SlideShare uma empresa Scribd logo
1 de 22
Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved.
Cisco Smart Net Total Care
Decrease Network Risk with Alert Management
Presented by:
Gary Blandino
Cisco Confidential 2© 2015 Cisco and/or its affiliates. All rights reserved.
Upcoming Sessions
Simple Steps to
Saving Time on
TAC Calls
May 7
Network Forecasting:
Useful Tools to Plan
Ahead
June 4
Get Visibility into
Your Network
On Demand:
Cisco Confidential 3© 2015 Cisco and/or its affiliates. All rights reserved.
Today’s Session Will Focus On:
Reducing network risk through
effective and efficient alert management
Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.
How do you track and manage alerts today?
Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved.
Manual Alert Tracking Methods
One-off email
notifications
Discovery
through TAC
Cisco support
community
Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved.
Types of Alerts
Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved.
Challenges of Alert Management
Receiving too
many alerts
Identifying
impacted devices
Prioritizing
alerts
Dedicating too
many hours for alert
management
Cisco Confidential 8© 2015 Cisco and/or its affiliates. All rights reserved.
Smart Net Total Care Delivers
Install Base Visibility Contract Status EOX Info & Details
Delta Reports Relevant Product Alerts Covered/Uncovered Devices
Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved.
Smart Net Total Care Portal
Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved.
Do you have a method for tracking PSIRT alerts?
Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved.
Prioritizing Alerts
 Security vulnerabilities
 Business impact
 Equipment costs
 Device location
 Product lifecycles
Cisco Confidential 12© 2015 Cisco and/or its affiliates. All rights reserved.
See Alerts Relevant to Your Cisco Devices
A complete view of
product alerts relevant to
your Cisco devices
Easily drill down for more details
Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved.
Identify What Hardware (or Software) Is Affected
Pinpoint the impacted
devices or software
Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved.
View Detailed Alert Information
Easily drill down to find
all details of an alert.
Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved.
View Status Updates and Notes
View notes on
remediation actions
Cisco Confidential 16© 2015 Cisco and/or its affiliates. All rights reserved.
Case Study
Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved.
Consistent device tracking and up-to-date maintenance reduce
the chance of network outages by 40 percent.
Reduce the Chance of Network Outages
Cisco Confidential 18© 2015 Cisco and/or its affiliates. All rights reserved.
Quick Tips for Tracking Alerts
Develop a consistent
process for reviewing
your alerts
Prioritize alerts according
to your specific business
needs
Develop a clear and
concise list of
actionable alerts
Cisco Confidential 19© 2015 Cisco and/or its affiliates. All rights reserved.
Quick Tips for Tracking Alerts
Record how you have
responded to each alert
Maintain detailed records Use a delta report to
keep track of changes
Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved.
Summary of Alert Management Benefits
• Proactively identify issues
• Determine which alerts apply your Cisco devices
• Prioritize alerts
• View actions for remediation
• Track and manage alerts
• Identify old versions of software
Cisco Confidential 21© 2015 Cisco and/or its affiliates. All rights reserved.
Get a Personalized Demo
Questions? Contact us today @
smarttalk@external.cisco.com
Schedule a Demo today!
demand.cisco.com/SNTC3
Cisco Confidential 22© 2015 Cisco and/or its affiliates. All rights reserved.
Thank You

Mais conteúdo relacionado

Mais procurados

Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013APEXMarCom
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013F-Secure Corporation
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityF-Secure Corporation
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139evaleng2
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able Solarwinds N-able
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Claudia Perez
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstationsF-Secure Corporation
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slidesprojectwinner
 
Michael jarmark internet security basics
Michael jarmark   internet security basicsMichael jarmark   internet security basics
Michael jarmark internet security basicsMichaelJarmark_
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them Donald E. Hester
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Corporation
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profilepds2k.com
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure Corporation
 
Taking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTaking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTripwire
 

Mais procurados (20)

Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
 
Best corporate end-point protection 2013
Best corporate end-point protection 2013Best corporate end-point protection 2013
Best corporate end-point protection 2013
 
Business Suite - Gain control of your IT security
Business Suite - Gain control of your IT securityBusiness Suite - Gain control of your IT security
Business Suite - Gain control of your IT security
 
Internet gatekeeper
Internet gatekeeperInternet gatekeeper
Internet gatekeeper
 
Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139Cyber essentials-overview-sep-2021-211019100139
Cyber essentials-overview-sep-2021-211019100139
 
