Duo Device Trust Monitor – Cisco Cloud Security

Duo Device Trust Monitor With Duo, you can monitor the health of every device across your organization in real time, whether it’s corporate-managed or not. With Duo’s device trust features, you can customize access requirements at the device level, and because it’s a cloud-based solution, you’ll stay ahead of the latest security threats. Identify risky … Read more

Watchlist Configuration – Cisco Cloud Security

Watchlist Configuration Watchlists control whether or not traffic from a specific entity will generate an alert. You can configure entries such that traffic involving those entities always causes the system to generate an alert. You can also configure those watchlist entries to expire after a configured period of time, at which point traffic involving those … Read more

Umbrella Integrations – Cisco Cloud Security

Umbrella Integrations Umbrella, while providing multiple levels of defense against Internet-based threats, is the center piece of a larger architecture for Internet security. Figure 8-29 illustrates Cisco Umbrella integrations. Figure 8-29 Cisco Umbrella integrations This section will explore the integrations that occur with other products in the Cisco portfolio and the role each plays in … Read more

Cisco Secure Cloud Analytics – Cisco Cloud Security

Cisco Secure Cloud Analytics Only 56 percent of security alerts are investigated, and more than half of those are not remediated, according to the Cisco 2017 Annual Cybersecurity Report. Responding to these alerts is an overwhelming job, and most organizations do not have the security staff to keep up. Companies of all sizes face the … Read more

Enabling Cloudlock via WSA (11.5) – Cisco Cloud Security

Enabling Cloudlock via WSA (11.5) Figure 8-8 illustrates Cisco Cloudlock enablement workflow using WSA. Figure 8-8 Cisco Cloudlock enablement workflow using WSA Figure 8-9 shows the Cisco Cloudlock onboarding page for signing in and signing up. Figure 8-9 Cisco Cloudlock onboarding page (sign-in and sign-up) The new radio button for Cloudlock log subscription has the … Read more

Cloud Access Security Broker – Cisco Cloud Security

Cloud Access Security Broker Umbrella exposes shadow IT by providing the ability to detect and report on cloud applications in use across your organization. For discovered apps, you can view details on the risk level and block or control usage to better manage cloud adoption and reduce risk. Figure 8-16 illustrates Cisco Cloudlock’s “shadow IT” … Read more