301x Filetype PPTX File size 0.43 MB Source: www.cisco.com
The Realities of Today’s Threat Landscape
Most organizations, large and small, have
already been compromised and don’t even
know it: 100 percent of business networks
analyzed by Cisco have traffic going to
websites that host malware.
- Cisco 2014 Annual Security Report
©© 22001133 CCiiscosco aanndd//oorr iitts s aaffffiilliiaattees.s. AlAlll ririgghhtts s rreeseservervedd.. CCiiscosco CCoonnffiiddeennttiiaall 22
Continuous Monitoring for Threats After an Attack
Cognitive is a cloud-based solution that reduces time
to discovery of threats operating inside the network.
Identifies Learns from Adapts
new threats what it sees over time
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Problems with Traditional Threat Monitoring
Rules Based
• Dependent on complex
manual rule sets
• Subject to human limitations
Admin and biases
Unable to keep
up with the latest Time Consuming
threats • Takes weeks or months to
setup
• Requires constant tuning
111010000 110 0111
Highly Complex
• Often requires a trained team
of experts to manage and
Security maintain
Team
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Easy Setup
Cognitive discovers threats on its own…just turn it on.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Normal… or Not?
Cognitive spots symptoms of infection using behavioral
anomaly detection algorithms and trust modeling
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
no reviews yet
Please Login to review.