Presentation c97 737987
Presentation c97 737987
Presentation c97 737987
Endpoint
Secure your endpoints and turbocharge your security ops
January 2022
Do you have the expertise,
time, and evidence to secure
your endpoints?
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Image source: https://commons.wikimedia.org/wiki/File:Soccer_goalkeeper.jpg (public domain)
Securing your endpoints is a challenge
How Cisco Helps:
Challenge: Expertise
“My team can’t be experts on every new threat or
all be experts in threat hunting.” 10 Person-hours saved
per security incident
Challenge: Time
Challenge: Evidence
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Introducing Secure Endpoint Pro
Combines human and machine power to reduce endpoint detection and response tasks and times
We do the heavy lifting of We detect and respond to We investigate every threat and
securing your endpoints threats in minutes, not hours prioritize the most critical ones
Our dedicated elite team of Cisco Cisco specialists use automation and We conduct an in-depth investigation of
security experts performs 24x7x365 advanced playbooks powered by the every incident for you and enable you to
endpoint monitoring, detection, and Cisco SecureX platform to drastically approve or reject remediation actions based
response so you don't have to reduce detection and response times so on evidence from our experts
you don't have to
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
How Cisco Secure Endpoint Pro works for you
Example Use Case
Receive Correlate Escalate to Threat Analyze Validate Determine Report & Approve/Reject
Alert Quarantine? Other Hosts Investigator Enrichment Assessment Evidence Malicious? Impact/Urgency Mitigation Response
• Cisco SOC ingests all events from Secure Endpoint and reviews • Comprehensive portal for all service interactions enables
them against playbooks and use cases visibility and dashboard status
• Each incident is prioritized and enriched by dedicated SOC • Easily approve or reject remediation actions and view links to
and Intel Teams available 24/7 incidents
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The Cisco Secure Endpoint solution
Secure your endpoints while turbocharging your security operations
Stop Threats Before Remediate Faster and More Maximize Your Security
Compromise Completely Operations
Quickly detect advanced attacks such as Decrease incident response time by up to Improve your security operations
ransomware with multifaceted prevention, 97% with advanced Endpoint Detection effectiveness by up to 86% and simplify
attack surface reduction, and posture and Response (EDR) and built-in Extended your security by eliminating complexity
assessments. Detection and Response (XDR) and enhancing SecOps productivity
capabilities.
Get the security expertise you need with Focus on the most important threats
endpoint detection and response managed Drastically reduce detection and and gain always-on security operations
by a team of dedicated Cisco experts response times with Cisco specialists that with accelerated EDR
quickly investigate and remediate threats
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Stop threats before
compromise
Dynamic multifaceted prevention
• Behavioral analytics, machine learning, signatures and more
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Remediate faster and
more completely
Extensive EDR and XDR capabilities
• Advanced and cross-control detection and response
• Endpoint isolation and other attack surface reduction capabilities
Accelerated threat response
• Automated playbooks, hundreds of preloaded queries
• Human-driven hunts for threats with in-depth mapping to MITRE
ATT&CK framework
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Maximize your security
operations
Investigate faster
• Pivot faster and never lose context with the SecureX ribbon that provides
relevant information that you take with you
Simplify incident management
• Pre-built or build your own investigation workflows
• Built-in approval actions, malware analysis, live queries, threat response
and third-party integrations
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Integrated XDR with Cisco SecureX
Cisco Secure
We’ve done the hard work to simplify your
Network Endpoint Cloud Applications
experience, accelerate your success and secure your
future
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Cisco Endpoint Security with SecureX Built-In
Endpoint security
enhances the
platform experience Enhance endpoint
Share details on affected
detection and response
endpoints, blocking of
supported with telemetry
malicious files, and
from other security
isolate endpoints
controls
The platform experience
improves endpoint
security
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Save time with threat response in Cisco SecureX
32 minutes 5 minutes
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
SecureX Threat Hunting and live queries built-in
• SecureX Threat Hunting leverages Cisco’s
entire security intelligence – to help
identify threats found within the
environment
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
The value of SecureX platform with
Endpoint Security
“
The combined power of Secure
Endpoint, Secure Firewall, and
“
It reduces our time to resolution of
risk within our environment”
Umbrella allows me to view what
threats have been seen in my
environment and exactly how
serious they are. I can analyze if it
“
We use Cisco SecureX threat response to
investigate malware threats found in
has been seen elsewhere and
Secure Endpoint and any suspicious
where.”
