Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A Cisco Confidential © 2011 Cisco and/or its affiliates. All rights reserved. 1
Cisco Security
Policy Compliance Eco-system Srini Nimmagadda Sr Product Manager
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Operations Tools
• Typically delivered by vendors
• Focused on day-to-day operations
Policy Compliance
• Network wide compliance
• Multi-vendor support critical
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Policy
Events
Reports
Monitor
Software Upgrade
What percentage of Fortune Top-
50 companies use CSM?
(a) 20 – 40%
(b) 41 – 60%
(c) 61 – 80%
(d) >80%
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Policy
Events
Reports
Monitor
Software Upgrade
CSM
• Policy Compliance
• Cannot have „ftp‟ access to my “Internal” network
• Deny all traffic that is not explicitly permitted
• Change Audit
• Who, what, when
• Custom Portal with Read-Only access to latest configuration
• Multi-vendor scenarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
The leader in Security Policy Management
• Centrally analyze multiple firewalls via CSM
• Cleanup and Optimization
• Intelligent Policy Tuning
• Risk and Compliance Assessment
• Change workflow automation
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
• Tufin Security Suite (TSS) was integrated with the new CSM APIs
• SecureTrack can monitor all Cisco configuration changes through the CSM
• PIX, ASA, FWSM, IOS, Nexus…
• Business value:
• Automatically track configuration changes to Cisco infrastructure
• Shorten the time to analyze & resolve network issues
• Audit trail enabling compliance with industry regulations such as SOX
• Real-time notifications of configuration changes
• Central console to monitor all firewalls and routers from all vendors
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Build Detailed
Network Model
• Complete visibility
• Update continuously
from CSM
• Network-wide compliance
Automate security
management
processes
• Audit firewall and
network devices
• Troubleshoot network
connectivity
• Virtual penetration
testing
Automatically Collect
Cisco Firewall & Router
Configs from CSM
• Fast deployment
• Scales with your network
• Ultra-efficient
CSM Vendor C
Vendor A
Vendor B
Plus multi-vendor support
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Josh Karp
VP Biz Dev
Booth #344
Michelle Cobb
VP Marketing
Booth #617
Reuven Harrison,
CTO
Booth #2658
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential A
Thank you.