Cisco Threat Scan Proof of Value Programme A step-by-step guide The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Do you know what’s happening in your network? You can’t protect what you can’t see. Gain visibility and deeper intelligence with the ASA Next Generation Firewall and FirePOWER The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The Guide covers: 1. The ASA Family 2. Why take part in a Cisco Threat Scan Proof of Value installation? 3. How the programme works 4. Cisco Threat Scan Attack Risk Report Guide The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. 1. The ASA Family Threat defence solutions are often complex, costly and can be hard to manage. Cisco’s ASA family with FirePOWER software offers more. The industry’s first adaptive, threat-focused next-generation firewall that’s intelligent, simple, intuitive, cost-effective and incredibly secure. The winning factors of the ASA family Experience the revolutionary next-generation firewall Gain visibility and deeper intelligence with the ASA 5506 Increase security (compared with traditional solutions) Take advantage of a 2 week FREE trial We will install and configure the system at your site Comprehensive threat attack report provided after 2-weeks No obligation to purchase If purchased we can provide technical support and additional services A class-leading, intelligent, threat-centric solution that’s simple, intuitive, cost-effective and incredibly secure. ‘Since May 2015, Cisco has reduced the median time to detection (TTD) of known threats in our networks to about 17 hours —less than one day. This far outpaces the current industry estimate for TTD, which is 100 to 200 days.’ The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Lower cost and complexity As well as delivering the highest levels of threat defence, Cisco’s ASA products offer businesses unrivalled cost and control benefits. By consolidating multiple security features in a single platform, the ASA with FirePOWER Services will help your business to; Reduce the requirement for multiple security solutions from different vendors Eliminate the complexity and drain on resources associated with managing disconnected solutions Streamline operations by correlating threats to better detect and prioritise threats based on their risk Automate security processes to help speed remediation against changing threat conditions The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Want to know more about the ASA 5506? Watch these short videos Introducing Cisco ASA with FirePOWER Services: Defend Against Today’s Attacks: The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. 2. Why take part in a Threat Scan Proof of Value installation? The short answer: it’s because truly effective threat defence is more in demand than ever. What’s more, figures* show that, today, businesses of all sizes are seeking powerful but flexible tools for securing networks that do not place a high burden on their staff numbers or budgets. This is precisely what Cisco’s ASA products offer. Its unique combination of benefits are significant. And our Threat Scan Proof of Value programme gives you the perfect opportunity to see these benefits for yourself. As you’ll see, the Threat Scan Proof of Value programme is simple and completely free and after the monitoring period (typically 2 weeks) we believe you will want to purchase the product. Why? Because you’ll see the unrivalled network intelligence the ASA with FirePOWER provides. The result? Unbeatable threat defence and a significant boost in the security your business. * Cisco ASR 2015, p40 The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. 3. How the Threat Scan programme works We will supply you with the Cisco ASA with FirePOWER software. The ASA will be installed by us in monitor-only mode, and will not be active on the network. The report, profiling network traffic over 14 days, will be generated by Cisco FireSIGHT. All you need to do is request a Threat Scan Proof of Value installation from us We will install a Cisco ASA for free to monitor your network for a 2 week period After this the equipment is collected and a report generated which will include the following: • • • • Executive summary Assessment results Business risk of attacks Recommendations If you decide to purchase the Cisco ASA, we provide you with a quote for the appropriate ASA with FirePOWER and a Service Contract The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. CiscoThreat Scan Attack Risk Report Guide The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Attack Risk Report Overview, 14 days later . . . The report provides a complete security analysis for the period during which the network was monitored. It will identify key observations including critical attacks using impact analysis, allowing customers make better informed decisions regarding the security of their network. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Total attacks Total attacks refers to the total number of attacks that were conducted during the assessment period. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Relevant attacks This refers to the number of attacks that will have an effect on their systems or network. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Hosts targeted This is the total number of hosts that were targeted for attack during the assessment period. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Irrelevant attacks Irrelevant attacks show the percentage of threats that will not have any significant effect on their systems or network. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Events requiring attention This refers to the percentage of events that occurred during the assessment period, which may require further investigation and protection. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Hosts connected to CnC Servers This shows the number of computer hosts connected to ‘command and control’ servers, designed to infect their systems and report back on the network status. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Relevant attacks carry the following risks This table shows the type of threats that their system was vulnerable to over the assessment period and the number of times each threat occurred. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Impact Analysis This graph displays the proportion of high and low impact threats on targeted machines within their network. This is then measured against the cost of qualifying these attacks, which Cisco’s FirePower software automatically identifies. The results of this are then extrapolated to estimate the cost savings of using and ASA with FirePower over 3 years. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. High impact attacks This table details the machines in their network that have been identified as vulnerable to threats and provides them with their IP information. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Hosts at high risk This chart displays the percentage of their hosts which have been targeted with high impact attacks. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Hosts already compromised The report generates a list of compromised devices and details how many hosts are connected to dangerous CnC servers. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Automating the tuning effort This table describes the type of changes and the number of times those changes occurred on their network during the assessment period. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Applications associated with attacks The applications identified in this table are associated with both high and low impact events during the assessment period and the number of occasions these events occurred. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Top attackers and targets This table details the IP addresses of attackers and information of the machines on their network that were targeted. This is shown for both high and low impact events. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. IPv6 attacks and traffic Network avenue IPv6 is often an unmonitored route for attackers. This table compares the number of hosts monitoring IPv6 with the number of attacks seen over IPv6. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Business risk of intrusion attempts The most common attack types are listed in this table alongside the associated risks that this presents to their business and network. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. Recommendations The report provides recommendations for protecting the network and systems from further threats. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. The image part with relationship ID rId2 was not found in the file. © 2016 Cisco and/or its affiliate. All rights reserved. 35
© Copyright 2026 Paperzz