Beruflich Dokumente
Kultur Dokumente
SAFE 01222008
Cisco Confidential
Sophisticated website attacks Increasing botnet sophistication and effectiveness Growing cyber espionage Emerging mobile phone threats Insider attacks Advanced identity theft Increasingly malicious spyware Web application security exploits Sophisticated social engineering Supply-chain attacks infecting consumer devices
Source: SANS Institute
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Siloed products and designs Poor security policy, control, management, and visibility
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Cisco SAFE
Security Reference Architecture Free Technical Design and Implementation Guide
Benefits
Combines security and network Fully tested and validated Speeds implementation Modular design
SEVT Dec 2008 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Potential Threats Disruption of business, resulting in loss of revenue Loss of customer privacy, security, and service levels Negative effect on marketing campaigns and brand reputation Fines, loss of business, and legal action
5
Security Policies
Harden Isolate Control Enforce
Security Operations
Cisco Confidential
Network Devices
Routers Servers Switches
Visibility
Control
Data Center
Campus
WAN Edge
Branch
Internet Edge
Ecommerce
Virtual User
Partner Sites
Services
Cisco Confidential
Extranet Campus
WAN Partner
E-Commerce
SensorBase
Cisco Confidential
Cisco Confidential
10
11
SAFE Resources
Cisco SAFE: http://www.cisco.com/go/safe Cisco Design Zone: http://www.cisco.com/go/cvd Cisco Security Lifecycle Services: http://www.cisco.com/go/services/security Ciscos Security Products: http://www.cisco.com/go/security
Cisco Confidential
12
Cisco Confidential
13