Part One - overview
User trust and identity
Duo
Too much malware getting in?
Umbrella
AMP
Email security
Takes too long to detect a breach?
Stealthwatch
Manual investigation is too difficult?
Cisco Threat Response
Threat Grid
Too long to Remediate Issues?
Incident Response
Built into the foundation of the internet
Intelligence to see attacks before launched
Visibility and protection everywhere
Enterprise-wide deployment in minutes
Integrations to amplify existing investments
DNS = Domain Name System
First step in connecting to the internet
Precedes file execution and IP connection
Used by all devices
Port agnostic
All office locations
Any device on your network
Roaming laptops and supervised iOS devices
Every port and protocol
On-network coverage With one setting change Integrated with Cisco SD-WAN, Cisco ISR 1K and 4K series, Cisco Meraki MX, MR, and Cisco WLAN controllers
Off-network laptop coverage With AnyConnect VPN client integration Or with any VPN using lightweight Umbrella client Or with Umbrella Chromebook client
Off-network mobile coverage With Cisco Security Connector
Take a few minutes to experience our 14-day trial of Umbrella
Deep inspection and control of web traffic
Capture all web traffic with full URL logging and blocking capabilities
Enforce acceptable use policies with content filtering and URL blocking
Block more malware with SSL decryption and file inspection
Additional functionality to be delivered in phases as developed
Quickly deploy DNS-layer security as first line of defense
Add deeper inspection and control with cloud-delivered firewall and secure web gateway capabilities
Easily scale security with future SaaS and web traffic growth
Monitor Process behavior at execution
Tuned to detect tell-tale ransomware signs
Quarantine and terminate associated files and processes
Log and alert encryption attempt
Umbrella provides:
Connection for safe requests
Prevention for user and malware-initiated connections
Proxy inspection for risky domains
Robust prevention, detection & response
Scalable and integrated architecture
Powered by global threat intelligence