上海品茶

您的当前位置:上海品茶 > 报告分类 > PDF报告下载

思科(Cisco):安全电子邮件买家指南(英文版)(12页).pdf

编号:112300 PDF  DOCX  12页 7.32MB 下载积分:VIP专享
下载报告请您先登录!

思科(Cisco):安全电子邮件买家指南(英文版)(12页).pdf

1、1 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure Email 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailCisco Secure Email Buyers GuideProtecting the#1 threat vector2 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure Email1.BitDefender 2020 Mi

2、d-Year Threat Landscape Report,2020.https:/ Email Attacks are Evolving in 2021,T,February 11,202.https:/ Blogsm“Staggering Phishing Statistics in 2020.https:/ to Buy715%YoY increase in Ransomware attack during 20201US$75,000:the average amount requested in in wire-transfer based BEC attack295%of net

3、work attacksin 2020 caused by successful phishing attacks3Email:The Leading Attack Vector for Cyber Attacks,AgainOrganizations continue to face a daunting challenge.Email is simultaneously the most important business communication tool and the leading attack vector for security breaches.The ubiquito

4、us,and casual,use of email makes it the perfect avenue to deliver threat-centric content,insert malware into corporate systems,steal data,and extort money.With the growing adoption of cloud mailbox services like Microsoft 365,and the massive exodus from corporate campuses over the last year,blended

5、attacks can target an organization from anywhere.Although a variety of attack types continue to wage war on business email,three categories of attack remain the greatest cause concern:1.Ransomware2.Business Email Compromise(BEC)3.Phishing 2021 Cisco and/or its affiliates.All rights reserved.3 2021 C

6、isco and/or its affiliates.All rights reserved.Cisco Secure EmailGiven the tactics used by these three categories of attack,Cisco recommends deploying an email security solution that delivers on five critical requirements.Your email security should:1.Leverage the strength of a platform approach2.Del

7、iver layered security and retroactive remediation3.Protection against business email compromise 4.Safeguard against data leakage and risk from outbound email5.Encrypt sensitive business informationLeverage the strength of a platform approachGiven the ever-increasing sophistication of the threat land

8、scape,it is essential that your email security solution takes full advantage of the benefits of having a built-in platform approach for better,faster threat response.Anytime a vendor claims to have a security platform,make sure to figure out what they mean by“platform”.Not all platforms are created

9、equal,nor do they provide the same benefits.The three main platform types youll encounter include:1.Solution-based platforms2.SIEM or SOAR-based platforms3.Portfolio-based PlatformLearn about the differences here.Buying criteria for email securityUnlike a SIEM or a SOAR,which both add value in their

10、 own ways,Security Platforms offer native integrations that make it much easier to scale security functionality across traditionally segmented threat vectors like email.Instead of being limited to the context that is generated by the native detection and response engines,a platform-enabled email sec

11、urity solution gains intelligence from the entire environment.Better intelligence means faster,and better,security decisions.Additionally,platforms enable a higher level of automation,which alleviate administrative burdens and further accelerate the detection and remediation of threats while minimiz

12、ing human error.4 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailTo learn more about the platform visit Secure Endpoints(Formerly AMP for Endpoints)and Cisco Secure Email with SecureX threat response are valuable integrations because that is where we see most attacks happenin

13、g.”Wouter HindriksSenior IT Architect,Missing PieceCisco SecureX is a cloud-native,built-in platform that connects Cisco Secure Email to the rest of the Cisco Secure Portfolio as well as 3rd party solutions.The broadest,most integrated platform on the market,SecureX removes bottlenecks that currentl

14、y hinder convoluted security workflows.Our security platform:Simplifies security with customizable dashboards that provide operational metrics,insights in to emerging email threats,and access to additional security functionality in a single click.Unifies device information into a comprehensive devic

15、e inventory,delivering the contextual awareness needed to identify gaps in coverage and simplify security investigations.Accelerates threat response and incident management by combining email intelligence with that of other threat vectors into a single view.How Cisco delivers on the promises of a pl

16、atform approach 2021 Cisco and/or its affiliates.All rights reserved.5 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailTo be effective,your email security solution needs to go beyond basic,single point-in-time inspection and should integrate multiple layers of security that re

17、peatedly analyze threats and monitors traffic trends.It is inevitable that ransomware,malware,phishing attacks,or malicious URLs will get through front-line defenses,and so continuous threat monitoring and assessment will be the best way to detect the problem,understand the impact or potential effec

18、t of the event,and then remediate it as quickly as possible.Deliver layered security and retroactive remediation 2021 Cisco and/or its affiliates.All rights reserved.Threat Intelligence Talos is Ciscos team of more than 350 full-time threat researchers,analysts,engineers,linguists,developers,and oth

19、er operators work around the clock digging deep into threats,tracking actors,creating and shipping detection,and adding deep,meaningful context to threat intelligence.This intelligence is gathered from a global range of sources,including other Cisco security products,which is then shared with Cisco

20、Email Security customers for more effective protection.By seeing a threat once and blocking it everywhere,Talos provides best-in-class protection and safeguards against blended attacks as they are emerging and blocks them.6 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailCisco

21、 Secure Email deploys a number of methods to create the multiple layers of security needed to defend against multiple attack types and continuously examines your security environment for malicious files or URLs that may have slipped through.Geolocation-based filtering safeguards against sophisticate

22、d spear phishing by quickly controlling email content based on the location of the sender.The Cisco Context Adaptive Scanning Engine(CASE)provides spam capture rates greater than 99 percent and an industry-low false positive rate of less than one in one million.Advanced outbreak filters provide ongo

23、ing deep inspection of URLs.With real-time click-time analysis,so that even websites that change from good to malicious behavior can be blocked quickly.Cisco Secure Email Malware Defense provides persistent protection against URL-based threats via real-time analysis of potentially malicious links.Ma

24、lware Defense continuously leverages real-time Talos monitoring and analytics and Cisco Threat Grid intelligence to identify previously unknown threats or sudden changes in the disposition of a file.Malware Defense also takes steps to remediate by automatically triggering dynamic reputation analysis

25、 and providing visibility into where the malware originated,what systems were affected,and what the malware is doing.After automatically prioritizing remediation,Malware Defense takes action on both inbound and outbound email based on these insights.How Cisco Secure Email provides layer security and

26、 automated retrospective remediationProtection Across Multiple Attack VectorsMalware Defense provides continuous analysis and retrospective security across your security environment in addition to traditional point-in-time detection techniques.NetworkLayered,Continuous Analysis&Retrospective Securit

27、yGlobal Threat Intelligence&Advanced AnalyticsEndpointMobileVirtualCloudEmail&Web7 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailRetrospective Security for Microsoft 365Malware Defense uses automated retrospective security to take action on infected inbound and outbound emai

28、ls for Microsoft 365 customers to help remediate breaches faster and with less effort.If a seemingly good attachment is later discovered to be malicious,an automated API call is made to Azure and the file is forwarded or deleted.To learn more about security for Microsoft 365 visit email compromise(B

29、EC),or impostor email,is a form of phishing attack in which a cybercriminal impersonates an executive(often the CEO)and attempts to get an employee,customer,or vendor to transfer funds or sensitive information to the phisher.BEC attacks are highly focused and use social engineering techniques to scr

30、ape compromised email inboxes,study company news,and research employees on social media to make the email look convincing.Because they dont use malware or malicious URLs to threaten organizations,BEC attacks can be very difficult to detect.Protection Against BEC 8 2021 Cisco and/or its affiliates.Al

31、l rights reserved.Cisco Secure EmailEmail security solutions must detect,block,and manage risks in outbound email.This includes guarding against malicious content sent to customers and business partners and preventing sensitive data from leaving the networkeither by accident or by design.In addition

32、 to losing critical intellectual property,compromised email accounts containing malware can propagate a virus by launching sudden outbound spam bursts.This can lead to a block-listing of the organizations email domain,even when the emails are signed.Protection Against Data Leakage and Risk from Outb

33、ound Email Cisco uses a multilayered approach to BEC that monitors worldwide email and web traffic using sophisticated web reputation filters and advanced email authentication technologies to identify spear phishing attempts Forged Email Detection makes it easier to detect spear phishing attacks by

34、examining one or more parts of the SMTP message for manipulation,including the“Envelope-From”,“Reply To”,or the“From”headers.A suite of authentication tools targets these parts:Sender Policy Framework(SPF)for sender authentication and DomainKeys Identified Mail(DKIM)and Domain-based Message Authenti

35、cation,Reporting,and Conformance(DMARC)for domain authentication.Visibility into email senders and their domains enables authorization of legitimate senders and blocks fraudulent emails before they reach employees,business partners,and customers.How Cisco Safeguards Against BEC9 2021 Cisco and/or it

36、s affiliates.All rights reserved.Cisco Secure EmailCisco Secure Email combines several layers of security for reducing the risk of outbound threats.Outbound LiabilityMail Flow PoliciesAntispam and AntivirusData Loss PreventionEncryption Vides security layers for outbound email,including behavioral m

37、onitoring to detect compromised accounts,rate limiting for outbound traffic,and antispam and antivirus scanning-which can keep compromised machines or accounts from getting your company on email blacklists.Cisco Data Loss Prevention technology provides content,context,and destination knowledge to pr

