This page is fully or partially automatically translated.

cisco Umbrella Desktop
  • Product Presentation
  • Technik II
  • Cloud Security
  • Endpoint Protection
  • Mobile Security
  • Network Security / Patch Management
  • SIEM / Threat Analytics / SOC
  • Websecurity/VPN

Threat Intelligence meets DNS

Which attacks do you miss? - Why DNS-level security is your starting point for the best defense against threats must be.

10/6/2020 1:45:00 PM – 10/6/2020 2:00:00 PM

Please log in or register in advance so that you can take part in actions or watch videos about the action!

This action is available to the it-sa 365 community as a video.

cisco Umbrella Desktop
  • Product Presentation
  • Technik II

Which attacks do you miss? - Why DNS-level security is your starting point for the best defense against threats must be.

Language: German

Questions and Answers: Yes

graphical blue background
close

This video is available to the it-sa 365 community. Please register or log in with your login data.

Action description

Today, employees work from anywhere - from co-working environments and cafes to Home office - and use networked devices and cloud applications to rebuild their working days
design and define. This is excellent for productivity and efficiency - but at the same time the network security is strained to the utmost. Furthermore, gaps and Weak points are created as employees move further and further away from the "conventional office".
79% of organizations are increasing direct Internet access (DIA) and SaaS adoption to 60% in the next two years, so they will recognize that, while the old approach
has worked in the past, it is not sufficient for today's networks. Security experts need a simpler and more reliable method to improve visibility and security for distributed improve environments and users, both inside and outside the network.
Hackers are alert and combine today's technological innovations with their mad creativity. They switched from attacks that aim to steal data, to blackmail, which instead blocks users from accessing their data when they do not pay a ransom. They manipulate files and sabotage software and devices to influence stock values or make websites illegible. They use Zero-Day-vulnerabilities, intercept and hack online credit card transactions in a fraction of a second, And also they attack networked devices ranging from surveillance cameras to smart watches, skateboards and even Cars.

read more

Speaker

Moderator