SlideShare a Scribd company logo
Ambika Gadre
Senior Director, Product Management
Cisco Cloud Security Strategy
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 2
Cisco’s Architecture for Borderless
Network Security
Borderless
DataCenter
3
Borderless
Internet
Borderless
EndZones
Policy
Corporate Border
Branch Office
Applications
and Data
Corporate Office
Policy
(Access Control, Acceptable Use, Malware, Data Security)4
Attackers
Coffee
ShopCustomers
Airport
Mobile
User Partners
Platform
as a Service
Infrastructure
as a Service
X
as a Service
Software
as a Service
2
1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 3
Migration to the Cloud:
Opposing Forces
Accelerators Inhibitors
Financial
Resources
Predictable Op-Ex
Operational
Maintenance
Datacenter footprint
Security
Privacy
Reliability
Control
Management
Visibility
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 4
Flexible Delivery Models
OnOn--PremisesPremises CloudCloud HybridHybrid ManagedManaged
Award-Winning
Technology
Dedicated SaaS
Infrastructure
Best of Both
Worlds
Fully Managed
on Premises
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 5
Co-Management
Maximum Flexibility At Your Finger Tips
Cisco SolutionCisco SolutionCompetitionCompetition
Ticket based delays
End-user frustration
Decreases efficiency
WhereWhere’’s mys my
message?message?
Granular access
Zero delays
Improved productivity
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 6
Single Pane of Management
Improved Visibility & Control
Common
Tracking
Reporting
Management
?
!
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 7
Hybrid Email Security
Best of Both Worlds
Identical feature set
Flexible deployment
Inbound: Mail Hygiene
Outbound:
Sensitive Data Protection
Application Deployment
Anti-Spam
DLP Encryption
Anti-VirusAnti-Virus
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 8
Cisco Cloud Email Security Strategy
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 9
Complementary
Capabilities
ScanSafe: Accelerating Cisco’s
Cloud Security Vision
Endpoint footprint
Powerful enforcement engines
Network integration
Threat protection
Proven multi-tenant cloud
platform
Global footprint
Hosted operations
Zero day threat protection
Service provider enablement
Accelerating Cisco’s
Borderless Security Vision
Persistent Security More Advanced
Scanning
Hybrid Delivery
Unified Policy
Across Form Factors
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 10
Secure, Persistent Connectivity
Network Follows User—It Just Works
Corporate Office Mobile User Home Office
Cellular / Wi-Fi
Wired Wi-Fi
Secure,
Consistent
Access
Voice—Video—Apps—Data
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 11
Persistent Security and Policy Enforcement
Choice of Form Factor: Cloud or On-Premise
News Email
Social Networking Enterprise SaaS
Cisco Web Security
Appliance
Information Sharing
Between ASA and WSA
Corporate AD
ASAAnyConnect
Anywhere+
(Transitioning to AnyConnect)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 12
Cloud Security Platform
Scalable and Extensible Architecture
Monitoring and Alerts
Interface
Event Manager Interface, SNMP,
Email Alerts, Syslog, W3C
logging, 3rd Party API
Directory Interfaces
(Identity, Authentication,
NAC, SSO, AAA, Groups,
Active Directory, LDAP)
Cisco Security
Intelligence
Operations
Other
Systems
3rd Party Service Integration APIs
Programmatic APIs
Identity and Authentication
L2-L4
Access
Control
Engine
Secure
Connection
Management
Engine
Web
Enforcement
Engine
Email
Enforcement
Engine
ConfigurationInterfaces
CustomerPartnerAdministrator
3rd Party
Services
Open DLP
(Future)
External Archiving
(Future)
Other Other
CiscoSecurityEnforcementEngines
Voice and
Video
Enforcement
Engine
(Future)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 13
Revolutionizing Web Reporting
Enabling Business Decisions
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 14
Flexibility
Unified Reporting and Tracking
Benchmark company vs.
industry trends
Message and user
tracking
Unified view with
on-premise reports
Insight to refine policy
to address business
needs
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 15
Cisco Security Intelligence Operations
Global
Threat
Telemetry
Global
Threat
Telemetry
8:03 GMT Sensor Detects
Hacker Probing
Bank Branch
in Chicago
Ad Agency HQ
in London
ISP Datacenter
in Moscow
8:00 GMT Sensor Detects
New Malware
8:07 GMT Sensor Detects
New Botnet
8:10 GMT
All Cisco Customers Protected
8:10 GMT
All Cisco Customers Protected
Cisco
SensorBase
Threat
Operations Center
Advanced
Algorithms
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
Higher Threat Coverage, Greater Accuracy, Proactive Protection
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 16
Zero-day Protection with Outbreak
Intelligence
Presentation   cisco cloud security strategy

