Professional Documents
Culture Documents
Why Security?
Security Investment: A Top Priority
Figure 1 How Enterprises View IT Security
Security: A critical
boardroom topic
Why Cisco
The leading security
company
Talos: Security intelligence
and research
Cisco Security
Strategy
56%
of organizations state
that IT security is
critical in meeting
their top business
objectives
73%
51%
of organizations state
that IT security is one
of the top five priorities
for IT investment for
the next fiscal year
of organizations say
that security is more
important than other IT
initiatives
Challenges
The Cisco Security
Strategy
Security Everywhere
As much as the Digital Economy and the IoE create
opportunities for companies and consumers, expected
to generate $19-trillion in value to organizations over the
next decade, they also create opportunities for hackers
and cybercriminals. With an expanded attack surface
represented by the IoE, cybercriminals look to cash in on
the estimated value of $450 billion to over $1 trillion of the
Hacker Economy.
The most effective way to confront this dynamic threat
landscape is to make security as pervasive as the Internet of
Everything itself extending to wherever employees are and
wherever data is to include Security Everywhere.
At-a-Glance
These are critical considerations as organizations become more agile and try to grow
their business models in the face of the evolving trends of mobility, cloud computing, and
advanced targeted attacks.
At-a-Glance
Why Cisco?
Cisco: The Leading Security Company
Cisco is widely recognized throughout the industry as offering best-in-class solutions (Figure 2).
Figure 2 Market Recognition of Cisco Security Solutions
The Cisco security portfolio was rated positive in Gartners 2014 Vendor Rating.
Cisco also had the highest Security Effectiveness score in the latest NSS Labs Security
Value Maps for:
Third-party tests of IT security solutions validate vendor claims of solution effectiveness and
performance. In addition to any individual test result, consistency also matters and Cisco
continues to be a leader in third-party testing year after year.
3
At-a-Glance
Talos also maintains the official rule sets of Snort, ClamAV, SenderBase, and SpamCop.
Cisco Security Research: www.cisco.com/go/talos
Cisco Security Reports: www.cisco.com/go/securityreports
For more information, visit www.cisco.com/go/security
At-a-Glance
Security Challenges
A combination of three major realities has made the task of defending a network more difficult
than ever, while helping attackers find new ways to evade defenses (Figure 4).
Figure 4 Security Challenges
At-a-Glance
Visibility driven: Get global intelligence and context for deeper insights and
better decisions.
Threat focused: Detect, understand, and stop threats across the entire
attack continuum
Platform based: Reduce fragmentation by using a platform-based approach to
protect the network, devices, and the cloud.
Only Cisco delivers platform-based solutions that integrate into an overall security system.
Figure 7 Security Products Used Along the Attack Continuum
At-a-Glance
At-a-Glance
Reduce complexity while gaining superior visibility, consistent control, and advanced threat
protection across the entire attack continuum.
Cisco Adaptive Security Virtual Appliance (ASAv)
Provides vSwitch support for Cisco, hybrid, and non-Cisco data centers
At-a-Glance
Point-in-time protection in the form of file signatures, file reputation, and sandboxing to
block known and emerging threats
Continuous analysis and retrospective security to detect malware that manages to evade
initial inspection. .
Check out www.cisco.com/go/promotions for the latest security incentives and promotions.
At-a-Glance
AMP Everywhere: Cisco offers the industrys broadest portfolio of integrated Advanced
Malware Protection solutions providing coverage across multiple attack vectors - network,
endpoint, mobile, virtual, email and web.
Combines static and dynamic malware analysis with threat intelligence into one
unified solution.
Provides Integrated sandboxing for Cisco ASA with FirePOWER Services, ESA, WSA,
AMP for Networks, and AMP for Endpoints to protect across the attack continuum from
both known and unknown attacks.
10
At-a-Glance
At-a-Glance
Provides secure network access based on rich contextual data (who, what, where, when, how)
Automates firewall rules and access control list administration, uses plain-language policies
Embedded in the operating systems of Cisco ISE, Cisco Catalyst and Cisco Nexus
switches, Cisco Integrated Services Routers, and Cisco ASA firewalls
Automates firewall rules and access control list administration, uses plainlanguage policies
12
At-a-Glance
2015 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a
list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not
imply a partnership relationship between Cisco and any other company. (1110R)
C45-123456-00 01/15
13