Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free...

38
Sam Rastogi, Product Marketing, Security Michal Brenner, Product Marketing, Service Provider Video December 9, 2015 Cisco End-to-end Video Security Solutions Video security everywhere

Transcript of Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free...

Page 1: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

Sam Rastogi, Product Marketing, Security Michal Brenner, Product Marketing, Service Provider Video December 9, 2015

Cisco End-to-end Video Security Solutions Video security everywhere

Page 2: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

2 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Consumer demand for content is evolving

Consumers are watching anytime, anywhere, on any device

Multi-device streaming Binge Watching Online News Access

Ad-free viewing options Faster content creation New device options On-demand television

Page 3: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

3 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

To meet that demand, you’re transforming video delivery to be

Flexible •  Offer multiple pricing tiers

and subscription packages •  Support multiple devices and

delivery methods

Responsive •  Deliver content on demand •  Implement new services and

delivery methods quickly

Efficient •  Support business proposition

to customer •  Price services competitively •  Simplify operations

Page 4: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

4 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

With the latest innovations to monetize your content

UHD content OTT

distribution

IP-based delivery

Multi-device viewing

TV apps

Personalized services

Home networking

Cloud technologies

Smart devices

Mobile

Page 5: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

5 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Video Consumer

Not long ago, content delivery was fairly straightforward

Service Provider

Take 7

Content Creators

Video Consumer

Service Provider

Take 7

Content Creators

Creation Distribution Consumption

Page 6: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

6 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Today, delivery methods are much more open

Creation Distribution Consumption

Regional Head End

Service Provider / Head End

Content Creators

Take 7

Video Consumer

3rd Party Sources

www…

www…

www…

Key: IP www… Set top box (STB)

Employees & endpoints

Content Delivery Network (CDN)

Video content data centers

Corporate data centers Cable Satellite Telecommunications

Page 7: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

7 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Key: IP www… Set top box (STB)

Employees & endpoints

Content Delivery Network (CDN)

Video content data centers

Corporate data centers Cable Satellite Telecommunications

Creation Distribution Consumption

www…

Regional Head End

www…

Service Provider / Head End

Content Creators

Take 7

3rd Party Sources

Video Consumer

www…

the cleanup cost from the data breaches it's suffered to cost at least $171 million. Sony said the data breach costs will affect revenues for its fiscal 2011 year, which ends on March 31, 2012.According to a statement released by Sony's investor relations group, "based on information currently available to Sony, our currently known costs associated with the unauthorized network access are estimated to be approximately 14 billion yen," or about $171 million. But those costs could go much higher, the company warned investors during a call on Monday. "So far, we have not received any confirmed reports of customer identity theft issues, nor confirmed any misuse of credit cards from the cyber attack. Those are key variables, and if that changes, the costs could change," said Sony, as reported by Joystiq, which saw a transcript of the call. Beginning in April, Sony suffered multiple data breaches involving its PlayStation Network (PSN), Qriocity, Sony Online Entertainment, and other sites. On Sunday, new revelations surfaced that Sony apparently also suffered another data breach earlier this month, after hackers cracked Sony BMG's website in Greece. That would make it the seventh data breach suffered by Sony since April 2011.In this breach, which occurred on May 5, attackers obtained information about more than 8,000 website users, according to The Hackers News, which received a copy of the website's SQL database from "b4d_vipera," the hacker who took responsibility for the breach. The attacker also leaked a sample of the purloined database--containing 450 records--to Pastebin. It contains usernames, passwords for the Sony website, and email addresses. Security experts recommend that anyone with a Sony BMG account in Greece immediately change their Sony password, and any other uses of the same password online. The attacker said he exploited the Greek Sony website using a SQL injection attack against the site, which was running Internet Information Server (IIS) 6.0 on Windows 2003. SQL injection attacks, which exploit website databases that haven't been patched against known vulnerabilities, are much favored by attackers, in part for their simplicity. "It's not something that requires a particularly skillful attacker, but simply the diligence to comb through Sony website after website until a security flaw is found," said Chester Wisniewski, a senior security advisor at Sophos Canada, in a blog post. In the wake of numerous data breaches involving more than 100 million user accounts, Sony is still attempting to get its systems fully secured and back online. Some of its Web properties, such as PlayStation Store, remain offline. On Wednesday, Sony also deactivated online password resets for PSN and Qriocity, saying its password system couldn't handle the load. But rumors that the password reset site had been compromised by attackers weren't true, said Patrick Seybold, Sony's senior director of corporate communications and social media, in a blog post. "Contrary to some reports, there was no hack involved. In the process of resetting of passwords there was a URL exploit that we have subsequently fixed.“ While Sony works to get its online password-reset process reestablished, Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said. Seybold said that PSN users can reset their passwords via their PlayStation 3. "Otherwise, they can continue to do so via the website as soon as we bring that site back up," he said. MN users can reset their passwords via their PlayStation

