cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
481
Views
0
Helpful
0
Comments
Amilee San Juan
Cisco Employee
Cisco Employee

(Twitter) CCR S8E34.pngListen: https://smarturl.it/CCRS8E34 
Follow us: twitter.com/ciscochampion

Nearly every day we can read about “ransomware” holding another organization’s data hostage, shutting their operations down, or disrupting their supply chain. Commercial enterprises, major utilities, large healthcare providers, processing facilities—even small businesses aren’t safe from being the target of these attacks.

The key to preventing your organization from falling prey to ransomware is to keep several steps ahead of hackers. In many cases, the tools you need to protect your data are already available in your network. With the recent introduction of Continuous Trusted Access and the new Cisco Trust Analytics you can now secure your network from several potential attack vectors.

Trust Analytics is part of Cisco SD-Access, Cisco’s best-of-breed Zero Trust solution for the workplace. Trust Analytics detects traffic from endpoints that are exhibiting unusual behavior by pretending to be trusted endpoints using MAC Spoofing, Probe Spoofing, or Man-in-the-Middle techniques.

Learn more:https://blogs.cisco.com/networking/trust-analytics-and-anti-spoofing-protection-its-already-in-your-network?dtid=opdcsnc001469

Cisco Champion Hosts:
Daren Fulwell (twitter.com/darenfulwell), ANS Group, Technical Architect
Evan Mintzer (twitter.com/EvanMintzer), Ashfield Engage, Information Security Manager
Marc Luescher (twitter.com/LuescherMarc), Fresenius Medical Care North America, Networking and Email Security Architect

Guest:
Justin Buchanan, Director, Product Management, Security Policy and Access

Moderator:
Amilee San Juan (twitter.com/amileesan1), Cisco, Customer Voices and Cisco Champion Program

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: