SlideShare a Scribd company logo
Financial Security
Summit
Percy Camus
Cisco Systems Perú
Cybersecurity Sales Specialist
pecamus@cisco.com
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
CyberSecurity
#10YearChallenge
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Malware
Client applications
Operating systems
Mobile Devices
VOIP phones
Routers & switches
Printers
C & C
Servers
Network Servers
Cisco Firepower NGFW
Users
File transfers
Web
applications
Application
protocols
Typical NGFW
Mayor visibilidad, mejor protección
Se necesita mayor visibilidad contextual
Threats
Typical IPS
Cisco TALOS – Grupo Inteligencia de
Amenazas
00I00 I00I0I II0I0I 0II0I I0I00I0I0 0II0I0II 0I00I0I I0 00
II0III0I 0II0II0I II00I0I0 0I00I0I00 I0I0 I0I0 I00I0I00
III00II 0II00II I0I0II0II0 I0 I0 I00 00I0 I000 0II0 00
III00II I000I0I I000I0I I000I0I II 0I00 I0I000 0II0 00
00I I0I0I0 I0I0III000 I0I00I0I 0II0I0 I00I0I0I0I 000
II0II0I0I0I I0I0I0I 0I0I0I0I 0I0I00I0 I0I0I0I 0II0I0I0I
0II00 I00I0I0 0I00I0I I00I0I0 I0I0I0I 0I0I0I 0I0I0I0
00I0I0 0I0I0I0 I0I0I00I 0I0I 0I0I 0I0I I0I0I 0I00I0I
III00II 0II00II I0I000 0II0 00I0I00 I0 I000I0I 0II 0I0I0I
III00II 0II00II 0I0I0I0I 0I I0 I00 000II0 I0I0 0II0 00
24 – 7 – 365 Operations
100 TB
Of Data Received Daily
1.5 MILLION
Daily Malware Samples
600 BILLION
Daily Email Messages
16 BILLION
Daily Web Requests
MILLIONS
Of Telemetry Agents
4
Global Data Centers
Over 100
Threat Intelligence Partners
250+
Full Time Threat Intel
Researchers
Deploy the world's largest
traffic monitoring network
Leverage industry-leading
threat analytics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Vida social Vida virtual
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cambio tecnológico Cambio agresivo
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enfocada en
Infraestructura
Enfocada en el
usuario
© 2019 Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
Tres puntos claves
que deben hacer
Verificar el usuario
Verificar el dispositivo
Control de acceso
1
2
3
Adaptive Multi Factor
Authentication (MFA)
Algo que
tienes
(pej. celular)
Algo que
conoces
(pej. password)
Algo que tú
eres
(pej. biometría)
© Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
© 2019 Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
REST
APIS
WEB SDK
RADIUS
SAML
OIDC
CustomVPN RA SSO
RRAS
Multicloud Email/MSFT On-Prem
Empieza aquí Luego extiende a
Duo MFA soporta tus aplicaciones de trabajo
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Empresas grandes Empresas pequeñas
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Seguridad perimetral
FW | AV| Routers
Movilidad, IoT, SSL
Encryption
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Encrypted Traffic Analytics
Nuestra solución es la única que provee visibilidad y detección de malware sin
desencriptar
Criptografía complianceMalware en tráfico cifrado
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Sensors
NetFlow
Alert data
Enhanced NetFlow
Crypto Audit Telemetry
Global-to-local knowledge
correlation results in higher
precision of threat findings
Stealthwatch enhanced analytics
and machine learning reduces
threat investigation time
Enhanced NetFlow with encrypted
traffic analytics from Cisco’s
newest switches and routers
Flow
Collector(s)
NetFlow + proxy
telemetry
The Stealthwatch
Management Console
provides aggregated,
Cognitive Analytics
enhanced malware
detection
Encrypted
Traffic Analytics
cognitive.cisco.com
Cognitive
Analytics
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cryptographic Compliance & Auditing
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Perfil de tráfico 2009 Perfil de tráfico 2019
87% del tráfico de
correo era SPAM
39% del tráfico de
correo es SPAM
Segue 2
Cisco Cloud Email Security (CES)
Nuestros clientes indican que una solución de seguridad
de correo debe incluir:
(https://www.cisco.com/c/dam/en/us/products/se/2018/11/Collateral/esg-info-email-security.pdf)
72% 70% 68% 68% 64% 60%
Malware Protection Data Encryption Phishing Protection
Email
authentication
Continuous
monitoring
Threat intelligence
Las amenazas de correo electrónico
cuestan a las organizaciones tiempo y
dinero. Las organizaciones necesitan una
cobertura completa y deben evaluar si sus
proveedores de correo electrónico SaaS los
han dejado expuestos.
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2009 2019
Vulnerabilidad
Exploit: Conflicker
Vulnerabilidad
Exploit: Wannacry
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2009 2019
Robo de bancos Cryptomining
Cisco Umbrella
Malware
C2 Callbacks
Phishing
Cryptomining
HQ
Sandbox
NGFW
Proxy
Netflow
AV AV
Sucursal
Router/UTM
AV AV
ROAMING
AV
1era Línea
Beneficios
Bloquea el malware antes que
toque la empresa
Contiene el malware en caso
que ya esté adentro
Internet más rápido
Provisionamiento en minutos
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
2009 2019
Impacto $ Impacto $$$
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
2019 Impacto
60%
85%
1M
Ataques son
inevitables
Visibilidad
tardía
Crecimiento
superficie de
ataque
1 Cisco Digital Business Infographic Story
2 2016 Verizon Data Breach Investigations Report and Forrester research
3 Gartner
de los servicios digitales
sufrirán afectación de
disponibilidad debido a la
falta de manejo de riesgo y
respuesta3
De los incidentes no serán
detectados en semanas o
más
Nuevos
dispositivos por
hora en 2020
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Colaboradores móviles con
múltiples dispositivos
Pédida de visibilidad
Una Nueva Era de Digitalización…
Trae una Nueva Era de retos de Seguridad
Más dispositivos IoT
conectados cada día
Crece superficie de ataque
Workloads
moviéndose al Cloud
Pérdida de control
Amenazas
persistentes
Gran probabilidad de brecha
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Potenciar la Red para proveer Visibilidad,
Segmentación y protección contra Amenazas
Visibilidad
“Ver todo”
Segmentación
“Reducir la superficie de
ataque”
Threat Protection
“Detener la brecha”
GRACIAS

