1 / 31

ASA CX

ASA CX. Agenda. How To Sell ASA CX How To Compete Product Roadmap Demo. Session Objectives. Session Objectives. At the end of the session, the participants should be able to: Understand and execute on the go-to-market strategy Identify ASA CX updates in the last 6 months

Download Presentation

ASA CX

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ASA CX

  2. Agenda • How To Sell ASA CX • How To Compete • Product Roadmap • Demo

  3. Session Objectives

  4. Session Objectives At the end of the session, the participants should be able to: • Understand and execute on the go-to-market strategy • Identify ASA CX updates in the last 6 months • Understand high-level roadmap for the next 12 months • Demonstrate key use cases to customers

  5. Reasons Why NGFW’s Sell ASA CX Focus Today

  6. The ASA CX Solution ASA CX “solution” CX capabilities Apps, Users URL Filtering Web Reputation (SIO) Industry’s most widely deployed stateful inspection FW & remote access solution

  7. Model Hardware Comparison ASA CX

  8. Superior Edge Performance

  9. High Availability Hardware Software • Redundant hot-swappable power supplies and hard disks • OIR capable SFP/SFP+ modules • Software Failover • CX fail-open and fail-close support

  10. Cisco Prime Security Manager Simple Standards-based Efficient Cisco ASA CX Context-Aware Threat Aware Classic ASA Firewall

  11. Apps, Users: Business Problems Solved

  12. URL Filtering: Business Problems Solved

  13. URL Filtering Opportunities

  14. Web Reputation: Business Problems Solved

  15. Web Reputation Case Study • Web Reputation protects Cisco’s 100K users from web-based threats • 300 transactions blocked every minute by reputation • Supports Cisco IT’s BYOD strategy: protects all devices irrespective of OS, browser used, or what client anti-virus software is installed • Enabled Cisco IT to reduce malware case load by 43% Cisco-on-Cisco case study on Web Reputation (WSA): http://www.cisco.com/web/about/ciscoitatwork/borderless_networks/ironport_web_security_appliance.html

  16. ASA CX & PRSM Wins

  17. Establish Credibility In Primary Features Apps, Micro-apps and App Behavior Broad… … classification of all traffic 1,000+ apps MicroAppEngine Deep classification of targeted traffic 75,000+ MicroApps App Behavior Control user interaction with the application

  18. Why Cisco Significant Investment and Expertise in AVC Proven, Cisco-owned Solution Updates Released Every Month • 2 years, 2,500 customers • 2 Bntransaction hits every week • For the last 2 years • Same infrastructure and frequency with ASA CX • Focused on customer use cases

  19. Business-Relevant Application Controls Cisco’s app support focuses on customer use cases References: PAN: http://apps.paloaltonetworks.com/applipedia Cisco (Web apps only yet, will be expanded to list all apps): https://securityhub.cisco.com/web/application_visibility_control

  20. Establish Credibility In Primary Features (Cont’d) Users: Covers Wide Breadth of Identity Use Cases Fidelity • AD/LDAP Identity • Non-auth-aware apps • Any platform • AD/LDAP credential • NTLM • Kerberos • TRUSTSEC* Network Identity Secure Group Tags • IP Surrogate • AD Agent • User Authentication • Auth-Aware Apps • Mac, Windows, Linux • AD/LDAP user credential Breadth * ASA 9.0

  21. Establish Credibility In Primary Features (Cont’d) URL: Industry-leading coverage and efficacy 60 languages countries mn URLs customers 200 20 9000 Legal Marketing Finance

  22. SensorBase Threat Operations Center Dynamic Updates

  23. 30B 100M 35% 750,000+ 4 TB GLOBALLY DEPLOYED DEVICES DATA RECEIVED PER DAY WEB REQUESTS EMAIL MESSAGES WORLDWIDE TRAFFIC SensorBase Threat Operations Center Dynamic Updates

  24. 24x7x365 $100M 40+ 80+ 500 SPENT IN DYNAMIC RESEARCH AND DEVELOPMENT OPERATIONS LANGUAGES Ph.D.s, CCIE, CISSPs, MSCEs ENGINEERS, TECHNICIANS AND RESEARCHERS SensorBase Threat Operations Center Dynamic Updates

  25. 6,500+ 3 to 5 20+ 200+ 8M+ IPS SIGNATURES PRODUCED MINUTE UPDATES PUBLICATIONS PRODUCED PARAMETERS TRACKED RULES per DAY SensorBase Threat Operations Center Dynamic Updates

  26. Differentiator: SIO Cisco SIO www.facebook.com GO

  27. SIO: Elements Of Cisco Differentiation Checkpoint and Fortinet don’t have an equivalent offering. Compare this against PAN’s WildFire. Breadth Of Data SIO: One-third of world’s internet traffic goes through SIO WildFire: No statistics available on data collected Proven Track Record SIO: Has been protecting customers for 7+ years WildFire: New, unproven solution launched in late 2011 Proactive SIO: Based on context, provides proactive protection WildFire: Based on file content, reactive, and poor uptake because customers hesitant to upload files to PAN’s cloud

  28. Differentiator: BYOD Cisco has the best remote access & BYOD solutions of all NGFW vendors AnyConnect deployed on 150 mn+ endpoints Unified security client: RA, Posture, NAM, Web Security Identity Services Engine: Enabling BYOD Example use case 1: Block high-bandwidth consuming applications for users connecting through VPN Example use case 2: Provide differentiated access based on device type

  29. Differentiator: User Device Information Policy Report CX Today AnyConnect provides device type information Future plan ISE provides device type information

  30. Differentiator: TrustSec & Security Group Tags John Doe authenticates from a corporate asset. Because desktop AV is not up-to-date, it is assigned SGT = Quarantine, with limited network access until he remediates. Jane Doe authenticates from an iPad ornon corporate asset. She is assigned SGT =BYOD, and is allowed RDP access to Finance apps.

More Related