More Related Content

PDF
Cisco Security Architecture
PPTX
Building Up Network Security: Intrusion Prevention and Sourcefire
PDF
Next Generation Security
PDF
Cisco ASA con fire power services
PDF
SourceFire IPS Overview
PPTX
Talos Insight: Threat Innovation Emerging from the Noise
PDF
Advanced threat security - Cyber Security For The Real World
PPTX
IPS Best Practices
Cisco Security Architecture
Building Up Network Security: Intrusion Prevention and Sourcefire
Next Generation Security
Cisco ASA con fire power services
SourceFire IPS Overview
Talos Insight: Threat Innovation Emerging from the Noise
Advanced threat security - Cyber Security For The Real World
IPS Best Practices

What's hot (20)

PDF
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
PDF
Presentación - Cisco ASA with FirePOWER Services
PPTX
Sourcefire Webinar - NEW GENERATION IPS
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
PPTX
TechWiseTV Workshop: OpenDNS and AnyConnect
PDF
Cisco umbrella overview
PDF
The Network as a Sensor, Cisco and Lancope
PDF
ASA Firepower NGFW Update and Deployment Scenarios
PDF
Cisco Security Presentation
PDF
Behind the Curtain: Exposing Advanced Threats
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PDF
Presentation cisco iron port email & web security
PPTX
Building Up Network Security: An Introduction
PDF
Cisco connect winnipeg 2018 accelerating incident response in organizations...
PPTX
Cisco connect winnipeg 2018 we make it simple
PDF
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
PDF
Cisco amp for meraki
PPTX
Secure Data Center Solution with FP 9300 - BDM
PDF
The World Against the Bad, Cisco AMP Solution to the Rescue
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Presentación - Cisco ASA with FirePOWER Services
Sourcefire Webinar - NEW GENERATION IPS
Scalar Security Roadshow - Toronto Presentation
Cisco connect winnipeg 2018 stealthwatch whiteboard session and cisco secur...
TechWiseTV Workshop: OpenDNS and AnyConnect
Cisco umbrella overview
The Network as a Sensor, Cisco and Lancope
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Security Presentation
Behind the Curtain: Exposing Advanced Threats
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Presentation cisco iron port email & web security
Building Up Network Security: An Introduction
Cisco connect winnipeg 2018 accelerating incident response in organizations...
Cisco connect winnipeg 2018 we make it simple
8 Ocak 2015 SOME Etkinligi - A10 Networks - Accelerating and Securing Applica...
Cisco amp for meraki
Secure Data Center Solution with FP 9300 - BDM
The World Against the Bad, Cisco AMP Solution to the Rescue
Ad

Similar to Presentation cisco cloud security strategy (20)

PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Intelligent Cybersecurity for the Real World
PDF
Корпоративные сети через 5 лет: что нас ждет?
PDF
Presentation cisco iron port e-mail security solution
PDF
cloud-security
PDF
Presentation cloud, the whole offer
PDF
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
DOCX
© 2017 Cisco andor its affiliates. All rights reserved. Ci.docx
PDF
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PPTX
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
PDF
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
PDF
Eficiencia y productividad
PDF
BYOD Transforming the Enterprise
PDF
Hosted Security as a Service - Solution Architecture Design
PPTX
Idc security roadshow may2015 Adrian Aron
PDF
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
PDF
Presentation cisco cloud security
PPTX
Ebc collab portfolio_master
PDF
Cloud Security: A New Perspective
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Intelligent Cybersecurity for the Real World
Корпоративные сети через 5 лет: что нас ждет?
Presentation cisco iron port e-mail security solution
cloud-security
Presentation cloud, the whole offer
The power of orchestration - Inside Cisco IT - DC Cloud from IaaS to Fast IT
© 2017 Cisco andor its affiliates. All rights reserved. Ci.docx
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Assuring Your SD-WAN to Deliver Unparalleled Digital Experiences
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Eficiencia y productividad
BYOD Transforming the Enterprise
Hosted Security as a Service - Solution Architecture Design
Idc security roadshow may2015 Adrian Aron
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Presentation cisco cloud security
Ebc collab portfolio_master
Cloud Security: A New Perspective
Ad

More from xKinAnx (20)

PPTX
Engage for success ibm spectrum accelerate 2
PPTX
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
PDF
Software defined storage provisioning using ibm smart cloud
PDF
Ibm spectrum virtualize 101
PDF
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
PDF
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
PPTX
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
PPT
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
PPTX
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
PDF
Presentation disaster recovery in virtualization and cloud
PDF
Presentation disaster recovery for oracle fusion middleware with the zfs st...
PDF
Presentation differentiated virtualization for enterprise clouds, large and...
PDF
Presentation desktops for the cloud the view rollout
Engage for success ibm spectrum accelerate 2
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Software defined storage provisioning using ibm smart cloud
Ibm spectrum virtualize 101
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Presentation disaster recovery in virtualization and cloud
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation desktops for the cloud the view rollout

