Retsudvalget 2014-15 (1. samling)
REU Alm.del Bilag 60
Offentligt
1419807_0001.png
Sikkerhedsløsninger I IT-design
Folketinget 12-11-14
Jan Bau, Managing Nothern Europe
GSSO
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
1
PDF to HTML - Convert PDF files to HTML files
1419807_0002.png
Visibility driven
Detect
Understand
Stop threats
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
PDF to HTML - Convert PDF files to HTML files
1419807_0003.png
The New Security Model
Attack Continuum
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Network
Endpoint
Mobile
Virtual
Cloud
Point in Time
Continuous
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
3
PDF to HTML - Convert PDF files to HTML files
1419807_0004.png
Need Both Breadth and Depth
BREADTH
Network
Endpoint
Mobile
Virtual
Cloud
Who
What
Where
When
How
DEPTH
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
4
PDF to HTML - Convert PDF files to HTML files
1419807_0005.png
Mapping Technologies to the Model
Attack Continuum
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Firewall
App Control
VPN
Patch Mgmt
Vuln Mgmt
IAM/NAC
IPS
Antivirus
Email/Web
IDS
FPC
Forensics
AMD
Log Mgmt
SIEM
Visibility and Context
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
5
PDF to HTML - Convert PDF files to HTML files
1419807_0006.png
Thank You
[email protected]
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
6