18
Bruce Johnson Senior Product Marketing Manager February 10, 2016 Cisco Web and Email Security New Ways to Protect from the Top Threat Vectors

Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Embed Size (px)

Citation preview

Page 1: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Bruce JohnsonSenior Product Marketing ManagerFebruary 10, 2016

Cisco Web and Email Security

New Ways to Protect from the Top Threat Vectors

Page 2: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Email: Leading Threat Vector

Data LossAcceptable Use Violations

Malware Infections

IPv6 Spam

Blended Threats

Targeted Attacks

APTs

Advanced Malware

Rootkits

Worms Trojan Horse

205.6 Billion Emails per Day in 2015

and Growing - Radicati

Page 3: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Blended Attacks Multiple Security Layers Needed

Page 4: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Point in Time Security is Not Enough!

BEFOREDiscoverEnforce Harden

DURINGDetect Block Defend

AFTERScope

ContainRemediate

Web Reputation

Usage Controls

Malware Signature

File Reputation

File Sandboxing

File Retrospection

Application Controls

Threat Analytics

Actionable Reporting

Page 5: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.

“If you knew you were going to be compromised…

…would you do security differently?”

Page 6: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Joe CFOWaiting for his plane

Meet Joe. He is heading home for a well deserved vacation.

He’s catching up on email using the airport Wi-Fi while he waits for his flight.

BEFORE

Page 7: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Joe CFOChecks his email

Joe just got an email from his vacation resort with a confirmation link.

www.beautiful-hawaii.com

BEFORE

Your Tropical Getaway

Joe,

Thank you for choosing us. We look forward to seeing you.

Before your arrival, please verify your information here: www.vacationresort.com

Best,Resort Team

Page 8: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Joe CFOInstinctively, he clicks on the link

No problem, right? Everything looks normal.

The site may even be a trusted site, or maybe a site that is newly minted.

BEFORE

Your Tropical Getaway

Joe,

Thank you for choosing us. We look forward to seeing you.

Before your arrival, please verify your information here: www.vacationresort.com

Best,Resort Team

Page 9: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

DURINGJoe CFOJoe is now infected

Joe opens the link and the resort video plays.

Although he doesn’t know it, Joe’s machine has been compromised by a flash-based video exploit.

The malware now starts to harvest Joe’s confidential information:

•Passwords

•Credentials

•Company access authorizations

Page 10: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.

Now let’s see how Cisco’s Layered Defense protects Joe….

instant replay

Page 11: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Meet Joe. He is heading home for a well deserved vacation.

Instant Replay with Cisco SecurityBEFORE

Waiting for his plane

How Cisco Protects You

Page 12: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Joe just got an email from his vacation resort.

Instant Replay with Cisco Email SecurityDURING

Checks his email

How Cisco Protects You

Your Tropical Getaway

Joe,

Thank you for choosing us. We look forward to seeing you.

Before your arrival, please verify your information here: www.vacationresort.com

Best,Resort Team

Page 13: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

No problem, right? Everything looks normal.

Instant Replay with Cisco Web SecurityDURING

Instinctively, he clicks on the link

How Cisco Protects You

Deploys malware protection

Traces phone home traffic

Conducts 200 pt. website “credit check”

Controls social media micro-app policy

Activates embedded protection

Your Tropical Getaway

Joe,

Thank you for choosing us. We look forward to seeing you.

Before your arrival, please verify your information here: www.vacationresort.com

Best,Resort Team

Traces “phone home” traffic

Page 14: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Joe opens the link and the resort video plays.

Instant Replay with Cisco AMP for Email & Web SecurityDURING

Joe is protected

How Cisco Protects You

Isolates unknown files through sandboxing

Evaluates file reputation

Registers files

Page 15: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

After a relaxing vacation, Joe returns home protected and unaware that the threat even existed. (and he still has a job!)

Joe CFO arrives home AFTER

Joe is protected

Page 16: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

After a few days, a file begins to behave maliciously.

Joe CFO arrives home AFTER

Joe is protected

How Cisco Protects You

Identifies polymorphic attacks

Discovers patient zero and zero +1

Analyzes threats retrospectively

Page 17: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Layered Email and Web SecurityBest Defense for Complex Threats

Come by the Email and Web Security Booth and Learn More

Page 18: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation

Thank you