Page 55 - CDSSa
P. 55

Threat Defense Example



         Broadening our Security Footprint




                                                  Protect the IoT
                  Mitigate & isolate         environment, reducing
                   malware threats           downtime and business              Outcome focused                        Key Points
                                                       impact


                                                                                                                       •
                 Ransomware                             IOT                                                           1      Requires broad architecture expertise

                     Defense                        Defense                                                                  to connect with customer



                       Umbrella                  Cognitive Threat                                                      •     End-to-end approach displaces
                                                 Analytics (CTA) *                                                    2
                 AMP for Endpoints                                            Solution.Next                                  competitors and brings more value to
                                                       Future                                                                customer
                    AMP for Email
                                                 Security Defined
                      ThreatGrid                   Access (SDA)
                                                                                                                       •
                                                                                                                      3      Land the platform base and cross-
                                              Manufacturers Usage                                                            sell/upsell by solution
                                               Description (MUD) *


                                                                                                                       •     Technically validated & documented
                                           Threat Defense                                                             4



                 Umbrella  |  ISE  |  Stealthwatch |  AnyConnect  |  NGFW  |  TrustSec *



                          LOB                      CISO / CxO                           IT

                                                                                          * Enabled feature
   50   51   52   53   54   55   56   57   58   59   60