Cisco Threat Response (CISCO Threat Response)

Cisco Threat Response helps us detect, investigate and take corrective action against cyber threats, at no additional cost.

What is CISCO Threat Response?

Cloud dashboard that collects and aggregates threat intelligence from multiple sources into a single application.

From a single dashboard, it allows quick access to all security solutions, thus facilitating and speeding up the detection, investigation and correction of threats.

CISCO Threat Response, is free with licenses for the following Cisco security products:

 
/&gt;</figure>
<p>For customers using Cisco next-generation firewalls, intrusion prevention systems (IPS), AMP for Endpoints, Cisco Umbrella, Email Security or Threat Grid, Cisco Threat Response helps them detect, investigate and take corrective action against cyber threats, at no additional cost.</p>
<h2>What does CISCO Threat Response bring to my business?</h2>
<ul>
<li><strong>Know which systems have been affected by the malicious file</strong>. Thanks to the integration with AMP for endpoints in the Threat Response console, you can see which computers have been affected and stop the threats immediately. </li>
</ul>
  align=" Tracking/ Investigación de lo dominios a los que se accede. Visibilidad de que equipos / usuarios han accedido o sido posiblemente comprometidos
  • Identificar qué dispositivos se conectaron al dominio malicioso. Esto se consigue por la integración con Umbrella, en el panel de Threat Response podrá identificarlos y bloquear esos dominios.

 data-lazy-src=

No es necesario ser un experto para usar Cisco Threat Response. La interfaz es simple, intuitiva e interactiva. Con tan solo cortar y pegar una amenaza, los usuarios pueden solicitarle a la herramienta que la investigue. Desde el primer clic, Cisco Threat Response presenta detalles sobre actividades, archivos y comportamientos sospechosos. Luego, al volver a hacer clic, los usuarios pueden ver la causa raíz e, incluso, corregirla de un modo fácil y rápido.

Los gráficos fáciles de leer y configurables permiten mapear los objetivos comunicados con el dominio malicioso que se investiga.

La información y los resultados obtenidos de cada amenaza, se recopilan y se agregan en el portal de Cisco Threat Response. Allí se ofrece una vista común, que se vuelve aún más valiosa gracias al conocimiento que aportan otros productos compatibles de Cisco. Estos productos son alimentados automáticamente por Talos, que ofrece soluciones integrales de inteligencia frente a amenazas con actualización continua para dispositivos de Cisco. El portal de Cisco Threat Response muestra las observaciones locales de la amenaza que se investiga en su red, junto con información detallada que lo ayudará a decidir, en el momento oportuno y de manera segura, cuáles son las mejores acciones correctivas.

¡No lo dudes, preguntanos!

What are the advantages of Cisco Threat Response?

  • Integrated threat intelligence

Cisco Threat Response integrates threat intelligence from Cisco Talos and other vendors to automatically search for indicators of compromise (IOCs) and detect threats quickly.

  • Automatic feeding

Cisco Threat Response is automatically fed with information from Cisco security products so that you know at all times which of your systems are under attack and how.

  • Intuitive and interactive view

Cisco Threat Response displays results through intuitive, customizable graphs that allow you to stay on top of everything that’s happening.

  • Incident tracking

Cisco Threat Response allows you to collect and store key analysis information and manage and document your progress and findings.

  • Unprecedented referral

With Cisco Threat Response, you can easily escalate investigations to other Cisco security products. Want to know where the malicious file went? With a single click, you can access Cisco AMP for Endpoints, which provides all the information you need to understand how the threat developed.

  • Direct solution

Cisco Threat Response allows you to take the necessary measures to respond to the threat, directly from the user interface. You can block suspicious files, domains, and more without using another product.

Related news:

https://www.solutel.com/seguridad-cisco-en-la-nube-novedades-cisco-umbrella/

https://www.solutel.com/productos-de-seguridad-cisco/

New articles

Scroll to Top