Cisco Sales Expert (CSE) - Security
1 Introduction to Cisco Security Solutions
1-1 Overview of Cisco Security Portfolio
1-2 Understanding the Security Market Landscape
1-3 Cisco Security Solutions Value Proposition
2 Cisco Secure Network Solutions
2-1 Cisco Secure Firewall
2-1 1 Firewall Technologies and Deployment Models
2-1 2 Advanced Threat Protection Features
2-1 3 Integration with Cisco SecureX
2-2 Cisco Secure Network Access
2-2 1 Cisco Identity Services Engine (ISE)
2-2 2 Cisco AnyConnect Secure Mobility Client
2-2 3 Cisco DNA Center for Network Management
2-3 Cisco Secure Internet Gateway (SIG)
2-3 1 Cloud-Delivered Security Services
2-3 2 Integration with Cisco Umbrella
2-3 3 Secure Internet Access for Remote Users
3 Cisco Secure Endpoint Solutions
3-1 Cisco Secure Endpoint (AMP for Endpoints)
3-1 1 Endpoint Detection and Response (EDR)
3-1 2 Advanced Malware Protection (AMP)
3-1 3 Integration with Cisco Threat Response
3-2 Cisco Secure Endpoint Management
3-2 1 Managing Endpoints with Cisco Secure Endpoint
3-2 2 Policy Management and Enforcement
3-2 3 Reporting and Analytics
4 Cisco Secure Cloud and SaaS Solutions
4-1 Cisco Secure Cloud Security Solutions
4-1 1 Cisco Cloud Security Architecture
4-1 2 Cisco Secure Cloud Analytics (Stealthwatch Cloud)
4-1 3 Cisco Secure Cloud Email (Cisco Email Security)
4-2 Cisco Secure SaaS Solutions
4-2 1 Cisco Secure SaaS Applications
4-2 2 Cisco Secure SaaS Integration with Cisco SecureX
4-2 3 Managing SaaS Security with Cisco Secure SaaS
5 Cisco Secure Collaboration Solutions
5-1 Cisco Secure Collaboration Architecture
5-1 1 Cisco Webex Security Features
5-1 2 Cisco Secure Collaboration with Cisco Defense Orchestrator
5-1 3 Secure Collaboration in Hybrid Work Environments
5-2 Cisco Secure Voice and Video Solutions
5-2 1 Cisco Secure Voice Solutions
5-2 2 Cisco Secure Video Conferencing
5-2 3 Integration with Cisco SecureX
6 Cisco Secure Identity and Access Management
6-1 Cisco Secure Identity Solutions
6-1 1 Cisco Identity Services Engine (ISE)
6-1 2 Cisco Duo Security
6-1 3 Cisco Secure Access Solutions
6-2 Cisco Secure Access Management
6-2 1 Access Policy Management
6-2 2 Multi-Factor Authentication (MFA)
6-2 3 Identity and Access Management in Hybrid Environments
7 Cisco Secure Threat Defense and Response
7-1 Cisco Secure Threat Defense Solutions
7-1 1 Cisco Secure Threat Defense Architecture
7-1 2 Cisco Secure Threat Intelligence
7-1 3 Cisco Secure Threat Defense with Cisco SecureX
7-2 Cisco Secure Threat Response
7-2 1 Incident Response and Management
7-2 2 Threat Hunting and Investigation
7-2 3 Integration with Cisco SecureX
8 Cisco SecureX Platform
8-1 Overview of Cisco SecureX
8-1 1 SecureX Architecture and Components
8-1 2 SecureX Orchestration and Automation
8-1 3 SecureX Integration with Cisco Security Solutions
8-2 Using Cisco SecureX
8-2 1 SecureX Dashboard and Reporting
8-2 2 SecureX Workflow Creation and Management
8-2 3 SecureX Threat Response and Investigation
9 Sales and Business Development for Cisco Security Solutions
9-1 Sales Strategies for Cisco Security Solutions
9-1 1 Positioning Cisco Security Solutions
9-1 2 Addressing Customer Security Challenges
9-1 3 Building Security Solution Proposals
9-2 Business Development for Cisco Security
9-2 1 Partnering with Cisco Security Ecosystem
9-2 2 Developing Security Solution Roadmaps
9-2 3 Driving Security Sales Growth
10 Certification Exam Preparation
10-1 Understanding the Exam Structure
10-1 1 Exam Domains and Objectives
10-1 2 Sample Exam Questions and Practice
10-1 3 Preparing for the Exam
4-2 1 Cisco Secure SaaS Applications Explained

