Submit Search
Upload
Cisco Content Security
•
1 like
•
2,024 views
Cisco Canada
Follow
Cisco Content Security presentation for Cisco Connect Canada Tour 2014.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 18
Download now
Download to read offline
Recommended
Advanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada
Cisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
Presentation cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
xKinAnx
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
Recommended
Advanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada
Cisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
Presentation cisco iron port e-mail security solution
Presentation cisco iron port e-mail security solution
xKinAnx
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz Asia Pte Ltd
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
FireEye Portfolio
FireEye Portfolio
Prime Infoserv
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
Ioannis Aligizakis, M.Sc.
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
Anatomy of an Attack
Anatomy of an Attack
Cisco Canada
Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
Websense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
2013 Threat Report
2013 Threat Report
Envision Technology Advisors
Security in the cloud protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
FireEye, Inc.
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Felipe Lamus
More Related Content
What's hot
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Dean Iacovelli
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Netpluz Asia Pte Ltd
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
FireEye Portfolio
FireEye Portfolio
Prime Infoserv
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
FireEye, Inc.
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
Ioannis Aligizakis, M.Sc.
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Valery Yelanin
Anatomy of an Attack
Anatomy of an Attack
Cisco Canada
Top Application Security Trends of 2012
Top Application Security Trends of 2012
DaveEdwards12
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
Websense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
2013 Threat Report
2013 Threat Report
Envision Technology Advisors
Security in the cloud protecting your cloud apps
Security in the cloud protecting your cloud apps
Cenzic
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
FireEye, Inc.
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
What's hot
(20)
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
2016 Trends in Security
2016 Trends in Security
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
FireEye Portfolio
FireEye Portfolio
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
Anatomy of an Attack
Anatomy of an Attack
Top Application Security Trends of 2012
Top Application Security Trends of 2012
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Websense 2013 Threat Report
Websense 2013 Threat Report
2013 Threat Report
2013 Threat Report
Security in the cloud protecting your cloud apps
Security in the cloud protecting your cloud apps
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Similar to Cisco Content Security
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Felipe Lamus
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
Cisco Canada
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
Robb Boyd
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
Lancope, Inc.
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Oscar Romano
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
Next Generation Security
Next Generation Security
Cisco Canada
The Next Generation Security
The Next Generation Security
Cybera Inc.
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Chrysostomos Christofi
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Ravikumar Sathyamurthy
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco do Brasil
Cisco ASA con fire power services
Cisco ASA con fire power services
Felipe Lamus
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
Anatomy Of An Attack
Anatomy Of An Attack
Cisco Canada
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
Cisco Russia
Similar to Cisco Content Security
(20)
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Two for Attack: Web and Email Content Protection
Two for Attack: Web and Email Content Protection
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
Presentación - Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Next Generation Security
Next Generation Security
The Next Generation Security
The Next Generation Security
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
apl5iy2ftxiwofbhsmxj-signature-584e2459f99b5370bda435f09b42cc84cc8c063b8cd454...
Securing your Organization with Microsoft 365
Securing your Organization with Microsoft 365
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco ASA con fire power services
Cisco ASA con fire power services
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Anatomy Of An Attack
Anatomy Of An Attack
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
More from Cisco Canada
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
Cisco Canada
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
Cisco Canada
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco Canada
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 secure dc
Cisco Canada
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco Canada
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Canada
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Canada
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco Canada
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
Cisco Canada
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 compute v final
Cisco Canada
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco Canada
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Canada
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Canada
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Canada
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Canada
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
Cisco Canada
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 DNA assurance
Cisco Canada
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 network-slicing
Cisco Canada
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Canada
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Cisco Canada
More from Cisco Canada
(20)
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Recently uploaded
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Enjoy Anytime
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
XfilesPro
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Hyundai Motor Group
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Recently uploaded
(20)
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Slack Application Development 101 Slides
Slack Application Development 101 Slides
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Cisco Content Security
1.
2.
Cisco Content Security Consulting
Systems Engineer Sept 30, 2014 Web and Email Solutions with Advanced Malware Protection Daniel Thorne
3.
Cisco Confidential 3©
2013-2014 Cisco and/or its affiliates. All rights reserved. Web and Email use is changing Making it more difficult to protect your network Mobile Coffee shop Corporate Home Airport
4.
Cisco Confidential 4©
2013-2014 Cisco and/or its affiliates. All rights reserved. Our Web Security Problems Aren’t Getting Any EasierAn Evolving Threat Landscape Email and Web are the #1 Threat Vector IPv6 Spam Blended Threats Targeted Attacks APTs Advanced Malware Rootkits Worms Trojan Horse
5.
Cisco Confidential 5©
2013-2014 Cisco and/or its affiliates. All rights reserved. Content Security Challenges Data Loss Malware Infections Acceptable Use Violations • Blocking hidden malware • Disarming malicious links • Managing advanced threats • Application visibility • Granular usage control • Consistent policy enforcement • Safeguard vital data • Detecting data breach • Preventing data leakage Visibility • Across users and sites • Proactive reporting (retrospective) • Centralized data collection
6.
Cisco Confidential 6©
2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Content Security with AMP BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Malware Signature File Reputation File Sandboxing File Retrospection Threat Analytics Actionable Reporting Defense across the attack continuum Reputation Usage/App Controls Filtering
7.
