Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion ... Security (CCIE Professional Development) by Aaron Woland & Vivek Santuka & Mason Harris & Jamie Sanbower

Integrated Security Technologies and Solutions - Volume I: Cisco Security Solutions for Advanced Threat Protection with Next Generation Firewall, Intrusion ... Security (CCIE Professional Development) by Aaron Woland & Vivek Santuka & Mason Harris & Jamie Sanbower

Author:Aaron Woland & Vivek Santuka & Mason Harris & Jamie Sanbower [Woland, Aaron]
Language: eng
Format: azw3
Publisher: Pearson Education
Published: 2018-05-02T04:00:00+00:00


Figure 6-11 illustrates the bidirectional communication between a NGIPS device and the FMC.

Figure 6-11 FMC Communication

NGIPS Deployment Options

In today’s organizations, attacks come from everywhere. As networks evolve, many organizations struggle to have intrusion prevention or other security architecture evolve at the same pace. Visibility is everything: A NGIPS must be able to detect and respond to threats before they cause significant damage. Placement of NGIPS services is just as important as the rules and configuration that reside on the system. Where a NGIPS is placed is typically driven by compliance requirements (for example, PCI, HIPAA, NIST), risks, threats, and vulnerabilities specific to the organization. For example, a hospital might want to focus on protecting electronic health records (EHRs) and medical devices, which in turn would require NGIPSs in between all devices that store or process EHRs or medical devices. Some organizations might have connected devices that cannot be patched, such as an audiovisual system. NGIPS would be essential in reducing risk associated with any unpatched systems because those are the most susceptible to attacks and malware.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.