Enviar búsqueda
Cargar
Umbrella roaming-customer-facing
•
1 recomendación
•
54 vistas
Ricardo Mendizabal
Seguir
Umbrella descripcion
Leer menos
Leer más
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 2
Descargar ahora
Descargar para leer sin conexión
Recomendados
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
Symantec Security Response
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Ahmad Yar
Digital self defense
Digital self defense
Henrik Jacobsen
Null hyderabad - October Newsbytes
Null hyderabad - October Newsbytes
n|u - The Open Security Community
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
Evolution of ransomware
Evolution of ransomware
Charles Steve
WannaCry ransomware attack
WannaCry ransomware attack
Abdelhakim Salama
Shamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizations
Symantec Security Response
Recomendados
WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
Symantec Security Response
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
Ahmad Yar
Digital self defense
Digital self defense
Henrik Jacobsen
Null hyderabad - October Newsbytes
Null hyderabad - October Newsbytes
n|u - The Open Security Community
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
marada0033
Evolution of ransomware
Evolution of ransomware
Charles Steve
WannaCry ransomware attack
WannaCry ransomware attack
Abdelhakim Salama
Shamoon attacks - Destructive malware targeting Middle East organizations
Shamoon attacks - Destructive malware targeting Middle East organizations
Symantec Security Response
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
Cyren, Inc
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
Symantec Security Response
Aircrack
Aircrack
MuhammadHanzalah6
Threat landscape update: June to September 2017
Threat landscape update: June to September 2017
Symantec Security Response
NewsBytes - Nullhyd
NewsBytes - Nullhyd
n|u - The Open Security Community
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
WannaCry? No Thanks!
WannaCry? No Thanks!
Roberto Martelloni
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
Yunfei Yang
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
MarketingArrowECS_CZ
Pentesting
Pentesting
Henrik Jacobsen
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
Ransomware
Ransomware
Nick Miller
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
LAN Security
LAN Security
Syed Ubaid Ali Jafri
WIFI Hacking
WIFI Hacking
Suraj Bohara
Firewall
Firewall
Amuthavalli Nachiyar
SonicWALL Advanced Features
SonicWALL Advanced Features
David Perkins
Feb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-Security
Casey Dunham
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
MyNOG
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
Gurbir Singh
Más contenido relacionado
La actualidad más candente
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
Cyren, Inc
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
Symantec Security Response
Aircrack
Aircrack
MuhammadHanzalah6
Threat landscape update: June to September 2017
Threat landscape update: June to September 2017
Symantec Security Response
NewsBytes - Nullhyd
NewsBytes - Nullhyd
n|u - The Open Security Community
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Open Knowledge Nepal
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
WannaCry? No Thanks!
WannaCry? No Thanks!
Roberto Martelloni
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
Yunfei Yang
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
MarketingArrowECS_CZ
Pentesting
Pentesting
Henrik Jacobsen
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
Ransomware
Ransomware
Nick Miller
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
LAN Security
LAN Security
Syed Ubaid Ali Jafri
WIFI Hacking
WIFI Hacking
Suraj Bohara
Firewall
Firewall
Amuthavalli Nachiyar
SonicWALL Advanced Features
SonicWALL Advanced Features
David Perkins
Feb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-Security
Casey Dunham
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
MyNOG
La actualidad más candente
(20)
Webinar: Insights from CYREN's Q3 trend report
Webinar: Insights from CYREN's Q3 trend report
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
Aircrack
Aircrack
Threat landscape update: June to September 2017
Threat landscape update: June to September 2017
NewsBytes - Nullhyd
NewsBytes - Nullhyd
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
WannaCry? No Thanks!
WannaCry? No Thanks!
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
Antispam aneb plnoleté řešení
Antispam aneb plnoleté řešení
Pentesting
Pentesting
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Ransomware
Ransomware
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
LAN Security
LAN Security
WIFI Hacking
WIFI Hacking
Firewall
Firewall
SonicWALL Advanced Features
SonicWALL Advanced Features
Feb-8-2012-Breaking-Wireless-Security
Feb-8-2012-Breaking-Wireless-Security
Are you ready for the next attack? Reviewing the SP Security Checklist
Are you ready for the next attack? Reviewing the SP Security Checklist
Similar a Umbrella roaming-customer-facing
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
Gurbir Singh
Protect your guest wifi - NOW
Protect your guest wifi - NOW
Joshua Sibaja
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
AboutSSL
Partner Welcome Kit
Partner Welcome Kit
Luca Simonelli
Cisco umbrella overview
Cisco umbrella overview
Cisco Canada
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
OpenDNS
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
🏆Ruben Cocheno💭
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
Inforsud Diffusion
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
AlgoSec
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
Courtland Smith
5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
Icomm Technologies
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Canada
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.ppt
jhony64281
The vpn
The vpn
Abhinav Dwivedi
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension Inc.
