SlideShare uma empresa Scribd logo
1 de 29
“S     e g u r id a                                     d e n  C o m      u n ic a c                                      io n e s       U    n ific a d                                     a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   1
©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   2
A A g g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   3
Amenazas en U C                                                                       … u na r eal i d ad ! !                                                                                                                                                Trojan-I nf e c t e d M P 3 s  Botnet g a i ns , W eb                                                                                                                        H av e P C U s e rs S i ng i ng  2 . 0 p a i ns                                                                                                                                 t h e B lu e s                                                                                                Half a million sites hit         December 31, 2007                                                                                                b y hu g e w eb hac k                                             M a y 9 , 2008                                                                                                                      A p ri l 28 , 2008                                                                                                                                           H ow C r ed i t-C a r d                                                                                                                                            D a ta W ent O u t                           Hac k er p osts C hilean                                                                                          W i r el es s D oor                           g ov er nment d ata on 6                                                                                                        M a y 4 , 2007                            million                                                                M a y 13, 2008           ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                                                4
U C : U n ent o r no c o mp l ej o p o r p r o t eg er   Virtu aliz ation                              S p eech                                       P res ence                M obility           P olicy         Vid eo                                                           C ont ac t                                                        W eb              Mobile                                                                                                             C lient s                                                            C ent er                                                     C onf er enc ing       U CUnifiedC o m m u nic a t io ns                                                       U nif ied                                   V id eo/ A u d io            IP               C all                                                      Mes s ag ing                                C onf er enc ing          P h ones        P r oc es s ing             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                   5
Más c o mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … …       Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e                           p r ot ección”          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   6
Amenazas en T el ef o nía I P              A ye r                                                                                             Hoy       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l         7
Amenazas en C o mu ni c ac i o nes U ni f i c ad as•   T o l l F r au d – S am                                    e as a P B X                                               • B 2 B         U n ifie d C o         m m u n i c at i o n s•    E av e sd r o p p i n g                                                                                                   •S     P IT•     D o S , W o r m s, an                                d t h e V i r u s-D e -J o u r                                      •Id         e n tity T h e       ft•      R o g u e D e v ic e In                              se r t i o n                                                       •E      x t e r n al D o     S                                                                                                                          • E x te   r n al U C S e             r v ic e s•       R e c o n n ai ssan c e                                                                                                                               •S       e c u r e Mo b           ility•        Man -i n -t h e -Mi d d                            le                                                                                                                               •R        e m o te A c c          e ss•        D H C P S p o o fin g                              & S t ar v at i o n                ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                               8
S eg u r i d ad en C o mu ni c ac i o nes U ni f i c ad as     L a m ay oría d e la g ente p iens a q u e u n am biente d e U C                                                              s eg u ro es s olo:         - P rotección contra f rau d es         - Voz encrip tad a     H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones      U nif icad as                                                                             Conectividad                          M anej o de   D ef ens a contr a                                                                               s eg u r a                         identidades       am enaz as        I nf r as tr u ctu r a       P r oces am iento de        l l am adas        E ndp oints       A p l icaciones        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                          9
U n r et o , c o o p er ac i ón ent r e ár eas                                                                                           S ec u r e U ni f i ed                                                                                         C o mmu ni c at i o ns   N et O P s                                                                                                       S ec O p s    E x ec s                                                                                                        T el O p s  “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e  p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le   U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7         ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                 10
R et o s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es                                                                   y s eg u r id ad )              ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l       11
Ag gend n a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   12
T o mar en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a                                                                                                   P u n t o s f i n al e s S eg u r id ad en la                                                                                                        T elef onos I P , C lient es d e S W  c onec t iv id ad y                                                                                                         y ot r os d is p os it iv os   t r ans p or t e                                                                                                          U nif ied                                                                                                     Com m u nications C o n t r o l d e l l am ad as                                                                                               A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos                                                                                         Mens aj er ía, at enc ión a  p ar a la ad m inis t r ac ión d e                                                                                          c lient es , et c .   llam ad as                                                                                        L a r e d c o m o p lat af o r m a             ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                        13
S eg u r i d ad en U C                                                    =            S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía                                               S ec u r e U ni f i ed                     S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny                                                                      S ec  “O r g a   n iz    a tio n s                    m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C  o w n e    rs h    ip . In c                  lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity   a n d M     a n     a g e m                 e n t.”    - K ey    Is s    u es fo                    r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7                     ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                  14
