21612 Cisco EMEAR Security Infographic v5 11-09-17 · Cisco Routers and Switches* AMP Threat Grid...

1
Security Infographic © 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. Customer Challenge Cisco Pull Through Learn More vCORE Technology Partners: www.vcoretec.com Who to contact: [email protected] Needs to increase control and visibility over who gets on the network to enable new ways of working. Desires the ability to enable users mobility requirements without increasing risk. Wishes they could detect and contain malicious threats much faster to minimise impact to the business. Has to have a segmentation plan that contains threats in the network but that doesn't impact users and reflects business operations. Wants to have more threat-centric visibility and control to protect key internal assets. The Network Intuitive: - TrustSec / SD Access - Encrypted Traffic Analytics - Rapid Threat Containment - Active Threat Analytics - Secure Agile Exchange - SecureOps Find and Contain Problems Fast Simplify Network Segmentation Stop Threats at the Edge Protect Users Wherever they Work Control who gets on to your Network Cisco Advisory Services Incident Response Retainer: Cisco Incident Response experts work with a client to review and improve their strategy for dealing with a breach when (not if) it happens. The client then has the Cisco team on call to help deal with emergency situations beyond their normal capabilities or capacity. Understand their current network and how aligned it is to a modern security architecture Help organisations build a clear plan and business requirement based roadmap for network segmentation that will reduce risk by protecting critical data and simplifying their audit profile while reducing security OpEx. Improve the efficiency and effectiveness of security monitoring and response on all elements of a customer’s SOC. Services include designing a new SOC, setting strategic direction, and implementation of detection and analytic capabilities. Assessment of their entire security operation from governance through to specific controls. Outline of roadmap to improve areas of immaturity to desired state. Network Architecture Assessment Network Segmentation SOC (Security Operation Center) Enablement Cyber Maturity Program Assessment Event www Cisco Identity Services Engine Cisco Stealthwatch *Cisco Integration/Aggregation Services Routers (ISR/ASR) and Catalyst Switches Meraki MX Talos Threat Intel Context Policy Cisco Routers and Switches* AMP Threat Grid Cisco FirePOWER NGFW/Next– Generation IPS (NGIPS) Cisco Advanced Malware Protection for Endpoints Cisco Cloudlock Cisco Umbrella Cisco Web Security Cisco Email Security

Transcript of 21612 Cisco EMEAR Security Infographic v5 11-09-17 · Cisco Routers and Switches* AMP Threat Grid...

Page 1: 21612 Cisco EMEAR Security Infographic v5 11-09-17 · Cisco Routers and Switches* AMP Threat Grid Cisco FirePOWER NGFW/Next– Generation IPS (NGIPS) Cisco Advanced Malware Protection

Security Infographic

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.

Customer Challenge

Cisco Pull Through

Learn MorevCORE Technology Partners:www.vcoretec.com

Who to contact: [email protected]

Needs to increase control and visibility over who gets on the network to enable

new ways of working.

Desires the ability to enable users mobility requirements

without increasing risk.

Wishes they could detectand contain malicious threats

much faster to minimise impact to the business.

Has to have a segmentation plan that contains threats in the network but that doesn't

impact users and reflects business operations.

Wants to have more threat-centric visibility and control to protect

key internal assets.

The Network Intuitive:- TrustSec / SD Access

- Encrypted Traffic Analytics- Rapid Threat Containment

- Active Threat Analytics- Secure Agile Exchange

- SecureOps

Find and Contain Problems Fast

Simplify Network Segmentation

Stop Threatsat the Edge

Protect Users Wherever they Work

Control who getson to your Network

Cisco Advisory ServicesIncident Response Retainer:

Cisco Incident Response experts work with a client to review and improve their strategy for dealing with a breach when (not if) it happens. The client

then has the Cisco team on call to help deal withemergency situations beyond their normal

capabilities or capacity.

Understand their current network and how aligned

it is to a modernsecurity architecture

Help organisations build a clear plan and business

requirement based roadmap for network segmentation that will

reduce risk by protecting critical data and simplifying

their audit profile while reducing security OpEx.

Improve the efficiency and effectiveness of security monitoring and response on all elements of a customer’s

SOC. Services include designing a new SOC, setting

strategic direction, and implementation of detection

and analytic capabilities.

Assessment of their entire security operation from governance through to

specific controls. Outline of roadmap to improve areas of immaturity to

desired state.

Network Architecture Assessment

Network Segmentation

SOC (Security Operation Center)

Enablement

Cyber Maturity Program

Assessment

Event

www

Cisco IdentityServices Engine

CiscoStealthwatch

*Cisco Integration/Aggregation Services Routers (ISR/ASR) and Catalyst Switches

Meraki MX

Talos

Threat Intel ContextPolicy

Cisco Routersand Switches*

AMPThreat

Grid

Cisco FirePOWERNGFW/Next–

Generation IPS(NGIPS)

Cisco AdvancedMalware Protectionfor Endpoints

Cisco Cloudlock

Cisco Umbrella

Cisco WebSecurity

Cisco EmailSecurity