network activity determined through
Secure Network Analytics”
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Integral part of the Cisco Secure Hybrid Work solution
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Secure Endpoint makes it easy to manage your agents
Unify your security stack by consolidating multiple agents into a single agent
• ONE platform
‑ Cloud-native, cloud-managed in our built-in SecureX platform
‑ Unmatched customer value as it comes included with:
• Device Insights for deep visibility of all your endpoints, apps and more
• Indicator of device compromise for easy and fast disposition lookup
• Fast response actions and remediation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Focus on the most important incidents and vulnerabilities
Secure Endpoint integrates with risk-based vulnerability management from Kenna Security
93
Enterprise Data
70 30
Data Science
Focus on the incidents and Boost ROI by optimizing Increase visibility and improve
vulnerabilities that matter first
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
resources security posture 17
Why Cisco?
Stops threats with simple, unified defense
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Why customers love
Cisco Secure Endpoint?
Reduces workload, time and resources
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
“Cisco Secure Endpoint will stop infection/exploit “We significantly reduced our time for detection & “Productivity increased. Automated
from spreading to other devices.” remediation, enabling a focus on other Security areas.” email alerts improved security ops.”
IT Professional, Medium Enterprise Consumer Company Amit Mathur, IT Specialist, Convergent Corporation Chief Security Officer, Small Business Healthcare Company
“It doesn’t impact the devices. “Cisco Secure Endpoint has made breach defense reach “With every incident, at least six
It’s just a rock-solid solution.” all-time highs. It helps me sleep better at night!” to 10 man-hours are saved.”
Dan Turner, CIO at Per Mar Security Service Ryan Paul, IT Specialist, Thunder Bay Regional HSC Wouter Hindriks, Technical Team Lead at Missing Piece BV
“Integrating Secure Endpoint with SecureX “Secure Endpoint Gives The Visibility, Detection
“
gives a lot of visibility to your endpoints.” and Remediation Organizations Need.”
IT Manager, $500M+ Manufacturing Cisco Secure Endpoint is 21st Security Admin, $50M+ Healthcare
“Cisco Secure Endpoint has taken our time to “Secure Endpoint has increased the confidence in our detection ability. “It’s given us visibility that we
remediate from hours to minutes.” It co-exists perfectly with our other solutions.” otherwise didn’t have by 80%.”
Neal Gravatt Sr Network Engineer at a Real Estate/Law Ludovic Varet, Chief Security Officer, Gecina Mark Bonnamy, Technical Director at Ridgewall Ltd
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Cisco Secure portfolio: simpler to buy and use
Security Choice Talos
Enterprise Agreement threat intel
• Great discounts on 2+ security • Cloud-native, built-in platform
products with support included experience including XDR
capabilities and beyond
• Buy what you need now and
Network Cloud • Integrated and open for
add more in the future
Security Edge simplicity with true turnkey
• Single coterminous agreement interoperability
managed in one portal • Unified in one location for
User & Endpoint Application visibility that accelerates your time
• Built-in 20% growth allowance with Protection Security to detect and investigate
true forward terms
• Maximized operational
• Pay annually with 0% financing Zero efficiency that accelerates
Trust your time to remediate
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
• Try it for free today!
