|
Emmanuel Tychon of Cisco Industrial IoT Presented at Tech Field Day Extra at Cisco LIve US 2024 |
This Presentation date is June 4, 2024 at 15:45-16:15.
Presenters: Anand Lakhotia, Mark Townsley, Vinny Parla
Delegate Panel: Chris Reed, Ed Weadon, Jody Lemoine, Martin Duggan, Matyáš Prokop, Teren Bryson
Follow on Twitter using the following hashtags or usernames: #CiscoLive, #CiscoLive24, #TFDx
Transforming the Next-Gen Firewall with Cisco Meraki Secure SD-WAN
Watch on YouTube
Watch on Vimeo
Join Cisco for an exclusive unveiling where the Meraki cloud’s capabilities meet the latest next-gen MX firewall advancements. Take a glimpse behind the scenes as Cisco reveals the industry’s first cloud-delivered orchestration behind the MX threat detection engine. Get an exclusive look at the Next-Gen MX operating system, featuring a security-centric architecture powered by Cisco’s VPP technology, offering unprecedented levels of scale and performance. The session concludes with insights into the seamless integration with Cisco XDR, designed to provide unparalleled threat visibility and response across your Meraki MX network landscape.
Personnel: Chris Pacheco, Chris Weber
Cisco Secure Connect and Client ZTNA with New SSE Engine powered by Cisco Secure Access
Watch on YouTube
Watch on Vimeo
In this session, learn how Cisco Zero Trust Network Architecture integrates with the larger Cisco SASE platform. Cisco Secure Client provides network access with zero trust principles, including posture checking and user authentication without the need for a client. Cisco’s Secure Client uses a streaming ecosystem without IP packet forwarding to enhance security though obfuscation of internal network details. The client also has built-in microsegmentation for application-level policy enforcement.
Secure Client also uses the new MASQUE protocol for proxying QUIC connections to enhance setup speed, resiliency, and provide granular application controls. It is supported on Apple operating systems, Samsung devices, and Windows with device specific enrollment and traffic interception mechanisms. Certificates are stored in the device’s secure enclave or TPM to bind them to that device and secure them from theft.
Existing VPN and clienteles access methods remain available alongside the Cisco Secure Client. The ZTNA proxy runs in the cloud without an on-premises requirement.
Personnel: Mark Townsley, Vinny Parla