S eg u r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e                                                                                                              A p p li c at i o n s    V L A N s e g m e nt at i on                                                                                                          M u l t i -l e v e l ad m i ni s t rat i on     L ay e r 2 p rot e c t i on      F i re w al l                                                                                                                       Tol l f rau d p rot e c t i on                                                                                                          Internet           Intranet       I nt ru s i on d e t e c t i on                                                                                                    S e c u re m anag e m e nt        Q oS and t h re s h ol d s                                                                                                        H ard e ne d p l at f orm s         S e c u re V P N                                                                                                                                          h . 3 2 3 and S I P s i g nal i ng          W i re l e s s s e c u ri t y C all Man ag e m e n t                                                                                                                 E n d p o in ts                                                                                                                        Si     Si    H ard e ne d W i nd ow s O S                                                                                                          D i g i t al c e rt i f i c at e s    D i g i t al c e rt i f i c at e s                                                                                                    A u t h e nt i c at e d p h one s                                                                                                                                          G A R P p rot e c t i on    S i g ne d s of t w are i m ag e s                                                                                                                                          TL S p rot e c t e d s i g nal i ng    TL S s i g nal i ng                                                                                                                                          S R TP m e d i a e nc ry p t i on    I nt e g rat e d C S A                                                                                                                                          C e nt ral i z e d m anag e m e nt                   ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                         15
C i s c o c o m o s o c i o t e c n o l óg i c o                                          1                                                                                                   2                     3     I nc l u ded a s fea t u r es                                                                               I nc l u ded in net w o r k ing   T h ing s y o u      in C is c o UC P r o du c t s                                                                               p r o du c t s (ex : V L A N )    s h o u l d do a ny w a y      (ex : T L S )                                                                                                                                  (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID   © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d .   C is c o C o n fid e n tia l                                              1616
M B eja o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes                 n                      is U ni f i c ad as                           L o w                                                                                            Me d i u m                                 H ig h              Easy or Default                                                                           M o d erate and R eas o nab l e                 H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s                                                      U C -A w are F i re w al l s                     U C     A w are F W       w / TL S P rox yS TP , B P D U G u ard , S m art P ort s                                                      E nc ry p t e d C onf i g u rat i on             R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s )                                             TL S & S R TP f or P h one s                     V P N    ( Te l e c om m u t e r)S t and ard O S H ard e ni ng                                                                 I P S e c & S R TP f or G at e w ay s            8 0 2 .1 X & N A CU nm anag e d C S A                                                                           O p t i onal O S H ard e ni ng / P at c h i ng   N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y )                                                       M anag e d C S A ( W i nd ow s onl y )           S e c u ri t y E v e nt M anag e m e ntH TTP S                                                                                       D H C P S noop i ng                              D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on                                                D y nam i c A R P I ns p e c t i on              S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s                                                         D y nam i c P ort S e c u ri t y                 I nt ru s i on P re v e nt i on S ol u t i on                                                                                              I P S ou rc e G u ard                  ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                                       17
S A F E S e c u r ity A r c h ite c tu r e S tr a te g y                                                                                                            S ec u r it y D ev ic es                 S ec u r it y                                                          V PN s                                                                                         M o n ito r in g                                                                                                                            F ir e w a ll                                                                                                                             E m a il F ilt e r in g                                                                                                                                                            A d m i s s i o n Co n t r o l                                                                                                                                                             In t r u s i o n Pr e v e n t i o n                                                                                                                                                                                                        N et w o r k                  S o l u t io ns                                                                                                                                                                        D ev ic es                        PCI                                                                                                                                                                                    R o u te rs                        D L P                                                                                                                                                                                   S e rv e rs                                                                                                                    P o l i c y and D ev i c e                         T h re a t                                                                                                                                                                              S w itc h e s                          Co n t r o l                                                                                                                        M anag em ent                                                                                                                      Id e n t i f y                H a rd e n                                                                              M o n ito r                                                                                          Is o l a t e   V i s i b i l i ty                                                                                                                                                                                                    C o ntro l                                                                                                            Co r r e l a t e                            E n fo rc e                                                                                                                                                                                            C is c o      Data                                                             W A N                                                           I n te r n e t            E c o m m -                            V i r tu al              P ar tn e r                                C am p u s                                                           B r an c h                                                                           V i r tu al    C e n te r                                                          E d g e                                                           E d g e                   e rc e                                U s e r                  S i te s                                                                                                                                                                                           O f f ic e                                                      Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion                                                                                                     N etw ork F oun da tion P rotection                 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .    C is c o C o n fid e n tia l                                                                                                                      18