More Related Content

PDF
VIRTUAL CISO AND OTHER KEY CYBER ROLES
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PDF
PROGRAMMING AND CYBER SECURITY
PDF
Mobile Security Assessment
PDF
2019 CYBER SECURITY TRENDS REPORT REVIEW
PDF
OFFICE 365 SECURITY
PDF
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
PPTX
Idc security roadshow may2015 Adrian Aron
VIRTUAL CISO AND OTHER KEY CYBER ROLES
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PROGRAMMING AND CYBER SECURITY
Mobile Security Assessment
2019 CYBER SECURITY TRENDS REPORT REVIEW
OFFICE 365 SECURITY
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Idc security roadshow may2015 Adrian Aron

What's hot (20)

PDF
OFFENSIVE IDS
PDF
Talk1 esc3 muscl-standards and regulation_v1_1
PPTX
Security transformation: Helping you manage digital risk
PDF
Fortinet Broşür
PPTX
Ascendiendo a la GEN V de Cyber Security
PDF
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
PDF
TechWiseTV Workshop: Encrypted Traffic Analytics
PDF
Talk2 esc4 muscl-ids_v1_2
PDF
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
PDF
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
PDF
Mfg workshop security
PDF
Critical Infrastructure Protection from Terrorist Attacks
PDF
DATA LOSS PREVENTION OVERVIEW
PDF
The Next Generation Security
PDF
Talk1 esc7 muscl-dataprotection_v1_2
PDF
Slides to the online event "Creating an effective cybersecurity strategy" by ...
PDF
Cisco Live Cancun Collaboration Press
PPTX
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
PDF
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
PDF
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
OFFENSIVE IDS
Talk1 esc3 muscl-standards and regulation_v1_1
Security transformation: Helping you manage digital risk
Fortinet Broşür
Ascendiendo a la GEN V de Cyber Security
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
TechWiseTV Workshop: Encrypted Traffic Analytics
Talk2 esc4 muscl-ids_v1_2
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Mfg workshop security
Critical Infrastructure Protection from Terrorist Attacks
DATA LOSS PREVENTION OVERVIEW
The Next Generation Security
Talk1 esc7 muscl-dataprotection_v1_2
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Cisco Live Cancun Collaboration Press
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
Ad

Similar to Cisco Cybersecurity #10YearChallenge (20)

PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PDF
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
PPTX
Cisco Security as a foundation for SP Digitization
PDF
Next Generation Security
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
PDF
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
PDF
Security and Virtualization in the Data Center
PDF
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
PDF
Smau Padova 2018 - Cisco
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
PDF
Cisco Live Cancun PR Session
PDF
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
PDF
Tomorrow Starts Here - Security Everywhere
PDF
Brink sanders cisco architecture keynote
PPTX
Umbrella DUO Multi-Factor Authentication
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
PDF
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Security as a foundation for SP Digitization
Next Generation Security
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Security and Virtualization in the Data Center
Cisco Connect 2018 Philippines - delivering a secure, intelligent platform fo...
Smau Padova 2018 - Cisco
Cisco connect montreal 2018 secure dc
Cisco Connect 2018 Malaysia - Programmability and telemetry for future networks
Cisco Live Cancun PR Session
AWS Summit Singapore 2019 | Learn How to Achieve Complete Visibility, Strong ...
Tomorrow Starts Here - Security Everywhere
Brink sanders cisco architecture keynote
Umbrella DUO Multi-Factor Authentication
New ThousandEyes Product Innovations: Cisco Live June 2025
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Ad

More from Cristian Garcia G. (20)

PDF
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
PPTX
El imperativo de la seguridad de la identidad
PPTX
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
PPTX
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
PPTX
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
PPTX
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
PPTX
La Brecha Silenciosa: ¿Estás Realmente Protegido?
PPTX
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
PPTX
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
PPTX
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
PPTX
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
PPTX
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
PDF
Estrategia de prevencion contra fraude electronico y financiero
PDF
BEYONDTRUST - Protegiendo Rutas al Privilegio
PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
PDF
FIREMON - Postura de Perimetro y Cumplimiento
PDF
Implementando Zero Standing Privilege: Acelere sus iniciativas estratégicas
PDF
NETSKOPE Proteger y acelerar todo a todas partes
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
El imperativo de la seguridad de la identidad
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
La Brecha Silenciosa: ¿Estás Realmente Protegido?
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
Estrategia de prevencion contra fraude electronico y financiero
BEYONDTRUST - Protegiendo Rutas al Privilegio
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
FIREMON - Postura de Perimetro y Cumplimiento
Implementando Zero Standing Privilege: Acelere sus iniciativas estratégicas
NETSKOPE Proteger y acelerar todo a todas partes

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Weekly Chronicles - August'25 Week I
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Spectral efficient network and resource selection model in 5G networks
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Encapsulation_ Review paper, used for researhc scholars