Cisco Confidential 7©
2013-2014 Cisco and/or its affiliates. All rights reserved. 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints 600+ engineers, technicians, and researchers 35% worldwide email traffic 13 billion web requests 24x7x365 operations 40+ languages Cisco Content Security with AMP Built on unmatched collective security intelligence 10I000 0II0 00 0III000 II1010011 101 1100001 110 110000III000III0 I00I II0I III0011 0110011 101000 0110 00 I00I III0I III00II 0II00II I0I000 0110 00 180,000+ File Samples per Day FireAMP™ Community Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities Honeypots Sourcefire AEGIS™ Program Private and Public Threat Feeds Dynamic Analysis 1010000II0000III000III0I00IIIIII0000III0 1100001110001III0I00III0IIII00II0II00II101000011000 100III0IIII00II0II00III0I0000II000 Cisco® SIO Sourcefire VRT® (Vulnerability Research Team) Cisco Collective Security Intelligence Content Security Email Endpoints Web Networks IPS Devices WWW
8.
Cisco Confidential 8©
2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco AMP delivers integrated… Retrospective SecurityAdditional Point-in-time Protection Continuous AnalysisFile Reputation & Sandboxing
9.
Cisco Confidential 9©
2013-2014 Cisco and/or its affiliates. All rights reserved. AMP strengthens the first line of detection Reputation Filtering and File Sandboxing Dynamic Analysis Machine Learning Fuzzy Finger-printing Advanced Analytics One-to-One Signature
10.
Cisco Confidential 10©
2013-2014 Cisco and/or its affiliates. All rights reserved. 0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 110 1000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 0100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 AMP’s continuous retrospective security Breadth and Control points: File Fingerprint and Metadata File and Network I/O Process Information Telemetry Stream Continuous feed Web WWW Endpoints NetworkEmail Continuous analysis DevicesIPS
11.
Cisco Confidential 11©
2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Web Security At-a-glance Centralized Management & Reporting Cisco Security Intelligence Operations (SIO) WWW URL Filtering Application Visibility and Control (AVC) Data Loss Prevention (DLP) Threat Monitoring & Analytics Advanced Malware Protection • Spots symptoms of infection based on behavioral anomalies (CWS only) and CNC traffic • Blocks unknown files via reputation and sandboxing • Continues to monitor threat levels after an attack • Contains 50M known sites • Categorizes unknown URLs in real time • Controls mobile, collaborative and web 2.0 applications • Enforces behaviors within web 2.0 applications • Blocks sensitive information • Integrates easily by ICAP with 3rd party vendors Offers actionable insight across threats, data and applications AllowWWW Limited AccessWWW BlockWWW Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min PROTECTION CONTROL
12.
Cisco Confidential 12©
2013-2014 Cisco and/or its affiliates. All rights reserved. Acceptable Use Controls Beyond URL Filtering URL Filtering • Constantly updated URL database covering over 50 million sites worldwide • Real-time dynamic categorization for unknown URLs HTTP:// Application Visibility and Control (AVC) Hundreds of Apps Application Behavior 150,000+ Micro-apps • Control over mobile, collaborative and web 2.0 applications • Assured policy control over which apps can be used by which users and devices • Granular enforcement of behaviors within applications • Visibility of activity across the network +
13.
Cisco Confidential 13©
2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Email Security At-a-glance Centralized Management & Reporting Cisco Security Intelligence Operations (SIO) Defense in Depth Policy Control DLP and EncryptionTargeted Threat Mitigation Advanced Malware Protection • Prevent phishing and blended threats • URL Filtering for advance policies • Blocks unknown files via reputation and sandboxing • Continues to monitor threat levels after an attack • SenderBase Reputation • Anti-Spam and Spoofing • Anti-Virus with Outbreak Filters • Dynamic update engines • Enhanced control over inbound and outbound traffic • Enforces behaviors within web 2.0 applications • Integration with RSA DLP policy engine and lexicons • Encrypt sensitive information Offers actionable insight across threats, data and applications Deliver Quarantine Drop Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min PROTECTION CONTROL Re-write URLs
14.
Cisco Confidential 14©
2013-2014 Cisco and/or its affiliates. All rights reserved. Phishing Attack and URL Defense Controls Integrated email and web security Rewrite Email Contains URL URL Categorization Cisco SIO BLOCKEDwww.playboy.comBLOCKED BLOCKEDwww.proxy.orgBLOCKED Defang Replace Send to Cloud Cisco Security The requested web page has been blocked http://www.threatlink.com Cisco Email and Web Security protects your organization’s network from malicious software. Malware is designed to look like a legitimate email or website which accesses your computer, hides itself in your system, and damages files.
15.
Cisco Confidential 15©
2013-2014 Cisco and/or its affiliates. All rights reserved. DLP and Compliance Built-in Comprehensive DLP Solution with RSA: Accurate, Easy, and Extensible Data Loss Prevention Incidents Policies Accurate, Easy, and Extensible • Fast setup • Low administrative overhead • Comprehensive policy creation and modification • Exceptional accuracy • Direct integration for enterprisewide DLP deployments • Secure delivery with on-box encryption. Data SecurityThreat Protection
16.
Cisco Confidential 16©
2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting Analyze, Troubleshoot and Refine Security Policies Centralized ReportingCentralized Management In-depth Threat Visibility Extensive Forensic Capabilities Centralized Policy Management Delegated Administration Insight Across Threats, Data and Applications Control Consistent Policy Across Offices and for Remote Users Visibility Continuous Visibility Across Different Devices, Services and Network Layers
17.
Cisco Confidential 17©
2013-2014 Cisco and/or its affiliates. All rights reserved. Flexible Licensing and Deployment Options On-Premise or In the Cloud Deployment Options Connection Methods On-premises Cloud Cloud FirewallRouter Roaming Virtual NGFW Roaming Appliance Appliance Redirectors WCCP PAC File Explicit WCCP PAC File Explicit Advanced Malware Protection Integrated on box – Licensed Plug-in Integrated - License
18.
Thank you.
Download now