Security

Share This: Mail In Google plus

Intelligent Cybersecurity for the Real World

Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolios: integrated, pervasive, continuous, and open. Cisco's threat-centric approach reduces complexity, while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum before, during, and after an attack.

Visit the Security booth to engage with security experts and Cisco executives about important trends that will improve governance, compliance, and threat-centric security.

Security Demos

Visit the Security booth in the Cisco Campus for demonstrations of the latest Cisco security solutions, covering the entire attack continuum before, during, and after.

Before:

  • Guest and BYOD with Cisco Identity Services Engine (ISE) 1.3: With Cisco ISE 1.3, we will demonstrate simplified, self-service guest access and device on-boarding for bring-your-own-device (BYOD) programs, including integration with Cisco Meraki Systems Manager for MDM.
  • Cisco ASA with FirePOWER Services: The new Cisco NGFW delivers integrated threat defense across the entire attack continuum. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.

    During:

  • Cisco Next-Generation IPS: Threat protection across the entire attack continuum: Integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.
  • Secure Software Defined Segmentation: Cisco TrustSec allows administrators to map business assets and functions directly to contextual access policies. These security policies can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations, and eliminate the need for complex network changes.
  • Cloud Web Security: Cisco Cloud Web Security (CWS) combines comprehensive web defense with superior deployment flexibility and lower costs than on-premises products. New on Cisco CWS: Cisco Advanced Malware Protection and cognitive threat analytics for detection and threat blocking; log extraction for granular reporting and bandwidth-based consumption.
  • Email Security Appliance: Cisco Email Security Appliance (ESA) stops emerging blended threats and targeted email attacks with an industry-leading approach to blocking unwanted messages, catching advanced malware, and disarming malicious links.
  • Web Security: Cisco Web Security Appliance (WSA) with multilayer acceptable use enforcement, antivirus and antimalware now integrates with the Cisco Identity Services Engine (ISE) architecture. Use the intelligence and in-depth knowledge provided by ISE to enforce corporate policy.

    After:

  • Advanced Malware Protection (AMP) for Networks and Endpoints: Detect, track, and respond to advanced threats on the network.
  • Cisco AMP Threat Grid: Use unified malware analysis and deep threat analytics to quickly respond to advanced threats.

    Transtemporal:

  • Managed Threat Defense: Cisco Managed Threat Defense (MTD) is a fully outsourced, managed security service that rapidly detects and responds to known intrusions, zero-day attacks, and advanced persistent threats by leveraging big data analytics, expert staff, and global threat intelligence 24 hours a day, 7 days a week.
  • Cisco ISE Partner Ecosystem: See how Cisco Identity Services Engine (ISE) shares contextual data with technology partners to accelerate their security and network capabilities.
  • Service Provider Security Solutions: The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services, such as email security, web security, FW and VPN services, to their customers.
  • Evolving Data Center Security Solutions: The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services such as email security, web security, firewall and VPN services to their customers.
  • Building Trustworthy Systems: Trustworthy Systems demos Secure Boot, Simplified Secure Transport, and Trustworthy Cloud are examples of technologies used to secure and assure Cisco products. Mandating CSDL and supply chain security along with these technologies, Cisco continually builds assurance and security in all its products and solutions.
  • Cyber Threat Defense: Cisco Cyber Threat Defense (CTD) is a Cisco Validated Design that focuses on increasing your resiliency to attack, blocking known threats, and reducing the time-to-discovery and time to containment for advanced threats that have penetrated your defenses. Secure Access Across the Network: This demo will show how several of the Cisco security products are able to communicate, share information, and automate policy changes and remediation. Viewers will witness access control enforced by an ASA enabled Cisco TrustSec, using a policy created by ISE, that varies by security events identified by FirePOWER Services.
  • Cisco Annual Security Report: The effects of cyberattacks are sobering, in terms of both costs and losses in productivity and reputation. The Cisco 2014 Annual Security Report examines threat intelligence and cybersecurity trends for 2014. Cisco’s research helps to underscore just how many different types of weak links exist in the systems we use, including the Internet itself.

    The security booth will also feature use cases with portable devices, hardware viewing, discussion areas and giveaways including 2015 Snort calendars!

  • Booth Tours

    Personalized Cisco Guided Booth Tours will focus on your business needs and how to get the best outcomes from our technology. See how you can:

  • Increase sales by reducing time to revenue and security breaches
  • Improve customer experiences ensuring customer data and transactions are protected
  • Reduce costs by simplifying secure deployment of devices, workflows, and services
  • Improve security and compliance with one identity-based control policy across wired, wireless, and VPN connections

    Register now by adding a booth tour via the Cisco Live session scheduling tool or contact your Account Manager.
  • Technology Trend Keynote - Security

    Intelligent Cybersecurity to Outwit the Attackers
    Wednesday, January 28 11:30 - 12:30

    Presenter: David Goeckeler, Senior Vice President, Security Business Group

    Not only have the motives and persistence of attackers increased, but also has their understanding of classic security technologies, applications, and how to exploit the gaps between them. Attackers are indiscriminate as they relentlessly drive their attacks home, frequently using tools that have been developed specifically to circumvent the target’s security infrastructure. They employ a methodical approach to an attack that can be demonstrated as an “attack chain” – the chain of events that leads up to and through the phases of an attack. To truly protect across all attack vectors, we have to accept the nature of modern networked environments and start defending them by understanding how attackers think and what is required to secure our infrastructure. In this session, David Goeckeler will discuss how defenders can think like an attacker to truly employ a threat-centric model of security that is advanced beyond the abilities of the attackers.

