SlidePub
Home
Categories
Login
Register
Home
Technology
Cisco Secure Email 2024 Cisco Secure Email 2024
Cisco Secure Email 2024 Cisco Secure Email 2024
MichaelLee15927
49 views
23 slides
Mar 08, 2025
Slide
1
of 23
Previous
Next
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
About This Presentation
Cisco Secure Email 2024
Size:
1.19 MB
Language:
en
Added:
Mar 08, 2025
Slides:
23 pages
Slide Content
Slide 1
Cisco Secure Email
Business Decision Maker Presentation
Joseph Lee, Technical Manager (Cybersecurity), Ingram Micro
Date: 17 Jan 2024
Slide 2
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Stolen or compromised credentials through
phishing resulted in $4.91M in losses.
3
1 Artic Wolf Labs
2 FBI ICR Report 2022
3 IBM Cost of a Data Breach 2022
Attacks on emails remain the easiest way for
attackers to breach an organization.
Business Email Compromise (BEC) cases more than
doubled from the first quarter to the second
quarter of 2022 from 17% to 34%.
1
In 2022, the IC3 received 21,832 BEC complaints with
adjusted losses over $2.7 billion.
2
Email is still the #1 threat vector
Slide 3
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Slide 4
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Cisco Secure Email: a layered approach
Duo multi-factor authentication
Protect credentials
Domain Protection
Protect your brand
Talos real-time intelligence
Email Threat Defense
Detect advanced threats
Secure Awareness Training
Enforce security policies with employee behavior
change
Secure Malware Defense Detect malicious
files and sandboxing
Cisco Secure Email, a proven industry leader, keeps on-premises or cloud-based email safe and productive by
stopping phishing, spoofing, business email compromise and other cyber threats. Comprehensive threat
detection ensures the security of inbound and outbound messages.
Slide 5
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Flexible to fit your environment
Secure Email deployment models
On-Premise
Secure Email Gateway
Hybrid Cloud
Secure Email Cloud Gateway Secure
Email Threat Defense
Hardware or Virtual
Machines
Best of both worlds
Agile, Scalable, Secure
Slide 6
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
isibility across all vectors from a best-in-class portfolio
Superior threat intelligence from Cisco Talos
Telemetry
•Domain •IP
•Network •File
•URL •Flow
Automated Analysis
Specialized Tools
Slide 7
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Cisco Secure Email relies on constant and incremental improvement
Improvements to Talos capabilities
Scale Speed Agility Cloud
processing
Slide 8
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
URL reputation
File reputation
and analysis
Sender
reputation
Content
scanning
Spam protection
Malware Phishing / BEC Internal Threats Account Takeover
Email
Threat
Defense
Email Threat Defense: Comprehensive Attack Protection
Slide 9
16© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Unknown / Targeted
Coverage of Advanced Threat Life Cycle
0-Day
Research & Analysis
Implementation
Reputation & Rules
Time
Public Feeds
I
n
c
ident
s
Emerging Known Widely Known
Relationship Models
Natural Language Understanding
BEC Models
Phishing Models
Malware Analytics
Cloud URL Analysis
Sender IP Reputation
Domain Reputation
Web Reputation, Category
File Reputation
Anti-Virus
Sender Authentication (DMARC, SPF)
Anti-Spam & Graymail
Public Threat Feeds / VirusTotal
STIX/TAXII Subscriptions
Algorithm Matching
Cisco Advanced Phishing Engine (CAPE) &
Research Efficacy Team (RET)
Cisco Sender Reputation, URL Reputation
Cisco Anti-Spam, Talos Unified Verdict Service
Slide 10
14© 2023 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Complete protection from advanced threats
Unknown & Targeted
Previously unseen in the wild or custom
for single-use with intended target
Emerging Threats
Newly discovered tactics are
analyzed and crafted into detections
Known Threats
Sources and threats have been
analyzed and categorized
Talos
Intelligence
Talos
Research and Efficacy Team
Cognitive Machine Learning
(ML) and Natural Language
Processing (NLP) Threat
Detection
Slide 11
Sender text is unusual
Impersonates Microsoft
Greets person by username
Impersonates the recipient company
Link contains suspicious patterns
Sender domain has low reputation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
1
Slide 12
Impersonates
DocuSign
Brand
impersonation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
2
Slide 13
