Page 100 - CSI - Cisco Security Instroduction - BT
P. 100

See and Act on Threats










                                                                ISE
                        Automated policy
                        enforcement for
                    segmentation through SD-                                                                                                       Encrypted
                             Access
                                                                                                                                                   Traffic Analytics


                                                                                        Machine learning                  Spot malware in            99     %
                                           NetFlow with                                                                   encrypted traffic          • Analyze metadata without
                                            enhanced                                                                                                 Threat Detection Accuracy*
                                                                                                                                                       decrypting traffic flows
  111011011000001000111                    telemetry at
                                             line rate  Stealthwatch                                                                                 • Global-to-local knowledge
  100111101001000100001
                                                                                                                                                       correlation
                                                                                                                                                     0.01        %
                                                                                                                                                     • Automate policy and segmentation
                                                                                                                                                       across the entire network

                                                                                                                                                     False Positives*
                    Catalyst 9K Switch



                                                                                                                                                    *Source : Identifying Encrypted Malware Traffic with
                                                                                                                                                    Contextual Flow Data, Oct 2016
                                                                                 Cognitive Analytics









          103
   95   96   97   98   99   100   101   102   103   104   105