Share This: Mail In Google plus

Intelligent Cybersecurity for the Real World

Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolios: integrated, pervasive, continuous, and open. Cisco's threat-centric approach reduces complexity, while providing superior visibility, continuous control, and advanced threat protection across the entire attack continuum before, during, and after an attack.

Visit the Security booth to engage with security experts and Cisco executives about important trends that will improve governance, compliance, and threat-centric security.

Cisco Security Demos

Visit the Security booth in the Cisco Campus for demonstrations of the latest Cisco security solutions, covering the entire attack continuum before, during, and after.


  • Guest and BYOD with Cisco Identity Services Engine (ISE) 1.3: With Cisco ISE 1.3, we will demonstrate simplified, self-service guest access and device on-boarding for bring-your-own-device (BYOD) programs.
  • Cisco ASA with FirePOWER Services: The new Cisco NGFW delivers integrated threat defense across the entire attack continuum. It combines the proven Cisco ASA firewall with industry-leading Sourcefire threat and advanced malware protection.


  • Cisco Next-Generation IPS/FireSight: Threat protection across the entire attack continuum: Integrated visibility of your network before an attack, industry-best threat protection during an attack, and scoping and remediation after an attack.
  • Cisco TrustSec Secure Software Defined Segmentation: TrustSec allows administrators to map business assets and functions directly to contextual access policies that can be used to segment the extended network, enforce resource usage, dynamically manage and simplify security configurations and eliminates the need for complex network changes.
  • Cisco Cloud Web Security: Combines comprehensive web defense with superior deployment flexibility and lower costs than on-premises products. New on Cisco CWS: Cisco Advanced Malware Protection and Cognitive Threat Analytics for detection and threat blocking; log extraction for granular reporting and bandwidth-based consumption.
  • Cisco Email Security Appliance (ESA): Stops emerging blended threats and targeted email attacks with an industry-leading approach to blocking unwanted messages, catching advanced malware, and disarming malicious links.
  • Cisco Web Security Appliance (WSA): With multilayer acceptable use enforcement, antivirus, and antimalware, the WSA now integrates with the Cisco ISE architecture. Use the intelligence and in-depth knowledge provided by ISE to enforce corporate policy.


  • Advanced Malware Protection (AMP) for Networks and Endpoints: Detect, track, and respond to advanced threats on the network.
  • Cisco AMP Threat Grid: Use unified malware analysis and deep threat analytics to quickly respond to advanced threats.


  • Cisco Managed Threat Defense Service: Managed Threat Defense helps defend against known intrusions, zero-day attacks, and advanced persistent threats. It is a fully outsourced, managed security service that rapidly detects and responds to security events by analyzing network traffic, evaluating security telemetry, and using global intelligence 24 hours a day, 7 days a week.
  • ISE 1.3 pxGrid with Technology Partners
  • Service Provider Security Solutions:The Cisco Hosted Security as a Service (HSS) solution enables service providers to provide cloud-based security services, such as email security, web security, FW and VPN services, to their customers.
  • Evolving Data Center Security Solutions: Cisco Adaptive Security Appliances (ASA) solutions secure physical, virtual, and cloud data centers including traditional, software-defined networks, virtualization (NFV) environments, and app-centric Infrastructures.
  • Building Trustworthy Systems: Trustworthy Systems demos Secure Boot, Simplified Secure Transport, and Trustworthy Cloud are examples of technologies used to secure and assure Cisco products. Mandating CSDL and supply chain security along with these technologies, Cisco continually builds assurance and security in all its products and solutions.
  • Cisco Cyber Threat Defense (CTD): A Cisco Validated Design that focuses on increasing your resiliency to attack, blocking known threats, and reducing the time to discovery and time to containment for advanced threats that have penetrated your defenses.

    The security booth will also feature use cases with portable devices, hardware viewing, discussion areas and giveaways including 2015 Snort calendars!

  • Technology Trend Keynote - Security

    Intelligent Cybersecurity to Outwit the Attackers
    Wednesday, January 28 11:30 - 12:30

    Presenter: David Goeckeler, Senior Vice President, Security Business Group

    Not only have the motives and persistence of attackers increased, but also has their understanding of classic security technologies, applications, and how to exploit the gaps between them. Attackers are indiscriminate as they relentlessly drive their attacks home, frequently using tools that have been developed specifically to circumvent the target’s security infrastructure. They employ a methodical approach to an attack that can be demonstrated as an “attack chain” – the chain of events that leads up to and through the phases of an attack. To truly protect across all attack vectors, we have to accept the nature of modern networked environments and start defending them by understanding how attackers think and what is required to secure our infrastructure. In this session, David Goeckeler will discuss how defenders can think like an attacker to truly employ a threat-centric model of security that is advanced beyond the abilities of the attackers.

    Security Speaking Sessions

    Experienced Cisco security thought-leaders, engineers, and partners are presenting more than 65 technical breakout sessions, seminars, product solutions overviews, customer case studies, and instructor-led labs.

    For a full line-up of Cisco Live sessions, visit the Technology Tracks page.

    Join our Security Communities

    Interact with your peers and industry visionaries. Share your insights on secure network access and mobility, next-generation firewalls, advanced malware protection, and secure data centers. Discover details of threat defense, countermeasures and controls, and best practices for deploying security technologies.

  • Cisco Security Website
  • Twitter
  • Facebook
  • Youtube
  • Blog
  • SlideShare
  • Community
  • Diamond Exhibitor


    Platinum Exhibitors

    citrix F5 Networks intel netapp

    Official Cable Sponsor


    An invitation to Cisco Live 2015, Milan