SlideShare a Scribd company logo
Cisco Content Security
Cisco Content Security
Consulting Systems Engineer
Sept 30, 2014
Web and Email Solutions with Advanced Malware Protection
Daniel Thorne
Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Web and Email use is changing
Making it more difficult to protect your network
Mobile Coffee shop Corporate Home Airport
Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Our Web Security Problems Aren’t Getting Any EasierAn Evolving Threat Landscape
Email and Web are the #1 Threat Vector
IPv6 Spam
Blended Threats
Targeted Attacks
APTs
Advanced Malware
Rootkits Worms
Trojan Horse
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Content Security Challenges
Data Loss
Malware Infections
Acceptable Use Violations
• Blocking hidden malware
• Disarming malicious links
• Managing advanced threats
• Application visibility
• Granular usage control
• Consistent policy enforcement
• Safeguard vital data
• Detecting data breach
• Preventing data leakage
Visibility
• Across users and sites
• Proactive reporting (retrospective)
• Centralized data collection
Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Content Security with AMP
BEFORE
Discover
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Malware Signature
File Reputation
File Sandboxing
File Retrospection
Threat Analytics
Actionable Reporting
Defense across the attack continuum
Reputation
Usage/App Controls
Filtering
Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved.
1.6 million
global sensors
100 TB
of data received per day
150 million+
deployed endpoints
600+
engineers, technicians,
and researchers
35%
worldwide email traffic
13 billion
web requests
24x7x365
operations
40+
languages
Cisco Content Security with AMP
Built on unmatched collective security intelligence
10I000 0II0 00 0III000 II1010011 101 1100001 110
110000III000III0 I00I II0I III0011 0110011 101000 0110 00
I00I III0I III00II 0II00II I0I000 0110 00
180,000+ File Samples per Day
FireAMP™ Community
Advanced Microsoft
and Industry Disclosures
Snort and ClamAV Open Source
Communities
Honeypots
Sourcefire AEGIS™ Program
Private and Public Threat Feeds
Dynamic Analysis
1010000II0000III000III0I00IIIIII0000III0
1100001110001III0I00III0IIII00II0II00II101000011000
100III0IIII00II0II00III0I0000II000
Cisco®
SIO
Sourcefire
VRT®
(Vulnerability
Research Team)
Cisco Collective
Security
Intelligence
Content Security
Email Endpoints Web Networks IPS Devices
WWW
Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco AMP delivers integrated…
Retrospective SecurityAdditional Point-in-time Protection
Continuous AnalysisFile Reputation & Sandboxing
Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved.
AMP strengthens the first line of detection
Reputation Filtering and File Sandboxing
Dynamic
Analysis
Machine
Learning
Fuzzy
Finger-printing
Advanced
Analytics
One-to-One
Signature
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 110
1000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00
0100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00
AMP’s continuous retrospective security
Breadth and Control points:
File Fingerprint and Metadata
File and Network I/O
Process Information
Telemetry
Stream
Continuous feed
Web
WWW
Endpoints NetworkEmail
Continuous analysis
DevicesIPS
Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Web Security At-a-glance
Centralized Management & Reporting
Cisco Security Intelligence Operations (SIO)
WWW
URL
Filtering
Application Visibility and
Control (AVC)
Data Loss Prevention
(DLP)
Threat Monitoring &
Analytics
Advanced Malware
Protection
• Spots symptoms of infection
based on behavioral anomalies
(CWS only) and CNC traffic
• Blocks unknown files via
reputation and sandboxing
• Continues to monitor threat
levels after an attack
• Contains 50M known sites
• Categorizes unknown URLs in
real time
