un mundo de clouds - fundación dintel · un mundo de clouds: seguridad y adopción cisco + intel...
TRANSCRIPT
Un mundo de Clouds: Seguridad y Adopción Cisco + Intel
Pilar Santamaria
Directora de Desarrollo Neg. y Ciberseguridad,
Región Sur de Europa
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• Tendencias: Movilidad y Datos
• Adopción y Estrategia
• Seguridad para Cloud y Movilidad: Acceso basado en Contexto
• Seguridad desde la Nube: Telemetría Global y Pago por Uso
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
3 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
4 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Próxima década
El número de
servidores (físicos y
virtuales) a nivel
mundial crecerá...
Hoy
0x
1
IDC's Digital Universe Study, June 2011
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
…y el número de archivos que los centros de datos tendrán que manejar crecerá…
5x
7
IDC's Digital Universe Study, June 2011
Próxima Década Hoy
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Próxima Década
IDC's Digital Universe Study, June 2011
El número de
profesionales IT en el
mundo crecerá…
Hoy
5x
1.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Un evento que cambia la forma en la que
pensamos y actuamos. Andy Grove, Fundador de Intel
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
• Tendencias: Movilidad y Datos
• Adopción y Estrategia
• Seguridad para Cloud y Movilidad: Acceso basado en Contexto
• Seguridad desde la Nube: Telemetría Global y Pago por Uso
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Un Mundo de Múltiples Clouds
Public Private
Personas
Múltiples
Dispositivos
Compañías
Administraciones
Públicas
Medio
s
Sanida
d
Gobiern
o
Y
más…
Cisco está conectando personas y compañías a
un Mundo de Múltiples Clouds
Hybrid
Red
Inteligente
para Cloud
Data
Center
Unificado
Aplicaciones
Cloud
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
11
Network Compute
Application
Services Storage
Optimiza la utilización de los recursos
Simplifica la operación – Disminuye TCO
Cisco Confidential 12 © 2011 Cisco and/or its affiliates. All rights reserved. 12
0 5 10 15 20 25 30 35 40 45
% of Respondents
Qué fabricante identificaría como el más
competente para acompañarle en una estrategia
basada en Fabric Computing?
Dell
Egenera
HP
IBM
VMware
Other
Don’t Know/Not
Sure
Cisco
Gartner report: Fabric Computing Poised as a Preferred Infrastructure for
Virtualization and Cloud Computing, February 11, 2011, George J. Weiss and
Andrew Butler Report. ID number: G00210438.
You can read the full Gartner report here: http://www.gartner.com/technology/media-
products/reprints/cisco/210438.html
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Puertos
Nexus
Puertos
MDS
Millones Millones
Gasto I+D
de Cisco
De
acuerdo
a Board de
Patentes
Data Center
&
Virtualization
TOP
Prioridades
La Apuesta de Cisco en Cloud
Q1-FY12
Crecimiento
UCS
USA,
España y
Sur de
Europa…
x86 Blade
Servers
Mundial x86
Blade Server
Market Share
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
INTEL x86 Plataforma de Computación Estándar
2010*
Source: IDC World Wide Server Tracker
Q4’10
RISC/
Mainframes
$30B
RISC/
Mainframes
$15B Intel x86
$19.2B Intel x86
$30.5B AMD
$2.8B
AMD
$330M
$0.1B $4B
2002
Itanium Itanium
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Cloud: El Corporativo de Clouds no Soportadas
Use of Unsupported Applications
(Total, n=511)
Types of Unsupported Applications
(Total, n=287)
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Types of Unsupported Applications (By Country)
E
B
BE
ABCE
BCE
CD
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Use of Unsupported Network Devices
(Total, n=511)
Breach or Loss of Information Due to Unsupported Devices
(Total, n=511)
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• Tendencias: Movilidad y Datos
• Adopción y Estrategia
• Seguridad para Cloud y Movilidad: Acceso basado en Contexto
• Seguridad desde la Nube: Telemetría Global y Pago por Uso
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
20 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
21 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
22 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
23 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
24 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Trusted
W i
F i
Authenticate User
Fingerprint Device
Apply Corporate
Config
Enterprise Apps
Automatic Policies
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
25 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
W i
F i
Trusted
Apply defined policy profiles based on:
Device Type
User
Location
Application
Identity Based Access Control
Mobile Device
Management
802.11n Wi-
Fi
WAN Optimization
Service Assurance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
26 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Trusted
W i
F i
Electronic Medical
Records
Mobile TelePresence
Instant Messenger
Yes No
Access: FULL
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
27 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Is Mr. Allen’s lab work
ready yet?
