November 10, 2010

Reputation Filtering

Today's sophisticated, blended threats can exploit three or four different communications vehicles before they launch full-scale attacks on unprepared enterprise networks.

This white paper, written for IT managers and executives, examines the new security risks for today's borderless enterprise networks, and describes how cloud-based Cisco Security Intelligence Operations and powerful, comprehensive reputation filtering capabilities built into Cisco security appliances and services can help you protect your network from known and unknown threats.

Download Paper
(Webtorials membership required. Click here to register or if you forgot your username/password.)


1 Comment

This is a super paper that addresses using an intelligent scale for rating threats, giving each type of threat a "reputation" and then sharing that "reputation."

Very much worth the read regardless of your exact choice of security vendor(s). An excellent benchmark.

Search Webtorials

Get E-News and Notices via Email


  

 



  

I accept Webtorials' Terms and Conditions.

Trending Discussions

See more discussions...

Featured Sponsor Microsites






















Archives

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2018, Distributed Networking Associates, Inc.