• Controls mobile, collaborative
and web 2.0 applications
• Enforces behaviors within web
2.0 applications
• Blocks sensitive information
• Integrates easily by ICAP with
3rd party vendors
Offers actionable insight across threats, data and applications
AllowWWW
Limited AccessWWW
BlockWWW
Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min
PROTECTION CONTROL
Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Acceptable Use Controls
Beyond URL Filtering
URL Filtering
• Constantly updated URL
database covering
over 50 million sites
worldwide
• Real-time dynamic
categorization for
unknown URLs
HTTP://
Application Visibility and Control (AVC)
Hundreds of
Apps
Application
Behavior
150,000+
Micro-apps
• Control over mobile,
collaborative and web
2.0 applications
• Assured policy control
over which apps can
be used by which
users and devices
• Granular enforcement
of behaviors within
applications
• Visibility of activity
across the network
+
Cisco Confidential 13© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Cisco Email Security At-a-glance
Centralized Management & Reporting
Cisco Security Intelligence Operations (SIO)
Defense in Depth Policy Control DLP and EncryptionTargeted Threat Mitigation
Advanced Malware
Protection
• Prevent phishing and blended
threats
• URL Filtering for advance
policies
• Blocks unknown files via
reputation and sandboxing
• Continues to monitor threat
levels after an attack
• SenderBase Reputation
• Anti-Spam and Spoofing
• Anti-Virus with Outbreak Filters
• Dynamic update engines
• Enhanced control over inbound
and outbound traffic
• Enforces behaviors within web
2.0 applications
• Integration with RSA DLP policy
engine and lexicons
• Encrypt sensitive information
Offers actionable insight across threats, data and applications
Deliver Quarantine Drop
Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min
PROTECTION CONTROL
Re-write URLs
Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Phishing Attack and URL Defense Controls
Integrated email and web security
Rewrite
Email Contains
URL
URL
Categorization
Cisco SIO
BLOCKEDwww.playboy.comBLOCKED
BLOCKEDwww.proxy.orgBLOCKED
Defang
Replace
Send to Cloud
Cisco Security
The requested web page
has been blocked
http://www.threatlink.com
Cisco Email and Web Security protects your
organization’s network from malicious software.
Malware is designed to look like a legitimate email
or website which accesses your computer, hides
itself in your system, and damages files.
Cisco Confidential 15© 2013-2014 Cisco and/or its affiliates. All rights reserved.
DLP and Compliance
Built-in Comprehensive DLP Solution with RSA: Accurate, Easy, and Extensible
Data Loss
Prevention
Incidents Policies
Accurate, Easy, and Extensible • Fast setup
• Low administrative overhead
• Comprehensive policy creation and
modification
• Exceptional accuracy
• Direct integration for enterprisewide
DLP deployments
• Secure delivery with on-box
encryption.
Data SecurityThreat Protection
Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Centralized Management and Reporting
Analyze, Troubleshoot and Refine Security Policies
Centralized ReportingCentralized Management
In-depth Threat Visibility
Extensive Forensic Capabilities
Centralized Policy
Management
Delegated
Administration
Insight
Across Threats,
Data and Applications
Control
Consistent Policy Across Offices
and for Remote Users
Visibility
Continuous Visibility Across Different
Devices, Services and Network Layers
Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Flexible Licensing and Deployment Options
On-Premise or In the Cloud
Deployment
Options
Connection
Methods
On-premises Cloud
Cloud
FirewallRouter Roaming
Virtual NGFW
Roaming
Appliance
Appliance
Redirectors
WCCP PAC File Explicit WCCP PAC File Explicit
Advanced
Malware
Protection
Integrated on box – Licensed Plug-in Integrated - License
Thank you.

