SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
AMP Helps Cisco IT Catch 50%
More Malware Threats
Cisco IT relies on the ESA for its threat-centric email security strategy.
And AMP has added an additional layer of valuable defense. The results
speak for themselves.
Source
Cisco Information Technology, Messaging and Calendaring Operations. Oct. 2014 – May 2015
© 2015 Cisco and/or its affiliates. All rights reserved.
www.cisco.com/go/emailsecurity
Get this same level of protection and performance for your organization.
Cisco IT Inbound Email Statistics
Phishing Statistics
Emails blocked on
average by the ESA60%
0
20
40
60
80
100
Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May15
%
Blocked Delivered
Malware Statistics
31%
0 3000 6000 9000 12000 1800015000
Feb-15
Mar-15
Apr-15
May-15
Blocked by AMP
400
500
600
Jan-15 Feb-15 Mar-15 Apr-15 May-15
500K
Emails with malicious URLs blocked on
average every month
Rootkits
Viruses Trojans
Worms
0
20
40
60
80
100%
Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May15
Blocked Email Statistics
>80%
Of blocked emails were caught
by SenderBase reputation analysis
Of encountered malware attacks were zero-day
(previously unknown) threats blocked by AMP
on ESA. Improving the overall malware catch rate
by approximately 50%!!!.
Blocked by ESA

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (13)

The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 

Ähnlich wie AMP Helps Cisco IT Catch 50% More Malware threats

Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
Symantec
 

Ähnlich wie AMP Helps Cisco IT Catch 50% More Malware threats (9)

Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015Symantec Intelligence Report: February 2015
Symantec Intelligence Report: February 2015
 
CompTIA IT Employment Tracker - April 2016
CompTIA IT Employment Tracker - April 2016CompTIA IT Employment Tracker - April 2016
CompTIA IT Employment Tracker - April 2016
 
CompTIA IT Employment Tracker - August 2016 release
CompTIA IT Employment Tracker - August 2016 releaseCompTIA IT Employment Tracker - August 2016 release
CompTIA IT Employment Tracker - August 2016 release
 
CompTIA IT Employment Tracker - November 2016
CompTIA IT Employment Tracker - November 2016CompTIA IT Employment Tracker - November 2016
CompTIA IT Employment Tracker - November 2016
 
CompTIA IT Employment Tracker - October 2016
CompTIA IT Employment Tracker - October 2016CompTIA IT Employment Tracker - October 2016
CompTIA IT Employment Tracker - October 2016
 
Updated Resume
Updated ResumeUpdated Resume
Updated Resume
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Keep Your Guard: Stay Compliant and Be Secure
Keep Your Guard: Stay Compliant and Be SecureKeep Your Guard: Stay Compliant and Be Secure
Keep Your Guard: Stay Compliant and Be Secure
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 

Mehr von Cisco Security

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security
 

Mehr von Cisco Security (17)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 

AMP Helps Cisco IT Catch 50% More Malware threats

  • 1. AMP Helps Cisco IT Catch 50% More Malware Threats Cisco IT relies on the ESA for its threat-centric email security strategy. And AMP has added an additional layer of valuable defense. The results speak for themselves. Source Cisco Information Technology, Messaging and Calendaring Operations. Oct. 2014 – May 2015 © 2015 Cisco and/or its affiliates. All rights reserved. www.cisco.com/go/emailsecurity Get this same level of protection and performance for your organization. Cisco IT Inbound Email Statistics Phishing Statistics Emails blocked on average by the ESA60% 0 20 40 60 80 100 Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May15 % Blocked Delivered Malware Statistics 31% 0 3000 6000 9000 12000 1800015000 Feb-15 Mar-15 Apr-15 May-15 Blocked by AMP 400 500 600 Jan-15 Feb-15 Mar-15 Apr-15 May-15 500K Emails with malicious URLs blocked on average every month Rootkits Viruses Trojans Worms 0 20 40 60 80 100% Oct-14 Nov-14 Dec-14 Jan-15 Feb-15 Mar-15 Apr-15 May15 Blocked Email Statistics >80% Of blocked emails were caught by SenderBase reputation analysis Of encountered malware attacks were zero-day (previously unknown) threats blocked by AMP on ESA. Improving the overall malware catch rate by approximately 50%!!!. Blocked by ESA