Enviar pesquisa
Carregar
Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
•
0 gostou
•
386 visualizações
Mundo Contact
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 29
Recomendados
Turismo power point
Turismo power point
Kornelia Lohynova
Doppelgangers? Prince Harry et al.
Doppelgangers? Prince Harry et al.
The Free School
8
8
guest7964de
Sw2009 Setup
Sw2009 Setup
guest6901d
Hans Biomed Spine & Orthopedic
Hans Biomed Spine & Orthopedic
JamieatHansUSA
Knowledge Management Australia 2013
Knowledge Management Australia 2013
Ark Group Australia Pty Ltd
Breaking Through the Talent Barrier
Breaking Through the Talent Barrier
Service Strategies
Reinsurance Powerpoint
Reinsurance Powerpoint
rfredmond
Recomendados
Turismo power point
Turismo power point
Kornelia Lohynova
Doppelgangers? Prince Harry et al.
Doppelgangers? Prince Harry et al.
The Free School
8
8
guest7964de
Sw2009 Setup
Sw2009 Setup
guest6901d
Hans Biomed Spine & Orthopedic
Hans Biomed Spine & Orthopedic
JamieatHansUSA
Knowledge Management Australia 2013
Knowledge Management Australia 2013
Ark Group Australia Pty Ltd
Breaking Through the Talent Barrier
Breaking Through the Talent Barrier
Service Strategies
Reinsurance Powerpoint
Reinsurance Powerpoint
rfredmond
About me dia
About me dia
Kent Toh Kian Hong
AwardsCerts
AwardsCerts
Brandon Clement
Puzzle
Puzzle
NataliaZapata14
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Eyespeak Brasil
Green Economy Initiative
Green Economy Initiative
Z3P
Hotel marketing-plan
Hotel marketing-plan
chan Philavong
How do i bring gene xus to my organization
How do i bring gene xus to my organization
GeneXus
2007 20 most_important_megatrends
2007 20 most_important_megatrends
atelier t*h
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Shane Mitchell
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
Vidhyalakshmi K
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
Ben Herz
weINDIE - Intro Pack
weINDIE - Intro Pack
Dey Dos
Degenshein Architects
Degenshein Architects
Fatima Rizvi
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Stanford University
Celebrations game
Celebrations game
claudiamariagiraldo
Active22 - Executive Summary
Active22 - Executive Summary
fsikipa
New doc 20
New doc 20
KingEdge
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
KNOWDLE Consortium Group (A.A.E.I.)
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
ssuser6ace78
Dance For Change
Dance For Change
poeschl
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Mundo Contact
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Mundo Contact
Mais conteúdo relacionado
Semelhante a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
About me dia
About me dia
Kent Toh Kian Hong
AwardsCerts
AwardsCerts
Brandon Clement
Puzzle
Puzzle
NataliaZapata14
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Eyespeak Brasil
Green Economy Initiative
Green Economy Initiative
Z3P
Hotel marketing-plan
Hotel marketing-plan
chan Philavong
How do i bring gene xus to my organization
How do i bring gene xus to my organization
GeneXus
2007 20 most_important_megatrends
2007 20 most_important_megatrends
atelier t*h
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Shane Mitchell
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
Vidhyalakshmi K
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
Ben Herz
weINDIE - Intro Pack
weINDIE - Intro Pack
Dey Dos
Degenshein Architects
Degenshein Architects
Fatima Rizvi
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Stanford University
Celebrations game
Celebrations game
claudiamariagiraldo
Active22 - Executive Summary
Active22 - Executive Summary
fsikipa
New doc 20
New doc 20
KingEdge
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
KNOWDLE Consortium Group (A.A.E.I.)
