How Cisco can help build your resilience
Cisco is helping organizations meet their resilience goals with the Cisco Security Cloud
A unified platform for end-to-end security
across hybrid multicloud environments
In addition to frictionless management and implementation, the Cisco Security Cloud provides detection and response services including threat intelligence, endpoint detection and response (EDR), and extended detection
and response (XDR).
Learn more about the Cisco Security Cloud
Here are some specific ways in which the tools
and services within the Cisco Security Cloud portfolio
can help organizations with their resilience:
Empower your teams to focus on reducing the biggest risks to your business, with Kenna Vulnerability Management.
With new CVEs being disclosed daily, it has become increasingly difficult for security teams to stay abreast of the latest risks, let alone quickly determine which ones apply to their network environment. From those, prioritizing which CVEs to patch first adds an additional wrinkle to the process.
If this wasn’t challenging enough,
a curve ball that’s often lobbed at security teams are the “breaking news” vulnerabilities— vulnerabilities picked up by the security media,
often with much fanfare. The stories surrounding these high-profile vulnerabilities generally carry an implied threat that the CVE in question will throw the doors wide open to attackers if not addressed immediately.
Kenna Security, a pioneer in risk-based vulnerability management, relies on threat intel and prioritization to keep security and IT teams focused on risks. Using data science, Kenna processes and analyzes 18+ threat and exploit intelligence feeds, and 12.7+ billion managed vulnerabilities to give you an accurate view of your company’s risk. With our risk scoring and remediation intelligence, you get the info you need to make truly data-driven remediation decisions. This is modern risk-based vulnerability management.
Watch demo of Kenna Security:
The Town of Gilbert
“You have to put the appropriate defenses in play. It’s very important that we engage with companies like Cisco that help inform us about how to enhance security in a way that takes away as much risk as possible.”
“Our dynamic and automated approach to remote access enabled Teleperformance and 60 of its clients to be resilient amidst unprecedented change, while managing risk across the distributed network. “I don’t know how we would have managed this so quickly without the expertise of smartNS and Cisco,” says Tsahouridis. “Our internal network team, together with smartNS, succeeded in quickly adapting the solution and deploying into production. It would have taken us a year to achieve what we did in two months.”
How does vulnerability management have its roots in the music of the 1920s? Another great story from Advisory
CISO Wolfgang Goerlich
Eliminate security gaps with our open, connected platform,
In security, attackers aren’t the only concern. You’re racing against time to keep up with business needs. Teams can feel overwhelmed by a slew of disconnected vendors and products. Context can be hidden in multiple consoles, with conflicting alerts needed to make faster and smarter decisions.
Cisco SecureX is founded on maintaining full security stack visibility and extensive integration capabilities with your existing security infrastructure. It’s a cloud-native, built-in platform experience within our portfolio. It is
integrated and open for simplicity, unified in one location for visibility, and maximizes operational efficiency to secure your network, endpoints, cloud, and applications.
Simply log in with your Cisco credentials to activate SecureX and start securing your network, users
and endpoints, cloud edge, and applications with a simplified
"All the security products we have implemented–from Cisco Umbrella to Cisco Secure Endpoint–are integrated thanks to the Cisco SecureX platform, which greatly facilitates my work and that of my team. Within Cisco SecureX, visibility and automation are definitely the most valuable features for us, together with the powerful analytical tools of Cisco Talos which are constantly detecting and updating protection against new threats. We’ve been working with Cisco technology for over 4 years now and our trust in the vendor has grown day by day as the effectiveness of the solutions and their responsiveness has consistently impressed. So, step by step our sense of protection has also increased.”
Mitigating Insider Threats
There are two broad categories of insider threats: the malicious insider and the unwitting asset. Both present unique challenges in detection and prevention for defenders and organizations’ IT admins.
Over the past six months to a year, Cisco Talos has seen an increasing amount of incident response engagements involving malicious insiders and unwitting assets being compromised via social engineering.
Resilience begins with secure connections. Cisco Identity Services Engine helps ensure that only trusted users and their devices can access resources across your self-managed network.
In addition, Cisco Security Analytics allows you to work confidently by
developing a baseline for normal access, then analyze each new access attempt to spot anomalous behavior. Gain insight into threats such as account takeover, access abuse, and compromised insiders.
Read more about what Cisco Talos is seeing with insider threat.
For more on this topic,
Cisco Secure recently put together
a white paper on the Insider Threat Maturity FrameWork.
Watch demo of Security Analytics
Stop more threats with Cisco Talos, the largest commercial
threat intelligence network.
Security tools are only as good as the intelligence and expertise that feeds them. Our security technologies are powered by Cisco Talos, one of the largest and most trusted threat intelligence groups in the world.
Talos is comprised of highly skilled researchers, analysts, and engineers who provide industry-leading visibility, actionable intelligence, and vulnerability research to protect both our customers and the internet at large.
The Talos team serves as a crucial pillar of our innovation — alerting customers and the public to new threats and mitigation tactics, enabling us to
quickly incorporate protection into
our products, and stepping in to help organizations with incident response.
Talos also leverages its unique insights to help society better understand and combat the cyberattacks facing us daily. During the war in Ukraine, the
group has taken on the additional
task of defending over 30 critical infrastructure providers in the country by directly managing and monitoring their endpoint security.
Cisco Talos Incident Response provides several services including emergency response, planning, playbooks, readiness assessments, tabletop exercises, compromise assessment, threat hunting, and cyber range training.
In addition, we can also provide Cisco Talos Intel on Demand.
This service bolsters your security team’s ability to identify and investigate threats by providing them with up-to-date intelligence reporting on the
latest threats and custom research surrounding your organization’s unique infrastructure, position as a potential target, and other relevant contextual factors to help give your organization an edge against your adversaries.
With this service, you ensure your team receives actionable information they can use to supplement in-house intelligence to strengthen your security.
The CTIR (Cisco Talos Incident Response) team will work with you to confirm business objectives, determine logistics and uncover any additional background information they need to provide thorough research. Next, they will perform investigations using a variety of available telemetry and intelligence to collate their research in a consumable and actionable way. Once the research phase is complete, a CTIR team member will meet with you to deliver their findings.
Read more about Cisco Talos Intel on Demand
Watch this episode of ThreatWise TV to learn more about the types of cyber attacks that our Cisco Talos Incident Response team regularly deal with. Plus, hear more about Cisco Intelligence on Demand:
Baltimore Police Department
Monitoring our network now occupies 15% of our time instead of every minute of the day, and we can start neutralizing a threat immediately. Whenever we learn about a new vulnerability, my team can take an Indicator of Compromise (IoC) from Cisco Talos, put it into Cisco Secure Malware Analytics, and can instantly see if we've been compromised.”
“I received an alert for Solarwinds malicious activity…and Cisco was already on top of it due to (Cisco) Talos threat intelligence backing the solution.”
Know when your
For more than a decade, Cisco has invested in and developed advanced technologies to deliver security resilience for our customers, across these
• Vulnerability management
• Identity and trust
• Endpoint protection
• Tracing and contextualization
• Application security
• Device security
• Threat Intelligence
Because you can embed security resilience across the organization with Cisco Secure, you protect the integrity of all your resilience initiatives — and emerge stronger every day.