Cisco Cisco Email Security Appliance C160 Guide De Démarrage

Page de 1
The High Cost of Cutting Corners
As the cost and likelihood of a breach grows you can’t afford 
“good enough”  protection before, during, AND after an attack.
Malware Impacts
Of Victims Report Measurable Impact to Business
80% 
Cisco Security 
5500
 
IPS Signatures in 
Advanced Malware Protection (AMP)
21 Billion 
Web Requests Through 
Cisco Web Security (WSA+CWS)
35%
 
Of Global Enterprise Email Traffic 
Processed Through Cisco Email 
Security (ESA + CES)
Rootkits
Viruses
Trojans
Worms
Sources
• Cisco Midyear Security Report 2014
• Cisco Annual Security Report 2014, ASR 2015
• ESG Endpoint security survey, Jan 15
• Ponemon Cost of Cyber crime, Oct 2014
• Ponemon cost of Data Breach 2013, May 2013
• Ponemon cost of Data Breach 2014, May 2014
• Ponemon cost of malware containment, Jan 2015
• 2014: A year of mega breaches, Ponemon 
• 2013 & 2014 Verizon Data breach investigations report 
www.cisco.com/go/emailsecurity
Protect your brand and data with Cisco Email and Web Security
www.cisco.com/go/websecurity
Malware
Hacking
Social Engineering
Organizations Are Not Able To Detect A Breach 
In A Timely Manner
2+ Years to Discover 
the Breach
33%
55%
Unable to Determine the 
Cause of the Breach
Top 3 causes of a breach
40%
52%
29%
2014
2013
2014
2013
$5.9
M
$5.4
M
32
 
days
Average Cost of 
a Breach 
Average Time To
Resolve a Cyber-attack
MONTH
MONTH
MONTH
MONTH
45 
days
Industries Hit Hardest In 2014 
Retail
$245
M
$80
M
$4.5
M
Financial Services Healthcare  
Top 2 Attack Vectors For Malware 
Web
Email