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
ssuser6ace78
Dance For Change
Dance For Change
poeschl
Semelhante a Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
(20)
About me dia
About me dia
AwardsCerts
AwardsCerts
Puzzle
Puzzle
Eyespeak E Learning Plan
Eyespeak E Learning Plan
Green Economy Initiative
Green Economy Initiative
Hotel marketing-plan
Hotel marketing-plan
How do i bring gene xus to my organization
How do i bring gene xus to my organization
2007 20 most_important_megatrends
2007 20 most_important_megatrends
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
J.D. Stanley - Looking Ahead: Smart Living and Sustainable Energy
Blue ocean strategy - 21.1.2012
Blue ocean strategy - 21.1.2012
The Nintendo Wii Presentation For Canada Professionals 2
The Nintendo Wii Presentation For Canada Professionals 2
weINDIE - Intro Pack
weINDIE - Intro Pack
Degenshein Architects
Degenshein Architects
Traveling spoon final 2013 berkeley
Traveling spoon final 2013 berkeley
Celebrations game
Celebrations game
Active22 - Executive Summary
Active22 - Executive Summary
New doc 20
New doc 20
K4clients.20120412.v.1.gral.resumen
K4clients.20120412.v.1.gral.resumen
Econ204 final presentation-Jialin Li-Duke Kunshan University
Econ204 final presentation-Jialin Li-Duke Kunshan University
Dance For Change
Dance For Change
Mais de Mundo Contact
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Mundo Contact
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Mundo Contact
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
Mundo Contact
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
Mundo Contact
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
Mundo Contact
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
Mundo Contact
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
Mundo Contact
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
Mundo Contact
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
Mundo Contact
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
Mundo Contact
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
Mundo Contact
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
Mundo Contact
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
Mundo Contact
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
Mundo Contact
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
Mundo Contact
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
Mundo Contact
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
Mundo Contact
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
Mundo Contact
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
Mundo Contact
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
Mundo Contact
Mais de Mundo Contact
(20)
Revista Mundo Contact Julio 2016
Revista Mundo Contact Julio 2016
Revista Mundo Contact Junio 2016
Revista Mundo Contact Junio 2016
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Mayo 2016
Revista Mundo Contact Abril 2016
Revista Mundo Contact Abril 2016
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Marzo 2016
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Febrero 2016
Revista Mundo Contact Enero 2016
Revista Mundo Contact Enero 2016
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Diciembre 2015
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Noviembre 2015
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Octubre 2015
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Septiembre 2015
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Agosto 2015
Revista Mundo Contact Julio 2015
Revista Mundo Contact Julio 2015
Revista Mundo Contact Junio 2015
Revista Mundo Contact Junio 2015
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Mayo 2015
Revista Mundo Contact Abril 2015
Revista Mundo Contact Abril 2015
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Marzo 2015
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Febrero 2015
Revista Mundo Contact Enero 2015
Revista Mundo Contact Enero 2015
Revista Mundo Contact Diciembre 2014
Revista Mundo Contact Diciembre 2014
Último
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
Último
(20)
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
Seguridad en Comunicaciones Unificadas: mas allá de la encripción de voz
1.
“S
e g u r id a d e n C o m u n ic a c io n e s U n ific a d a s ”Mas al l á d e l a e n c r i p c i ón d e v o zGilberto VicenteGerente d e D es arrollo d e N eg ociosC is co S y s tem s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 1
2.
©2 0 0
8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 2
3.
A A g
g e en n d d a aAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )Mejores p rác t i c a s p a ra l a p rot ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 3
4.
Amenazas en U
C … u na r eal i d ad ! ! Trojan-I nf e c t e d M P 3 s Botnet g a i ns , W eb H av e P C U s e rs S i ng i ng 2 . 0 p a i ns t h e B lu e s Half a million sites hit December 31, 2007 b y hu g e w eb hac k M a y 9 , 2008 A p ri l 28 , 2008 H ow C r ed i t-C a r d D a ta W ent O u t Hac k er p osts C hilean W i r el es s D oor g ov er nment d ata on 6 M a y 4 , 2007 million M a y 13, 2008 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 4
5.
U C :
U n ent o r no c o mp l ej o p o r p r o t eg er Virtu aliz ation S p eech P res ence M obility P olicy Vid eo C ont ac t W eb Mobile C lient s C ent er C onf er enc ing U CUnifiedC o m m u nic a t io ns U nif ied V id eo/ A u d io IP C all Mes s ag ing C onf er enc ing P h ones P r oc es s ing ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 5
6.
Más c o
mp l ej o , si g u i end o l a mi sma d i námi c ad e p r o t ec c i ón … “T u v imos u n p r ob lema d e seg u r id ad , est o ayu d o a g ener ar conciencia en la imp or t ancia d e at end er el t ema y … … … Seleccionamos y nos ap r ob ar ón u na “h er r amient a d e p r ot ección” ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 6
7.
Amenazas en T
el ef o nía I P A ye r Hoy ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 7
8.
Amenazas en C
o mu ni c ac i o nes U ni f i c ad as• T o l l F r au d – S am e as a P B X • B 2 B U n ifie d C o m m u n i c at i o n s• E av e sd r o p p i n g •S P IT• D o S , W o r m s, an d t h e V i r u s-D e -J o u r •Id e n tity T h e ft• R o g u e D e v ic e In se r t i o n •E x t e r n al D o S • E x te r n al U C S e r v ic e s• R e c o n n ai ssan c e •S e c u r e Mo b ility• Man -i n -t h e -Mi d d le •R e m o te A c c e ss• D H C P S p o o fin g & S t ar v at i o n ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 8
9.