Detection of Docusign logo
without a Docusign domain
Semantic intent
understanding
HTML attachment
unlike what
Docusign usually
sends
Brand
impersonation
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
1
3
Slide 15
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Block attackers from using your domain
Secure Email Domain Protection
Protect Your Brand
•Easily analyze, update and take action
against those misusing your domain to send
malicious email
•Validate those who use your domain
appropriately
DMARC Authentication
•Compliant with new US Department of
Homeland Security Regulations
•Drive to DMARC Enforcement with proven
tools and services
Slide 16
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Slide 17
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Combat targeted malware with a powerful ecosystem
Secure Email Malware Defense
Find out if a file contains
a threat
Analyze new files in a
secure environment
Get alerted when
malware emerges in your
network
Automate removal from
Microsoft 365 and
Exchange inboxes
Slide 18
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
A comprehensive approach to combat phishing
Cisco Secure Email
Block malicious emails with threat
intelligence from Cisco Talos
Domain Protection
Prevent attackers from using your
domain in phishing campaigns
Duo multi-factor
authentication
Protect user credentials with multi
factor authentication
Secure Awareness
Training
Focus on user behavior training to
help employees work smarter and
safer
Email Threat Defense
Protect against advanced threats with
sophisticated Artificial Intelligence and
behavioral analytics
Secure Awareness Training
Slide 19
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Cisco XDR
You need a solution that sees deeply across the entire attack chain
The importance of a strong XDR strategy
Built on the Cisco Security Cloud platform
Most attacks use a sequence like this…
DNS Email
A well-tailored and
personalized email causes
a user to click…
Which goes to
a questionable web
site…
Which leads to a
strange process being
created locally on the
user’s device…
That process will
connect to another
machine or directly to
their data
Slide 20
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Your Infrastructure
SIEM/SOAROthers
3
rd
party toolsIntelligence
Cisco
ApplicationsCloud
Network Endpoint
Your SOC
CISO
SecOps
Analyst
Incident
responder
Clear
prioritization
Streamlined
investigations
Automation and
response guidance
Open and
extensible
Built on the Cisco security platform
Email
Identity
Simplify with Cisco XDR
Slide 21
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Andrew Fisher, Digital Program Manager at a healthcare
company with 10,001+ employees
“Spam, marketing, malicious or virus-enabled
emails are not delivered to us 90 to 91 percent of
the time because they are stopped external to
the organization. That is a massive win for us.”
Slide 22
© 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential © 2023 Ci sco and/ or i t s af f iliates. Al l ri ght s reserved. Ci sco Conf idential
Free Trial
Discover what your current protection is
missing and fortify against future gaps.
Start today!
Next Step
Tags
Categories
Technology
Download
Download Slideshow
Get the original presentation file
Quick Actions
Embed
Share
Save
Print
Full
Report
Statistics
Views
49
Slides
23
Age
269 days
Related Slideshows
11
8-top-ai-courses-for-customer-support-representatives-in-2025.pptx
JeroenErne2
46 views
10
7-essential-ai-courses-for-call-center-supervisors-in-2025.pptx
JeroenErne2
46 views
13
25-essential-ai-courses-for-user-support-specialists-in-2025.pptx
JeroenErne2
37 views
11
8-essential-ai-courses-for-insurance-customer-service-representatives-in-2025.pptx
JeroenErne2
34 views
21
Know for Certain
DaveSinNM
21 views
17
PPT OPD LES 3ertt4t4tqqqe23e3e3rq2qq232.pptx
novasedanayoga46
26 views
View More in This Category
Embed Slideshow
Dimensions
Width (px)
Height (px)
Start Page
Which slide to start from (1-23)
Options
Auto-play slides
Show controls
Embed Code
Copy Code
Share Slideshow
Share on Social Media
Share on Facebook
Share on Twitter
Share on LinkedIn
Share via Email
Or copy link
Copy
Report Content
Reason for reporting
*
Select a reason...
Inappropriate content
Copyright violation
Spam or misleading
Offensive or hateful
Privacy violation
Other
Slide number
Leave blank if it applies to the entire slideshow
Additional details
*
Help us understand the problem better