Users and apps have adopted the cloud… 50% of the workforce roaming 85% of corporate users bypass VPN >50% of business apps will be SaaS 79% of branch offices are shifting to DIA …security must, too. Security controls must shift to the cloud Source: Cisco Secure Internet Gateway Survey, ESG Research Survey, January 2019
Key security challenges Compromised accounts Cloud apps and shadow IT Malware and other threats
OPEN Simple, effective, powerful protection Cisco Umbrella First line of defense against threats on the internet wherever users go Duo Security, Multi-Factor Authentication (MFA) Verify the identify of all users before granting access to corporate applications The best in cloud-delivered security
Secure access to the internet and applications — everywhere Benefits Uncover shadow IT Secure the use of sanctioned cloud applications Protect against phishing and other threats
Get started today Duo Security Multi-Factor Authentication (MFA) 30-day free trial: signup.duo.com Cisco Umbrella Secure Internet Gateway (SIG) 14-day free trial: signup.umbrella.com
Umbrella Secure access to the internet Stealthwatch Cloud Secure public cloud Duo Secure access to any app Cisco’s Cloud Security Portfolio AMP for Endpoints Secure endpoints from threats Cloudlock & Email Security Secure usage of cloud apps
Cisco Umbrella Built into the foundation of the internet Intelligence to see attacks before launched Visibility and protection everywhere Enterprise-wide deployment in minutes Integrations to amplify existing investments Cloud security platform Malware C2 Callbacks Phishing 208.67.222.222
Malware C2 Callbacks Phishing Benefits Block malware before it hits the enterprise Contains malware if already inside Internet access is faster Provision globally in minutes Where does Umbrella fit? HQ Sandbox NGFW Proxy Netflow AV AV BRANCH Router/UTM AV AV Umbrella First line AV ROAMING
It all starts with DNS Umbrella Cisco.com 72.163.4.161 DNS = Domain Name System First step in connecting to the internet Precedes file execution and IP connection Used by all devices Port agnostic
Built into foundation of the internet Umbrella provides: Connection for safe requests Prevention for user and malware-initiated connections Proxy inspection for risky domains Safe request Blocked request
Data Cisco Talos feed of malicious domains, IPs, and URLs Umbrella DNS data — 175B requests per day Security researchers Industry renown researchers Build models that can automatically classify and score domains and IPs Models Dozens of models continuously analyze millions of live events per second Automatically uncover malware, ransomware, and other threats Intelligence to see attacks before launched
Solve the three biggest challenges related to shadow IT Umbrella App Discovery and Blocking Visibility App and risk insight Optimization and blocking
Enterprise-wide coverage in minutes, not months ANY DEVICE ON NETWORK ROAMING / MOBILE On-network coverage With one setting change Integrated with Cisco SD-WAN, Cisco ISR 1K and 4K series, Cisco Meraki MR, and Cisco WLAN controllers Off-network laptop coverage With AnyConnect VPN client integration Or with any VPN using lightweight Umbrella client Or with Umbrella Chromebook client Off-network mobile coverage With Cisco Security Connector BRANCH OFFICES
World’s Easiest and Most Secure MFA Instantly integrates with all apps Users self-enroll in minutes Users authenticate in seconds; no codes to enter
REST APIS WEB SDK RADIUS SAML OIDC Custom VPN RA SSO RRAS Multicloud Email/MSFT On- Prem Start Here Then Expand Integration documents are available at duo.com /docs Duo MFA Supports Your Work Applications
Duo Access for Adaptive MFA Easily enforce contextual policies based on security risks of each application
Compromised Devices Can Access Your Data of vulnerabilities exploited will be ones known by security team for at least one year (through 2021) Source: Gartner, Dale Gardner, 2018 Security Summit 99 % Admin lack time to patch all corporate (managed) devices End users access data with personal (unmanaged) devices End users don’t want admins to take control of personal devices
Verify Trust for Any Device Limit Access to Compliant Devices Identify corporate-owned & BYO devices Unified Device Visibility for laptops, desktops and mobile Supports all platforms Windows, MacOS , iOS , & Android
Why Customers Choose Duo? Ease of use Lower TCO Broadest Coverage Speed to Security “Our clinicians loved the simplicity of Duo Push to their phone or smartwatch to approve prescriptions.” Dr. CT Lin, CMIO “We went from identifying a solution to users authenticating with Duo in less than 1 week . From start to finish, the entire process was incredibly easy.” Mike Fleckenstein, CIO “We have over 300K employees enrolled with Duo accessing hundreds of apps. It has been one of the most successful projects at Ohio State.” Helen Patton, CI S O “We have reduced the number of help desk requests by more than 75% since deploying Duo’s MFA.” Steve Grzybinski , Dir. of Security