S eg u
r i d ad en C o mu ni c ac i o nes U ni f i c ad as L a m ay oría d e la g ente p iens a q u e u n am biente d e U C s eg u ro es s olo: - P rotección contra f rau d es - Voz encrip tad a H ay m u ch o m as q u e as eg u rar en u n am biente d e C om u nicaciones U nif icad as Conectividad M anej o de D ef ens a contr a s eg u r a identidades am enaz as I nf r as tr u ctu r a P r oces am iento de l l am adas E ndp oints A p l icaciones ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 9
10.
U n r
et o , c o o p er ac i ón ent r e ár eas S ec u r e U ni f i ed C o mmu ni c at i o ns N et O P s S ec O p s E x ec s T el O p s “P a r t i c i p a t i o n o f a c r o s s -s e c t i o n o f r e l e v a n t I T p e r s o n n e l i n t h e p la n n in g p r o c e s s is c r u c ia l to a c o m p r e h e n s iv e a n d a c tio n a b le U C C s t r a t e g i c p l a n . ” G ar t n e r , Mar c h 2 0 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 10
11.
R et o
s d e l a seg u r i d ad i nf o r mát i c a, en r esu mén:Mas allá d e l so lo h e c h o d e d e t e n e rat aq u e s y e n c r i p t ar v o z :I d ent if ic ar t od as las ár eas d e v u lner abilid ad y p r ot eg er c ad a u na d e las c ap asA s u m ir u na p os t u r a ad ec u ad a ant e el r ies g oH ac er m ás c on m enosP os ic ionar la s eg u r id ad c om o u n h abilit ad or d e N eg oc ioC u m p lim ient o c on Mar c os R eg u lat or iosC olabor ac ión ent r e ár eas ( t elef onía, r ed es y s eg u r id ad ) ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 11
12.
Ag gend n
a a A e dA m en a z a s y ret os d e l a seg u ri d a d en l a s C om u n i c a c i on es U n i f i c a d a s ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef eren c i a s A d i c i on a l esP reg u n t a s y R esp u est a s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 12
13.
T o mar
en c u ent a c ad a u na d e l as c ap as d e U C I n f r ast r u c t u r a P u n t o s f i n al e s S eg u r id ad en la T elef onos I P , C lient es d e S W c onec t iv id ad y y ot r os d is p os it iv os t r ans p or t e U nif ied Com m u nications C o n t r o l d e l l am ad as A p l i c ac i o n e s S eg u r id ad en los p r ot oc olos Mens aj er ía, at enc ión a p ar a la ad m inis t r ac ión d e c lient es , et c . llam ad as L a r e d c o m o p lat af o r m a ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 13
14.
S eg u
r i d ad en U C = S eg u r i d ad en r ed + S eg u r i d ad en T el ef o nía S ec u r e U ni f i ed S ec u r e N et w o r k C o mmu ni c at i o ns u r e T el ep h o ny S ec “O r g a n iz a tio n s m u s t fo c u s o n c r e a tin g e ffic ie n c ie s a c r o s s a ll a s p e c ts o f U C C o w n e rs h ip . In c lu d in g : H y g ie n e , C o m p lia n c e , In te g r a tio n , S e c u r ity & Id e n tity a n d M a n a g e m e n t.” - K ey Is s u es fo r Unified C o m m u nic a t io ns & C o l l a b o r a t io n; G a r t ner , 3 / 0 7 ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 14
15.
S eg u
r i d ad en c ad a u na d e l as c ap as I n f r ast r u c t u r e A p p li c at i o n s V L A N s e g m e nt at i on M u l t i -l e v e l ad m i ni s t rat i on L ay e r 2 p rot e c t i on F i re w al l Tol l f rau d p rot e c t i on Internet Intranet I nt ru s i on d e t e c t i on S e c u re m anag e m e nt Q oS and t h re s h ol d s H ard e ne d p l at f orm s S e c u re V P N h . 3 2 3 and S I P s i g nal i ng W i re l e s s s e c u ri t y C all Man ag e m e n t E n d p o in ts Si Si H ard e ne d W i nd ow s O S D i g i t al c e rt i f i c at e s D i g i t al c e rt i f i c at e s A u t h e nt i c at e d p h one s G A R P p rot e c t i on S i g ne d s of t w are i m ag e s TL S p rot e c t e d s i g nal i ng TL S s i g nal i ng S R TP m e d i a e nc ry p t i on I nt e g rat e d C S A C e nt ral i z e d m anag e m e nt ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 15
16.
