
Security is the foundation of the Network and the malware attack is growing exponentially, globally cybercrime will cost 6 trillion annually by 2021. The attack is mainly target to the BFSI industry, as a No.1 vendor into security vendor, CISCO leads the partner eco-system into security. Vishak Raman, Director, Security speaking at the 5th CISCO India Summit in Goa. Security is running across the core fabrics. In CISCO we bring an unique integrated and orchestration approach to fast detect the attack, Vishak said. He further said on how they integrated the technology into four critical components like Alerts, Events, Threat Intelligence and Broadcast .
Alerts- Real-time activities at the endpoint are reported back to the firewall
Events- What happens at the identity service engine, is communicated o the next-gen firewall
Threat Intelligence- What we at the detection point of view, is broadcasted to the entire portfolio
Broadcast- Many corporates are also use these security best practices. Cisco Umbrella gives, the power to block newly-detected threats beyond the network perimeter, everywhere your employees work.
The fundamental principle is to detect once and protect everywhere and as a security and network security leader, it is important on how fast we are able to detect vulnerability, to complement this, with our CISCO’s Talo labs,300 dedicated persons are working 24/7 for detecting actual threats, Threat Intelligence work for enhancing security,learns from internet activity to automatically identify attacker infrastructure staged for current and emergent threats. Umbrella captures and understand relationships between malware, domains, IPs, and networks across the internet.
[Why Malware Variants are High Vs CVE]
Detect once, suppose in any part of the email security detects a phishing and the Talos Security Intelligence and Research Group (Talos) is made up of leading threat researchers supported by sophisticated systems to create threat intelligence for Cisco products that detects, analyzes and protects against both known and emerging threats. Detect once, suppose in any part of the email security detects a phishing attack and we check on the actual domain using our umbrella portfolio and push the intelligence back to our endpoint” Vishak said.
Vishal also spoke about CISCO acquisition strategy is concerned, we are Network security, we are moving ahead from core Network to hybrid cloud and there is higher visibility of shadow IT operations. The markets have moved away from speeds and feeds, the time really matters to actually close the vulnerability window. “We just not limited to the Cisco’s products, also sharing the threat intelligence with the third party, because not all the system are going to be homogenously Cisco. There is a module known as the ‘Policy Exchange’ in our identity threat engine, where co-work with our competitors, in terms of sharing our artifacts” Vishak also said on the identity services and it’s opportunity of the growth.
Lastly, Raman said, all of our acquisition strategy of products and services have a common connector and also towards the hybrid cloud, he also spoke on the OpenDNS, sees approximately 16 billion web requests a day, an Advance Malware Protection .
Related Articles
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.