Sony Data Breach Cleanup

To Cost $171 Million

Netflix's 'Breaking Bad' First Episode

Becomes First 4K Leak: Pirates Feast On 18GB Torrent

Maryland station the

victim of cyber attack

TV5Monde in chaos as data breach costs roll into the millions

Attackers are taking advantage of the open delivery and new attack vectors

20 Million Watched World Cup on Illegal Streams

“Game of Thrones” the most pirated TV show on the air

Trend Sources: 2014 Verizon Data Breach Investigations Report, Juniper Research, Creative Future

Microsoft’s Xbox Live hit

with possible data breach

Growing piracy concern

24% of worldwide data traffic is related to pirate sites

Significant financial loss

$2.1 trillion is the expected loss due to data breaches by 2019

Stealthier data threats

60% of data is stolen in hours

54% of breaches remain undiscovered for months

Page 8: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

8 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Key: IP www… Set top box (STB)

Employees & endpoints

Content Delivery Network (CDN)

Video content data centers

Corporate data centers Cable Satellite Telecommunications

Creation Distribution Consumption Creation Distribution Consumption

Regional Head End

Service Provider / Head End

Content Creators

3rd Party Sources

Video Consumer

www…

www…

www…

Take 7

Stealing or leaking video content

Hacking networks for content

Stealing user credentials to gain access to content

Accessing content by hacking corporate data centers or compromising broadcast networks

Pirating distributed content

Offering full-service streaming networks, reselling your content

Sharing decryption keys and hacking apps to give illegal access to content

2-5693-45-66

00I I000III00II I0II00II I0I000

0I I000I0II00II I0I000

00I I000II00II I00I I000

Page 9: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

9 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Key: IP www… Set top box (STB)

Employees & endpoints

Content Delivery Network (CDN)

Video content data centers

Corporate data centers Cable Satellite Telecommunications

Creation Distribution Consumption Creation Distribution Consumption

Regional Head End

Service Provider / Head End

Content Creators

3rd Party Sources

Video Consumer

www…

www…

www…

Take 7

Impacting customer experience

Obstructing service performance Altering content or disrupting the service

Targeting specific businesses with Denial of Service (DoS) from the end device

Inhibiting quality and performance of content delivery

00I I000III00II I0II00II I0

Disrupting service with Denial of Service (DoS) or infrastructure attacks

Modifying content or taking control of content during live broadcasts

00I I000III00II I0II00II I0

00I I000III00II I0II00II I0

Page 10: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

10 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Key: IP www… Set top box (STB)

Employees & endpoints

Content Delivery Network (CDN)

Video content data centers

Corporate data centers Cable Satellite Telecommunications

Creation Distribution Consumption Creation Distribution Consumption

Regional Head End

Service Provider / Head End

Content Creators

3rd Party Sources

Video Consumer

www…

www…

www…

Take 7

Compromising your business and stealing confidential data

Hacking into your infrastructure

Stealing billing data and customer information, such as credit card numbers and personal identification data

Altering security settings and breaking the protection of your video services or other business functions

