Cisco Champion Radio

S8|E34 Ransomware and Cisco Zero-Trust Networking


Listen Later

Nearly every day we can read about “ransomware” holding another organization’s data hostage, shutting their operations down, or disrupting their supply chain. Commercial enterprises, major utilities, large healthcare providers, processing facilities—even small businesses aren’t safe from being the target of these attacks.
The key to preventing your organization from falling prey to ransomware is to keep several steps ahead of hackers. In many cases, the tools you need to protect your data are already available in your network. With the recent introduction of Continuous Trusted Access and the new Cisco Trust Analytics you can now secure your network from several potential attack vectors.
Trust Analytics is part of Cisco SD-Access, Cisco’s best-of-breed Zero Trust solution for the workplace. Trust Analytics detects traffic from endpoints that are exhibiting unusual behavior by pretending to be trusted endpoints using MAC Spoofing, Probe Spoofing, or Man-in-the-Middle techniques.
Learn more: https://blogs.cisco.com/networking/trust-analytics-and-anti-spoofing-protection-its-already-in-your-network?dtid=opdcsnc001469
Follow us: https://twitter.com/ciscochampion
Cisco Champion Hosts:
Daren Fulwell (twitter.com/darenfulwell), ANS Group, Technical Architect
Evan Mintzer (twitter.com/EvanMintzer), Ashfield Engage, Information Security Manager
Marc Luescher (twitter.com/LuescherMarc), Fresenius Medical Care North America, Networking and Email Security Architect
Guest:
Justin Buchanan, Director, Product Management, Security Policy and Access
Moderator:
Amilee San Juan (twitter.com/amileesan1), Cisco, Customer Voices and Cisco Champion Program
...more
View all episodesView all episodes
Download on the App Store

Cisco Champion RadioBy Cisco Champion Radio

  • 4.4
  • 4.4
  • 4.4
  • 4.4
  • 4.4

4.4

7 ratings


More shows like Cisco Champion Radio

View all
Talos Takes by Cisco Talos

Talos Takes

13 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

33 Listeners