Page 54 - CSI - Cisco Security Introduction
P. 54

The Relevance of Cisco Umbrella












                                                                                                                             Malware
                                                                                                                             C2 Callbacks
                                                                                                                             Phishing










                 Network and endpoint

                                                                                                               First line                       It all starts with DNS




                   NGFW                                                                                                                         Precedes file execution and IP
                                                  Network and endpoint
                   Netflow                                                                                                                      connection

                   Proxy                                                                                                                        Used by all devices
                                                                                   Endpoint
                   Sandbox                          Router/UTM
                                                                                                                                                Port agnostic

                  AV         AV                   AV         AV                   AV



                       HQ                           BRANCH                    ROAMING



       ©
       © 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved
   49   50   51   52   53   54   55   56   57   58   59