The how and why of patch management by N-able
The how and why of patch management by N-able The how and why of patch management by N-able
The how and why of patch management by N-able
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 
Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016Equiinet discussion of cyber threat landscape final 2016
Equiinet discussion of cyber threat landscape final 2016
 
Client Security - Best security for business workstations
Client Security - Best security for business workstationsClient Security - Best security for business workstations
Client Security - Best security for business workstations
 
Inv i carepro_brochure
Inv i carepro_brochureInv i carepro_brochure
Inv i carepro_brochure
 
HIPAA Safeguard Slides
HIPAA Safeguard SlidesHIPAA Safeguard Slides
HIPAA Safeguard Slides
 
Michael jarmark internet security basics
Michael jarmark   internet security basicsMichael jarmark   internet security basics
Michael jarmark internet security basics
 
Powerful email protection
Powerful email protectionPowerful email protection
Powerful email protection
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
F-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior controlF-Secure Policy Manager - onsite security management with superior control
F-Secure Policy Manager - onsite security management with superior control
 
Security Readiness Profile
Security Readiness ProfileSecurity Readiness Profile
Security Readiness Profile
 
Protection Service for Business
Protection Service for BusinessProtection Service for Business
Protection Service for Business
 
Security Essentials
Security EssentialsSecurity Essentials
Security Essentials
 
F-Secure E-mail and Server Security
F-Secure E-mail and Server SecurityF-Secure E-mail and Server Security
F-Secure E-mail and Server Security
 
Taking the Pain out of PCI Compliance
Taking the Pain out of PCI ComplianceTaking the Pain out of PCI Compliance
Taking the Pain out of PCI Compliance
 

Semelhante a Sntc April 2: Decrease Network Risk with Alert Management Draft v2

Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testB2BContact
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3B2BContact
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...B2BContact
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation SecurityBGA Cyber Security
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco ITSitio.com
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM Security
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA Cyber Security
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance NetworkCollaborators
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBMC Software
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementIvanti
 

Semelhante a Sntc April 2: Decrease Network Risk with Alert Management Draft v2 (20)

Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
TEST -- Nos webinar architecture test
TEST -- Nos webinar architecture testTEST -- Nos webinar architecture test
TEST -- Nos webinar architecture test
 
Nos webinar architecture strategy and planning what's your game plan fina lv3
Nos   webinar architecture strategy and planning what's your game plan fina lv3Nos   webinar architecture strategy and planning what's your game plan fina lv3
Nos webinar architecture strategy and planning what's your game plan fina lv3
 
NEW - Nos webinar architecture strategy and planning what's your game plan ...
NEW - Nos   webinar architecture strategy and planning what's your game plan ...NEW - Nos   webinar architecture strategy and planning what's your game plan ...
NEW - Nos webinar architecture strategy and planning what's your game plan ...
 
Protegendo sua rede
Protegendo sua redeProtegendo sua rede
Protegendo sua rede
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco #ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
#ITSitioEnRSA - Presentacion de Jeef Reed de Cisco
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and SecurityIBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
IBM BigFix: Closing the Endpoint Gap Between IT Ops and Security
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...BGA SOME/SOC Etkinliği - Tehdit  Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
 
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
Cisco Connect 2018 Indonesia - Introducing cisco dna assurance
 
Best Practices for Intelligent Compliance
Best Practices for Intelligent ComplianceBest Practices for Intelligent Compliance
Best Practices for Intelligent Compliance
 
How to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability ManagementHow to Perform Continuous Vulnerability Management
How to Perform Continuous Vulnerability Management
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 