C i s
c o c o m o s o c i o t e c n o l óg i c o 1 2 3 I nc l u ded a s fea t u r es I nc l u ded in net w o r k ing T h ing s y o u in C is c o UC P r o du c t s p r o du c t s (ex : V L A N ) s h o u l d do a ny w a y (ex : T L S ) (ex : F ir ew a l l ing , I P S )P r e s e n ta tio n _ ID © 2 0 0 86 C i s c o S y s t e m s , I n c . A l l r i g h t s r e s e r v e d . C is c o C o n fid e n tia l 1616
17.
M B eja
o l r a esc P i r n ácg t i R c as k d e S eg u r i d ad en C o mu ni c ac i o nes n is U ni f i c ad as L o w Me d i u m H ig h Easy or Default M o d erate and R eas o nab l e H ard o r N o t Integ ratedS e p arat e V oi c e & D at a V L A N s U C -A w are F i re w al l s U C A w are F W w / TL S P rox yS TP , B P D U G u ard , S m art P ort s E nc ry p t e d C onf i g u rat i on R at e L i m i t i ngB as i c L ay e r 3 A C L ’s ( S t at e l e s s ) TL S & S R TP f or P h one s V P N ( Te l e c om m u t e r)S t and ard O S H ard e ni ng I P S e c & S R TP f or G at e w ay s 8 0 2 .1 X & N A CU nm anag e d C S A O p t i onal O S H ard e ni ng / P at c h i ng N e t w ork A nom al y D e t e c t i onA nt i -V i ru s ( W i nd ow s O nl y ) M anag e d C S A ( W i nd ow s onl y ) S e c u ri t y E v e nt M anag e m e ntH TTP S D H C P S noop i ng D i re c t ory I nt e g rat i on ( S L D A P )S i g ne d F i rm w are & C onf i g u rat i on D y nam i c A R P I ns p e c t i on S c av e ng e r C l as s Q O SP h one S e c u ri t y S e t t i ng s D y nam i c P ort S e c u ri t y I nt ru s i on P re v e nt i on S ol u t i on I P S ou rc e G u ard ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 17
18.
S A F
E S e c u r ity A r c h ite c tu r e S tr a te g y S ec u r it y D ev ic es S ec u r it y V PN s M o n ito r in g F ir e w a ll E m a il F ilt e r in g A d m i s s i o n Co n t r o l In t r u s i o n Pr e v e n t i o n N et w o r k S o l u t io ns D ev ic es PCI R o u te rs D L P S e rv e rs P o l i c y and D ev i c e T h re a t S w itc h e s Co n t r o l M anag em ent Id e n t i f y H a rd e n M o n ito r Is o l a t e V i s i b i l i ty C o ntro l Co r r e l a t e E n fo rc e C is c o Data W A N I n te r n e t E c o m m - V i r tu al P ar tn e r C am p u s B r an c h V i r tu al C e n te r E d g e E d g e e rc e U s e r S i te s O f f ic e Secured Mobility, U n if ied C om m un ica tion s , N etw ork V irtua liz a tion N etw ork F oun da tion P rotection ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 18
19.
C o l
a b o r a c i ón / S e c u r i t y / S a a S Collaboration N etw or k as th e P l atf or m S e c u rity S aaS ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 19
20.
P l ant
eami ent o C i sc o ant e l as nu ev as d i námi c as Collaboration U n iq ue C om p etitiv e D if f eren tia tor S e c u rity S aaS Network as the Platform ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 20
21.
Al g u
no s ej emp l o s …. C i sc o I P S I P S F e at u r e s: I n-l ine ins p ec t io n o f v o ic e a nd v ideo t r a ffic D r o p c a l l s t h a t a r e c o m ing fr o m I P a ddr es s es ident ified o n t h e C is c o S ec u r it y A g ent “w a t c h l is t ” D ev el o p b u ffer o v er fl o w a t t em p t s ig na t u r es b a s ed o n C is c o S ec u r it y A g ent R is k r a t ing a dj u s t ed b a s ed o n r el ev a nc e o f a s s et s , a t t a c k r el ev a nc y , s ig na t u r e fidel it y a nd ev ent s ev er it y 2 . C SA block s th e a tta ck a n d 1 . A tta ck er tries to brute f orce a dds a tta ck er to its w a tch lis t a tta ck a n in tern a l s erv er 4 . F uture a tta ck s f rom h a ck er a re block ed a t th e I P S dev ice 3 . C SA colla bora tin g w ith C is co I P S is a ble to dyn a m ica lly elev a te th e R is k R a tin g th res h old f or ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l a tta ck s com in g f rom th e a tta ck er 21
22.
C i sc
o AS A N ew in8 .0 ! T L S si g n ali n g E ncr y p ted S R T P m e d ia E ndp oint E ncr y p ted E ndp oint A n y C i sc o v o i c e / v i d e o c o m m u n i c at i o n s e n c r y p t e d w i t h S R T P / T L S c an n o w b e i n sp e c t e d b y C i sc o A S A 5 5 0 0 A d ap t i v e S e c u r i t y A p p li an c e s: • Mai n t ai n s i n t e g r i t y an d c o n f i d e n t i ali t y o f c all w h i le e n f o r c i n g se c u r i t y p o li c y t h r o u g h ad v an c e d S I P / S C C P f i r e w all se r v i c e s • T L S si g n ali n g i s t e r m i n at e d an d i n sp e c t e d , t h e n r e -e n c r y p t e d f o r c o n n e c t i o n t o d e st i n at i o n ( le v e r ag i n g i n t e g r at e d h ar d w ar e e n c r y p t i o n se r v i c e s f o r sc alab le p e r f o r m an c e ) • D y n am i c p o r t i s o p e n e d f o r S R T P e n c r y p t e d m e d i a st r e am , an d au t o m at i c ally c lo se d w h e n c all e n d s ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 22
23.
S ec u
r e U C & F i r ew al l S er v i c es AS A 5 5 5 0 v 8 . 0 E ns u r e S I P , S C C P , H . 3 2 3 , M G C P r eq u es t s c o nfo r m t o s t a nda r ds P r ev ent ina p p r o p r ia t e S I P M et h o ds fr o m b eing s ent t o C o m m u nic a t io n M a na g er N et w o r k R a t e L im it S I P R eq u es t s C is c o P o l ic y enfo r c em ent o f c a l l s S ec u ri ty C is c o A S A (w h it el is t , b l a c k l is t ,A g ent ( C S A ) w i th IP S W A N c a l l er / c a l l ed p a r t y , S I P UR I ) and V P N D y na m ic p o r t o p ening fo r C is c o a p p l ic a t io ns Cis co A S A w ith S S L In te r n e t E na b l e o nl y “r eg is t er ed V P N p h o nes ” t o m a k e c a l l s E na b l e ins p ec t io n o f enc r y p t ed p h o ne c a l l s R es t r ic t UC s er v ic es (ins t a nt m es s a g ing , a c c es s t o UR L s , m edia t y p es , m es s a g es , ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l m es s a g e l eng t h ) 23
24.
C o n
c lu s io n e s G e n e r a le s :L a s eg u r ida d N O p u ede v er s e c o m o u n t em a s ec u nda r ioL o s p r o du c t o s p u nt u a l es no s o n s u fic ient es p a r a a da p t a r s e a u n ent o r no de C o m u nic a c io nes Unific a da sS eg u r ida d en c a p a s es fu nda m ent a lC is c o c u ent a c o n l a s o l u c ión c o m p l et a y a dec u a da a s u s nec es ida des de s eg u r ida d cisco.com/go/secureuc ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 24
25.
Ag gend n
a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 25
26.
L ig a
s d e r e fe r e n c ia : S ec u r e U ni f i ed C o mmu ni c at i o ns h t t p : / / w w w . c i sc o . c o m/ g o / sec u r eu c S AF E Ar c h i t ec t u r es h t t p : / / w w w . c i sc o . c o m/ g o / saf e C i sc o S ec u r i t y h t t p : / / w w w . c i sc o . c o m/ sec u r i t y ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 26
27.
Ag gend n
a a A e dAmenazas y r et o s d e l a seg u r i d ad en l asC o mu ni c ac i o nes U ni f i c ad as ( U C )M ej o r es p r ác t i c as p ar a l a p r o t ec c i ón d e U CR ef er enc i as Ad i c i o nal esP r eg u nt as y R esp u est as ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 27
28.
G i l
b erto V i c ente G erente d e D es arro l l o d e N eg o c i o s g v i c ente@ c i s c o . c o m ©2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 28
29.
©2 0 0
8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d . C is c o C o n fid e n tia l 29