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Big Data Technologies - Introduction.pptx
PDF
Approach and Philosophy of On baking technology
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
NewMind AI Monthly Chronicles - July 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Unlocking AI with Model Context Protocol (MCP)
Big Data Technologies - Introduction.pptx
Approach and Philosophy of On baking technology
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
NewMind AI Monthly Chronicles - July 2025

Presentation cisco cloud security strategy

  • 1. Ambika Gadre Senior Director, Product Management Cisco Cloud Security Strategy
  • 2. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 2 Cisco’s Architecture for Borderless Network Security Borderless DataCenter 3 Borderless Internet Borderless EndZones Policy Corporate Border Branch Office Applications and Data Corporate Office Policy (Access Control, Acceptable Use, Malware, Data Security)4 Attackers Coffee ShopCustomers Airport Mobile User Partners Platform as a Service Infrastructure as a Service X as a Service Software as a Service 2 1
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 3 Migration to the Cloud: Opposing Forces Accelerators Inhibitors Financial Resources Predictable Op-Ex Operational Maintenance Datacenter footprint Security Privacy Reliability Control Management Visibility
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 4 Flexible Delivery Models OnOn--PremisesPremises CloudCloud HybridHybrid ManagedManaged Award-Winning Technology Dedicated SaaS Infrastructure Best of Both Worlds Fully Managed on Premises
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 5 Co-Management Maximum Flexibility At Your Finger Tips Cisco SolutionCisco SolutionCompetitionCompetition Ticket based delays End-user frustration Decreases efficiency WhereWhere’’s mys my message?message? Granular access Zero delays Improved productivity
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 6 Single Pane of Management Improved Visibility & Control Common Tracking Reporting Management ? !
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 7 Hybrid Email Security Best of Both Worlds Identical feature set Flexible deployment Inbound: Mail Hygiene Outbound: Sensitive Data Protection Application Deployment Anti-Spam DLP Encryption Anti-VirusAnti-Virus
  • 8. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 8 Cisco Cloud Email Security Strategy
  • 9. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 9 Complementary Capabilities ScanSafe: Accelerating Cisco’s Cloud Security Vision Endpoint footprint Powerful enforcement engines Network integration Threat protection Proven multi-tenant cloud platform Global footprint Hosted operations Zero day threat protection Service provider enablement Accelerating Cisco’s Borderless Security Vision Persistent Security More Advanced Scanning Hybrid Delivery Unified Policy Across Form Factors
  • 10. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 10 Secure, Persistent Connectivity Network Follows User—It Just Works Corporate Office Mobile User Home Office Cellular / Wi-Fi Wired Wi-Fi Secure, Consistent Access Voice—Video—Apps—Data
  • 11. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 11 Persistent Security and Policy Enforcement Choice of Form Factor: Cloud or On-Premise News Email Social Networking Enterprise SaaS Cisco Web Security Appliance Information Sharing Between ASA and WSA Corporate AD ASAAnyConnect Anywhere+ (Transitioning to AnyConnect)
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 12 Cloud Security Platform Scalable and Extensible Architecture Monitoring and Alerts Interface Event Manager Interface, SNMP, Email Alerts, Syslog, W3C logging, 3rd Party API Directory Interfaces (Identity, Authentication, NAC, SSO, AAA, Groups, Active Directory, LDAP) Cisco Security Intelligence Operations Other Systems 3rd Party Service Integration APIs Programmatic APIs Identity and Authentication L2-L4 Access Control Engine Secure Connection Management Engine Web Enforcement Engine Email Enforcement Engine ConfigurationInterfaces CustomerPartnerAdministrator 3rd Party Services Open DLP (Future) External Archiving (Future) Other Other CiscoSecurityEnforcementEngines Voice and Video Enforcement Engine (Future)
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 13 Revolutionizing Web Reporting Enabling Business Decisions
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 14 Flexibility Unified Reporting and Tracking Benchmark company vs. industry trends Message and user tracking Unified view with on-premise reports Insight to refine policy to address business needs
  • 15. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 15 Cisco Security Intelligence Operations Global Threat Telemetry Global Threat Telemetry 8:03 GMT Sensor Detects Hacker Probing Bank Branch in Chicago Ad Agency HQ in London ISP Datacenter in Moscow 8:00 GMT Sensor Detects New Malware 8:07 GMT Sensor Detects New Botnet 8:10 GMT All Cisco Customers Protected 8:10 GMT All Cisco Customers Protected Cisco SensorBase Threat Operations Center Advanced Algorithms © 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15 Higher Threat Coverage, Greater Accuracy, Proactive Protection
  • 16. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 16 Zero-day Protection with Outbreak Intelligence