xerox secure x 060711 tg

Post on 22-Nov-2014

409 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Tom Gillis, Cisco

TRANSCRIPT

Cisco Confidential 1© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco SecureX Architecture

Tom Gillis, VP/GM STBU

Cisco Confidential 2© 2011 Cisco and/or its affiliates. All rights reserved.

Design and Defendfor Unpredictable

Threats

Opposing Forces: Finding the Balance

BUSINESS

SECURITY

Simplify Security for the User, the Business, and

the Operations

Maintain Regulatory Compliance and

Manage Risk Well

Provide Business Speed and Agility

Enable New Business Models

Enable Collaborative Work

IMPERATIVES

BUSINESS

SECURITY

The Traditional Model

DMZDMZDesktopDesktop

The NetworkThe Network

Mobile Applications and Data

DMZDMZDesktopDesktop

The NetworkThe Network

Mobile Applications and Data

DMZDMZDesktopDesktop

The NetworkThe Network

The NetworkThe Network

The NetworkThe NetworkCisco SecureX

The Network

Context Aware EnforcementContext Aware EnforcementApplianceAppliance ModuleModule CloudCloud

Tru

stS

ec

Tru

stS

ec

Tru

stS

ec

Tru

stS

ec

Context Aware PolicyContext Aware Policy

An

yCo

nnec

tA

nyC

onn

ect

Vir

tua

l and

Clo

udV

irtu

al a

nd C

loud

ServicesServicesPartnersPartners ManagementManagement

Application Programming InterfacesApplication Programming Interfaces

Cisco SecureX Architecture

The NetworkThe Network

Cisco SIOCisco SIO

Cisco Confidential 10© 2011 Cisco and/or its affiliates. All rights reserved.

Cisco: Securing Today and Tomorrow

Private Cloud Physical Data CenterPublic Cloud

SecureXSecureX

Cisco Confidential 11© 2011 Cisco and/or its affiliates. All rights reserved.

top related