Sntc April 2: Decrease Network Risk with Alert Management Draft v2

  • 1. Cisco Confidential 1© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Smart Net Total Care Decrease Network Risk with Alert Management Presented by: Gary Blandino
  • 2. Cisco Confidential 2© 2015 Cisco and/or its affiliates. All rights reserved. Upcoming Sessions Simple Steps to Saving Time on TAC Calls May 7 Network Forecasting: Useful Tools to Plan Ahead June 4 Get Visibility into Your Network On Demand:
  • 3. Cisco Confidential 3© 2015 Cisco and/or its affiliates. All rights reserved. Today’s Session Will Focus On: Reducing network risk through effective and efficient alert management
  • 4. Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved. How do you track and manage alerts today?
  • 5. Cisco Confidential 5© 2015 Cisco and/or its affiliates. All rights reserved. Manual Alert Tracking Methods One-off email notifications Discovery through TAC Cisco support community
  • 6. Cisco Confidential 6© 2015 Cisco and/or its affiliates. All rights reserved. Types of Alerts
  • 7. Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved. Challenges of Alert Management Receiving too many alerts Identifying impacted devices Prioritizing alerts Dedicating too many hours for alert management
  • 8. Cisco Confidential 8© 2015 Cisco and/or its affiliates. All rights reserved. Smart Net Total Care Delivers Install Base Visibility Contract Status EOX Info & Details Delta Reports Relevant Product Alerts Covered/Uncovered Devices
  • 9. Cisco Confidential 9© 2015 Cisco and/or its affiliates. All rights reserved. Smart Net Total Care Portal
  • 10. Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved. Do you have a method for tracking PSIRT alerts?
  • 11. Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved. Prioritizing Alerts  Security vulnerabilities  Business impact  Equipment costs  Device location  Product lifecycles
  • 12. Cisco Confidential 12© 2015 Cisco and/or its affiliates. All rights reserved. See Alerts Relevant to Your Cisco Devices A complete view of product alerts relevant to your Cisco devices Easily drill down for more details
  • 13. Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved. Identify What Hardware (or Software) Is Affected Pinpoint the impacted devices or software
  • 14. Cisco Confidential 14© 2015 Cisco and/or its affiliates. All rights reserved. View Detailed Alert Information Easily drill down to find all details of an alert.
  • 15. Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved. View Status Updates and Notes View notes on remediation actions
  • 16. Cisco Confidential 16© 2015 Cisco and/or its affiliates. All rights reserved. Case Study
  • 17. Cisco Confidential 17© 2015 Cisco and/or its affiliates. All rights reserved. Consistent device tracking and up-to-date maintenance reduce the chance of network outages by 40 percent. Reduce the Chance of Network Outages
  • 18. Cisco Confidential 18© 2015 Cisco and/or its affiliates. All rights reserved. Quick Tips for Tracking Alerts Develop a consistent process for reviewing your alerts Prioritize alerts according to your specific business needs Develop a clear and concise list of actionable alerts
  • 19. Cisco Confidential 19© 2015 Cisco and/or its affiliates. All rights reserved. Quick Tips for Tracking Alerts Record how you have responded to each alert Maintain detailed records Use a delta report to keep track of changes
  • 20. Cisco Confidential 20© 2015 Cisco and/or its affiliates. All rights reserved. Summary of Alert Management Benefits • Proactively identify issues • Determine which alerts apply your Cisco devices • Prioritize alerts • View actions for remediation • Track and manage alerts • Identify old versions of software
  • 21. Cisco Confidential 21© 2015 Cisco and/or its affiliates. All rights reserved. Get a Personalized Demo Questions? Contact us today @ smarttalk@external.cisco.com Schedule a Demo today! demand.cisco.com/SNTC3
  • 22. Cisco Confidential 22© 2015 Cisco and/or its affiliates. All rights reserved. Thank You

Notas do Editor

  1. Session Description: Good morning (afternoon). Today’s discussion will focus on how to prevent network disruption by proactively identifying and managing Cisco alerts that impact your network devices.
  2. Poll question: How do you track and manage alerts today? Review one-off email notifications – review notice & determine impacted devices When they open a case with TAC, they find their a bulletin addressing the problem Cisco support community / industry sites No formal process in place
  3. Poll question: How do you track and manage alerts today? [Recap the manual methods after the audience participates in the poll question] Here are a few of the manual tracking methods we find today: Customers are reviewing one-off email notifications Alert are discovered during a TAC call and they find a bulletin addressing the problem Periodic searching on the Cisco support community or industry sites In some cases, there isn’t a formal process in place
  4. Typical alerts include: Hardware alerts: Hardware end-of-life and end-of-support reminders. Software alerts: Software end-of-engineering, end-of-life, and end-of support reminders. PSIRT alerts: Product Security Incident Response Team. Security advisories, notifications of threats, and vulnerabilities. Field notice alerts: Published notifications of significant product issues that typically require an upgrade, workaround, or other action.
  5. What are some of the issues you run into when dealing with alerts? Are you getting too many alerts and having trouble knowing if they apply to your network? How do you identify devices that have security alerts and/or notifications? How do I manage security vulnerabilities? Which alerts should we prioritize? Do you find managing your alerts to be a labor intensive process? Today, we’re going to show you how Smart Net Total Care addresses these challenges.
  6. Introduce Smart Net Total Care Cisco Smart Net Total Care is a next-generation support service that helps you: Automatically maintain a comprehensive and up-to-date view of your Cisco installed base Manage your support contracts to see what’s covered, what’s due to expire, and if you have any uncovered devices Identify Cisco products that are reaching end-of-life, end-of-sale, or end-of-support Easily see what has moved, been added or changed in your network. Perform network device planning and budgeting activities And the topic for today’s session… Easily see the alerts that apply to your network, and which devices are affected.
  7. Here’s a what the highly intuitive and customizable SNTC dashboard looks like. As you can see, SNTC quickly delivers actionable information and insights into your network. We’re going to show how Smart Net Total Care help you effectively and efficiently manage and track Cisco security, hardware, and software alerts, and Cisco field notices. ● Easily list alerts that apply to your network, and which devices are affected, helping prioritize activity. ● Acknowledge those alerts that have been reviewed or mitigated, providing you with a concise and persistent list of activities and alerts needing attention. ● See which Cisco alerts have been generated, and alerts activities associated with your devices, during a specific time period.
  8. Do you have a method for tracking PSIRT or security alerts specific the equipment on your network?
  9. An important first step in getting the most from your alerts is determining which alerts apply to you and which could put your network at risk. Investing some time in organizing and updating network alerts can make a world of difference. Prioritizing Alerts: When it comes to prioritizing alerts, every team should have its own set of critical considerations. Here are some important factors that should make the list: Security vulnerabilities – these need to be adjusted your specific environment. The level of impact on business operations. Does impacted device affect your Service-level agreements? Equipment replacement costs Device location Software and hardware lifecycles – mitigate risk and plan for upgrades to equipment that is no longer supported
  10. Alerts provide list of hardware and software alerts, PSIRTs, and Field notices. Users can drill down to see increasing detail.
  11. Now we see the relevant details of those devices to quickly focus where attention needs to be taken.
  12. Here you can see more details regarding how the alert works and how your customer can drill down to see affected devices as well as the actual alert text.
  13. Status updates and notes become part of the record for the device.
  14. Example Case Study Customer challenge: We recently worked with a healthcare organization who was looking for a more efficient way to manage their alerts. Being in a medical environment, security was very important so they needed a way to ensure vulnerabilities were being addressed. How did they keep track of all of the alerts coming in? They assigned a member of their IT staff to manually review PSIRTS and security advisories. As you can imagine, this was a very labor intensive task to review every PSIRT manually. First they had to determine if the alert even applied to their network. If it did, they would then assess the risk level, find the impacted devices, and lookup the detail on how to remediate the issue. Business Outcome: When we put Smart Net Total Care in, it became much easier to see and prioritize the PSIRTS based on their environment. With a tracking system in place, they were able to confirm alerts were addressed Network risk was reduced based on timely alerts and responses IT resources were reallocate to more strategic IT initiatives
  15. STAT: Consistent device tracking and up-to-date maintenance reduce the chance of network outages by 40 percent.
  16. Quick Tips for Tracking Alerts 1. Develop a consistent process for reviewing alerts. 2. Prioritize alerts according to your specific business needs. 3. Tag alerts that require action and develop a clear and concise list of actionable alerts. Flag and comment on alerts “Action Required” “Assign to security group to review and complete by X/X” (Continued on next slide)
  17. Quick Tips for Tracking Alerts Continued… 4. Record how you have responded to each alert: whether you addressed the alert or chose not to address it and why. Alert drops off after action has been completed   5. Maintain detailed information, so other team members have important background on hand when addressing remediation steps or when TAC support is needed. Comments, actions taken 6. Use a delta report to keep track of what’s new and what’s been addressed
  18. To summarize, SNTC helps customers to: Preempt network disruption by proactively identifying issues Easily determine which alerts apply their Cisco devices Know which alerts are putting my network at risk - prioritize alerts View detailed alert information and the recommended actions for remediation Track which alerts have already been addressed Know which devices in my network are running old versions of software and creating security vulnerabilities
  19. Thanks for your time and attention today. Do you have any questions?