More Related Content

PDF
Advanced Web Security Deployment
PPTX
Cisco Web and Email Security Overview
PDF
Presentation cisco iron port e-mail security solution
PPTX
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
The Cost of Inactivity: Malware Infographic
PDF
Cisco Addresses the Full Attack Continuum
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Advanced Web Security Deployment
Cisco Web and Email Security Overview
Presentation cisco iron port e-mail security solution
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
The Cost of Inactivity: Malware Infographic
Cisco Addresses the Full Attack Continuum
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...

What's hot (20)

PDF
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
PDF
Cyber Risk Management in the New Digitalisation Age - eSentinel™
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
PDF
2016 Trends in Security
PDF
FireEye Advanced Threat Protection - What You Need to Know
PDF
Watch Guard Reputation Enabled Defense (White Paper)Dna
PDF
FireEye Portfolio
PPTX
Proatively Engaged: Questions Executives Should Ask Their Security Teams
PDF
Microsoft Cyber Defense Operation Center Strategy
PDF
Microsoft Security Intelligence Report vol. 21
PDF
FireEye Use Cases — FireEye Solution Deployment Experience
PDF
Anatomy of an Attack
PPTX
Top Application Security Trends of 2012
PDF
Endpoint Detection & Response - FireEye
PDF
Websense 2013 Threat Report
PDF
2013 Threat Report
PDF
Security in the cloud protecting your cloud apps
 
PDF
Application Security: Safeguarding Data, Protecting Reputations
PDF
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
PDF
Cisco 2014 - Anual Security Report
"Evolving Cybersecurity Strategies" - Threat protection and incident managment
Cyber Risk Management in the New Digitalisation Age - eSentinel™
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
2016 Trends in Security
FireEye Advanced Threat Protection - What You Need to Know
Watch Guard Reputation Enabled Defense (White Paper)Dna
FireEye Portfolio
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Microsoft Cyber Defense Operation Center Strategy
Microsoft Security Intelligence Report vol. 21
FireEye Use Cases — FireEye Solution Deployment Experience
Anatomy of an Attack
Top Application Security Trends of 2012
Endpoint Detection & Response - FireEye
Websense 2013 Threat Report
2013 Threat Report
Security in the cloud protecting your cloud apps
 
Application Security: Safeguarding Data, Protecting Reputations
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
Cisco 2014 - Anual Security Report
Ad

Similar to Cisco Content Security (20)

PPTX
Two for Attack: Web and Email Content Protection
PDF
The Next Generation Security
PDF
Cisco Live Cancun PR Session
PPTX
Idc security roadshow may2015 Adrian Aron
PDF
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
PPTX
Isday 2017 - Atelier Cisco
PDF
Next Generation Security
PDF
During the Next Generation Network and Data Centre – Now and into the Future ...
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Enterprise-Grade Trust: Collaboration Without Compromise
PPTX
Seminar on Phishing Protection
PPTX
email-security-bdm.pptx
PPT
Girls Days 2014 - Cisco Germany - Duesseldorf
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Network as a sensor
PPTX
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
PDF
Presentation cisco iron port web usage controls
PDF
Cisco Connect 2018 Singapore - Cisco Incident Response Services
PDF
Cisco Cybersecurity #10YearChallenge
Two for Attack: Web and Email Content Protection
The Next Generation Security
Cisco Live Cancun PR Session
Idc security roadshow may2015 Adrian Aron
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Isday 2017 - Atelier Cisco
Next Generation Security
During the Next Generation Network and Data Centre – Now and into the Future ...
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Enterprise-Grade Trust: Collaboration Without Compromise
Seminar on Phishing Protection
email-security-bdm.pptx
Girls Days 2014 - Cisco Germany - Duesseldorf
Scalar Security Roadshow - Toronto Presentation
Network as a sensor
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Presentation cisco iron port web usage controls
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Cybersecurity #10YearChallenge
Ad

More from Cisco Canada (20)

PDF
Cisco connect montreal 2018 net devops
PDF
Cisco connect montreal 2018 iot demo kinetic fr
PPTX
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
PDF
Cisco connect montreal 2018 secure dc
PDF
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
PDF
Cisco connect montreal 2018 vision mondiale analyse locale
PDF
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
PDF
Cisco connect montreal 2018 collaboration les services webex hybrides
PDF
Integration cisco et microsoft connect montreal 2018
PDF
Cisco connect montreal 2018 compute v final
PDF
Cisco connect montreal 2018 saalvare md-program-xr-v2
PDF
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
PDF
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
PDF
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
PDF
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
PDF
Cisco Connect Toronto 2018 DevNet Overview
PDF
Cisco Connect Toronto 2018 DNA assurance
PDF
Cisco Connect Toronto 2018 network-slicing
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco Connect Toronto 2018 sixty to zero
Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco connect montreal 2018 collaboration les services webex hybrides
Integration cisco et microsoft connect montreal 2018
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018 sixty to zero

