Upload
supattra-smith
View
220
Download
0
Embed Size (px)
Citation preview
8/12/2019 BYOD-We Secure It
1/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 1
Bring your own deviceWe Secure It.Okan KalakConsulting Systems Engineer
01.04.2011
8/12/2019 BYOD-We Secure It
2/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Whats going on? What are the bad guys doing? Cisco AnyConnect Secure Mobility
Demo
8/12/2019 BYOD-We Secure It
3/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 3
8/12/2019 BYOD-We Secure It
4/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
4
Un-Managed
Devices
The World
Today
The World
as We Knew It
Managed Devices Un-Managed Devices
8/12/2019 BYOD-We Secure It
5/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cybercriminals shift in focustoward mobile users and awayfrom the PC environment is being
spurred partly by a significanttipping point in vulnerabilities.
8/12/2019 BYOD-We Secure It
6/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
6
68 mins
52 mins
36 mins
13 mins
19 mins
18 mins
10 mins
8/12/2019 BYOD-We Secure It
7/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
7
+ +
8/12/2019 BYOD-We Secure It
8/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 8
8/12/2019 BYOD-We Secure It
9/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
8/12/2019 BYOD-We Secure It
10/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
8/12/2019 BYOD-We Secure It
11/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
8/12/2019 BYOD-We Secure It
12/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Gilbert Hey
Tony hey gil what's up?
Gilbert Not too good. I'm in some kind of deep mess right now
Tony oh?
GilbertI'm stranded in London. I was mugged at gun point last night,all cash on me and my bank card was all stolen
Tony dude that's horrible?
Gilberti have a plane back home in about3 hours time but i need some money for the hotel bills
GilbertCan you please loan me some $$ for now i will def have themoney refund when i get back home..????????
Tonyuh... i'm not to sure how to do that. what's theeasiest method?
GilbertYou can have the money sent to me via westernunion moneytransfer
Gilbert You
8/12/2019 BYOD-We Secure It
13/31 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
13
8/12/2019 BYOD-We Secure It
14/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
In her mid 20s
Degree from MIT
Analyzed cyberthreats for the U.S. Department of the Navy
8/12/2019 BYOD-We Secure It
15/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Connections with about 300 people in:U.S Military
Government Agencies
Security CompaniesGovernment Contractors
Offered several jobs in security firms including Lockeed Martin
Thomas Ryan removed the profiles after one month
8/12/2019 BYOD-We Secure It
16/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16Cisco ConfidentialCisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 16
The old adage,If it sounds toogood to be true, it probably is,should be put into play when it
comes to responding to socialnetworking connectionrequests.
8/12/2019 BYOD-We Secure It
17/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17Cisco Confidential 2010 Cisco and/or its affiliates. All rights reserved. 17
8/12/2019 BYOD-We Secure It
18/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
18
Acceptable Use
Control
Data-Loss
Prevention
Access
Control
Spam
Malware Infections
Intrusions
Threat
ProtectionPolicy
8/12/2019 BYOD-We Secure It
19/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
19
Limited
Predominantly PC-basedClient Support
Manual
Numerous clicksNon-persistent Connection
Rarely-On
Only connected if / whenabsolutely necessary
No Security or Visibility Security
Intranet
Corporate File
Sharing
8/12/2019 BYOD-We Secure It
20/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
20
Limited Clients
Predominantly PC-basedClient Support
Limited Security
URL-filtering client unableto address key use cases
No Access
Not integrated, requiresseparate VPN client
Data Loss Prevention
Threat Prevention
Acceptable Use
Access Control
No AccessAccess
Intranet
Corporate File
Sharing
8/12/2019 BYOD-We Secure It
21/31
8/12/2019 BYOD-We Secure It
22/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
22
" Simplified remote access" Connection and app persistence" Always-on VPN enforcement
" Location-aware policy" Application controls" SaaS Access Control
Web Security ApplianceRicher Web ControlsAnyConnectSecure Mobility Client1 2
Cisco WebSecurity Appliance
Information Sharing
Between Cisco ASA and
Cisco WSA
Corporate AD
ASAAnyConnect
News Email
Social Networking Enterprise SaaS
3Combined SolutionEnd-to-End Seamless Security
8/12/2019 BYOD-We Secure It
23/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
More IntelligenceOptimal Gateway Detection
Trusted Network Detection
More SecurityAlways-On VPN administrativecontrol
Quarantine capability
Better User ExperienceHotspot/Captive Portal detectionLocal print access
8/12/2019 BYOD-We Secure It
24/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Windows, Mac and Linux Apple iOS 4.1+
iPhone 3G/3GS/4, iPod touch2nd and 3rd generation andiPad v1 and v2 support
Windows Mobile 6.xTouch screen devices
Secure remote accessto enterprise applications
from Apple iOS 4 and WindowsMobile 6.x
Support planned for additionalenterprise mobility platforms
8/12/2019 BYOD-We Secure It
25/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
New User Interface
New User Interface forWindows 7 and Vista(x86 and x64)
Windows XP (x86)
Windows 2003 Server (x86)
Network Access Manager
Enhanced UI for otherplatforms to follow
Windows 7-style Tray Flyout Provides 95% Functionality
8/12/2019 BYOD-We Secure It
26/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
26
!Statistics, Configuration, and Diagnostic Options
8/12/2019 BYOD-We Secure It
27/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
27
!Logo, background image, application icon, title, system tray icons
CustomizedBackground
8/12/2019 BYOD-We Secure It
28/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
28
Airport
CoffeeShop
MobileUser
HomeOffice
ScanSafe SaaS Web Security
"15 data centers"Billions of Web requests per day"100% availability
AnyWhere+ Roaming Support
"Access ScanSafe services fromoutside of corporate infrastructure
"Works with VPN"Location-aware for best performance
Software
as a Service
Infrastructure
as a Service
Platform
as a Service
8/12/2019 BYOD-We Secure It
29/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Web Security with ScanSafe - Highlights
Keeps malware from gettingto your system in the firstplace
Enforces Acceptable UsePolicy
Protects users even whenVPN is disconnected
Tunnels HTTP/HTTPS trafficthrough ScanSafe cloud
Replacement for AnyWhere+standalone client
8/12/2019 BYOD-We Secure It
30/31
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
8/12/2019 BYOD-We Secure It
31/31
Thank you.