Cisco ASA 5500 Security Appliance - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

Cisco ASA 5500 Security Appliance

Description:

December 2006, Data Overview 'The State Of Security In SMBs And Enterprises' ... Comprehensive Malware Protection. Integrates antivirus and malware technology to stop ... – PowerPoint PPT presentation

Number of Views:5557
Avg rating:5.0/5.0
Slides: 15
Provided by: author91
Category:

less

Transcript and Presenter's Notes

Title: Cisco ASA 5500 Security Appliance


1
Cisco ASA 5500Security Appliance
  • Jon Sawdon- Security Business Development Manager.

2
Agenda
  • What do people look for in network security?
  • How can the ASA help?
  • What is the Cisco ASA Solution?

3
Understanding the SMB Decision Maker
AND do all that with limited staff and budget?
How can we be more productive?
How do I protect my assets?
How can I increase my profitability?
How can I be more adaptive to changing conditions?
4
SMB Situation Assessment
  • Market research indicates strong demand in SMBs
    for ASA and ISR features
  • - IPS 39 Forrester, 25 Gartner
  • - Content Security 36 Forrester, 35 Gartner
  • - SSL 25 Gartner
  • Manageability most important feature for SMBs

Source Forrester, Dec 2006
5
Infrastructure Adoption and Spending
  • SMBs are looking to buy or upgrade all types of
    security technologies
  • Network Firewalls
  • Intrusion Detection
  • Content Security
  • Gateway Anti-Spyware Appliance
  • Gateway Anti-Virus Appliance

December 2006, Data Overview The State Of
Security In SMBs And Enterprises
6
The Need For a Systems Approach
  • Complex environment
  • Gaps and inconsistency
  • Lower visibility
  • More difficult to manage
  • Higher TCO
  • Simplified environment
  • Tight integration, tight security
  • Greater visibility
  • Easier to deploy and manage
  • Lower TCO

7
Security Appliance Market Is Evolving
Security Appliance Market Has Diversified to Meet
Changing Security Needs
  • Small to medium businesses are moving to
    converged, multifunctional security appliances
  • Larger enterprises seek environment-specific
    security solutions tailored to their needs

IDC Threat Management Security Appliance by
Market Share
Market Size (M)
Source IDC, 2006
8
Market Leader with Commitment to Security
  • Product and Technology Innovation
  • 1500 security-focused engineers
  • Nine acquisitions added to our solution portfolio
    in last two years
  • SMB focused security products
  • Industry Leadership
  • Critical Infrastructure Assurance Group
  • Responsible disclosure

Because the network is a strategic customer
asset, the protection of its business-critical
applications and resources is a top
priority. John Chambers, Chairman CEO, Cisco
9
Network Security Threats
  • Network security threats include
  • Network service attacks
  • Data theft and interception
  • Software-based viruses, worms and Trojan Horses

10
What is a Firewall?
  • Firewalls provide the first line of perimeter
    defense by
  • Preventing unauthorized access to a network,
    while allowing in authorized users.
  • Provides ability to expose internet services in
    a limited ability to the outside world via a
    DMZ.

11
What is a VPN?
  • VPNs are the solution to ensure that data
    confidentiality and integrity are protected in
    dynamic environments.
  • VPNs provide protection from data interception
    of unprotected assets using secure
    connectivity, encryption, and traffic
    authentication.
  • Company LANs and remote users can connect to
    the network using the same Internet access
    methods dialup, (DSL), cable, ISDN, and
    wireless.

12
What is Intrusion Prevention (IPS)
  • IPS adds a layer of protection that firewalls
    alone cannot address. Follows are some key
    threats where IPS provides added protection
  • Worms
  • Trojan Horses
  • Bots
  • Application Attacks
  • Port Scans and Hacking attempts
  • Covert Channel Communications

13
What is Content Security?
  • Content Security represents a myriad of network
    security protections designed to protect
    information, users and devices stemming from
    common threats
  • Comprehensive Malware Protection
  • Integrates antivirus and malware technology to
    stop virtually all threats
  • Stops viruses, spyware, adware, jokeware, hacking
    tools, etc.
  • Advanced Content Filtering
  • Secures employee productivity and reduces legal
    liability
  • Stops phishing, spyware downloads, spyware phone
    home attempts, inappropriate browsing
  • Integrated Message Security
  • Removes unsolicited email (spam)
  • Stops email-born trojans, viruses, spware, etc.

14
Security Is Now a Baseline Architecture for IT
Infrastructure
Routing
IP Telephony
StorageNetworking
Networked Home
Wireless LAN
Write a Comment
User Comments (0)
About PowerShow.com