joe cfo for ciscolive berlin 2016 email and web security presentation
TRANSCRIPT
Bruce JohnsonSenior Product Marketing ManagerFebruary 10, 2016
Cisco Web and Email Security
New Ways to Protect from the Top Threat Vectors
Email: Leading Threat Vector
Data LossAcceptable Use Violations
Malware Infections
IPv6 Spam
Blended Threats
Targeted Attacks
APTs
Advanced Malware
Rootkits
Worms Trojan Horse
205.6 Billion Emails per Day in 2015
and Growing - Radicati
Blended Attacks Multiple Security Layers Needed
Point in Time Security is Not Enough!
BEFOREDiscoverEnforce Harden
DURINGDetect Block Defend
AFTERScope
ContainRemediate
Web Reputation
Usage Controls
Malware Signature
File Reputation
File Sandboxing
File Retrospection
Application Controls
Threat Analytics
Actionable Reporting
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
“If you knew you were going to be compromised…
…would you do security differently?”
Joe CFOWaiting for his plane
Meet Joe. He is heading home for a well deserved vacation.
He’s catching up on email using the airport Wi-Fi while he waits for his flight.
BEFORE
Joe CFOChecks his email
Joe just got an email from his vacation resort with a confirmation link.
www.beautiful-hawaii.com
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
Joe CFOInstinctively, he clicks on the link
No problem, right? Everything looks normal.
The site may even be a trusted site, or maybe a site that is newly minted.
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
DURINGJoe CFOJoe is now infected
Joe opens the link and the resort video plays.
Although he doesn’t know it, Joe’s machine has been compromised by a flash-based video exploit.
The malware now starts to harvest Joe’s confidential information:
•Passwords
•Credentials
•Company access authorizations
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Now let’s see how Cisco’s Layered Defense protects Joe….
instant replay
Meet Joe. He is heading home for a well deserved vacation.
Instant Replay with Cisco SecurityBEFORE
Waiting for his plane
How Cisco Protects You
Joe just got an email from his vacation resort.
Instant Replay with Cisco Email SecurityDURING
Checks his email
How Cisco Protects You
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
No problem, right? Everything looks normal.
Instant Replay with Cisco Web SecurityDURING
Instinctively, he clicks on the link
How Cisco Protects You
Deploys malware protection
Traces phone home traffic
Conducts 200 pt. website “credit check”
Controls social media micro-app policy
Activates embedded protection
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
Traces “phone home” traffic
Joe opens the link and the resort video plays.
Instant Replay with Cisco AMP for Email & Web SecurityDURING
Joe is protected
How Cisco Protects You
Isolates unknown files through sandboxing
Evaluates file reputation
Registers files
After a relaxing vacation, Joe returns home protected and unaware that the threat even existed. (and he still has a job!)
Joe CFO arrives home AFTER
Joe is protected
After a few days, a file begins to behave maliciously.
Joe CFO arrives home AFTER
Joe is protected
How Cisco Protects You
Identifies polymorphic attacks
Discovers patient zero and zero +1
Analyzes threats retrospectively
Layered Email and Web SecurityBest Defense for Complex Threats
Come by the Email and Web Security Booth and Learn More
Thank you