9
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1 Cisco Security Policy Compliance Eco-system Srini Nimmagadda Sr Product Manager

Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1

Cisco Security

Policy Compliance Eco-system Srini Nimmagadda Sr Product Manager

Page 2: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Operations Tools

• Typically delivered by vendors

• Focused on day-to-day operations

Policy Compliance

• Network wide compliance

• Multi-vendor support critical

Page 3: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Policy

Events

Reports

Monitor

Software Upgrade

What percentage of Fortune Top-

50 companies use CSM?

(a) 20 – 40%

(b) 41 – 60%

(c) 61 – 80%

(d) >80%

Page 4: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Policy

Events

Reports

Monitor

Software Upgrade

CSM

• Policy Compliance

• Cannot have „ftp‟ access to my “Internal” network

• Deny all traffic that is not explicitly permitted

• Change Audit

• Who, what, when

• Custom Portal with Read-Only access to latest configuration

• Multi-vendor scenarios

Page 5: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

The leader in Security Policy Management

• Centrally analyze multiple firewalls via CSM

• Cleanup and Optimization

• Intelligent Policy Tuning

• Risk and Compliance Assessment

• Change workflow automation

Page 6: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

• Tufin Security Suite (TSS) was integrated with the new CSM APIs

• SecureTrack can monitor all Cisco configuration changes through the CSM

• PIX, ASA, FWSM, IOS, Nexus…

• Business value:

• Automatically track configuration changes to Cisco infrastructure

• Shorten the time to analyze & resolve network issues

• Audit trail enabling compliance with industry regulations such as SOX

• Real-time notifications of configuration changes

• Central console to monitor all firewalls and routers from all vendors

Page 7: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Build Detailed

Network Model

• Complete visibility

• Update continuously

from CSM

• Network-wide compliance

Automate security

management

processes

• Audit firewall and

network devices

• Troubleshoot network

connectivity

• Virtual penetration

testing

Automatically Collect

Cisco Firewall & Router

Configs from CSM

• Fast deployment

• Scales with your network

• Ultra-efficient

CSM Vendor C

Vendor A

Vendor B

Plus multi-vendor support

Page 8: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Josh Karp

VP Biz Dev

Booth #344

Michelle Cobb

VP Marketing

Booth #617

Reuven Harrison,

CTO

Booth #2658

Page 9: Cisco Security Policy Compliance Eco-system · Operations Tools •Typically delivered by vendors •Focused on day-to-day operations Policy Compliance ... •Tufin Security Suite

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A

Thank you.