joe cfo for ciscolive berlin 2016 email and web security presentation
TRANSCRIPT
![Page 1: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/1.jpg)
Bruce JohnsonSenior Product Marketing ManagerFebruary 10, 2016
Cisco Web and Email Security
New Ways to Protect from the Top Threat Vectors
![Page 2: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/2.jpg)
Email: Leading Threat Vector
Data LossAcceptable Use Violations
Malware Infections
IPv6 Spam
Blended Threats
Targeted Attacks
APTs
Advanced Malware
Rootkits
Worms Trojan Horse
205.6 Billion Emails per Day in 2015
and Growing - Radicati
![Page 3: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/3.jpg)
Blended Attacks Multiple Security Layers Needed
![Page 4: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/4.jpg)
Point in Time Security is Not Enough!
BEFOREDiscoverEnforce Harden
DURINGDetect Block Defend
AFTERScope
ContainRemediate
Web Reputation
Usage Controls
Malware Signature
File Reputation
File Sandboxing
File Retrospection
Application Controls
Threat Analytics
Actionable Reporting
![Page 5: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/5.jpg)
Cisco Confidential 5© 2013-2014 Cisco and/or its affiliates. All rights reserved.
“If you knew you were going to be compromised…
…would you do security differently?”
![Page 6: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/6.jpg)
Joe CFOWaiting for his plane
Meet Joe. He is heading home for a well deserved vacation.
He’s catching up on email using the airport Wi-Fi while he waits for his flight.
BEFORE
![Page 7: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/7.jpg)
Joe CFOChecks his email
Joe just got an email from his vacation resort with a confirmation link.
www.beautiful-hawaii.com
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
![Page 8: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/8.jpg)
Joe CFOInstinctively, he clicks on the link
No problem, right? Everything looks normal.
The site may even be a trusted site, or maybe a site that is newly minted.
BEFORE
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
![Page 9: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/9.jpg)
DURINGJoe CFOJoe is now infected
Joe opens the link and the resort video plays.
Although he doesn’t know it, Joe’s machine has been compromised by a flash-based video exploit.
The malware now starts to harvest Joe’s confidential information:
•Passwords
•Credentials
•Company access authorizations
![Page 10: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/10.jpg)
Cisco Confidential 10© 2013-2014 Cisco and/or its affiliates. All rights reserved.
Now let’s see how Cisco’s Layered Defense protects Joe….
instant replay
![Page 11: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/11.jpg)
Meet Joe. He is heading home for a well deserved vacation.
Instant Replay with Cisco SecurityBEFORE
Waiting for his plane
How Cisco Protects You
![Page 12: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/12.jpg)
Joe just got an email from his vacation resort.
Instant Replay with Cisco Email SecurityDURING
Checks his email
How Cisco Protects You
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
![Page 13: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/13.jpg)
No problem, right? Everything looks normal.
Instant Replay with Cisco Web SecurityDURING
Instinctively, he clicks on the link
How Cisco Protects You
Deploys malware protection
Traces phone home traffic
Conducts 200 pt. website “credit check”
Controls social media micro-app policy
Activates embedded protection
Your Tropical Getaway
Joe,
Thank you for choosing us. We look forward to seeing you.
Before your arrival, please verify your information here: www.vacationresort.com
Best,Resort Team
Traces “phone home” traffic
![Page 14: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/14.jpg)
Joe opens the link and the resort video plays.
Instant Replay with Cisco AMP for Email & Web SecurityDURING
Joe is protected
How Cisco Protects You
Isolates unknown files through sandboxing
Evaluates file reputation
Registers files
![Page 15: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/15.jpg)
After a relaxing vacation, Joe returns home protected and unaware that the threat even existed. (and he still has a job!)
Joe CFO arrives home AFTER
Joe is protected
![Page 16: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/16.jpg)
After a few days, a file begins to behave maliciously.
Joe CFO arrives home AFTER
Joe is protected
How Cisco Protects You
Identifies polymorphic attacks
Discovers patient zero and zero +1
Analyzes threats retrospectively
![Page 17: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/17.jpg)
Layered Email and Web SecurityBest Defense for Complex Threats
Come by the Email and Web Security Booth and Learn More
![Page 18: Joe CFO for CiscoLive Berlin 2016 Email and Web Security Presentation](https://reader036.vdocument.in/reader036/viewer/2022062823/58772fb31a28ab2b2c8b6b69/html5/thumbnails/18.jpg)
Thank you