38、event accidental or malicious loss of data,enforce compliance,and protect your brand and reputation.You control who can send what information where and how.Over 150 up-to-date predefined policies help prevent data loss and support security and privacy standards for government,private sector,and cust

39、om company-specific regulations.For example,filters such as“HIPAA,”“GLBA,”or“DSS,”enable automatic scanning and encryption of payload according to policy to prevent the loss of data.Remediation choices include adding footers and disclaimers,adding blind carbon copies(BCCs),notifying,quarantining,enc

40、ryption,and more.Policies include:Card Industry Data Security Standard(PCI DSS)Health Insurance Portability and Accountability Act(HIPAA)Sarbanes-Oxley Act(SOX)Gramm-Leach-Bliley Act(GLBA)State and European privacy directives and regulations In addition,Transport Layer Security(TLS)digital certifica

41、tes provide communications protection by authenticating the user as well as the network for privacy and data integrity between sender and recipient.How Cisco Protects Against Data Leakage and the Risk of Outbound Threats10 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailHow Ci

42、sco Encrypts DataCisco Secure Email uses the most advanced encryption key service available today to manage email recipient registration,authentication,and per-message/per-recipient encryption keys.Superior TLS support helps configure the best method of delivery.The gateway also gives compliance and

43、 security officers the control of and visibility into how sensitive data is delivered.A customizable reporting dashboard provides instant access to information about encrypted email traffic,including the delivery method used and the top senders and receivers.Read our recent datasheet for more inform

44、ation on Ciscos encrypted email service.Companies should be able to rely on secure communications to conduct their business activities without fear of compromise.Encryption is one of the critical security layers for protecting data leaving your network.Whether its malicious or accidental,encryption

45、can keep sensitive information such as financial and personal information,competitor intelligence,and intellectual property from exposure.Encrypt Sensitive Business Information11 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure EmailTheres a growing interest in an evolution of email

46、 security;a comprehensive solution that provides the highest levels of security,unparalleled integration and the ability to greatly reduce complexity.This is exemplified by Cisco Secure Email.A proven industry leader,Cisco Secure Email delivers comprehensive protection for on-premises or cloud-based

47、 email by stopping ransomware,phishing,spoofing,business email compromise,malware and other common cyber threats.It protects against malicious content,remediates attacks and prevents loss of sensitive information.Built-in capabilities with SecureX provide visibility and integration across the entire

48、 security portfolio to simplify the ability to search for and remediate threats.Regardless of how you choose to deploy,you get the same code base with the same features enabled.This means you can deploy security today on premises,and then migrate to a hybrid environment and even fully deploy to the

49、cloud in phases while keeping consistent policies and familiar user interfaces across environments.Simple setup and automation provides protection within minutes.Our solution is cost-effective,on-guard,and up-to-date.Subscriptions start as low as 100 users and the same features and deployment choice

50、s are available to customers of all sizes.To learn more,visit Secure Email represents a suite of deployment optionsDeployment optionsMultidevice SupportHybridVirtualTabletApplianceCloudHybridManagedLaptopMobileDesktopOnPremises12 2021 Cisco and/or its affiliates.All rights reserved.Cisco Secure Emai

51、l 2021 Cisco and/or its affiliates.All rights reserved.The best way to understand the benefits of Cisco Secure Email is to put us to the test in a free,45-day trial.For additional information,please visit: Cisco Secure Email todayToday organizations need a platform-enabled,multilayered email securit

52、y model to protect against sophisticated multi-vector threats such as BEC,ransomware,and URL-based attacks.Our best-of-breed protection is exactly what your businesses need to keep on-premises and cloud email safe.Our platform approach to security integrates across products,so you get effective inte

53、lligence sharing across the portfolio.The result is a faster,more synchronized response across security layers:The most robust and predictive global intelligence from Cisco Talos that sees attacks before they impact your systems Protection from risky files no matter when they become malicious and mi

54、tigation of damage if an infection occurswith the same protection for Microsoft 365 email users Deep,real-time URL scanning,analysis and blocking that catches malicious changes at click time Prevention of sensitive information from inadvertently getting out so you can stay compliant with industry an

55、d government regulations Comprehensive and real-time reporting to reduce investigation and response times Flexible deployment options with the same robust email protection on-premises and in the cloud so you can migrate with confidence A small footprint,easy implementation,and automated administration to yield savings over time and a low total cost of ownershipHow to buyTo view buying options and speak with a Cisco sales representative,visit

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(思科(Cisco):安全电子邮件买家指南(英文版)(12页).pdf)为本站 (无糖拿铁) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
会员购买
客服

专属顾问

商务合作

机构入驻、侵权投诉、商务合作

服务号

三个皮匠报告官方公众号

回到顶部