Securing the Local Area Network

Description

Mind Map on Securing the Local Area Network, created by Liliana Garcia on 26/09/2016.
Liliana Garcia
Mind Map by Liliana Garcia, updated more than 1 year ago
Liliana Garcia
Created by Liliana Garcia about 9 years ago
3
0

Resource summary

Securing the Local Area Network
  1. Securing LAN Elements
    1. Endpoints
      1. Network infrastructure
        1. Advanced Malware Protection
          1. Advanced Malware Protection (AMP)
            1. File Reputation
              1. File Sandboxing
                1. File Retrospection
              2. raditional Endpoint Security
                1. Securing Endpoints in the Borderless Network
                  1. modern security solutions
                    1. Antimalware Protection (AMP)
                      1. Email Security Appliance (ESA)
                        1. Web Security Appliances (WSA)
                          1. Network Admission Control (NAC)
                          2. Hardware and Software Encryption of Local Data
                            1. 256-bit AES encryption.
                            2. AMP for Endpoints
                              1. AMP for Endpoints
                                1. AMP for Networks
                                  1. AMP for Content Security
                                  2. Cisco CWS protects corporate users
                                    1. 1. An internal user makes an HTTP request to an external website
                                      1. 2. The Cisco ASA forwards the HTTP request to Cisco CWS global cloud infrastructure.
                                        1. 3. Cisco CWS notices that www.example.com has web content, possibly a banner ad, that is redirecting the user to a known malicious site
                                          1. Cisco CWS blocks the request to the malicious site, but continues to allow access to the rest of the content at www.example.com
                                        2. Layer 2 Security Consideration
                                            Show full summary Hide full summary

                                            Similar