Cisco Cisco ScanSafe Wi-Fi Hotspot Security 白皮書
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 7
White Paper
Web Security: Protect Your Data in the Cloud
What You Will Learn
Security teams can’t be everywhere, but the current landscape demands that organizations defend their data
anywhere a threat can manifest itself. “Anywhere” includes networks, mobile devices, virtual environments, and the
cloud or data center.
anywhere a threat can manifest itself. “Anywhere” includes networks, mobile devices, virtual environments, and the
cloud or data center.
Today’s threats are designed to penetrate every defense. Adversaries are actively working to understand what
types of security solutions are deployed. And they are shifting to less visible, less detectable patterns of behavior.
According to the Cisco 2014 Annual Security Report, most of these actors have one primary mission: stealing high-
value data.
types of security solutions are deployed. And they are shifting to less visible, less detectable patterns of behavior.
According to the Cisco 2014 Annual Security Report, most of these actors have one primary mission: stealing high-
value data.
Meanwhile, the rise of the distributed enterprise, and the emergence of new business models such as cloud
computing, mobility, and bring-your-own-device (BYOD) environments, have eroded the traditional security
perimeter and are expanding the attack surface. Security teams are struggling to keep pace. They don’t know how
to prioritize which threats to investigate and are missing many threats they simply can’t see.
computing, mobility, and bring-your-own-device (BYOD) environments, have eroded the traditional security
perimeter and are expanding the attack surface. Security teams are struggling to keep pace. They don’t know how
to prioritize which threats to investigate and are missing many threats they simply can’t see.
It’s easy to understand why preventive, point-in-time security solutions cannot provide adequate protection for
modern businesses. Of course, no detection method is perfect, and inevitably some threats will be sophisticated
and stealthy enough to penetrate all the layers of a defense. What is needed? Continuous and retrospective
security designed to cover the entire attack continuum—before, during, and after an attack.
modern businesses. Of course, no detection method is perfect, and inevitably some threats will be sophisticated
and stealthy enough to penetrate all the layers of a defense. What is needed? Continuous and retrospective
security designed to cover the entire attack continuum—before, during, and after an attack.
Figure 1. The Attack Continuum