C o l a b o r a c i ón / S e c u r i t y / S a a S                                                                                                     Collaboration                                                                                                               N etw or k                                                                                                                 as th e                                                                                                              P l atf or m                                                S e c u rity                                                                 S aaS    ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                          19
P l ant eami ent o C i sc o ant e l as nu ev as d i námi c as                                                                                                         Collaboration                                                                                                                        U n iq ue                                                                                                                   C om p etitiv e                                                                                                                  D if f eren tia tor                                                    S e c u rity                                                                        S aaS                                                                                   Network as the Platform        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                 20
Al g u no s ej emp l o s …. C i sc o I P S  I P S F e at u r e s:     I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic     D r o p c a l l s t h a t a r e c o m ing fr o m                                                                 I P a ddr es s es ident ified o n t h e C is c o      S ec u r it y A g ent “w a t c h l is t ”     D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y      A g ent     R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y ,      s ig na t u r e fidel it y a nd ev ent s ev er it y                                                                                                                                                           2 . C SA block s th e a tta ck a n d      1 . A tta ck er tries to brute f orce                                                                                                                                                            a dds a tta ck er to its w a tch lis t       a tta ck a n in tern a l s erv er                                               4 . F uture a tta ck s f rom                                                h a ck er a re block ed a t th e                                                 I P S dev ice                                                                                                                        3 . C SA colla bora tin g w ith C is co I P S is a ble to                                                                                                                         dyn a m ica lly elev a te th e R is k R a tin g th res h old f or            ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l      a tta ck s com in g f rom th e a tta ck er                                  21
C i sc o AS A                                                                                                                                                      N ew                                                                                                                                                     in8 .0 !                                                                                              T L S                                                                                         si g n ali n g                E ncr y p ted                                                                                     S R T P m e d ia                 E ndp oint                                                                                                          E ncr y p ted                                                                                                                                      E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an  n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s:       • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g         se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s       • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r         c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e          e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e )       • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d         au t o m at i c ally c lo se d w h e n c all e n d s        ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                            22
S ec u r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0                                                                                                         E ns u r e S I P , S C C P , H . 3 2 3 ,                                                                                                                               M G C P r eq u es t s c o nfo r m t o                                                                                                                                s t a nda r ds                                                                                                                                 P r ev ent ina p p r o p r ia t e S I P                                                                                                                                  M et h o ds fr o m b eing s ent t o                                                                                                                                   C o m m u nic a t io n M a na g er                                                                                                                                    N et w o r k R a t e L im it S I P                                                                                                                                     R eq u es t s     C is c o                                                                                                                         P o l ic y enfo r c em ent o f c a l l s   S ec u ri ty                     C is c o A S A                                                                                     (w h it el is t , b l a c k l is t ,A g ent ( C S A )                     w i th IP S                                               W A N                                  c a l l er / c a l l ed p a r t y , S I P UR I )                                      and V P N                                                                                                                                        D y na m ic p o r t o p ening fo r                                                                                                                                         C is c o a p p l ic a t io ns       Cis co A S A        w ith S S L                                                  In te r n e t                                                        E na b l e o nl y “r eg is t er ed           V P N                                                                                                                           p h o nes ” t o m a k e c a l l s                                                                                                                                            E na b l e ins p ec t io n o f                                                                                                                                             enc r y p t ed p h o ne c a l l s                                                                                                                                             R es t r ic t UC s er v ic es (ins t a nt                                                                                                                                              m es s a g ing , a c c es s t o UR L s ,                                                                                                                                               m edia t y p es , m es s a g es ,                    ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l                                                                                                                                                m es s a g e l eng t h )                23
C o n c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n  ent o r no de C o m u nic a c io nes  Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s  nec es ida des de s eg u r ida d          cisco.com/go/secureuc           ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   24
Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   25
L ig a s d e r e fe r e n c ia :   S ec u r e U ni f i ed C o mmu ni c at i o ns    h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c   S AF E Ar c h i t ec t u r es    h t t p : / / w w w . c i sc o . c o m/ g o / saf e   C i sc o S ec u r i t y    h t t p : / / w w w . c i sc o . c o m/ sec u r i t y          ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   26
Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as       ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   27
G i l b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s  g v i c ente@ c i s c o . c o m                ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   28
©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .   C is c o C o n fid e n tia l   29