00I I000III00II I0II00II I0 2-5693-45-66

Page 11: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

11 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Protecting your business

What’s needed is a comprehensive approach to security

Protecting your service

I000III00II I0II00II I0

www…

Protecting your content Take 7

Page 12: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

12 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

That adapts to a changing threat landscape

Protecting your business

Protecting your service

Protecting your content

Page 13: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

13 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

And supports the video delivery system you have worked hard to develop

Efficient Flexible Responsive

Protecting your business

Protecting your service

Protecting your content

Page 14: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

14 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Protecting your business

Protecting your service

Protecting your content

Only Cisco delivers that security

Video Service

Protection Anti-Piracy Services

Data Center Security

Page 15: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

15 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Video Service Protection

Anti-Piracy Services

Data Center Security

Our job is to ensure that you can focus on your business

We provide the best security components…

#1 in video security solutions

#1 in data center security

solutions

…that work together to provide protection across your business

Multi-layered, comprehensive

security

Enhanced protection with

common toolset

Cisco is a true partner, offering both security technologies and services to create a solution that addresses your business needs

Page 16: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

16 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Video Service Protection

Page 17: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

17 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

I00I I000III00II I0II00II I0I000

I00I I000III00II I0II00II I0I000

Cisco provides video service protection to help you monetize on industry opportunities

VGE OTT Security for ‘Over the Top’ delivery to any screen

VGE Connected Security for 2-way Cable/Telco networks

VGE Hybrid Security for hybrid 1 / 1.5 / 2-way satellite and IP networks

Enable premium content delivery and multiscreen experiences with a powerful security solution built on CA and multi-DRM

VGE

VGE

VideoGuard Everywhere (VGE)

I00I I000III00II I0II00II I0I000

I00I I000III00II I0II00II I0I000

Page 18: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

18 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Maximize protection with a proven and robust solution

Used today in 1 of 3 pay TV homes worldwide

460 software/hardware security engineers

Studio-approved security

Protecting over $100 billion in customer revenue

300M active client devices >4.5M active mobile devices in a single OTT deployment

8 years of proven global DCAS deployments

Longest unhacked record, over 10 years

Page 19: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

19 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Increase flexibility with a standards-based, scalable solution

Compatible with most popular managed and unmanaged devices

Supports multiple DRM deployments to reach every device while enabling consistent UX

Supports industry standard encryption, content formats, cloud technologies

Supports multiple application development platforms and language

Security support for advanced features and business policies

Page 20: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

20 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Reduce your TCO and time to market

Simplify operations

Reduce the complexity of securing your content

Streamline security management

Configure the solution faster

Deploy faster

Go to market quickly

Incorporate the latest technologies

Reduce in-house development

Lower operating costs

Minimize upfront costs

Pay up to 80% less per STB client

Realize savings of 25% for OTT deployments

Page 21: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

21 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Anti-piracy Services

21 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 22: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

22 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco helps protect video content after distribution and eliminate piracy

Global team of 40+ researchers

6 continents and 20+ languages

20+ years experience

Streaming Piracy Prevention (SPP)

Operational Security Services (OpSec)

VideoGuard Everywhere 00I I000III00II I0II00II I0

SPP

Ensure that others don’t profit off of your content illegally

OpSec

2-5693-45-66 0I I000I0II00I00I000 00I0II00II I00II000I I000

Page 23: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

23 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Verify the pirate’s ID by sending a unique

command to the suspicious source

Identify piracy source with advanced fingerprint

techniques

Eliminate the piracy by deactivating subscriber access to content

Locate illegal streams automatically with StreamLocator or with OpSec

Terminate piracy automatically upon detection

Locate Identify

Eliminate Verify

LIVE Cycle

Page 24: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

24 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco security experts proactively address potential piracy

Scour forums for leads on pirate live streaming activity

Anticipate what pirates will do next and adjust security accordingly

Provide feedback to help improve anti-streaming technologies

Develop techniques to address credential sharing piracy

Picture

Page 25: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

25 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Data Center Security

Page 26: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

26 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco solutions address advanced threats

