Page 28 - CSI - Cisco Security Introduction
P. 28
The Attack Continuum
Before, during and after: a security framework
BEFORE DURING AFTER
Discover Detect Scope
Enforce Block Contain
Harden Defend Remediate
Network Endpoint Mobile Virtual Cloud
X
Threat Intelligence Point in Time Continuous
©
© 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved