COUNTRY FOCUS: TURKEY
of the enterprise and global service provider
infrastructures, Cisco embeds security
throughout the extended network.
Cisco is adding more sensors to increase
visibility; more control points to strengthen
enforcement; and pervasive, advanced
threat protection to reduce time-to-
detection and time-to-response, limiting the
impact of attacks.
Threat Response automates integrations
across select Cisco Security products
and accelerates key security operations
functions: detection, investigation and
remediation. It is a key pillar of the
integrated security architecture.
Why is it so important for IGA to
protect the data of its customers
and are you confident that this will
be protected?
With security across the network, Cisco
provides scalable threat protection covering
the broadest range of attack vectors and
throughout the entire attack continuum –
before, during and after an attack. The arena for cybercriminals is increasing.
In today’s cyberthreat landscape, every
organisation, large or small, is at risk of
an attack.
By integrating security, enterprises and
service providers are able to deliver the
threat-centric security requirements
demanded by today’s dynamic threat
landscape and capture emerging business
opportunities created by the rise of the
Digital Economy and the Internet of
Everything (IoE). The Cisco 2018 Security Capability
Benchmark Study indicates that 54% of
all cyberattacks result in financial damages
of more than US$500,000 including, but
not limited to, lost revenue, customers,
opportunities and out-of-pocket costs.
To prevent such losses, we prefer Cisco to
protect our customers’ data.
Can you explain how the
solution has given you better
threat hunting capabilities? Cisco enables the organisation’s
IP network to be used as a sensor to
report anomalies on the network and
even undertake automatic cybersecurity
actions. This means the IP network can be
used as a sensor to detect and eliminate
security threats.
Cisco CTR is our primary integrations
platform which gives us the capability
to reduce the time for detection. Cisco
www.intelligentcio.com
We all know that in the real world there
is not a 100% protection system/data
but we are confident that we can mitigate
99% of attacks. For the 1%, we focus
on endpoint security solutions, awareness,
regulations, network visibility and
security solutions.
How important is it to IGA to protect
the endpoints?
Cisco Advanced Malware Protection (AMP)
for Endpoints prevents threats at point of
entry, then continuously tracks every file it
allows into your endpoints. AMP can uncover
the most advanced threats including file-less
malware and ransomware, in hours, not days
or months.
The data is on the endpoints and malware
is always active on the endpoints so for us,
endpoint visibility is very important and
using Cisco AMP for Endpoints, which is a
hybrid of EPP and EDR solution, gives us the
capability to protect endpoints.
How scalable is the implementation?
Cisco’s AMP architecture can be on public
cloud or on-premise so the scalability is easy
and fast. We have started to sell our MSSP
services to our customers from our new
company, IGA IT. n
INTELLIGENTCIO
53