DURING Detect Block

Defend

AFTER Scope

Contain Remediate

BEFORE Discover Enforce Harden

NGFW

Policy & Access

AnyConnect NGIPS

Web/Email Security

Advanced Malware Protection

Threat Grid (Sandboxing)

Lancope StealthWatch

Talos

Security Services

Page 27: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

27 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Next-Generation Firewall (NGFW) Web Security

Cisco provides protection across video data centers and corporate IT

Lancope StealthWatch

AnyConnect

Policy & Access

Advanced Malware Protection

Next-Generation Intrusion Prevention System (NGIPS)

Threat Grid (Sandboxing)

Email Security

2-5693-45-66

Protect video content, infrastructure, and customer information

Data Center Security

Threat Grid (Sandboxing) AnyConnect Talos

Talos

Corporate network Video head end Web Security Email Security

NGFW Policy & Access NGIPS AMP

Lancope StealthWatch

Page 28: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

28 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Gain enhanced visibility and control over your entire network

Cisco solutions: Next-Gen Firewall: ASA with Firepower Services

Next-Gen Intrusion Prevention System Policy & Access Lancope StealthWatch

See and control all video and corporate traffic

Eliminate unauthorized access of video content and customer data

Quickly and easily segment users and grant access based on category or role

Discover hidden threats or potential video content or data thefts

Page 29: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

29 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco solutions: Email Security Web Security

Protect the pathways in and out of your network

AnyConnect

Block access to potentially malicious web pages, page objects, and emails

Prevent specific file types or information from being sent via email

Analyze and block traffic crossing any port into your network

Protect video content and data while working with remote branches, mobile workers, and 3rd parties

Page 30: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

30 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco solutions:

Identify the latest and most advanced attacks

Next-Gen Intrusion Prevention System

Advanced Malware Protection (AMP)

Threat Grid (Sandboxing)

Protect against hidden malware or targeted attacks that introduce latency and service issues

Address new potential attacks and discover malware quickly by analyzing files in real time

Ensure that your security is always up to date against the latest threats

Lancope StealthWatch Talos

Page 31: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

31 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco solutions:

Remediate quickly after an attack

AMP Retrospective Security Lancope StealthWatch

Discover where a file entered the network to address that vulnerability

Determine how long the file has been in your network to adjust remediation

Trace the file’s location and actions over time to address all affected areas

Determine how to remove the file to prevent continued attack

Page 32: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

32 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Bringing it all together

Page 33: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

33 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco provides end-to-end video security

Video Service Protection

Anti-Piracy Services

Data Center Security

Page 34: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

34 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Improve protection

Simplify security

Cisco offers a variety of security services

Advisory Integration

Managed Services

•  Research & Assessments •  Architecture & Design •  Program Strategy

•  Integration •  Migration Optimization

•  Product Support •  Hosted Security •  Managed Security

Leverage extensive security experience

Evaluate security effectiveness with vulnerability assessments

Proactively address the latest evolving threats

Reduce the complexity of threat defense

Automatically keep solutions up to date

Minimize the impact of security on your network performance

Page 35: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

35 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

We are positioned to meet today’s needs

Deep experience 20+ years experience as a trusted security partner

Global scale and reach 380 sites in 165+ countries

Great Partners Nearly 70,000 channel partners

Experts in IP 90% of Internet traffic goes over Cisco infrastructure

Page 36: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

36 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

And are already addressing future security challenges Updating security solutions with learnings from anti-piracy teams

Incorporating security measures for practices not yet widely adopted

Integrating solutions for more comprehensive, end-to-end security

Page 37: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,

37 © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Get started today with Cisco

Identify security gaps in your business 1

Learn more about our video and data center security solutions 2

Work with a Cisco engineer to plan a deployment 3

Page 38: Cisco End-to-end Video Security Solutions · New device options Faster content creation Ad-free viewing options On-demand television ... 2014 Verizon Data Breach Investigations Report,