Fire Jumper Academy Essentials Assessments and POVs
Fire Jumper Academy Essentials Assessments and POVs
Fire Jumper Academy Essentials Assessments and POVs
Training
Training &
& Incentives
Incentives &
& POV
POV Partner
Partner
Enablement
Enablement Promotions
Promotions Delivery
Delivery Profitability
Profitability
Find
Find Presentation
Presentation Proof
Proof of
of
Opportunity
Opportunity &
& Demo
Demo Value
Value
• Software Download
• Software Installation
• Bootstrap
• Licensing
• Initial Configuration
• Customer Report Generation
• Device Sanitization
Find
Find Presentation
Presentation Proof
Proof of
of
Opportunity
Opportunity &
& Demo
Demo Value
Value
Firewall
• Place FTD on span or tap port
• Configure Policies:
• System
span / tap FTD • Health
Switch • Intrusion
• File
• Access Control
• Perform POV
FMC • Generate Risk Reports
Users Active • Sanitize (FTD, FMC)
VMware Risk
Directory
ESXi Reports
LAN
© 2018 Cisco and/or its affiliates. All rights reserved. 10
On-Site Sensor and dCloud FMC
• Schedule dCloud Session
dCloud FMC • Download and install FMC VM
• Add Licenses to FMC
Risk
Reports • Update FTD Software
TCP 8443
Firewall
• Place FTD on span or tap port
• Internet Connection TCP 8443
• Configure Policies
span / tap
Switch
FTD • System
• Health
• Intrusion
• File
• Access Control
Optional: An Active
Directory 1-to-1 NAT
• Perform POV
configuration is required
Users Active for additional user and • Create Risk Reports
Directory hostname context sent to
dCloud. This is not a • Sanitize (FTD) FMC
LAN requirement for the POV.
© 2018 Cisco and/or its affiliates. All rights reserved. 11
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Why Do a Proof of Value?
• Benefits
• Can show customer how quickly we can scope, contain, and remediate a
threat.
• Can show how easy it is to deploy and maintain
• We usually surface at least one unknown infection previously
established in their environment and save them from an incident
•Risks
• Improper tuning and deployment can create performance headache
• Concurrent PoV with another vendor on the same machine can create a
resource conflict
Visibility
Assessment
Cloud Collector
Accounting Segment
IPFIX
Anti-Spam
Anti-Virus
Outbreak Filters
Incoming email Drop Rewrite Quarantine © 2015 Cisco and/or its affiliates. All rights reserved. 24
What is the O365 Threat Analyzer Tool
• Free to use non-CES subscription tool that reports on threats
• Zero impact on customer environment
• Leverages full scanning capabilities of Cisco Email Security
• Reports on SPAM, Graymail and Malware
√
threats.
• Account/License Request
• Setup customer network/Identity
• Modify DNS
• Create Policies
• Customer Report Generation
• License Conversion
• Close
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
What PPoV can do for you
With this tool, you can easily:
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential 32
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Cloudlock addresses organizations’ most critical
cloud security use cases
Discover and Control
Privacy and
Insider Threats Shadow IT
Compliance Violations
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
CASB – API Access (cloud to cloud)
Unmanaged
Users Public APIs
Unmanaged
Devices
Unmanaged
Network
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Often, Cisco Cloudlock sells itself
without a Proof of Value (POV)
Many customers are convinced by:
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
https://get.cloudlock.com/product-security-assessment/
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Stealthwatch Cloud monitors on-premises
and cloud network traffic
Stealthwatch Cloud
Private network
Public cloud monitoring
monitoring
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Using modeling to detect security events
Dynamic Entity Modeling
Collect Input Perform Analysis Draw Conclusions
System Logs
What ports/protocols does the
Group
device continually access?
Security Events
Dynami
c Entity What connections does it
Passive DNS Consistency
continually make?
Modelin
External Intel g
Does it communicate internally only?
Rules
What countries does it talk to?
Vulnerability Scans
How much data does the device
Forecast
Config Changes normally send/receive?
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
https://
www.cisco.com/c/en/us/products/security/stealthwatch/stealthwatch-cloud-free-offer.html
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
https://salesconnect.cisco.com/open.html?c=120edf8b-c962-4c4c-91fc-09f7841e175d