21612 Cisco EMEAR Security Infographic v5 11-09-17 · Cisco Routers and Switches* AMP Threat Grid...
Transcript of 21612 Cisco EMEAR Security Infographic v5 11-09-17 · Cisco Routers and Switches* AMP Threat Grid...
Security Infographic
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries.
Customer Challenge
Cisco Pull Through
Learn MorevCORE Technology Partners:www.vcoretec.com
Who to contact: [email protected]
Needs to increase control and visibility over who gets on the network to enable
new ways of working.
Desires the ability to enable users mobility requirements
without increasing risk.
Wishes they could detectand contain malicious threats
much faster to minimise impact to the business.
Has to have a segmentation plan that contains threats in the network but that doesn't
impact users and reflects business operations.
Wants to have more threat-centric visibility and control to protect
key internal assets.
The Network Intuitive:- TrustSec / SD Access
- Encrypted Traffic Analytics- Rapid Threat Containment
- Active Threat Analytics- Secure Agile Exchange
- SecureOps
Find and Contain Problems Fast
Simplify Network Segmentation
Stop Threatsat the Edge
Protect Users Wherever they Work
Control who getson to your Network
Cisco Advisory ServicesIncident Response Retainer:
Cisco Incident Response experts work with a client to review and improve their strategy for dealing with a breach when (not if) it happens. The client
then has the Cisco team on call to help deal withemergency situations beyond their normal
capabilities or capacity.
Understand their current network and how aligned
it is to a modernsecurity architecture
Help organisations build a clear plan and business
requirement based roadmap for network segmentation that will
reduce risk by protecting critical data and simplifying
their audit profile while reducing security OpEx.
Improve the efficiency and effectiveness of security monitoring and response on all elements of a customer’s
SOC. Services include designing a new SOC, setting
strategic direction, and implementation of detection
and analytic capabilities.
Assessment of their entire security operation from governance through to
specific controls. Outline of roadmap to improve areas of immaturity to
desired state.
Network Architecture Assessment
Network Segmentation
SOC (Security Operation Center)
Enablement
Cyber Maturity Program
Assessment
Event
www
Cisco IdentityServices Engine
CiscoStealthwatch
*Cisco Integration/Aggregation Services Routers (ISR/ASR) and Catalyst Switches
Meraki MX
Talos
Threat Intel ContextPolicy
Cisco Routersand Switches*
AMPThreat
Grid
Cisco FirePOWERNGFW/Next–
Generation IPS(NGIPS)
Cisco AdvancedMalware Protectionfor Endpoints
Cisco Cloudlock
Cisco Umbrella
Cisco WebSecurity
Cisco EmailSecurity