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
 
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
 

Cisco Content Security

  • 2. Cisco Content Security Consulting Systems Engineer Sept 30, 2014 Web and Email Solutions with Advanced Malware Protection Daniel Thorne
  • 3. Cisco Confidential 3© 2013-2014 Cisco and/or its affiliates. All rights reserved. Web and Email use is changing Making it more difficult to protect your network Mobile Coffee shop Corporate Home Airport
  • 4. Cisco Confidential 4© 2013-2014 Cisco and/or its affiliates. All rights reserved. Our Web Security Problems Aren’t Getting Any EasierAn Evolving Threat Landscape Email and Web are the #1 Threat Vector IPv6 Spam Blended Threats Targeted Attacks APTs Advanced Malware Rootkits Worms Trojan Horse
  • 5. Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved. Content Security Challenges Data Loss Malware Infections Acceptable Use Violations • Blocking hidden malware • Disarming malicious links • Managing advanced threats • Application visibility • Granular usage control • Consistent policy enforcement • Safeguard vital data • Detecting data breach • Preventing data leakage Visibility • Across users and sites • Proactive reporting (retrospective) • Centralized data collection
  • 6. Cisco Confidential 6© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Content Security with AMP BEFORE Discover Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Malware Signature File Reputation File Sandboxing File Retrospection Threat Analytics Actionable Reporting Defense across the attack continuum Reputation Usage/App Controls Filtering
  • 7. Cisco Confidential 7© 2013-2014 Cisco and/or its affiliates. All rights reserved. 1.6 million global sensors 100 TB of data received per day 150 million+ deployed endpoints 600+ engineers, technicians, and researchers 35% worldwide email traffic 13 billion web requests 24x7x365 operations 40+ languages Cisco Content Security with AMP Built on unmatched collective security intelligence 10I000 0II0 00 0III000 II1010011 101 1100001 110 110000III000III0 I00I II0I III0011 0110011 101000 0110 00 I00I III0I III00II 0II00II I0I000 0110 00 180,000+ File Samples per Day FireAMP™ Community Advanced Microsoft and Industry Disclosures Snort and ClamAV Open Source Communities Honeypots Sourcefire AEGIS™ Program Private and Public Threat Feeds Dynamic Analysis 1010000II0000III000III0I00IIIIII0000III0 1100001110001III0I00III0IIII00II0II00II101000011000 100III0IIII00II0II00III0I0000II000 Cisco® SIO Sourcefire VRT® (Vulnerability Research Team) Cisco Collective Security Intelligence Content Security Email Endpoints Web Networks IPS Devices WWW
  • 8. Cisco Confidential 8© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco AMP delivers integrated… Retrospective SecurityAdditional Point-in-time Protection Continuous AnalysisFile Reputation & Sandboxing
  • 9. Cisco Confidential 9© 2013-2014 Cisco and/or its affiliates. All rights reserved. AMP strengthens the first line of detection Reputation Filtering and File Sandboxing Dynamic Analysis Machine Learning Fuzzy Finger-printing Advanced Analytics One-to-One Signature
  • 10. Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved. 0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 110 1000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 0100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 AMP’s continuous retrospective security Breadth and Control points: File Fingerprint and Metadata File and Network I/O Process Information Telemetry Stream Continuous feed Web WWW Endpoints NetworkEmail Continuous analysis DevicesIPS
  • 11. Cisco Confidential 11© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Web Security At-a-glance Centralized Management & Reporting Cisco Security Intelligence Operations (SIO) WWW URL Filtering Application Visibility and Control (AVC) Data Loss Prevention (DLP) Threat Monitoring & Analytics Advanced Malware Protection • Spots symptoms of infection based on behavioral anomalies (CWS only) and CNC traffic • Blocks unknown files via reputation and sandboxing • Continues to monitor threat levels after an attack • Contains 50M known sites • Categorizes unknown URLs in real time • Controls mobile, collaborative and web 2.0 applications • Enforces behaviors within web 2.0 applications • Blocks sensitive information • Integrates easily by ICAP with 3rd party vendors Offers actionable insight across threats, data and applications AllowWWW Limited AccessWWW BlockWWW Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min PROTECTION CONTROL