Cisco Cybersecurity #10YearChallenge

  • 1. Financial Security Summit Percy Camus Cisco Systems Perú Cybersecurity Sales Specialist pecamus@cisco.com
  • 2. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential CyberSecurity #10YearChallenge
  • 3. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 4. Malware Client applications Operating systems Mobile Devices VOIP phones Routers & switches Printers C & C Servers Network Servers Cisco Firepower NGFW Users File transfers Web applications Application protocols Typical NGFW Mayor visibilidad, mejor protección Se necesita mayor visibilidad contextual Threats Typical IPS
  • 5. Cisco TALOS – Grupo Inteligencia de Amenazas 00I00 I00I0I II0I0I 0II0I I0I00I0I0 0II0I0II 0I00I0I I0 00 II0III0I 0II0II0I II00I0I0 0I00I0I00 I0I0 I0I0 I00I0I00 III00II 0II00II I0I0II0II0 I0 I0 I00 00I0 I000 0II0 00 III00II I000I0I I000I0I I000I0I II 0I00 I0I000 0II0 00 00I I0I0I0 I0I0III000 I0I00I0I 0II0I0 I00I0I0I0I 000 II0II0I0I0I I0I0I0I 0I0I0I0I 0I0I00I0 I0I0I0I 0II0I0I0I 0II00 I00I0I0 0I00I0I I00I0I0 I0I0I0I 0I0I0I 0I0I0I0 00I0I0 0I0I0I0 I0I0I00I 0I0I 0I0I 0I0I I0I0I 0I00I0I III00II 0II00II I0I000 0II0 00I0I00 I0 I000I0I 0II 0I0I0I III00II 0II00II 0I0I0I0I 0I I0 I00 000II0 I0I0 0II0 00 24 – 7 – 365 Operations 100 TB Of Data Received Daily 1.5 MILLION Daily Malware Samples 600 BILLION Daily Email Messages 16 BILLION Daily Web Requests MILLIONS Of Telemetry Agents 4 Global Data Centers Over 100 Threat Intelligence Partners 250+ Full Time Threat Intel Researchers Deploy the world's largest traffic monitoring network Leverage industry-leading threat analytics
  • 6. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Vida social Vida virtual
  • 7. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cambio tecnológico Cambio agresivo
  • 8. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Enfocada en Infraestructura Enfocada en el usuario
  • 9. © 2019 Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC. Tres puntos claves que deben hacer Verificar el usuario Verificar el dispositivo Control de acceso 1 2 3 Adaptive Multi Factor Authentication (MFA) Algo que tienes (pej. celular) Algo que conoces (pej. password) Algo que tú eres (pej. biometría) © Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC.
  • 10. © 2019 Cisco and/or affiliates. All rights reserved. | CONFIDENTIAL INFORMATION PROPERTY OF DUO SECURITY, INC. REST APIS WEB SDK RADIUS SAML OIDC CustomVPN RA SSO RRAS Multicloud Email/MSFT On-Prem Empieza aquí Luego extiende a Duo MFA soporta tus aplicaciones de trabajo
  • 11. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Empresas grandes Empresas pequeñas
  • 12. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Seguridad perimetral FW | AV| Routers Movilidad, IoT, SSL Encryption
  • 13. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Encrypted Traffic Analytics Nuestra solución es la única que provee visibilidad y detección de malware sin desencriptar Criptografía complianceMalware en tráfico cifrado
  • 14. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Sensors NetFlow Alert data Enhanced NetFlow Crypto Audit Telemetry Global-to-local knowledge correlation results in higher precision of threat findings Stealthwatch enhanced analytics and machine learning reduces threat investigation time Enhanced NetFlow with encrypted traffic analytics from Cisco’s newest switches and routers Flow Collector(s) NetFlow + proxy telemetry The Stealthwatch Management Console provides aggregated, Cognitive Analytics enhanced malware detection Encrypted Traffic Analytics cognitive.cisco.com Cognitive Analytics
  • 15. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cryptographic Compliance & Auditing
  • 16. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Perfil de tráfico 2009 Perfil de tráfico 2019 87% del tráfico de correo era SPAM 39% del tráfico de correo es SPAM
  • 17. Segue 2 Cisco Cloud Email Security (CES) Nuestros clientes indican que una solución de seguridad de correo debe incluir: (https://www.cisco.com/c/dam/en/us/products/se/2018/11/Collateral/esg-info-email-security.pdf) 72% 70% 68% 68% 64% 60% Malware Protection Data Encryption Phishing Protection Email authentication Continuous monitoring Threat intelligence Las amenazas de correo electrónico cuestan a las organizaciones tiempo y dinero. Las organizaciones necesitan una cobertura completa y deben evaluar si sus proveedores de correo electrónico SaaS los han dejado expuestos.
  • 18. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2009 2019 Vulnerabilidad Exploit: Conflicker Vulnerabilidad Exploit: Wannacry
  • 19. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2009 2019 Robo de bancos Cryptomining
  • 20. Cisco Umbrella Malware C2 Callbacks Phishing Cryptomining HQ Sandbox NGFW Proxy Netflow AV AV Sucursal Router/UTM AV AV ROAMING AV 1era Línea Beneficios Bloquea el malware antes que toque la empresa Contiene el malware en caso que ya esté adentro Internet más rápido Provisionamiento en minutos
  • 21. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2009 2019 Impacto $ Impacto $$$
  • 22. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential 2019 Impacto 60% 85% 1M Ataques son inevitables Visibilidad tardía Crecimiento superficie de ataque 1 Cisco Digital Business Infographic Story 2 2016 Verizon Data Breach Investigations Report and Forrester research 3 Gartner de los servicios digitales sufrirán afectación de disponibilidad debido a la falta de manejo de riesgo y respuesta3 De los incidentes no serán detectados en semanas o más Nuevos dispositivos por hora en 2020
  • 23. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential Colaboradores móviles con múltiples dispositivos Pédida de visibilidad Una Nueva Era de Digitalización… Trae una Nueva Era de retos de Seguridad Más dispositivos IoT conectados cada día Crece superficie de ataque Workloads moviéndose al Cloud Pérdida de control Amenazas persistentes Gran probabilidad de brecha
  • 24. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Potenciar la Red para proveer Visibilidad, Segmentación y protección contra Amenazas Visibilidad “Ver todo” Segmentación “Reducir la superficie de ataque” Threat Protection “Detener la brecha”