Title: Cisco ASA 5500 Security Appliance
1Cisco ASA 5500Security Appliance
- Jon Sawdon- Security Business Development Manager.
2Agenda
- What do people look for in network security?
- How can the ASA help?
- What is the Cisco ASA Solution?
3Understanding the SMB Decision Maker
AND do all that with limited staff and budget?
How can we be more productive?
How do I protect my assets?
How can I increase my profitability?
How can I be more adaptive to changing conditions?
4SMB Situation Assessment
- Market research indicates strong demand in SMBs
for ASA and ISR features - - IPS 39 Forrester, 25 Gartner
- - Content Security 36 Forrester, 35 Gartner
- - SSL 25 Gartner
- Manageability most important feature for SMBs
Source Forrester, Dec 2006
5Infrastructure Adoption and Spending
- SMBs are looking to buy or upgrade all types of
security technologies - Network Firewalls
- Intrusion Detection
- Content Security
- Gateway Anti-Spyware Appliance
- Gateway Anti-Virus Appliance
December 2006, Data Overview The State Of
Security In SMBs And Enterprises
6The Need For a Systems Approach
- Complex environment
- Gaps and inconsistency
- Lower visibility
- More difficult to manage
- Higher TCO
- Simplified environment
- Tight integration, tight security
- Greater visibility
- Easier to deploy and manage
- Lower TCO
7Security Appliance Market Is Evolving
Security Appliance Market Has Diversified to Meet
Changing Security Needs
- Small to medium businesses are moving to
converged, multifunctional security appliances - Larger enterprises seek environment-specific
security solutions tailored to their needs
IDC Threat Management Security Appliance by
Market Share
Market Size (M)
Source IDC, 2006
8Market Leader with Commitment to Security
- Product and Technology Innovation
- 1500 security-focused engineers
- Nine acquisitions added to our solution portfolio
in last two years - SMB focused security products
- Industry Leadership
- Critical Infrastructure Assurance Group
- Responsible disclosure
Because the network is a strategic customer
asset, the protection of its business-critical
applications and resources is a top
priority. John Chambers, Chairman CEO, Cisco
9Network Security Threats
- Network security threats include
- Network service attacks
- Data theft and interception
- Software-based viruses, worms and Trojan Horses
10What is a Firewall?
- Firewalls provide the first line of perimeter
defense by - Preventing unauthorized access to a network,
while allowing in authorized users. - Provides ability to expose internet services in
a limited ability to the outside world via a
DMZ.
11What is a VPN?
- VPNs are the solution to ensure that data
confidentiality and integrity are protected in
dynamic environments. - VPNs provide protection from data interception
of unprotected assets using secure
connectivity, encryption, and traffic
authentication. - Company LANs and remote users can connect to
the network using the same Internet access
methods dialup, (DSL), cable, ISDN, and
wireless.
12What is Intrusion Prevention (IPS)
- IPS adds a layer of protection that firewalls
alone cannot address. Follows are some key
threats where IPS provides added protection - Worms
- Trojan Horses
- Bots
- Application Attacks
- Port Scans and Hacking attempts
- Covert Channel Communications
13What is Content Security?
- Content Security represents a myriad of network
security protections designed to protect
information, users and devices stemming from
common threats - Comprehensive Malware Protection
- Integrates antivirus and malware technology to
stop virtually all threats - Stops viruses, spyware, adware, jokeware, hacking
tools, etc. - Advanced Content Filtering
- Secures employee productivity and reduces legal
liability - Stops phishing, spyware downloads, spyware phone
home attempts, inappropriate browsing - Integrated Message Security
- Removes unsolicited email (spam)
- Stops email-born trojans, viruses, spware, etc.
14Security Is Now a Baseline Architecture for IT
Infrastructure
Routing
IP Telephony
StorageNetworking
Networked Home
Wireless LAN