Académique Documents
Professionnel Documents
Culture Documents
“Security is
“How do I best complex; so we “We need to meet the “How do I make “We need to be able “How do I reduce cost
protect IT many overlapping the best use of both to determine the and improve the
need a holistic effectiveness of my
Confidentiality, approach to standards suchtoas
“We need security policy and likelihood and impact
security and compliance
Integrity, and deploy
SoX, PCI, SSL VPN”
ISO-27001 technology to of business threats
prioritize activities initiatives?”
Availability?” and investment “ to name a few “ insure security and and prioritize our
compliance” response”
Businesses today face the challenge of both Define Assess Remediate Maintain
protecting themselves from a myriad of security
Define Common Maintain Controls and
threats and meeting many overlapping compliance Assess Controls for Remediate Control
Control Framework:
obligations, all with limited resources Presence and Gaps:
Framework:
Security threats continue to increase in number and Effectiveness: • Operate and monitor
Identify compliance Define and publish technical controls
sophistication obligations Policy controls policies
Inability to meet compliance requirements can lead Asset inventory • Maintain
to lawsuits, fines, and other penalties. Evaluate threats and
Technical controls Deploy security subscriptions
vulnerabilities technology
Fragmented teams that operated in individual silos
Understand business solutions • Periodic assessments
lead to inefficiency, redundancy, gaps, and high cost requirements
Identify and Train employees •
Threats to availability of business processes Risk assessment Evolve solutions
Prioritize Gaps as needed
Loss of customer trust and loyalty in the business
Solution and Customer Benefits Cisco Solution Offers Top Questions To Ask To Initiate The Sale
Update
Operate
Requirements Framework
when it comes to assessing, remediating, and
maintaining security infrastructure.
Risk
Industry Assessment
Standards
International
Standards and Monitor
Control Models
Security Compliance
Threats
Asset
Vulnerabilities
Inventory
Business
Value
Additional Resources
IPS with Global Correlation is a security Reduces network down time and prevents DoS
attacks. GC IPS is able to identify and prevent 1. “How are you currently identifying and
capability deployed with Cisco IPS Sensor preventing attacks and attackers ?”
Software Release 7.0. Global Correlation attacks and attackers, and provide (and receive)
harnesses the power of Cisco Security global awareness.
2. “How confident are you in knowing that
Intelligence Operations, the world’s largest your IPS is blocking and permitting
threat monitoring network, to achieve Reduces operational costs associated with
having to manage, update, and propagate traffic based on real attacks?”
unprecedented threat management efficacy.
Global threat information is turned into updated signatures
3. “Does your current signature based IPS
actionable intelligence, such as reputation solution only detect attacks that are
scores, and pushed out to all enabled Increase worker (IT-Security) efficiency by
focusing key business functions and actionable already under way, and only have local
technologies. threat awareness?”
events.
4. “Are you aware that 50% of attacks are
from repeat offenders? (every attack a
Value Proposition Key Points Where It Fits bad guy attempts counts against him in
GC IPS’ risk rating system)”
Global Correlation makes Cisco IPS 7.0 twice
SensorBase
as effective as signature-only IPS technologies.
http://www.cisco.com/en/US/products/sw/secursw/ps2113/index.html
ASA BATTLE CARD
“My “The useful life of
“We need to be able “We need to be our investment in “Support for multiple
administrators are
to protect against able to protect our “We
“Weneed
needtoto having a hard time security vendor solution
deploy creates problems
deploy SSLVPN”
SSL
threats, known and unified technologies
unknown (i.e. like communication VPN” managing all our
continues to shrink” and is expensive”
security devices”
filtering botnet services.”
traffic)”