Page 28 - CSI - Cisco Security Introduction
P. 28

The Attack Continuum









      Before, during and after: a security framework











                                      BEFORE                                                DURING                                                AFTER

                                      Discover                                               Detect                                                Scope
                                       Enforce                                                Block                                               Contain
                                       Harden                                                Defend                                             Remediate















                                         Network                  Endpoint                   Mobile                    Virtual                   Cloud



                                                                                                 X


                                                Threat Intelligence                     Point in Time                   Continuous




       ©
       © 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved
   23   24   25   26   27   28   29   30   31   32   33