i-Tech Support
  • About Us
  • IT Services
    • Managed Services
    • Professional Services
    • IT Consulting
    • Outsourced IT
    • Technology Assessment
    • Security & Compliance
      • Network Security Consulting & Auditing
      • Cybersecurity
      • CMMC Compliance
      • PCI Compliance Support & Consulting
    • Wireless Network Site Survey & Heat Mapping
    • Cloud Services
    • Cloud Computing
    • Data Center Hosting
    • Backup & Disaster Recovery
    • Microsoft Office 365
    • Wireless Network Support
    • Network Monitoring
    • Vendor Management
    • VoIP
  • Educational Technology
    • Educational Technology Services Overview
    • Professional Development
    • Instructional Coaching
    • Google for Education Certified Trainers
    • Partnership Plan
    • Orlando Learning Summit
  • Acumatica Cloud ERP
    • Acumatica Overview
    • Built For Your Business
    • Professional Services
    • Acumatica Case Study
  • Resources
    • Awards
    • Blogs
    • News & Events
  • Testimonials
  • Contact Us
  • Menu Menu

What is Next Generation Threat Defense?

May 24, 2016/0 Comments/in CISCO, Cisco Premier Partner, Featured, IT Blog /by i-Tech Support

What is Next Generation Threat Defense?


by Daniel Stockman, i-Tech Support, Inc

 

 

 

The first version of the Cisco Cyber Threat defense was released in the year 2013, aimed at providing an analysis of network behavior, and identifying threat detection within the interior network.  The primary objective is to introduce an architecture that facilitates threat discovery and containment, after they have entered the network core. Several different solutions have been used to achieve the set goals.

 

These include

  • Netflow
  • Broader visibility
  • Network behavior analysis
  • Context analysis
  • Anomaly detection
  • Incident management
  • Cisco Firepower
  • Threat management in real time
  • URL control
  • In-depth contextual threat visibility
  • Advanced Malware Protection or AMP
  • Endpoint and malware control

The Need

Cyber attacks have become an almost daily incident, targeting large corporations and governments, and allowing valuable and confidential data theft. In most of these events, the attackers directly targeted the victim organization and breached the network several months following theft discovery. The term used for such incidents is Advanced Persistent Threat or APT.  Formally APT is an adversary, possessing sophisticated expertise levels. This allows multiple opportunities to be created through which objectives are achieved by several attack vectors such as physical, deception and cyber.

What this means is that an APT is not a just one attack, but a full campaign. Multiple methods are used so even if one intrusion attempt is blocked, the attacker can try other techniques.

The Cyber Threat Defense Solution tries to instrument the network interior so as to disover the presence of unwanted intrusions that have already acquired an operational footprint.

 

If an organization wants to defend the occurrence of an attack,

they should have complete visibility of the networking environment,

including operating systems, applications, services and all other components.

The Proposed Model

Advanced technology and tools are required to develop a complete and comprehensive response to potential threats. The model must be simple, yet continuously protect business assets and address potential changes. The resultant security system must be deployed directly into the core network layers to achieve maximum efficiency and performance, while risks are minimized.

Such a security system can be designed only when a new model is deployed that ensures proper integration, especially for data centers with little or no space for errors.  The key component of this model is the attack continuum for identifying critical mechanisms that functions in a continuous cycle. Threats are addressed by considering the actions, which must be taken before, during and after attacks.

Before an Attack

If an organization wants to defend the occurrence of an attack, they should have complete visibility of the networking environment, including operating systems, applications, services and all other components. All infrastructure risks should be indentified and understood, and alerts should be enabled at network endpoints.

During an Attack

A cyber attack is ongoing, which means security must be continuous. The security infrastructure should be based on awareness with data aggregation and correlation capabilities across the network. Historical patterns should be identifiable, and global intelligence must be used for distinguishing attacks and background activities.

After an Attack

Retrospective security and an intelligent infrastructure are required to detect malware, and prevent future attacks.

 

Learn more about cybersecurity from technology experts at i-Tech Support, Inc.

  


 

i-Tech Support, Inc. – The Technology to Achieve More

Established in 1999, i-Tech Support, Inc. offers world-class technology support to help businesses achieve more. With divisions dedicated to managed IT support, advanced technology, cybersecurity, cloud services, network assessments, software and consulting, our full service capabilities enable us to be a versatile technology partner for IT departments and businesses in Florida. We support you with the technology to achieve more. Locations in Orlando and Tampa, Florida

i-Tech Support, Inc.: D: 407-265-2000  |  W: www.i-techsupport.com  |  E: info@i-techsupport.com

Tags: Business, CISCO, cisco technology, it, managed It, managed It support, orlando, tampa, technology, technology support
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on WhatsApp
  • Share on Pinterest
  • Share on LinkedIn
  • Share on Tumblr
  • Share on Vk
  • Share on Reddit
  • Share by Mail
/wp-content/uploads/2019/06/blue-logo.svg 0 0 i-Tech Support /wp-content/uploads/2019/06/blue-logo.svg i-Tech Support2016-05-24 13:03:242019-08-07 17:17:59What is Next Generation Threat Defense?
You might also like
A Secure Network Starts with Your Front Line…Your Employees.
Next Generation Collaboration: How Video Conferencing is Revolutionizing Local Government
One Joule At A Time! (An Engineer’s Gadget Review of a Smart Thermostat.)
Passionate About Virtualization, Storage…and DIY TV.
Just Released: Cisco’s 2013 Global IT Impact Survey
Get Back to Gaming! Yeah, Work Should be Fun.
5 Ways Managed IT (Tech Support) can help achieve your goals
Get the Technology You Need Today with Cisco Year End Incentives
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

X

Contact Us

Questions about technology? You’ve come to the right place.

  • This field is for validation purposes and should be left unchanged.

Group 785

Email

info@i-techsupport.com

Call

(888) 298-9696 / (407) 265-2000

Office

2711 Rew Circle, Ocoee, FL 34761 GET DIRECTIONS
Serving all of Central FL, including Tampa and Orlando
Launch Screenconnect

Recent Posts

  • Acumatica Year-End Checklist
  • i-Tech Support named 2022 Fast 50 Company, “Ultimate Newcomer” to the Golden 100 by Orlando Business Journal
  • Microsoft is Disabling Basic Authentication and Requiring Use of Modern Authentication under OAuth 2.0 starting October 1, 2022*
  • i-Tech Support, The First Academy present Orlando Learning Summit in 2022
  • Emergency Connectivity Funds (ECF) are Available to Florida Schools Now. Make Sure Your Students Benefit.

Email

info@i-Techsupport.com

Call

Toll Free:

(888) 298-9696

Orlando:

(407) 265-2000

Miami:

(786) 706-0544

Office

2711 Rew Circle
Ocoee, FL 34761

Serving all of Central and South FL, including Tampa, Orlando and Miami

Newsletter Sign Up

Sign up to receive more information and exciting news every month!

  • We respect your privacy. We'll NEVER sell, rent or share your email address.
  • This field is for validation purposes and should be left unchanged.

Recent Resources

  • i-Tech Support named 2022 Fast 50 Company, “Ultimate Newcomer” to the Golden 100 by Orlando Business Journal

    Why this is a milestone for i-Tech.Read More »
  • Microsoft is Disabling Basic Authentication and Requiring Use of Modern Authentication under OAuth 2.0 starting October 1, 2022*

    This may impact apps.Read More »
© 2022 i-Tech Support All rights reserved. Sitemap
What is BDR? Get the most from your IT investment
Scroll to top