eBooks/eGuides

Ransomware Defense for Dummies eBook

Issue link: https://insights.oneneck.com/i/1093615

Contents of this Issue

Navigation

Page 36 of 52

CHAPTER 4 Deploying Cisco Ransomware Defense 31 These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. At the same time, advanced malware provides a launching pad for a persistent attacker to move laterally throughout a compromised organization's network. Email phishing campaigns are a favorite — and astonishingly effective — malware attack vector for cybercriminals. Recent ransomware variants such as Locky and Chimera all use phishing techniques to infect their victims. Cisco Ransomware Defense solutions secure endpoints and pre- vent email threats include Cisco Advanced Malware Protection (AMP) for Endpoints and Cisco Cloud Email Security with AMP. Cisco Advanced Malware Protection (AMP) for Endpoints Traditional antimalware software that only uses point-in-time detection techniques alone will never be 100 percent effective. Yet, it takes only one threat that evades detection to compromise your entire environment. Using targeted context-aware mal- ware, sophisticated attackers have the resources, expertise, and persistence to outsmart point-in-time defenses. Point-in-time detection is also completely blind to the scope and depth of a breach after it happens, rendering organizations incapable of stopping an outbreak from spreading or preventing a similar attack from happening again. Although no antimalware solution can remove ransomware or decrypt files once an endpoint is infected, Cisco helps organiza- tions proactively detect ransomware and block it before it ever reaches the network. Based on this understanding of malware, Cisco created AMP for Endpoints to deliver a complete framework of detection capabilities and big data analytics to continuously analyze files and traffic in order to identify and block advanced malware threats. Sophisticated machine-learning techniques evaluate more than 400 character- istics associated with each file. Retrospective security — the ability to look back in time and trace processes, file activities, and com- munications in order to understand the full extent of an infection, establish root causes, and perform remediation — can detect and alert you to files that become malicious after the initial disposition.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Ransomware Defense for Dummies eBook