Page 54 - CSI - Cisco Security Introduction
P. 54
The Relevance of Cisco Umbrella
Malware
C2 Callbacks
Phishing
Network and endpoint
First line It all starts with DNS
NGFW Precedes file execution and IP
Network and endpoint
Netflow connection
Proxy Used by all devices
Endpoint
Sandbox Router/UTM
Port agnostic
AV AV AV AV AV
HQ BRANCH ROAMING
©
© 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved