Achieving Business Outcomes

Intersect offers products and services that enable healthcare organizations to increase operational efficiency and achieve their business goals. Our unique solutions model allows them to combine technology and centers of excellence to improve service and control costs so that they can focus on what matters most, their patients and long-term sustainability.

Complete Protection

Cisco's total security protection is driven by a threat-centric defense model. Cisco threat-centric defense provides organizations with defense-in-depth layered security across seven key attack sectors:

  1. Email
  2. Web
  3. Cloud Applications
  4. Mobile
  5. Endpoints
  6. Campus & Branch
  7. Data Center

Defense-in-depth layered security places multiple layers of security controls throught the environment providing redundancy in the event of a security control failure or if a vulnerability is exploited. This serial approach of one layer at a time makes it exponentially more difficult for threats to break through.

For example, if a virus passes web security it could still be blocked by the Next-Gen Firewall protecting sensitive data that is inside the network. Starting with DNS-Layer Security, Cisco uses the Internet's infrastructure to block malicious destinations before a connection is ever established. By delivering security from the cloud, not only do customers save money, but gain management efficiency. For example, DNS and IP layer enforcement stops threats over ports, protocols and even direct to IP connections while intelligent proxy routes requests to risky domains for deeper URL and file inspection. And, command and control call-back blocking prevents executing ransomware encrption. DNS-Layer security is reinforced through Cisco's Next-Generation Firewall.

Cisco NGFW (Next-Generation Firewall) blocks more theats and quickly mitigates those that do breach organizational defenses. The industry's first threat-centric firewall reduces the threat detection time-frame from the industry standard of around 100 days to an average of less than 9 hours. For example, Next-Gen Firewall simplifies operations by consolidating all security functions into a single managment interface while reducing fragmentation by integrating with other Cisco security and network solutions.

In addition, Cisco Next-Generation Firewall works in unison with the industry's most effective Next-Generation Intrusion Prevention System. Cisco Next-Generation Intrusion Prevention System (NGIPS) integrates visibile, imbedded security intelligence, automated analysis, and industry leading threat effectivness providing customers better protection against sophisticated attacks. For example NGIPS enables real-time contextual awareness providing deeper insights into network behavior, out of compliance situations, and intrusion events while intelligent security automation correlates threat events with the intended target;s vulnerabiity to prioritize remediation.

DNS-Layer Security, Next Gen Firewall and Hext-Gen IPS all combine to provide the most advanced web security on the planet!

Cisco Web Security protects organizations from advanced threats that hide in plain sight on legitimate web sites or in enticing popup ads by automatically blocking risky sites and testing unknown sites before allowing users to link to them. For example, Web Security automated traffic analysis scans all web traffic in real-time for both known and new malware using dynamic reputation and behavior-based analysis on all web content allowing customers to create andeuse granular policies without slowing productivity.

Web security is greatly complimented by Cisco Email Security. Cisco Email Security protects against spam, ransomware, business email compromise, spoofig and phishing that uses advanced threat intelligence and a multi-layered approach to protect inbound messages and sensitive outbound data. For example Email Security defends against the most advanced malware found in modern attacks while providing data loss prevention and encryption across inbound and outbound messages to keep data secure and confidential.

Once networks, email and web are protected, customers canuse Cisco Identity and Access Control to ensure the right people are accessing the right resources at the right time. Cisco Identity and Access Control provides streamlined access managment and segmented traffic through consistent policies based on advanced visibility and context across the extended network. For example, Identity and Access control provides deep visibility and access control from a unified interface, simplifying access across wired, wireless, and VPN connections , cascading policies throughout all types of access points and enforcing software defined segmentation.

Cisco Identity and Access Control is reinforced through Cisco Remote Access VPN. Cisco Remote Access VPN enables organizations to increase their mobile and global footprint through a highly secure effective remote access solution that permits them to extend their network to branch offices, telecommuters, patients and business partners everywhere and anywhere. for example, Remote Access VPN provides users with secure access to the enterprise network at anytime in any location while enabling greater visibility into endpoint behavior, comprehensive protection, and a consistent experience across devices, both on and off premise.

In addition to providing advanced remote access, Cisco Cyber Threat Defense and Network Analytics ensures that customer networks are protected. Cisco Cyber Threat Defense and Network Analytics quickly detect and respond to attempts at establishing a presence in an organizational environment and attacks that are already underway. Threats can be botnet, rootkit, malbertising, or other malware. Cisco detects advanced threats attempting to communicate with a command and control infrastructure, usually within 2 to 3 hours. For example, Cyber Threat Defense and Network Analytics provide advanced machine learning, model threat behavior, network analytics that leverage network telemetry, and DNS intelligence that continuously researches current and future threats.

A key value of protecting business networks, devices and endpoints is to enable secure access to the growing set of cloud applications on the market. Cisco Cloud App Security is designed to protect access to cloud applications for all users enabling organizaational productivity, collaboration and communication across the business. For example, Cloud App Security stops malware before it reaches networks or endpoints, decreasing time spent remediating infections while removing blind spots and sandbox and compromised accounts with no impact on end user productivity.

