Part Two - solution breakdown
Positioning - Email security
Positioning - Stealthwatch
Positioning - CTR
Positioning - Duo
Positioning - Talos
Back to Main Menu
Verizon Breach Digest: https://enterprise.verizon.com/resources/reports/data-breach-digest/
1 Malware Bytes https://www.malwarebytes.com/pdf/white-papers/CTNT-Q4-17.pdf
2 The 5 Billion Dollar Scam, 2017 Business Email Compromise, E-mail Account Compromise
3 RSA 2017 Global Fraud & Cybercrime Forecast https://www.rsa.com/content/dam/en/infographic/2017-global-fraud-forecast.pdf
4 2018 ACR https://www.cisco.com/c/dam/m/hu_hu/campaigns/security-hub/pdf/acr-2018.pdf
was the average cost per breach in US in 20161
of SMBs with under 1,000 employees experienced cyberattacks in the last year3
of cyber attack victims in 2016 haven’t made changes in 20172
of SMBs consider regulatory and compliance constraintsas high security risks4
1) Source: Ponemon “2016 Cost of Data Breach Study: Global Analysis,” 2) Source: Ponemon “2016 Cost of Data Breach Study: Global Analysis,”
3) Source: Barkly, December 2016, Security Confidence Headed Into 2017 4) Source: Ponemon “2016 Cost of Data Breach Study: Global Analysis,”
Unleashing the power of the Cisco Integrated Security Architecture
Automates integrations across Cisco security products
Reduces the time and effort spent on key security operations functions: - Detection - Investigation - Remediation
Included as part of Cisco Security product licenses
Integration documents are available at duo.com/docs
Source: Gartner, Dale Gardner, 2018 Security Summit
Talos is the threat intelligence group at Cisco. We are here to fight the good fight — we work to keep our customers, and users at large, safe from malicious actors.