Вы находитесь на странице: 1из 2

TOPIC:'' AS EXPERT IN TECHNOLOGIES, YOU'RE TOLD TO GIVE ADVICE TO THE

SENEGALESE ARMY GENERAL FALL TO USE CISCO SECURITY TOOLS.

Cheikh Moustapha LO,

Master1 SSIM General Fall,

Senegal Army

New technologies are constantly impacting our daily life, the professional world, our habits etc...

Indeed, over the last few decades governments have followed this global trend and have aligned
their way of working and storing data with new technologies. Of course, a field as strategic as the
military has not remained indifferent to this phenomenon.

However, this massive use of new technologies causes a large amount of data that becomes
problematic. The management of this data is becoming more and more difficult because of a
sustained growth in the means of intrusion, modification or access to this data by threat actors.

When we know how sensitive and strategic data processed in the military can affect the security of a
country and its citizens, it is important to find ways to remedy this.

Fortunately, digital entities are offering fairly robust security solutions capable of dealing with the
various attacks perpetrated by tools that are becoming more and more powerful as time goes by.

That's why we're going to talk to you about security solutions from CISCO, which is a large and well-
known American digital company.

CISCO offers several security tools depending on your needs and integrates security at the network,
cloud, messaging, application and endpoint levels.

When you choose CISCO, you join the leader in the security industry. Cisco is positioned as a leader in
the Magic Quadrant for Intrusion Detection and Prevention Systems.

The benefits of using CISCO are stronger security, faster responses. Identify and stop threats using
the power of your network. Our network visibility and segmentation solution combine Cisco
Stealthwatch Enterprise, the Cisco Identity Services Engine, and Cisco TrustSec technology. You
benefit from rapid threat detection, highly secure access, and software-defined segmentation.

The Cisco Secure portfolio contains a wide range of technologies that work as a team, providing
seamless interoperability with your security infrastructure, including third-party technologies. This
translates into unified visibility, automation, and stronger defenses. Using the integrated Cisco
SecureX Platform, the products listed below help secure the network, users and endpoints, the cloud
edge, and applications.

With Cisco Secure Workload, understand application behavior, automate micro-segmentation, and
use security analytics to accelerate detection.

Targeted threats - including phishing and malware - are increasingly causing data breaches by
compromising credentials and device vulnerabilities. Cisco offers adaptive multi-factor
authentication, device health assessments, user and entity behavior analysis, endpoint protection,
endpoint detection and response, secure messaging gateway, mobile threat defense, and mobility
management to protect employees or contractors on managed, unmanaged, or mobile devices
accessing VPN, email, or other applications.

As the network perimeter evolves and trust in the workplace erodes, Cisco provides industry-leading
threat intelligence, zero-trust security for your workplace, consistent protections, contextual
visibility, predictive analytics, and automated responses to enable secure access and stay ahead of
increasingly complex threats. Cisco offers firewalls and intrusion prevention, VPN and network access
control, network traffic analysis, and secure web gateways to secure your data center, branch offices,
cloud environments, and everywhere else.

In summary, the Cisco Secure portfolio contains a wide range of technologies that work as a team,
providing seamless interoperability with your security infrastructure, including third-party
technologies. By choosing to adopt CISCO, you join a team of experts available around the clock,
powerful and resilient tools, and diligent support for the technological challenges facing our nation's
military.

Cheikh Moustapha LO

Вам также может понравиться