The final Defense in Depth layer is Cisco Malware Protection for all attack vectors. Cisco Malware Protection analyzes attacks and hidden exploits retrospectively and adopts automatically to emerging threats to boost protection before, respond effectively during, and remediate faster after an attack. With Cisco's Malware Protection, customers receive global threat intelligence, advanced sandboxing, and real-time malware blocking to prevent breaches. For example, Malware Protection leverages expert analysis of malware samples and terabytes of data per day. Cisco uses a context-rich knowledge base to proactively defend against known and emerging threats while advanced sandboxing capabilities perform automated static and dynamic analysis of files against more than 700 behavioral indicators.

These layers of security are supported by Cisco's extensive threat intelligence and management capabilities. All Defense in Depth layers are easily controlled through Cisco's unified management solution and are smoothly integrated with third-party applications with comprehensive APIs.

In addition Cisco Talos is the industry leading global threat intelligence organization dedicated to providing protection before, during and after cybersecurity attacks. Talos detects and correlates threats in real-time across all layers of defense. Cisco Talos is the largest threat detection network in the world monitoring 35% of global email traffic including 600 billion daily email messages and 1.5 million malware samples daily. Talos is a recognized leader in threat detection as validated by NSF Labs with over 250 highly skilled malware reverse engineers, threat analysts and zero-day vulnerability research engineers.

  • 100 TB of Data Received Daily
  • 1.5 Million Daily Malware Samples
  • 600 Billion Daily Email Messages
  • 16 Billion Daily Web Requests
  • 250+ Full-Time Telemetry Agents
  • 4 Global Data Centers
  • Over 100 Threat Intelligence Partners

Talos catches threats that traditional security infrastructure and analysis systems can not. With Talos, customers are able to see more anomalies, network intrusions and threats because Cisco delivers a 24X7 view into global traffic activity and keep them up to date with the latest intelligence every three to five minutes. No other company can offer this comprehensive intelligence.

Visibility and Control

Beyond complete protection, Cisco provides healthcare organizations with strong visibility and control through a managed environment. Cisco security solutions provide customers with reliable visibility and control of security management of their entire environment.

Fast device policy updates: Managing security solutions of often challenging. Accomplishing this in a changing landscape of mobile users, virtual data centers, and cloud services adds more complexity. To address these challenges, Cisco offers centralized and agile tools to simplify and accelerate management of firewalls, IPS, advanced threats and VPN deployments.

Better control of data and policies: Cisco offers control for Data Loss Prevention (DLP) across emails, web and VPN with more than 100 predefined policies for government, private sector regulation, and organizaational-specific regulations.

Gnanular device visibility and managment: Cisco Identity Services Engine (ISE) monitors who and what requests across the network, tracks their identity, providing complete control of data moving through the network.

Comprehensive policy enforcement: Cisco offers the industry's broadest set of enforcement and remediation options for usage control. This provides customers with the ability to orchestrate policy changes across thousands of devices in a single pane of glass, create policy templates, model security policies before deploying them, and analyze security policy configurations for consistency - and to deploy new devices faster through standardized policies.

Unparalled network and endpoint visibility: Cisco network analytics provides visibility and real-time awareness across the entire network by leveraging anomaly detection and network telemetry to detect behaviors in advance of threats. threats can be acted upon when discovered through integration of policy and access solutions and advanced threat detection.

Advanced threat solutions: Protect the network and every endpoint and correlate suspicious behavior to a central managment information view. In addition to the network and IT environment, Cisco delivers value to the organization as a whole enabling customers to grow and adapt to business changes.

Enabling organizations through flexible solutions: Cisco provides the ability to scale with a security architecture that spans across infrastructures, security appliances, and the cloud. Cisco platforms are open, agile and expandable, helping drive organizational growth. Support for third-party applications and customizable tools meet changing organizational requirements.

Unified: In addition to scalability, Cisco provides better economics across the environment. Cisco solutions work together providing lower total cost of ownership and simple integration for customers.

Flexible: Cisco's threat-centric architecture provides flexible deployment options including physical, virtual and cloud. This flexibility allows customers to pick the solutions that are right for their organization. In enables them to meet immediate needs using existing infrastructure while planning for the future.

Cisco Security Solutions come together to drive key organizational business outcomes.

Enabled Business

Enabling organizations through flexible solutions: Cisco provides the ability to scale with a security architecture that spans across infrastructures, security appliances, and the cloud. Cisco platforms are open, agile and expandable, helping drive organizational growth. Support for third-party applications and customizable tools meet changing organizational requirements. Cisco provides the ability to adjust to the changing environment allowing companies to grow at their own pace.

Unified: In addition to scalability, Cisco provides better economics across the environment. Cisco solutions work together providing lower total cost of ownership and simple integration for customers. Cisco requires low maintenance increaseing customer value per dollar.

Flexible: Cisco's threat-centric architecture provides flexible deployment options including physical, virtual and cloud. This flexibility allows customers to pick the solutions that are right for their organization. It enables them to meet immediate needs using existing infrastructure while planning for the future.

Cisco Security Solutions come together to drive key organizational business outcomes.

Key Business Outcomes

Across these three organizational outcomes, Cisco provides a set of solutions strategically designed to solve the challenges that hinder organizational success.

  • Web and email security
  • Cloud security
  • Next Generation Firewall (NGFW) and Next Generation Intrusion Prevention System (NGIPS)
  • Policy and Access
  • Advanced Threats
  • Each of these solutions is armed with a set of products that compliment and reinforce each other.