    Please see David Goeckeler’s bio here.

    Speaking Sessions

    Experienced Cisco security thought-leaders, engineers, and partners are presenting more than 65 technical breakout sessions, seminars, product solutions overviews, customer case studies, and instructor-led labs.

    For a full line-up of Cisco Live sessions, visit the Technology Tracks page.

    Theater Sessions

    Cloud Web Security
    Tuesday, January 27, 12:15

    Speaker: Ben Munroe, Senior Product Marketing Manager

    Built on an unrivaled global threat visibility network, Cisco Cloud Web Security (CWS) provides comprehensive cloud-delivered web defense and the most effective protection against advanced and targeted threats. Continuous monitoring of network and file behavior identifies threats with Cisco Advanced Malware Protection (AMP) and Cisco Cognitive Threat Analytics (CTA). CWS provides superior flexibility, integrating with existing infrastructure; accessing our global estate of next-generation data centers; and offering bandwidth pricing, log extraction for SIEM integration, and customized reporting. CWS delivers web security and advanced threat protection from the cloud across the full attack continuum before, during, and after an attack.


    Layered Security: Not Just for Networks, It Is Also Critical for Email Security
    Tuesday, January 27, 16:15

    Speaker: Bruce Johnson, Product Marketing Manager, Email and Web Security

    As you evaluate secure email gateway technology, you want the most effective protection against spam, blended threats, and targeted attacks. Come learn the answers to the following questions: How do you deal with the variety of types of spam and viruses? How do you deal with blended threats that include links to websites laced with malware? What happens if an attack still gets through? Do I have any recourse? What capabilities do you offer to help me stay ahead of emerging threats?


    Cisco ASA with FirePOWER Services: What a Next-Generation Firewall Should Be
    Wednesday, January 28, 12:00

    Speaker: David Stuart, Product Marketing Manager, Network Security

    Come see how Cisco's next-generation network security solution delivers a new model for security that protects your organization across the entire attack continuum. Cisco ASA with FirePOWER Services is the industry’s first threat-focused next-generation firewall (NGFW), combining Cisco’s proven ASA firewall with industry-leading Sourcefire next-generation IPS and advanced malware protection, all in a single easy-to-manage device. Gain unparalleled visibility of your network before an attack; the industry's best threat protection and security automation for during an attack; as well as the revolutionary ability to scope, contain, and remediate after an attack has been successful, all in one fully integrated solution.


    Hosted Security as a Service: Service Provider Cloud Security Services to Reduce Costs and Increase Profitability and Agility
    Wednesday, January 28, 18:30

    Speaker: Terri Quinn, Security Solutions Manager

    The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services for enterprise customers designed to help reduce operational costs and capital expenditures, while providing advanced security protection and increasing profitability and agility. Solutions include web security, email security, firewalls, and VPN services.


    Guest Bring Your Own Device (BYOD)
    Thursday, January 29, 11:00

    Speaker: Sanjay Raja, Director, Product Marketing

    Security Strategic Planning and Operations Customers and users are looking for a transparent, but rich experience when attempting to gain access to either Internet or corporate networks using personal or mobile devices. Most enterprises want to provide an enhanced user experience with the right level of security controls, but with minimal IT intervention. This requires the right solution to make it simple and fast for users to get securely connected to the network, while being able to create and deliver a customized user experience. Come learn the challenges with securely and efficiently providing access to new users and devices, whether for guest access or supporting enterprise mobility initiatives, and how those challenges can be solved.


    OpenSOC: An Open Source Framework for Security Monitoring
    Thursday, January 29, 14:00

    Speaker: Tom Piscitell, Information Security Investigator

    Unified security monitoring has traditionally been a difficult task. Customers need to aggregate telemetry and events that exist in myriad formats and apply the necessary analytics to make the information applicable. Few tools exist other than Security Incident Event Managers and they have their limitations. As we move into a big data world, Cisco saw the need for a more flexible tool. Accordingly, we have created OpenSOC, a Hadoop-based framework for security analytics, and released it to the public under the Apache license.

    Meet with Security Experts

    Private meetings with security leadership team members are available. To confirm a date and time, please contact your Account Manager.

    Join our Communities

    Interact with your peers and industry visionaries. Share your insights on secure network access and mobility, next-generation firewalls, advanced malware protection, and secure data centers. Discover details of threat defense, countermeasures and controls, and best practices for deploying security technologies.

  • Cisco Security Website
  • Twitter
  • Facebook
  • Youtube
  • Blog
  • SlideShare
  • Community
  • Cisco Live 2015 Milan Event Highlights

    close