Register for the Cisco Secure
Endpoint 30-day trial
• Download the latest AV
comparatives results to learn more
about how effective
Cisco Secure Endpoint is in
Next steps malware protection
• View our latest XDR-based
Webinar Series featuring Secure
Endpoint and SecureX
• Sign-up for the Threat Hunting
Workshop near you
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Appendix
Cisco Secure Endpoint
Pro
Let Cisco help with
your endpoint defense
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Image source: https://commons.wikimedia.org/wiki/File:Soccer_goalkeeper.jpg (public domain)
Secure Endpoint Pro with SecureX built-in
Unlike other solutions, you:
• don’t give up control of the policies/
configuration for your endpoints
Cisco does all the heavy
• get less false positives lifting for you
• don’t have to buy multiple modules
• have a simple portal for all service
interactions
• have the entire platform working for you with Detection, investigation
context from all control points and response combines
human and machine
power
Secure Endpoint Pro turbocharges your
security and delivers a unified platform
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Our best resource is our people with 2,200+ experts
Global scale and footprint provide deep visibility and analysis into the most advanced threats
NOCs
SOCs
CaaS
Data Centers
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Cisco Secure Endpoint Pro portal is your one-stop shop
Dashboard, ticketing, reporting, and case management for security operations and executives
Customer Portal
Central hub for all service
interactions. It includes a dashboard,
ticketing, reporting and case
management that provides both
operations and executive visibility to
all activities.
Service Dashboard
An interactive snapshot of activities and
metrics in one place where you can see
the effectiveness of Secure Endpoint Pro
in securing your organization.
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
How Cisco Secure Endpoint Pro works for you
Approval Response Action Interface
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
How to Purchase Cisco Secure Endpoint Pro
• For Cisco Secure Endpoint customers with an
Advantage or Premier License
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Cisco Secure Client
45 … is the average number of
security tools deployed per
organization
Fragmented
everything is a Why MORE is not better?
broken security • Organizations with 50+ tools end up 8%
paradigm lower in detecting threats
• Agent-fatigue gets amplified
• SecOps, NetOps and ITOps efficiency takes a
hit
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Users: ITOps, NetOps
and SecOps
Use Cases
• Reduce agents on my endpoints
cases. •
•
I want to know the status of my endpoints at any given time
I need visibility to my environment, fast (via the Cloud is
preferred)
• Show gaps and compliance issues in my security controls
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Consolidate and simplify security.
Starting with the Endpoint is key.
Fragmented
• Endpoint security is a key control point for overall security and
for modern architectures like: XDR, SASE and Zero Trust
• Unify to accelerate
‑ From platform to the agent
‑ Speeds the move to XDR, SASE, Zero Trust
• ONE platform
‑ Cloud-native, cloud-managed in our built-in SecureX platform
‑ Unmatched customer value as it comes included with:
• Device Insights for deep visibility of all your endpoints, apps and more
• Indicator of device compromise for easy and fast disposition lookup
• Fast response actions and remediation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Driving Endpoint Operational Efficiency
Better Endpoint Security with operational efficiency rooted in integration and agent consolidation
Agent
Consolidation
Secure
Client
Opportunity
Next Gen
Antivirus* EDR DNS / Web
Protection
Vulnerability
Identity VPN DLP
Management
Encryption UEM OS
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
*Many customers still run legacy AV on systems (mostly from different vendor)
Protect
Save time and block more with security
that works together
See once, block everywhere
Removed automatically Blocked across network, endpoints,
If malware Immediate
from endpoints email and cloud
gets in Detection
“ Made major investment in Cisco… looked at [“3Cs”] can orchestrate better if I stick to Cisco –
need to find products that complement what we have and not retrain staff
– Security Director
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Higher security efficacy with the least false alarm
Validated by 3rd Protection Rate False Alarms
party tests:
AV Comparatives, Malware Protection Test 100% 0
Miercom,
Real World Protection Test 99.3% 1
and NSS Labs
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Detect & Respond
Know everything about the endpoint and
respond with
Advanced Endpoint Detection and Response (EDR)
Detection Response
• Continuous activity monitoring • Custom block/allow lists for files and
• Advanced endpoint search network traffic
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Improve security & IT Ops alignment and simplify threat
hunting with
Orbital Advanced Search
Key capabilities:
Advanced search; pre-defined, customizable
queries; forensics snapshot
Benefits:
Faster investigation and quicker response, seamless
investigation and remediation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Orbital Advanced search
Use cases
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Uncover hidden threats faster across your
attack surface
Using MITRE ATTACK and other industry
best practices
Threat Hunting
Continuous hunting by elite
threat hunters
Human-driven hunts based on playbooks
producing high fidelity alerts
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
SecureX Threat Hunting Example alerts
Threat Hunting Alert MITRE ATT&CK
“Device executed Powershell to schedule a task that creates a text Tactics: Execution (TA0002), Persistence (TA0003), Defense
file of FTP commands, executes FTP Evasion (TA0005), Command & Control (TA0011).
