SlideShare a Scribd company logo
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Cisco SecureX.pdf
Denunciar
WildhaniIhyaraRahman1
Seguir
28 de May de 2023
•
0 gostou
•
18 visualizações
1
de
18
Cisco SecureX.pdf
28 de May de 2023
•
0 gostou
•
18 visualizações
Baixar agora
Baixar para ler offline
Denunciar
Tecnologia
Cisco Extended Detection and Response
WildhaniIhyaraRahman1
Seguir
Recomendados
BGA SOME/SOC Etkinliği - Tehdit Odaklı Güvenlik Mimarisinde Sourcefire Yakla...
BGA Cyber Security
3.4K visualizações
•
48 slides
Building a Security Architecture
Cisco Canada
4.7K visualizações
•
68 slides
David Patterson IT Security Resumes 2016
David Patterson
748 visualizações
•
7 slides
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
Cisco DevNet
1.6K visualizações
•
31 slides
Cisco Connect Ottawa 2018 data centre security
Cisco Canada
156 visualizações
•
47 slides
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
572 visualizações
•
22 slides
Mais conteúdo relacionado
Similar a Cisco SecureX.pdf
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
197 visualizações
•
62 slides
IBM Relay 2015: Securing the Future
IBM
1.9K visualizações
•
23 slides
Cisco Endpoint Security for MSSPs
Cisco Russia
927 visualizações
•
25 slides
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
1.4K visualizações
•
22 slides
Windows 7 Security Enhancements
Presentologics
1.2K visualizações
•
43 slides
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
466 visualizações
•
35 slides
Similar a Cisco SecureX.pdf
(20)
CLÍNICA DE RESPUESTAS A INCIDENTES Y THREAT HUNTING - WORKSHOP DAY TÉCNICO DE...
Cristian Garcia G.
•
197 visualizações
IBM Relay 2015: Securing the Future
IBM
•
1.9K visualizações
Cisco Endpoint Security for MSSPs
Cisco Russia
•
927 visualizações
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
•
1.4K visualizações
Windows 7 Security Enhancements
Presentologics
•
1.2K visualizações
Protecting Your Key Asset – Data Protection Best Practices V2.0 Final
Vinod Kumar
•
466 visualizações
Architecting Secure Web Systems
InnoTech
•
1.7K visualizações
[Cisco Connect 2018 - Vietnam] Eric rennie sw cisco_connect
Nur Shiqim Chok
•
50 visualizações
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
NetworkCollaborators
•
116 visualizações
Securing Sensitive Data in Your Hybrid Cloud
RightScale
•
1.2K visualizações
Proteja seus clientes - Gerenciamento dos Serviços de Segurança
Cisco do Brasil
•
580 visualizações
Slide Griffin - Practical Attacks and Mitigations
EnergySec
•
547 visualizações
CIS Control Solution Guide
Lauren Bell
•
130 visualizações
CONFidence2015: Real World Threat Hunting - Martin Nystrom
PROIDEA
•
314 visualizações
DESIGNS & IMPLEMENTATIONS TO OVERCOME CHALLENGES IN THE UTILITY INDUSTRY
iQHub
•
12 visualizações
Scalar Security Roadshow - Ottawa Presentation
Scalar Decisions
•
852 visualizações
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
•
1.4K visualizações
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
Amazon Web Services
•
4.4K visualizações
Manoj Kumar_CA
Manoj Kumar M
•
446 visualizações
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
•
2.8K visualizações
Último
Orchestration, Automation and Virtualisation Maturity Model
CSUC - Consorci de Serveis Universitaris de Catalunya
51 visualizações
•
19 slides
h2 meet pdf test.pdf
JohnLee971654
52 visualizações
•
4 slides
Elevate Your Enterprise with FME 23.1
Safe Software
277 visualizações
•
72 slides
Advancing Equity and Inclusion for Deaf Students in Higher Education
3Play Media
143 visualizações
•
24 slides
Product Listing Presentation_Cathy.pptx
CatarinaTorrenuevaMa
62 visualizações
•
41 slides
Accelerating Data Science through Feature Platform, Transformers, and GenAI
FeatureByte
139 visualizações
•
46 slides
Último
(20)
Orchestration, Automation and Virtualisation Maturity Model
CSUC - Consorci de Serveis Universitaris de Catalunya
•
51 visualizações
h2 meet pdf test.pdf
JohnLee971654
•
52 visualizações
Elevate Your Enterprise with FME 23.1
Safe Software
•
277 visualizações
Advancing Equity and Inclusion for Deaf Students in Higher Education
3Play Media
•
143 visualizações
Product Listing Presentation_Cathy.pptx
CatarinaTorrenuevaMa
•
62 visualizações
Accelerating Data Science through Feature Platform, Transformers, and GenAI
FeatureByte
•
139 visualizações
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
NicolasVuillamy1
•
186 visualizações
Improving Employee Experiences on Cisco RoomOS Devices, Webex, and Microsoft ...
ThousandEyes
•
63 visualizações
Data Formats: Reading and writing JSON – XML - YAML
CSUC - Consorci de Serveis Universitaris de Catalunya
•
54 visualizações
Die ultimative Anleitung für HCL Nomad Web Administratoren
panagenda
•
57 visualizações
Keynote: Two years at the British Library... and counting / Alan Danskin (Bri...
CILIP MDG
•
24 visualizações
Cloud Composer workshop at Airflow Summit 2023.pdf
Leah Cole
•
77 visualizações
Understanding Wireguard, TLS and Workload Identity
Christian Posta
•
100 visualizações
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc
•
123 visualizações
GDSC Cloud Lead Presentation.pptx
AbhinavNautiyal8
•
13 visualizações
BuilderAI Proposal_Malesniak
Michael Lesniak
•
85 visualizações
Prompt Engineering - an Art, a Science, or your next Job Title?
