jagomart
digital resources
picture1_Business Ppt Templates 73976 | Cognitive Threat Analytics


 153x       Filetype PPTX       File size 0.43 MB       Source: www.cisco.com


File: Business Ppt Templates 73976 | Cognitive Threat Analytics
the realities of today s threat landscape most organizations large and small have already been compromised and don t even know it 100 percent of business networks analyzed by cisco ...

icon picture PPTX Filetype Power Point PPTX | Posted on 01 Sep 2022 | 3 years ago
Partial capture of text on file.
                      The Realities of Today’s Threat Landscape
                                    Most organizations, large and small, have 
                                    already been compromised and don’t even 
                                    know it: 100 percent of business networks 
                                    analyzed by Cisco have traffic going to 
                                    websites that host malware.
                                     - Cisco 2014 Annual Security Report
                   ©©  22001133  CCiiscosco  aanndd//oorr  iitts s aaffffiilliiaattees.s.  AlAlll  ririgghhtts s rreeseservervedd..                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    CCiiscosco  CCoonnffiiddeennttiiaall                             22
            Continuous Monitoring for Threats After an Attack
            Cognitive is a cloud-based solution that reduces time 
            to discovery of threats operating inside the network.
                                          Identifies                                                                                         Learns from                                                                                                             Adapts 
                                     new threats                                                                                               what it sees                                                                                                      over time
          © 2013 Cisco and/or its affiliates. All rights reserved.                                                                                                                                                                                                                                                          Cisco Confidential               3
            Problems with Traditional Threat Monitoring
                                                                                                                                                                                                                                                      Rules Based
                                                                                                                                                                                                                                                      •        Dependent on complex 
                                                                                                                                                                                                                                                               manual rule sets
                                                                                                                                                                                                                                                      •        Subject to human limitations 
                                                                                                                                                                                                              Admin                                            and biases 
                                                                                                          Unable to keep 
                                                                                                          up with the latest                                                                                                                          Time Consuming
                                                                                                          threats                                                                                                                                     •        Takes weeks or months to 
                                                                                                                                                                                                                                                               setup 
                                                                                                                                                                                                                                                      •        Requires constant tuning
                                                                                                     111010000 110  0111 
                                                                                                                                                                                                                                                      Highly Complex
                                                                                                                                                                                                                                                      •        Often requires a trained team 
                                                                                                                                                                                                                                                               of experts to manage and 
                                                                                                                                                                                                              Security                                         maintain
                                                                                                                                                                                                                 Team
          © 2013 Cisco and/or its affiliates. All rights reserved.                                                                                                                                                                                                                                                          Cisco Confidential               4
            Easy Setup
           Cognitive discovers threats on its own…just turn it on.
          © 2013 Cisco and/or its affiliates. All rights reserved.                                                                                                                                                                                                                                                          Cisco Confidential               5
            Normal… or Not?
           Cognitive spots symptoms of infection using behavioral 
           anomaly detection algorithms and trust modeling
          © 2013 Cisco and/or its affiliates. All rights reserved.                                                                                                                                                                                                                                                          Cisco Confidential               6
The words contained in this file might help you see if this file matches what you are looking for:

...The realities of today s threat landscape most organizations large and small have already been compromised don t even know it percent business networks analyzed by cisco traffic going to websites that host malware annual security report cciiscosco aanndd oorr iitts aaffffiilliiaattees alalll ririgghhtts rreeseservervedd ccoonnffiiddeennttiiaall continuous monitoring for threats after an attack cognitive is a cloud based solution reduces time discovery operating inside network identifies learns from adapts new what sees over or its affiliates all rights reserved confidential problems with traditional rules dependent on complex manual rule sets subject human limitations admin biases unable keep up latest consuming takes weeks months setup requires constant tuning highly often trained team experts manage maintain easy discovers own just turn normal not spots symptoms infection using behavioral anomaly detection algorithms trust modeling...

no reviews yet
Please Login to review.