Mais conteúdo relacionado

Semelhante a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz

Eyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak Brasil
 
Green Economy Initiative
Green Economy InitiativeGreen Economy Initiative
Green Economy InitiativeZ3P
 
How do i bring gene xus to my organization
How do i bring gene xus to my organizationHow do i bring gene xus to my organization
How do i bring gene xus to my organizationGeneXus
 
2007 20 most_important_megatrends
2007 20 most_important_megatrends2007 20 most_important_megatrends
2007 20 most_important_megatrendsatelier t*h
 
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyJ.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyShane Mitchell
 
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Vidhyalakshmi K
 
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2Ben Herz
 
weINDIE - Intro Pack
weINDIE - Intro PackweINDIE - Intro Pack
weINDIE - Intro PackDey Dos
 
Degenshein Architects
Degenshein ArchitectsDegenshein Architects
Degenshein ArchitectsFatima Rizvi
 
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyTraveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyStanford University
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summaryfsikipa
 
New doc 20
New doc 20New doc 20
New doc 20KingEdge
 
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University ssuser6ace78
 
Dance For Change
Dance For ChangeDance For Change
Dance For Changepoeschl
 

Semelhante a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz (20)

About me dia
About me diaAbout me dia
About me dia
 
AwardsCerts
AwardsCertsAwardsCerts
AwardsCerts
 
Puzzle
PuzzlePuzzle
Puzzle
 
Eyespeak E Learning Plan
Eyespeak E Learning PlanEyespeak E Learning Plan
Eyespeak E Learning Plan
 
Green Economy Initiative
Green Economy InitiativeGreen Economy Initiative
Green Economy Initiative
 
Hotel marketing-plan
Hotel marketing-planHotel marketing-plan
Hotel marketing-plan
 
How do i bring gene xus to my organization
How do i bring gene xus to my organizationHow do i bring gene xus to my organization
How do i bring gene xus to my organization
 
2007 20 most_important_megatrends
2007 20 most_important_megatrends2007 20 most_important_megatrends
2007 20 most_important_megatrends
 
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable EnergyJ.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
 
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
 
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
 
weINDIE - Intro Pack
weINDIE - Intro PackweINDIE - Intro Pack
weINDIE - Intro Pack
 
Degenshein Architects
Degenshein ArchitectsDegenshein Architects
Degenshein Architects
 
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeleyTraveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
 
Celebrations game
Celebrations  gameCelebrations  game
Celebrations game
 
Active22 - Executive Summary
Active22 - Executive SummaryActive22 - Executive Summary
Active22 - Executive Summary
 
New doc 20
New doc 20New doc 20
New doc 20
 
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumenK4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
 
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
 
Dance For Change
Dance For ChangeDance For Change
Dance For Change
 

Mais de Mundo Contact

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Mundo Contact
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Mundo Contact
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Mundo Contact
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Mundo Contact
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Mundo Contact
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Mundo Contact
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Mundo Contact
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Mundo Contact
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Mundo Contact
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Mundo Contact
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Mundo Contact
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Mundo Contact
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Mundo Contact
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Mundo Contact
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Mundo Contact
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Mundo Contact
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Mundo Contact
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Mundo Contact
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Mundo Contact
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Mundo Contact
 

Mais de Mundo Contact (20)

Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
 
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
 
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
 
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
 
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
 
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
 
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
 
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
 
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
 
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
 
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
 
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
 
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
 
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
 
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
 
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
 
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
 
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
 
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
 
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
 

Último

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz

  • 1. “S e g u r id a d e n C o m u n ic a c io n e s U n ific a d a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 1
  • 2. ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 2
  • 3. A A g g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 3
  • 4. Amenazas en U C … u na r eal i d ad ! ! Trojan-I nf e c t e d M P 3 s Botnet g a i ns , W eb H av e P C U s e rs S i ng i ng 2 . 0 p a i ns t h e B lu e s Half a million sites hit December 31, 2007 b y hu g e w eb hac k M a y 9 , 2008 A p ri l 28 , 2008 H ow C r ed i t-C a r d D a ta W ent O u t Hac k er p osts C hilean W i r el es s D oor g ov er nment d ata on 6 M a y 4 , 2007 million M a y 13, 2008 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 4
  • 5. U C : U n ent o r no c o mp l ej o p o r p r o t eg er Virtu aliz ation S p eech P res ence M obility P olicy Vid eo C ont ac t W eb Mobile C lient s C ent er C onf er enc ing U CUnifiedC o m m u nic a t io ns U nif ied V id eo/ A u d io IP C all Mes s ag ing C onf er enc ing P h ones P r oc es s ing ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 5
  • 6. Más c o mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … … Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e p r ot ección” ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 6
  • 7. Amenazas en T el ef o nía I P A ye r Hoy ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 7
  • 8. Amenazas en C o mu ni c ac i o nes U ni f i c ad as• T o l l F r au d – S am e as a P B X • B 2 B U n ifie d C o m m u n i c at i o n s• E av e sd r o p p i n g •S P IT• D o S , W o r m s, an d t h e V i r u s-D e -J o u r •Id e n tity T h e ft• R o g u e D e v ic e In se r t i o n •E x t e r n al D o S • E x te r n al U C S e r v ic e s• R e c o n n ai ssan c e •S e c u r e Mo b ility• Man -i n -t h e -Mi d d le •R e m o te A c c e ss• D H C P S p o o fin g & S t ar v at i o n ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 8
  • 9. S eg u r i d ad en C o mu ni c ac i o nes U ni f i c ad as L a m ay oría d e la g ente p iens a q u e u n am biente d e U C s eg u ro es s olo: - P rotección contra f rau d es - Voz encrip tad a H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones U nif icad as Conectividad M anej o de D ef ens a contr a s eg u r a identidades am enaz as I nf r as tr u ctu r a P r oces am iento de l l am adas E ndp oints A p l icaciones ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 9
  • 10. U n r et o , c o o p er ac i ón ent r e ár eas S ec u r e U ni f i ed C o mmu ni c at i o ns N et O P s S ec O p s E x ec s T el O p s “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 10
  • 11. R et o s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es y s eg u r id ad ) ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 11
  • 12. Ag gend n a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 12
  • 13. T o mar en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a P u n t o s f i n al e s S eg u r id ad en la T elef onos I P , C lient es d e S W c onec t iv id ad y y ot r os d is p os it iv os t r ans p or t e U nif ied Com m u nications C o n t r o l d e l l am ad as A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos Mens aj er ía, at enc ión a p ar a la ad m inis t r ac ión d e c lient es , et c . llam ad as L a r e d c o m o p lat af o r m a ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 13
  • 14. S eg u r i d ad en U C = S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía S ec u r e U ni f i ed S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny S ec “O r g a n iz a tio n s m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C o w n e rs h ip . In c lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity a n d M a n a g e m e n t.” - K ey Is s u es fo r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 14
  • 15. S eg u r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e A p p li c at i o n s V L A N s e g m e nt at i on M u l t i -l e v e l ad m i ni s t rat i on L ay e r 2 p rot e c t i on F i re w al l Tol l f rau d p rot e c t i on Internet Intranet I nt ru s i on d e t e c t i on S e c u re m anag e m e nt Q oS and t h re s h ol d s H ard e ne d p l at f orm s S e c u re V P N h . 3 2 3 and S I P s i g nal i ng W i re l e s s s e c u ri t y C all Man ag e m e n t E n d p o in ts Si Si H ard e ne d W i nd ow s O S D i g i t al c e rt i f i c at e s D i g i t al c e rt i f i c at e s A u t h e nt i c at e d p h one s G A R P p rot e c t i on S i g ne d s of t w are i m ag e s TL S p rot e c t e d s i g nal i ng TL S s i g nal i ng S R TP m e d i a e nc ry p t i on I nt e g rat e d C S A C e nt ral i z e d m anag e m e nt ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 15