and a downloaded malware.”
Techniques: Commonly Used Port (T1043), Scheduled Task (T1053)
“Device is communicating with malicious JavaScript that is posted WebService (T1102), Mshta (T1170).
on pastebin[.]com. The JavaScript is executed by Microsoft HTML
Applications utility, mshta.exe. The JavaScript “unescapes” an
encoded string to reveal embedded VBScript that is called by
wscript.exe and launches powershell. Persistence is maintained via
scheduled tasks.”
Remediation: Isolate the host from the network, perform forensic investigation, and reimage the system to prevent potential unknown
persistence methods.
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
SecureX Threat Hunting
What customers are saying…
Thank you for the notification; we are Thank you for this info, it was super helpful.
appreciative of the quick follow up, This endpoint has been taken offline and
effectiveness, and communication from our replaced.”
Cisco partners.”
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Access
Protect applications from infected devices with the industry’s first
“Zero Trust on the Endpoint” approach
Block malicious devices from accessing applications.
Users use their devices to Cisco Secure Endpoint It notifies the MFA blocks that device
access application. running on the device MFA about the infected from accessing apps.
detected malware. device.
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Secure endpoint access from anywhere on any
device
Virtual Private Network
Greater visibility
Comprehensive protection
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Eliminate blind spots with
continuous monitoring and retrospective alerting
• What happened?
• Where did the malware
come from?
• Where has the malware been?
• What is it doing?
• How do we stop it?
https://www.cisco.com/c/en/us/products/security/amp-for-endpoints/index.html
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Why Cisco?
Market Presence 2.2
trillion artifacts analyzed daily
6000+ endpoint 15M+ 70k AMP Ecosystem 100M DNS security more than any vendor
security customers protected endpoints customers customers
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Vertical & Industry
Cisco Secure Endpoint for Education
A shifting landscape for education
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
Introducing Secure Endpoint for Education
A Modern Endpoint Security Solution!
• Quickly detect advanced attacks such as
ransomware with multifaceted prevention,
attack surface reduction, and posture
assessments.
Cisco Secure XDR
• Decrease incident response time by up Endpoint
to 97% with advanced Endpoint VPN
EPP/EDR
Detection and Response (EDR) and built- Posture
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Where does Endpoint for EDU fit?
Secure Endpoint
Essentials Orbital advanced Search | Malware Analytics Cloud | Cisco Secure Endpoint Pro (Available)
200+ Pre-Defined Vulnerability, IT Operations, and Threat-Hunting Queries | Advanced Sandboxing Techniques
Cisco SecureX Platform | Platform Next Generation Endpoint Protection | Continuous Monitoring|
Dynamic File Analysis | Vulnerability Identification | Endpoint Isolation
†
Student device licenses will be available at 1/5 the price of staff licenses
** Secure Malware Analytics (formerly known as Threat Grid) for 1staff users licenses with the purchase of 500 or less endpoint licenses
††
Secure Malware Analytics (formerly known as Threat Grid) for 3 staff users licenses with the purchase of 500 or more endpoint licenses
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Secure Endpoint for EDU introductory offer
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
‣ Dive deeper. Schedule a meeting.
‣ See a demo