Page 24 - CSI - Cisco Security Instroduction - BT
P. 24

The Attack Continuum


          Before, during and after: a security framework










                               BEFORE                                                  DURING                                                  AFTER



                                Intelligence                                         Point-in-Time                                            Continuous

                                                                                        Protection                                             Protection
















                                        Network                  Endpoint                   Mobile                    Virtual                   Cloud



                                                                                                X

                                               Threat Intelligence                     Point in Time                   Continuous






          27
   19   20   21   22   23   24   25   26   27   28   29