  • 16. C i s c o c o m o s o c i o t e c n o l óg i c o 1 2 3 I nc l u ded a s fea t u r es I nc l u ded in net w o r k ing T h ing s y o u in C is c o UC P r o du c t s p r o du c t s (ex : V L A N ) s h o u l d do a ny w a y (ex : T L S ) (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d . C is c o C o n fid e n tia l 1616
  • 17. M B eja o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes n is U ni f i c ad as L o w Me d i u m H ig h Easy or Default M o d erate and R eas o nab l e H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s U C -A w are F i re w al l s U C A w are F W w / TL S P rox yS TP , B P D U G u ard , S m art P ort s E nc ry p t e d C onf i g u rat i on R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s ) TL S & S R TP f or P h one s V P N ( Te l e c om m u t e r)S t and ard O S H ard e ni ng I P S e c & S R TP f or G at e w ay s 8 0 2 .1 X & N A CU nm anag e d C S A O p t i onal O S H ard e ni ng / P at c h i ng N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y ) M anag e d C S A ( W i nd ow s onl y ) S e c u ri t y E v e nt M anag e m e ntH TTP S D H C P S noop i ng D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on D y nam i c A R P I ns p e c t i on S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s D y nam i c P ort S e c u ri t y I nt ru s i on P re v e nt i on S ol u t i on I P S ou rc e G u ard ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 17
  • 18. S A F E S e c u r ity A r c h ite c tu r e S tr a te g y S ec u r it y D ev ic es S ec u r it y V PN s M o n ito r in g F ir e w a ll E m a il F ilt e r in g A d m i s s i o n Co n t r o l In t r u s i o n Pr e v e n t i o n N et w o r k S o l u t io ns D ev ic es PCI R o u te rs D L P S e rv e rs P o l i c y and D ev i c e T h re a t S w itc h e s Co n t r o l M anag em ent Id e n t i f y H a rd e n M o n ito r Is o l a t e V i s i b i l i ty C o ntro l Co r r e l a t e E n fo rc e C is c o Data W A N I n te r n e t E c o m m - V i r tu al P ar tn e r C am p u s B r an c h V i r tu al C e n te r E d g e E d g e e rc e U s e r S i te s O f f ic e Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion N etw ork F oun da tion P rotection ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 18
  • 19. C o l a b o r a c i ón / S e c u r i t y / S a a S Collaboration N etw or k as th e P l atf or m S e c u rity S aaS ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 19
  • 20. P l ant eami ent o C i sc o ant e l as nu ev as d i námi c as Collaboration U n iq ue C om p etitiv e D if f eren tia tor S e c u rity S aaS Network as the Platform ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 20
  • 21. Al g u no s ej emp l o s …. C i sc o I P S I P S F e at u r e s: I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic D r o p c a l l s t h a t a r e c o m ing fr o m I P a ddr es s es ident ified o n t h e C is c o S ec u r it y A g ent “w a t c h l is t ” D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y A g ent R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y , s ig na t u r e fidel it y a nd ev ent s ev er it y 2 . C SA block s th e a tta ck a n d 1 . A tta ck er tries to brute f orce a dds a tta ck er to its w a tch lis t a tta ck a n in tern a l s erv er 4 . F uture a tta ck s f rom h a ck er a re block ed a t th e I P S dev ice 3 . C SA colla bora tin g w ith C is co I P S is a ble to dyn a m ica lly elev a te th e R is k R a tin g th res h old f or ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l a tta ck s com in g f rom th e a tta ck er 21
  • 22. C i sc o AS A N ew in8 .0 ! T L S si g n ali n g E ncr y p ted S R T P m e d ia E ndp oint E ncr y p ted E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s: • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e ) • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d au t o m at i c ally c lo se d w h e n c all e n d s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 22
  • 23. S ec u r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0 E ns u r e S I P , S C C P , H . 3 2 3 , M G C P r eq u es t s c o nfo r m t o s t a nda r ds P r ev ent ina p p r o p r ia t e S I P M et h o ds fr o m b eing s ent t o C o m m u nic a t io n M a na g er N et w o r k R a t e L im it S I P R eq u es t s C is c o P o l ic y enfo r c em ent o f c a l l s S ec u ri ty C is c o A S A (w h it el is t , b l a c k l is t ,A g ent ( C S A ) w i th IP S W A N c a l l er / c a l l ed p a r t y , S I P UR I ) and V P N D y na m ic p o r t o p ening fo r C is c o a p p l ic a t io ns Cis co A S A w ith S S L In te r n e t E na b l e o nl y “r eg is t er ed V P N p h o nes ” t o m a k e c a l l s E na b l e ins p ec t io n o f enc r y p t ed p h o ne c a l l s R es t r ic t UC s er v ic es (ins t a nt m es s a g ing , a c c es s t o UR L s , m edia t y p es , m es s a g es , ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l m es s a g e l eng t h ) 23
  • 24. C o n c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n ent o r no de C o m u nic a c io nes Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s nec es ida des de s eg u r ida d cisco.com/go/secureuc ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 24
  • 25. Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 25
  • 26. L ig a s d e r e fe r e n c ia : S ec u r e U ni f i ed C o mmu ni c at i o ns h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c S AF E Ar c h i t ec t u r es h t t p : / / w w w . c i sc o . c o m/ g o / saf e C i sc o S ec u r i t y h t t p : / / w w w . c i sc o . c o m/ sec u r i t y ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 26
  • 27. Ag gend n a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 27
  • 28. G i l b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s g v i c ente@ c i s c o . c o m ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 28
  • 29. ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 29