Page 53 - CSI - Cisco Security Instroduction - BT
P. 53

Key Cisco Security Solutions




                                                                                                      •    Blocks known malware and captures a


                                                                                                           fingerprint of unknown files as they
          • TALOS                                                                                          traverse a supported security gateway,



                                                                                                           sending this information to a cloud-based
          • Next Generation Firewall
                                                                                                           intelligence network for a File Reputation

          • Advanced Malware Protection (AMP)                                                              verdict before letting the file into the


                                                                                                           network.
          • Identity Services Engine (ISE)

                                                                                                      •    Provides File Sandboxing to learn precise
          • Umbrella
                                                                                                           details about a file’s behavior and

          • CloudLock                                                                                      combined with detailed human & machine


                                                                                                           analysis to determine the file’s threat level.
          • StealthWatch

                                                                                                      •    When a breach occurs, File Retrospection


                                                                                                           identifies where the file traveled to quickly

                                                                                                           begin remediation.



          56
   48   49   50   51   52   53   54   55   56   57   58