Page 76 - CSI - Cisco Security Introduction
P. 76

AMP Threat Grid











                                                                                                                    Can Be Access via a Web Browser



                                                                                                                      The analyst can interact with
                                 CLOUD                                                                                  the sample and change the

                                                                                                                      runtime from 5 to 30 minutes




                                                                                                         •  All results can be easily retrieved

                                                                                                         • Samples can be compared and

                                                                                                         searched
                              APPLIANCE
                                                                                                         • Threat intelligence can be enriched
         A Malware Analysis and

         Threat Intelligence Platform                                                                  Security tools can access and integrate

                                                                                                                           using the Threat Grid API
               •     Scale



               •     Speed
                                                                                                                      Malware analysis, threat intelligence

               •     Actionable Intelligence                                                                         correlation and feeds retrieval can be
                                                                                                                   automated and integrated with existing
                                                                                                                                                security solutions
       © 2018 Engage ESM All Rights Reserved 2018 Engage ESM All Rights Reserved
       ©
   71   72   73   74   75   76   77   78   79   80   81