Not yet but i will let you
know the moment it
arrives
Trusted
W i
F i
Identity Based Access Control
Mobile Device
Management
802.11n Wi-Fi Location
Video
Optimization
Spectrum
Intelligence
Client
Acceleration
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
28 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Untrusted WiFi
Access: Limited
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
29 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Hotspot 2.0
802.11n
Wi-Fi
Web/Email
Security
Identity
Based
Access
Control
VPN
Collaboratio
n/
UC
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
30 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID
Electronic Medical Records
Mobile TelePresence
Instant Messenger
Yes No
Truste
d Wi
F i
Access: FULL
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
www.cisco.com/web/about/doing_business/legal/privacy_compliance/index.html
Trust, Visibility, Transparency
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
424 Libros Facebook marketing
53% Edad 26-45 700,000 Páginas de Negocios Locales en Facebook
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Fuga de Datos
Productividad
Ataques: 1/3 de los usuarios
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Job Sites
Instant Message
P2P
Streaming Media
Human Resource
No File Transfer
All
Business-related Content
Facebook Lunch Hour ? Time
Object
Application
Location
Identity
Compliance
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Cumplimiento de políticas y confidencialidad
Block Malware like
‘Farm Town’ app ad that
redirects users to fake
antivirus software
Allow/Block features like
chat, messaging, video
& audio
Allow/Block thousands
of Facebook Apps
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
• Tendencias: Movilidad y Datos
• Adopción y Estrategia
• Seguridad para Cloud y Movilidad: Acceso basado en Contexto
• Seguridad desde la Nube: Telemetría Global y Pago por Uso
Cisco Confidential 37 © 2011 Cisco and/or its affiliates. All rights reserved.
Source: Cisco IronPort
33%
14% 11%
9%
9%
9%
6% 6%
4%
Eastern Europe
South America
China
Europe
Asia Pacific
Africa
North America
Middle East Nordic Region
Cisco Confidential 38 © 2011 Cisco and/or its affiliates. All rights reserved.
IPS Signatures
300K Devices
700,000+ Endpoints
150M +
Daily Web Requests
20B Global Email Visibility
35%
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Deep Content
Analysis Virtualized
Script Emulation Structural Content
Investigation
Cisco Confidential 40 © 2011 Cisco and/or its affiliates. All rights reserved.
Países
Millones De Usuarios Protegidos
20B Peticiones Web por Día
100% Sin Interrupción de
Servicio durante 8 años
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Protección Cloud en el acceso ubicuo, mediante contexto y desde la Nube
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
DMZ Desktop
The Network
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
DMZ Desktop
The Network
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Mobile Applications
and Data
DMZ Desktop
The Network
Cisco Confidential 46 © 2011 Cisco and/or its affiliates. All rights reserved.
The Network
Cisco Confidential 47 © 2011 Cisco and/or its affiliates. All rights reserved.
The Network
Cisco Confidential 48 © 2011 Cisco and/or its affiliates. All rights reserved.
The Network
Context Aware Enforcement
Appliance Module Cloud
Context Aware Policy
An
yC
on
ne
ct
Vir
tua
l a
nd
Clo
ud
Cisco SecureX Architecture
The Network
Cisco SIO