Security Architecture Inbound Protection Outbound Control Threat Defense Antispam Antivirus and Virus Outbreak Filter Data Security Data Loss Prevention Encryption Flexible Deployment Options Appliance Virtual © 2013-2014 Cisco and/or its affiliates. All rights reserved. 11
  • 12. Gartner Magic Quadrant for Secure Email Gateway, 2014 The Magic Quadrant is copyrighted 2014 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Cisco. Source: Magic Quadrant for Secure Email Gateways: http://www.gartner.com/technology/ reprints.do?id=1-1GT4N4C&ct=130702&st=sb © 2013-2014 Cisco and/or its affiliates. All rights reserved. 12
  • 13. Cisco Web Security Architecture WWW Cisco Security Intelligence Operations (SIO) PROTECTION CONTROL URL Filtering Application Visibility and Control (AVC) *Data Loss Prevention (DLP) Layer 4 Traffic Monitoring (On-premises) Malware Protection Centralized Management & Reporting WWW Allow Limited Access WWW WWW Block © 2013-2014 Cisco and/or its affiliates. All rights reserved. 13
  • 14. Gartner Magic Quadrant for Secure Web Gateway, 2014 The Magic Quadrant is copyrighted 2014 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner’s analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders” quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Cisco. Source: Magic Quadrant for Secure Web Gateways: http://www.gartner.com/technology/ reprints.do?id=1-1VSLKXG&ct=140624&st=sb © 2013-2014 Cisco and/or its affiliates. All rights reserved. 14
  • 15. Cisco Next Gen Firewall Architecture Cisco Collective Security Intelligence Enabled FireSIGHT Analytics & Automation CISCO ASA WWW URL Filtering (subscription) Identity-Policy Control & VPN Advanced Malware Protection (subscription) Intrusion Prevention (subscription) Application Visibility &Control Clustering & High Availability Network Firewall Routing | Switching Built-in Network Profiling © 2013-2014 Cisco and/or its affiliates. All rights reserved. 15
  • 16. NSS Labs: Next Generation Firewall © 2013-2014 Cisco and/or its affiliates. All rights reserved. 16
  • 17. AMP on Email, Web & Firewall • Blocks known and unknown files • Reputation verdicts delivered by AMP cloud intelligence network • Behavioral analysis of unknown files • Looks for suspicious behavior • Feeds intelligence back to AMP cloud • Continuous analysis of files that have traversed the gateway • Retrospective alerting after an attack when file is determined to be malicious File Reputation File Sandboxing File Retrospection © 2013-2014 Cisco and/or its affiliates. All rights reserved. 17
  • 18. Point-in-time Detection Antivirus Sandboxing Initial Disposition = Clean Initial Disposition = Clean AMP Blind to scope of compromise Analysis Stops Never 100% Sleep Techniques Unknown Protocols Encryption Polymorphism Actual Disposition = Bad = Too Late!! Retrospective Detection, Analysis Continues Actual Disposition = Bad = Blocked AMP is unique in the way it reevaluates information. If new data shows known-good files actually aren't good or have turned bad, AMP re-mines its data set and automatically transmits notifications to customers to trigger remediation. © 2013-2014 Cisco and/or its affiliates. All rights reserved. 18
  • 19. NSS Labs: Advanced Malware Protection © 2013-2014 Cisco and/or its affiliates. All rights reserved. 19
  • 20. AMP Everywhere Secure Gateway Network Appliance Endpoint • Stops threats before they enter the network • Easy activation • File Trajectory & Retrospective Security • Ideal for new or existing Cisco Email or Web Security customers • Effective upsell for all existing customers • Wide visibility inside the network with File Trajectory & Retrospective Security • Layered with network threat defense (IPS/NGFW) & event correlation • Broad selection of features-before, during and after an attack • Ideal for IPS/NGFW customers • Granular visibility and control at the endpoint level with Device Trajectory, File Trajectory & Retrospective Security • Protection for mobile and remote devices • For advanced customers wanting comprehensive threat protection, investigation & response © 2013-2014 Cisco and/or its affiliates. All rights reserved. 20
  • 21. Why Cisco?? © 2013-2014 Cisco and/or its affiliates. All rights reserved. 21
  • 22. © 2013-2014 Cisco and/or its affiliates. All rights reserved. 22