4-2 1 Cisco Secure SaaS Applications Explained

Key Concepts

Cloud Access Security Broker (CASB)

A Cloud Access Security Broker (CASB) acts as an intermediary between cloud service users and cloud service providers. Cisco Secure SaaS, also known as Cisco Cloudlock, is a CASB solution that provides visibility and control over SaaS applications. It helps organizations monitor and secure data in cloud applications, ensuring that sensitive information is protected and that only authorized users have access.

For example, if an organization uses Salesforce for customer relationship management, Cisco Cloudlock can monitor all activities within Salesforce, ensuring that sensitive customer data is not exposed or misused.

Data Protection

Data Protection is a critical aspect of Cisco Secure SaaS Applications. It involves safeguarding sensitive data from unauthorized access, leakage, and breaches. Cisco Cloudlock uses advanced encryption, data loss prevention (DLP) techniques, and access controls to protect data in SaaS applications. This ensures that even if data is accessed, it remains secure and confidential.

Consider a healthcare provider that uses Google Workspace for document sharing. Cisco Cloudlock can encrypt all documents stored in Google Drive, ensuring that patient information is protected from unauthorized access.

User Behavior Monitoring

User Behavior Monitoring in Cisco Secure SaaS Applications involves tracking and analyzing user activities within SaaS applications. This helps identify suspicious behavior that may indicate a security threat or policy violation. By monitoring user behavior, organizations can detect and respond to potential threats in real-time.

Imagine a financial institution that uses Microsoft 365 for collaboration. Cisco Cloudlock can monitor user activities, such as file downloads and sharing, to detect any unusual behavior. If a user attempts to download a large number of sensitive files, the system can flag this activity as suspicious and alert the security team.

Compliance Management

Compliance Management ensures that SaaS applications comply with industry regulations and organizational policies. Cisco Secure SaaS Applications provide tools to audit and report on compliance, ensuring that data and activities within SaaS applications meet regulatory requirements. This helps organizations avoid penalties and maintain trust with stakeholders.

For instance, a retail chain that uses Dropbox for file storage must comply with GDPR regulations. Cisco Cloudlock can audit all data stored in Dropbox, ensuring that it complies with GDPR requirements. If any non-compliance is detected, the system can generate reports and take corrective actions.

Examples and Analogies

Cloud Access Security Broker (CASB): Think of a CASB as a security guard at the entrance of a cloud service. Just as the guard checks IDs and monitors activities, a CASB monitors and controls access to cloud applications.

Data Protection: Consider data protection as a safe for your valuables. Just as you lock your valuables in a safe, Cisco Cloudlock locks sensitive data in SaaS applications, ensuring it remains secure.

User Behavior Monitoring: Imagine user behavior monitoring as a surveillance system in your home. Just as the system monitors activities for any unusual behavior, Cisco Cloudlock monitors user activities in SaaS applications.

Compliance Management: Think of compliance management as a checklist for meeting regulations. Just as you check items off a list to ensure compliance, Cisco Cloudlock audits SaaS applications to ensure they meet regulatory requirements.

By understanding these key concepts, you can appreciate how Cisco Secure SaaS Applications provide comprehensive security and compliance for cloud-based services, protecting sensitive data and ensuring organizational integrity.