Solution Briefs

Protect Your Organization From Unwanted Cryptomining: At-a-Glance

Issue link: https://learn-umbrella.cisco.com/i/1081452

Contents of this Issue

Navigation

Page 1 of 1

At a glance How does Cisco Umbrella protect you? Umbrella aggregates intelligence from multiple sources including open-source intelligence (OSINT), infrastructure telemetry hunting algorithms and Umbrella's research on co-occurrences and related domain models. Intelligence includes indicators gathered from malware, IPs, domains, campaign research and threat actor developments. When cryptomining is detected, Cisco Umbrella will block at the IP and domain level, as well as analyze risky domains in the Intelligent Proxy. Umbrella users can detect, block and protect against unwanted cryptomining in their environments by simply enabling the cryptomining security category in their policy settings. You can view cryptomining activity right from the Umbrella dashboard alongside other common threat categories such as malware, phishing and command and control. Further reading Learn how to defend your organization from malicious cryptomining with the Cisco security portfolio. https://learn-umbrella.cisco.com/ technical-papers/defending-your- network-from-cryptomining Find out how Umbrella can send malicious cryptominers packing. https://umbrella.cisco.com/ malicious-cryptomining Lock malicious cryptominers out of your network. See how it works. Start a free trial today. htttps://signup.umbrella.com © 2019 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)

Articles in this issue

Links on this page

view archives of Solution Briefs - Protect Your Organization From Unwanted Cryptomining: At-a-Glance