BYOD-We Secure It

Embed Size (px)

Citation preview

  • 8/12/2019 BYOD-We Secure It

    1/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

    Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 1

    Bring your own deviceWe Secure It.Okan KalakConsulting Systems Engineer

    01.04.2011

  • 8/12/2019 BYOD-We Secure It

    2/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2

    Whats going on? What are the bad guys doing? Cisco AnyConnect Secure Mobility

    Demo

  • 8/12/2019 BYOD-We Secure It

    3/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 3

  • 8/12/2019 BYOD-We Secure It

    4/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4

    4

    Un-Managed

    Devices

    The World

    Today

    The World

    as We Knew It

    Managed Devices Un-Managed Devices

  • 8/12/2019 BYOD-We Secure It

    5/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

    Cybercriminals shift in focustoward mobile users and awayfrom the PC environment is being

    spurred partly by a significanttipping point in vulnerabilities.

  • 8/12/2019 BYOD-We Secure It

    6/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

    6

    68 mins

    52 mins

    36 mins

    13 mins

    19 mins

    18 mins

    10 mins

  • 8/12/2019 BYOD-We Secure It

    7/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

    7

    + +

  • 8/12/2019 BYOD-We Secure It

    8/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 8

  • 8/12/2019 BYOD-We Secure It

    9/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

  • 8/12/2019 BYOD-We Secure It

    10/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

  • 8/12/2019 BYOD-We Secure It

    11/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11

  • 8/12/2019 BYOD-We Secure It

    12/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

    Gilbert Hey

    Tony hey gil what's up?

    Gilbert Not too good. I'm in some kind of deep mess right now

    Tony oh?

    GilbertI'm stranded in London. I was mugged at gun point last night,all cash on me and my bank card was all stolen

    Tony dude that's horrible?

    Gilberti have a plane back home in about3 hours time but i need some money for the hotel bills

    GilbertCan you please loan me some $$ for now i will def have themoney refund when i get back home..????????

    Tonyuh... i'm not to sure how to do that. what's theeasiest method?

    GilbertYou can have the money sent to me via westernunion moneytransfer

    Gilbert You

  • 8/12/2019 BYOD-We Secure It

    13/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

    13

  • 8/12/2019 BYOD-We Secure It

    14/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

    In her mid 20s

    Degree from MIT

    Analyzed cyberthreats for the U.S. Department of the Navy

  • 8/12/2019 BYOD-We Secure It

    15/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

    Connections with about 300 people in:U.S Military

    Government Agencies

    Security CompaniesGovernment Contractors

    Offered several jobs in security firms including Lockeed Martin

    Thomas Ryan removed the profiles after one month

  • 8/12/2019 BYOD-We Secure It

    16/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16Cisco ConfidentialCisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 16

    The old adage,If it sounds toogood to be true, it probably is,should be put into play when it

    comes to responding to socialnetworking connectionrequests.

  • 8/12/2019 BYOD-We Secure It

    17/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 17

  • 8/12/2019 BYOD-We Secure It

    18/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

    18

    Acceptable Use

    Control

    Data-Loss

    Prevention

    Access

    Control

    Spam

    Malware Infections

    Intrusions

    Threat

    ProtectionPolicy

  • 8/12/2019 BYOD-We Secure It

    19/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

    19

    Limited

    Predominantly PC-basedClient Support

    Manual

    Numerous clicksNon-persistent Connection

    Rarely-On

    Only connected if / whenabsolutely necessary

    No Security or Visibility Security

    Intranet

    Corporate File

    Sharing

  • 8/12/2019 BYOD-We Secure It

    20/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

    20

    Limited Clients

    Predominantly PC-basedClient Support

    Limited Security

    URL-filtering client unableto address key use cases

    No Access

    Not integrated, requiresseparate VPN client

    Data Loss Prevention

    Threat Prevention

    Acceptable Use

    Access Control

    No AccessAccess

    Intranet

    Corporate File

    Sharing

  • 8/12/2019 BYOD-We Secure It

    21/31

  • 8/12/2019 BYOD-We Secure It

    22/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

    22

    " Simplified remote access" Connection and app persistence" Always-on VPN enforcement

    " Location-aware policy" Application controls" SaaS Access Control

    Web Security ApplianceRicher Web ControlsAnyConnectSecure Mobility Client1 2

    Cisco WebSecurity Appliance

    Information Sharing

    Between Cisco ASA and

    Cisco WSA

    Corporate AD

    ASAAnyConnect

    News Email

    Social Networking Enterprise SaaS

    3Combined SolutionEnd-to-End Seamless Security

  • 8/12/2019 BYOD-We Secure It

    23/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

    More IntelligenceOptimal Gateway Detection

    Trusted Network Detection

    More SecurityAlways-On VPN administrativecontrol

    Quarantine capability

    Better User ExperienceHotspot/Captive Portal detectionLocal print access

  • 8/12/2019 BYOD-We Secure It

    24/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

    Windows, Mac and Linux Apple iOS 4.1+

    iPhone 3G/3GS/4, iPod touch2nd and 3rd generation andiPad v1 and v2 support

    Windows Mobile 6.xTouch screen devices

    Secure remote accessto enterprise applications

    from Apple iOS 4 and WindowsMobile 6.x

    Support planned for additionalenterprise mobility platforms

  • 8/12/2019 BYOD-We Secure It

    25/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

    New User Interface

    New User Interface forWindows 7 and Vista(x86 and x64)

    Windows XP (x86)

    Windows 2003 Server (x86)

    Network Access Manager

    Enhanced UI for otherplatforms to follow

    Windows 7-style Tray Flyout Provides 95% Functionality

  • 8/12/2019 BYOD-We Secure It

    26/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

    26

    !Statistics, Configuration, and Diagnostic Options

  • 8/12/2019 BYOD-We Secure It

    27/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

    27

    !Logo, background image, application icon, title, system tray icons

    CustomizedBackground

  • 8/12/2019 BYOD-We Secure It

    28/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

    28

    Airport

    CoffeeShop

    MobileUser

    HomeOffice

    ScanSafe SaaS Web Security

    "15 data centers"Billions of Web requests per day"100% availability

    AnyWhere+ Roaming Support

    "Access ScanSafe services fromoutside of corporate infrastructure

    "Works with VPN"Location-aware for best performance

    Software

    as a Service

    Infrastructure

    as a Service

    Platform

    as a Service

  • 8/12/2019 BYOD-We Secure It

    29/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

    Web Security with ScanSafe - Highlights

    Keeps malware from gettingto your system in the firstplace

    Enforces Acceptable UsePolicy

    Protects users even whenVPN is disconnected

    Tunnels HTTP/HTTPS trafficthrough ScanSafe cloud

    Replacement for AnyWhere+standalone client

  • 8/12/2019 BYOD-We Secure It

    30/31

    2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

  • 8/12/2019 BYOD-We Secure It

    31/31

    Thank you.