154x Filetype PPTX File size 0.43 MB Source: www.cisco.com
The Realities of Today’s Threat Landscape Most organizations, large and small, have already been compromised and don’t even know it: 100 percent of business networks analyzed by Cisco have traffic going to websites that host malware. - Cisco 2014 Annual Security Report ©© 22001133 CCiiscosco aanndd//oorr iitts s aaffffiilliiaattees.s. AlAlll ririgghhtts s rreeseservervedd.. CCiiscosco CCoonnffiiddeennttiiaall 22 Continuous Monitoring for Threats After an Attack Cognitive is a cloud-based solution that reduces time to discovery of threats operating inside the network. Identifies Learns from Adapts new threats what it sees over time © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Problems with Traditional Threat Monitoring Rules Based • Dependent on complex manual rule sets • Subject to human limitations Admin and biases Unable to keep up with the latest Time Consuming threats • Takes weeks or months to setup • Requires constant tuning 111010000 110 0111 Highly Complex • Often requires a trained team of experts to manage and Security maintain Team © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Easy Setup Cognitive discovers threats on its own…just turn it on. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Normal… or Not? Cognitive spots symptoms of infection using behavioral anomaly detection algorithms and trust modeling © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
no reviews yet
Please Login to review.