Cisco Security Presentation
Cisco Security Presentation
Simplex
Similar a Umbrella roaming-customer-facing
(20)
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Steve Porter : cloud Computing Security
Steve Porter : cloud Computing Security
Protect your guest wifi - NOW
Protect your guest wifi - NOW
Four Network Security Challenges for the Cloud Generation
Four Network Security Challenges for the Cloud Generation
Partner Welcome Kit
Partner Welcome Kit
Cisco umbrella overview
Cisco umbrella overview
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Network Security: A Four Point Analysis of Appliances vs. the Cloud
Pxosys Webinar Amplify your Security
Pxosys Webinar Amplify your Security
Isday 2017 - Atelier Cisco
Isday 2017 - Atelier Cisco
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
White Paper: Securing Nomadic Workforce
White Paper: Securing Nomadic Workforce
5691 computer network career
5691 computer network career
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
Cisco Connect Halifax 2018 Anatomy of attack
Cisco Connect Halifax 2018 Anatomy of attack
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
How to install Kaspersky Antivirus.ppt
How to install Kaspersky Antivirus.ppt
The vpn
The vpn
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Cisco Security Presentation
Cisco Security Presentation
Último
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
Ethan lee
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
NZSG
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Dave Litwiller
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Paul Menig
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
Forklift Trucks in Minnesota
M.C Lodges -- Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
Aaiza Hassan
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
Eric T. Tung
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
Aggregage
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
IlamathiKannappan
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Seta Wicaksana
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Neil Kimberley
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
Workforce Group
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
AmzadHosen3
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Dipal Arora
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Delhi Call girls
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
Paul Menig
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dipal Arora
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Admir Softic
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Roland Driesen
Último
(20)
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
M.C Lodges -- Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
Organizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
Umbrella roaming-customer-facing
1.
© 2017 Cisco
and/or its affiliates. All rights reserved. The easiest and fastest way to protect users 100% of the time Cloud-delivered security service for Cisco’s next-generation firewall Umbrella Roaming protects employees when they are off the VPN by blocking malicious domain requests and IP responses as DNS queries are resolved. By enforcing security at the DNS-layer, connections are never established and files are never downloaded. Malware will not infect laptops and command & control (C2) callbacks or phishing will not exfiltrate data over any port. Plus, you gain real-time visibility of infected laptops with C2 activity. Protect your mobile workforce with no extra agents or user actions All internet activity that bypasses your perimeter security is now enforced through our security service, so your off-network blind spot is eliminated. Umbrella Roaming is fully integrated into AnyConnect for Windows or Mac OS X. And unlike using the VPN, there’s absolutely nothing new for end-users to do or any performance sacrifice.2 Cisco Umbrella: Roaming Package DATASHEET The problem NGFWs are blind to 25% of traffic1 Not all traffic—over all ports, all the time—is backhauled to perimeter security using the Cisco AnyConnect VPN due to: • Apps & data in the cloud • Personal web browsing • Split tunnels configured And endpoint security (i.e. AV) is not enough to protect your mobile workforce. The solution Cisco NGFW + Cisco Umbrella Roaming • Security when the VPN is off • No action required from end users • Protect against threats over any port • For Windows and Mac OS X roaming laptops The way your employees work has changed 82% of your workers admit to not always using the VPN2 Employees are using more cloud apps for work and leveraging their work laptops for personal use—the reality is that not every connection goes through the VPN. Your network extends beyond the perimeter, and your security must too. 49% of your workforce is mobile and under defended3 Zero-day malware spikes at night and on weekends when we’re roaming and attackers know we’re vulnerable. In fact, 22% of malicious email links are clicked when roaming.4 While security may never stop 100% of the threats, it must work 100% of the time. No one combines effectiveness & performance better #1 fastest & most reliable DNS with 85M+ daily active users 100B+ daily internet requests or connections 3M+ daily new domain names discovered 60K+ daily malicious destinations identified 7M+ malicious destinations enforced concurrently while resolving DNS requests Threats blocked over any port Cisco NGFW Roaming laptop with AnyConnect Internet VPN ON VPN OFF Umbrella acticve Cisco Umbrella Malware Phishing C2 Callbacks 1. cs.co/gartner-prediction 2. cs.co/IDG-survey 3. cs.co/sans-survey 4. cs.co/proofpoint-report 5. cs.co/dns-latency, system.opendns.com
2.
© 2017 Cisco
and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) 3 CONFIDENTIAL Learn why we’re so fast & reliable • For network teams, go to cs.co/pointdns to learn how we’ve maintained 100% uptime since 2006. • For sysadmin teams, go to cs.co/roaming to learn why virtually no PC resources are used. How we predict threats before they happen Real-time, diverse data reveals internet activity patterns Correlating DNS, WHOIS, BGP, IP geolocation, SSL certificates, and even file connectivity provides a complete view of domains and IPs where threats are staged. Automated statistical models identify malicious destinations Similar to Amazon learning from shopping patterns to suggest the next purchase, or Pandora learning from music listening patterns to play the next song, we learn from internet activity patterns to identify attacker infrastructure being staged for the next threat. Simple for both security & sysadmin teams Enable roaming protection in minutes • Simply enable the Roaming Security module available in Cisco AnyConnect v4.3 or later for Windows or Mac OS X. OR • Deploy a stand-alone Umbrella Roaming Client for Windows or Mac OS X alongside any other remote access VPN client. Global security by default • As soon as Roaming Security is enabled, mobile workers are protected against malicious destinations. • If a threat is requested via a web browser, end-users receive a customizable block page. • To immediately access a blocked site, just allow the domain. Instant visibility into threats • View your daily, weekly, or monthly security events occurring off-network either in your inbox or our dashboard. • Check if threats are trending up or down as well as the domains and laptops with the most security events. • Respond to an incident by drilling into the full activity per domain or laptop. Detailed logs for incident response • View and optionally filter the last 30 days of detailed, real-time Internet activity by time, domain, category, laptop, or IP location. • “Top N” summary reports are retained for up to 2 years and can be scheduled to your and others’ inboxes.
Descargar ahora