Statements (107)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Company
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Next-Generation_Firewalls
gptkb:Cisco_Cloud_Security |
gptkbp:deployment |
virtual machines
physical servers |
gptkbp:developed_by |
gptkb:Cisco_Systems
|
https://www.w3.org/2000/01/rdf-schema#label |
Advanced Malware Protection
|
gptkbp:includes |
user behavior analytics
sandboxing technology file trajectory analysis Sandboxing Technology File Reputation Services |
gptkbp:integrates_with |
Cisco Security Suite
Cisco Security products SIEM solutions SOAR platforms |
gptkbp:is_available_in |
Multiple Languages
multiple languages |
gptkbp:is_available_on |
Subscription Model
One-Time Purchase on-premises solution cloud solution Cisco partners |
gptkbp:is_compatible_with |
gptkb:Windows_Operating_System
gptkb:Linux_operating_system gptkb:smartphone gptkb:Mac_Operating_System gptkb:Linux_Operating_System gptkb:operating_system mac OS operating system |
gptkbp:is_considered_as |
Industry Leader
|
gptkbp:is_designed_for |
large enterprises
IT Security Teams small and medium businesses |
gptkbp:is_designed_to |
Reduce Attack Surface
Enhance Incident Response Improve Threat Detection |
gptkbp:is_enhanced_by |
gptkb:Cisco_Talos_Intelligence_Group
|
gptkbp:is_evaluated_by |
independent security analysts
|
gptkbp:is_integrated_with |
Intrusion Prevention Systems
Firewall Solutions SIEM Solutions |
gptkbp:is_part_of |
gptkb:Cisco's_security_portfolio
gptkb:Cisco_Secure_X_Platform gptkb:Cisco_Secure_X_platform gptkb:Cisco_Secure_Endpoint gptkb:Cisco_Umbrella gptkb:Cisco's_threat_defense_architecture Endpoint Security Solutions |
gptkbp:is_promoted_by |
Cisco's marketing campaigns
|
gptkbp:is_recognized_by |
gptkb:Forrester
gptkb:Gartner |
gptkbp:is_scalable |
Large Enterprises
Small Businesses |
gptkbp:is_subject_to |
regular audits
|
gptkbp:is_supported_by |
Technical Support Team
Cisco's technical support team |
gptkbp:is_used_by |
Enterprises
enterprises |
gptkbp:is_used_for |
data protection
network security endpoint protection |
gptkbp:is_used_in |
gptkb:financial_services_company
gptkb:Educational_Institution Government Agencies healthcare Healthcare Organizations government agencies |
gptkbp:offers |
API access
automated remediation customizable dashboards Compliance Reporting Real-time Threat Intelligence Threat Hunting Tools Automated Remediation cloud-based protection |
gptkbp:provides |
gptkb:Company
Threat Detection compliance reporting incident response threat detection real-time visibility threat intelligence user training resources Endpoint Protection Network Visibility detailed reporting Malware Analysis Incident Response Capabilities malware prevention |
gptkbp:recognizes |
gptkb:virus
Phishing Attacks Ransomware Adware Spyware zero-day exploits phishing attacks advanced persistent threats Trojan Horses |
gptkbp:supports |
Cloud Environments
On-Premises Deployment multi-tenancy endpoint security |
gptkbp:updates |
Threat Signatures
regular threat intelligence feeds |
gptkbp:uses |
gptkb:software_framework
|