  • 12. Cisco Confidential 12© 2013-2014 Cisco and/or its affiliates. All rights reserved. Acceptable Use Controls Beyond URL Filtering URL Filtering • Constantly updated URL database covering over 50 million sites worldwide • Real-time dynamic categorization for unknown URLs HTTP:// Application Visibility and Control (AVC) Hundreds of Apps Application Behavior 150,000+ Micro-apps • Control over mobile, collaborative and web 2.0 applications • Assured policy control over which apps can be used by which users and devices • Granular enforcement of behaviors within applications • Visibility of activity across the network +
  • 13. Cisco Confidential 13© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Email Security At-a-glance Centralized Management & Reporting Cisco Security Intelligence Operations (SIO) Defense in Depth Policy Control DLP and EncryptionTargeted Threat Mitigation Advanced Malware Protection • Prevent phishing and blended threats • URL Filtering for advance policies • Blocks unknown files via reputation and sandboxing • Continues to monitor threat levels after an attack • SenderBase Reputation • Anti-Spam and Spoofing • Anti-Virus with Outbreak Filters • Dynamic update engines • Enhanced control over inbound and outbound traffic • Enforces behaviors within web 2.0 applications • Integration with RSA DLP policy engine and lexicons • Encrypt sensitive information Offers actionable insight across threats, data and applications Deliver Quarantine Drop Monitors threats worldwide, filters on reputation and automatically updates every 3-5 min PROTECTION CONTROL Re-write URLs
  • 14. Cisco Confidential 14© 2013-2014 Cisco and/or its affiliates. All rights reserved. Phishing Attack and URL Defense Controls Integrated email and web security Rewrite Email Contains URL URL Categorization Cisco SIO BLOCKEDwww.playboy.comBLOCKED BLOCKEDwww.proxy.orgBLOCKED Defang Replace Send to Cloud Cisco Security The requested web page has been blocked http://www.threatlink.com Cisco Email and Web Security protects your organization’s network from malicious software. Malware is designed to look like a legitimate email or website which accesses your computer, hides itself in your system, and damages files.
  • 15. Cisco Confidential 15© 2013-2014 Cisco and/or its affiliates. All rights reserved. DLP and Compliance Built-in Comprehensive DLP Solution with RSA: Accurate, Easy, and Extensible Data Loss Prevention Incidents Policies Accurate, Easy, and Extensible • Fast setup • Low administrative overhead • Comprehensive policy creation and modification • Exceptional accuracy • Direct integration for enterprisewide DLP deployments • Secure delivery with on-box encryption. Data SecurityThreat Protection
  • 16. Cisco Confidential 16© 2013-2014 Cisco and/or its affiliates. All rights reserved. Centralized Management and Reporting Analyze, Troubleshoot and Refine Security Policies Centralized ReportingCentralized Management In-depth Threat Visibility Extensive Forensic Capabilities Centralized Policy Management Delegated Administration Insight Across Threats, Data and Applications Control Consistent Policy Across Offices and for Remote Users Visibility Continuous Visibility Across Different Devices, Services and Network Layers
  • 17. Cisco Confidential 17© 2013-2014 Cisco and/or its affiliates. All rights reserved. Flexible Licensing and Deployment Options On-Premise or In the Cloud Deployment Options Connection Methods On-premises Cloud Cloud FirewallRouter Roaming Virtual NGFW Roaming Appliance Appliance Redirectors WCCP PAC File Explicit WCCP PAC File Explicit Advanced Malware Protection Integrated on box – Licensed Plug-in Integrated - License