1
Five reasons for the rise of the secure internet gateway Security in a mobile, cloud-enabled world The way we work has changed Security must also change 70% 49% 70% Branch/eld oces connect directly to the internet 1 Built to solve the security challenges of today’s mobile, cloud-enabled enterprise, a new category of products is emerging — the secure internet gateway. Workforce are mobile workers 2 Applications increase in SaaS app use 3 Sources: 1 “Securing Direct-To-Internet Branch Oces: Cloud-Based Security Oers Flexibility And Control,” Forrester, 2015 2 “Securing Portable Data and Applications,” SANS, 2015 3 “Keeping SaaS Secure,” Gartner, 2016 4 “Your Users Have Left the Perimeter. Are You Ready?” IDG, 2016 5 “Visual Investigations of Command & Control Botnet Behavior,” Cisco (Lancope), 2013 6 “2015 Cost of Data Breach Study: Global Analysis,” Ponemon Institute, 2015 7 “Cisco 2017 Annual Cybersecurity Report,” Cisco, 2017 8 “The Cost of Malware Containment,” Ponemon Institute, 2015 9 “Cloud Cybersecurity Report: The Extended Perimeter,” Cisco (Cloudlock), 2015 Discover how a secure internet gateway can help your organization protect users anywhere they access the internet. Get the details by reading “The Rise of the Secure Internet Gateway. 82% of mobile workers admit that they do not always use VPN when working 4 15% of malware command and control (C2) callbacks use ports other than 80/443 to ex ltrate data 5 60% of the time attackers penetrate and compromise an organization within minutes, while detection takes days or more 6 Some companies use up to 50 di erent security vendors 7 and generate almost 17,000 alerts per week 8 On average, companies use more than 475 third-party applications 9 Enforcement only on your network Perimeter security provides visibility and control for employee activity only when on your corporate network. Protection against threats over web Web gateways only protect employees from threats over web ports 80/443. Threat intel from only static reputation scores Traditional security neutralizes threats only after detection. Appliance processing power limits hardware-based tools. ON OFF Enforcement everywhere A secure internet gateway protects all devices on your network and roaming users. Protection over all ports and protocols A secure internet gateway provides comprehensive protection over all ports and protocols. Threat intel from live internet requests A secure internet gateway uses real-time threat intelligence from global internet activity to uncover attacks before launch. And, because it’s cloud-delivered, it’s not limited by appliance CPU. Traditional Security vs. Secure Internet Gateway 82% 15% 60% 50+ 475+ Limited integration You likely have many dierent security products, but they work in silos with zero interoperability. Open platform A secure internet gateway provides APIs and built-in integrations to easily add and share intelligence among systems. Lack of visibility for SaaS apps With traditional security, you have limited or zero control over sensitive data in the cloud. Discovery for SaaS apps A secure internet gateway helps you address risky or unsanctioned SaaS apps by easily identifying all accessed apps across an organization. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Workforce Applications 70% 49% 70% · 8 “The Cost of Malware Containment,” Ponemon Institute, 2015 9 “Cloud Cybersecurity Report: The Extended Perimeter,” Cisco (Cloudlock),

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Workforce Applications 70% 49% 70% · 8 “The Cost of Malware Containment,” Ponemon Institute, 2015 9 “Cloud Cybersecurity Report: The Extended Perimeter,” Cisco (Cloudlock),

Five reasons for the rise of the secure internet gatewaySecurity in a mobile, cloud-enabled world

The way we work has changed

Security must also change

70% 49% 70%Branch/field offices

connect directly to the internet1

Built to solve the security challenges of today’s mobile, cloud-enabled enterprise, a new category of products is emerging — the secure internet gateway.

Workforce

are mobile workers2

Applications

increase in SaaS app use3

Sources:

1 “Securing Direct-To-Internet Branch Offices: Cloud-Based Security Offers Flexibility And Control,” Forrester, 2015

2 “Securing Portable Data and Applications,” SANS, 2015

3 “Keeping SaaS Secure,” Gartner, 2016

4 “Your Users Have Left the Perimeter. Are You Ready?” IDG, 2016

5 “Visual Investigations of Command & Control Botnet Behavior,” Cisco (Lancope), 2013

6 “2015 Cost of Data Breach Study: Global Analysis,” Ponemon Institute, 2015

7 “Cisco 2017 Annual Cybersecurity Report,” Cisco, 2017

8 “The Cost of Malware Containment,” Ponemon Institute, 2015

9 “Cloud Cybersecurity Report: The Extended Perimeter,” Cisco (Cloudlock), 2015

Discover how a secure internet gateway can help your organization protect users anywhere they access the internet.

Get the details by reading “The Rise of the Secure Internet Gateway.”

82% of mobile workers admit that they do not always use VPN when working4

15% of malware command and control (C2) callbacks use ports other than 80/443 to exfiltrate data5

60% of the time attackers penetrate and compromise an organization within minutes,

while detection takes days or more6

Some companies use up to 50 different security vendors7 and generate almost 17,000 alerts per week8

On average, companies use more than 475 third-party applications9

Enforcement only on your network

Perimeter security provides visibility and control for employee activity only

when on your corporate network.

Protection against threats over web Web gateways only protect

employees from threats over web ports 80/443.

Threat intel from only static reputation scores

Traditional security neutralizes threats only after detection.

Appliance processing power limits hardware-based tools.

ONOFF

Enforcement everywhere

A secure internet gateway protects all devices on your network and

roaming users.

Protection over all ports and protocols

A secure internet gateway provides comprehensive protection over all

ports and protocols.

Threat intel from live internet requests

A secure internet gateway uses real-time threat intelligence from global internet

activity to uncover attacks before launch. And, because it’s cloud-delivered, it’s

not limited by appliance CPU.

Traditional Security vs. Secure Internet Gateway

82%

15%

60%

50+

475+

Limited integration You likely have many different

security products, but they work in silos with zero

interoperability.

Open platform A secure internet gateway provides

APIs and built-in integrations to easily add and share intelligence

among systems.

Lack of visibility for SaaS apps

With traditional security, you have limited or zero control over

sensitive data in the cloud.

Discovery for SaaS apps

A secure internet gateway helps you address risky or unsanctioned SaaS

apps by easily identifying all accessed apps across an organization.

© 2017 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)