Maxim Salnikov
•
18 visualizações
Experts Live Europe 2023 - Ensure your compliance in Microsoft Teams with Mic...
Jasper Oosterveld
•
56 visualizações
UiPath Tips and Techniques for Error Handling - Session 2
DianaGray10
•
24 visualizações
Navigating the Future
OnBoard
•
24 visualizações
Cisco SecureX.pdf
1.
Wildhani I R Cybersecurity
Specialist SecureX
2.
Agenda SecureX Value Proposition Understanding
SecureX Demo SecureX Automated Threat Hunting Investigation Demo SecureX Orchestration Custom Response Actions 1 2 3 4
3.
5 © 2022 Cisco
and/or its affiliates. All rights reserved. Cisco Public SecureX Value Proposition
4.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Top Customer Challenge Security Operations Technologies and Intelligence Is this thing bad? Has it affected us? How? Why? Web Security Network Analytics Next-Gen Firewall Email Security Third-Party Sources Secure Internet Gateway Next-Gen IPS Endpoint Security Threat Intel SIEM Identity Management Malware Detection Security Does Not Work Together
5.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Investigation Remediation Managed Policy Orchestration Automation Detection Analytics Unified Visibility What is SecureX Customer Infrastructure SIEM/SOAR Identity Third-Party/ITSM Intelligence Cisco Secure Applications Cloud Network Endpoint A Cloud-Native, Built-In Platform Experience Within Our Portfolio Customer Teams ITOps NetOps SecOps
6.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecureX Unlocks Value for Your Customers Integrations built-in, pre-built or custom Ribbon & Sign-on never leaves you maintains context Dashboard customizable for what matters to you Threat Response is at the core of the platform Orchestration drag-drop GUI for no/low code Unified In One Location for Maximized Operational Integrated & Open for Simplicity Visibility Efficiency Device Insights device inventory with the contextual awareness
7.
6 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential How true simplicity is experienced Before: 32 minutes 2. Investigate incidents in multiple consoles Product dashboard 1 Product dashboard 2 Product dashboard 3 Product dashboard 4 3. Remediate by coordinating multiple teams Product dashboard 1 Product dashboard 2 Product dashboard 3 Product dashboard 4 1. IOC/alert After: 5 minutes SecureX threat response is integrated across your security infrastructure SHA - 256 IP Target endpoint Email Query intel and telemetry from multiple integrated products Subject Quickly visualize the Threat impact in your environment Remediate directly from one UI In one view Malicious domain
8.
© 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential Cisco Infrastructure Third-Party Infrastructure IT service management, and cloud/virtual and DevOps platforms General Toolsets Scripting/dev tools, system interfaces, data exchanges, and messaging protocols Networking, collaboration, server/ app, and Multicloud management platforms Third-Party Security Operational tools, intelligence sources, infrastructure protections and visibility Meaningful Integrations to Protect your Network HTTP SMTP SNMP …and more! ACI UCS Director CloudCenter DNA Center Cisco Webex
9.
8 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential A new level of visibility with SecureX dashboard Understand what matters in one view across your security infrastructure • Applications (left) View, launch or trial the integrated products • Tiles (middle) Presents metrics and operational measures from the integrated products • News (right) Product updates, industry news, and blog posts
10.
9 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential I make automated playbook changes in minutes with a drag- drop interface My top 5 most frustrating tasks have all be automated We have never communicated faster: Our approvals are automated Maximizing operational efficiency After: I combined 9 tasks across 3 security tools, 2 infrastructuresystems, and 3 teams in one keystroke! Solution:Orchestrating security across the full lifecycle Before: Repetitive, human-poweredtasks ALERT task: REMEDIATE Cisco or non-Cisco infrastructure Pre-built or customizable workflows task task task task while loop condition Go To: SecureX threat response deep dive Outdated playbook Automation script that works “sometimes” Playbook Integration script that no longer works
11.
14 © 2022 Cisco
and/or its affiliates. All rights reserved. Cisco Public Understanding SecureX
12.
11 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps The process of consulting all the modules to find out what any of them know about the observable(s). Enrichment DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation
13.
12 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps DNS security Etc.. EPP NGIPS SecureX threat response EPP logs NGIPS logs DNS logs Etc. File Analysis Etc . IP reputation Domain reputation Enrichment The process of consulting all the modules to find out what any of them know about the observable(s).
14.
13 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps Enrichment DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation The process of consulting all the modules to find out what any of them know about the observable(s).
15.
14 SecOps The process of
leveraging the capabilities of SecureX-enabled technologies to mitigate threats by acting on observables or targets Response DNS security Etc.. EPP NGIPS EPP logs NGIPS logs DNS logs Etc. SecureX threat response File Analysis Etc . IP reputation Domain reputation © 2023 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
16.
15 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential SecOps DNS security Etc.. EPP NGIPS SecureX threat response EPP logs NGIPS logs DNS logs Etc. File Analysis Etc . IP reputation Domain reputation Response The process of leveraging the capabilities of SecureX-enabled technologies to mitigate threats by acting on observables or targets
17.
16 © 2023 Cisco
and/or its affiliates. All rights reserved. Cisco Partner Confidential I’m a Cisco Secure customer with SecureX threat response My team can: Answer questions faster about observables. Block and unblock domains from threat response. Isolate Hosts Hunt for an observable associated with a known actor and immediately see organizational impact. Save a point in time snapshot of our investigations for further analysis. Document our analysis in a cloud casebook from all integrated or web-accessible tools, via an API. Integrate threat response easily into existing processes and custom tools Store our own threat intel in threat response private intel for use in investigations See Incidents all in one place Block and unblock file executions from threat response