{"id":1766,"date":"2020-02-04T03:46:22","date_gmt":"2020-02-04T03:46:22","guid":{"rendered":"http:\/\/ec2-34-209-118-10.us-west-2.compute.amazonaws.com\/?page_id=1766"},"modified":"2023-07-20T13:03:07","modified_gmt":"2023-07-20T20:03:07","slug":"fast-incident-response","status":"publish","type":"page","link":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response","title":{"rendered":"Fast Incident Response"},"content":{"rendered":"\n<style>\n\t#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731 > .block-wrap{padding-bottom:50px;}#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731 > .block-wrap{padding-top:50px;}#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731{background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170824\/2020-q2-web-fast-incident-response-hero-banner_020320.jpg);}@media only screen and (min-width:761px){#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731 > .block-wrap{padding-bottom:80px;}#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731 > .block-wrap{padding-top:80px;}#hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731 .heading-wrap{max-width:50%;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"hero-banner-block_d2fd4a55f05ebcf6db40bb208facc731\" class=\"hero-banner alignwide\">\n\n\t<div class=\"block-wrap\">\n\n\t\t<div class=\"heading-wrap\">\n\n\t\t\t<h1 class=\"area-title h1\">Fast incident response<\/h1>\n\t\t\t\t\t\t\t<p class=\"area-subheading\">Predictive intelligence so your teams can research a given incident and can stay ahead of future attacks<\/p>\n\t\t\t\n\t\t\t\n\t<div id=\"_umbrella_hero_buttons69ec02027e2ec\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<a class=\"button button-0  pass-query\" href=\"\/request-a-quote\">Request a quote<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\t<\/div>\n\n\t\t\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#single-column-block_43f2154e0ca498db64e60684a056fe67 > .block-wrap{padding-bottom:50px;}#single-column-block_43f2154e0ca498db64e60684a056fe67 > .block-wrap{padding-top:50px;}#single-column-block_43f2154e0ca498db64e60684a056fe67{background-color:#ffffff;}#single-column-block_43f2154e0ca498db64e60684a056fe67,#single-column-block_43f2154e0ca498db64e60684a056fe67 p,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h1,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h2,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h3,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h4,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h5,#single-column-block_43f2154e0ca498db64e60684a056fe67 .h6{color:#333333;}@media only screen and (min-width:761px){#single-column-block_43f2154e0ca498db64e60684a056fe67 > .block-wrap{padding-bottom:80px;}#single-column-block_43f2154e0ca498db64e60684a056fe67 > .block-wrap{padding-top:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_43f2154e0ca498db64e60684a056fe67\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 1000px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--flex-start\">Predicting attacks with big data analytics<\/h2>\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t<div class=\"content-wrap align-self--flex-start\">\n\t\t\t\t\t\t\t<p>From NGFW and SIEM products to behavioral network analysis and endpoint forensics, you have already deployed many security solutions, which all claimed to provide unique visibility. You are thinking, \u201cWhy do I really need one more thing to manage?\u201d<\/p>\n<p><a href=\"\/products\/umbrella-investigate\">Umbrella Investigate<\/a> is different because we see millions of security events happening in real-time across our 100 million daily-active users. We use big data analytics and machine learning to predict where related attacks will emerge on the Internet. We provide our customers access to this threat intelligence so that they can get more out of their existing network security investments, and also become more proactive at combating the next cyber attack.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#double-column-block_e3df7c5a12ccd55480f136e0f076b83a > .block-wrap{padding-bottom:50px;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a > .block-wrap{padding-top:50px;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a{background-color:#f5f5f5;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a p,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h1,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h2,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h3,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h4,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h5,#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .h6{color:#333333;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a a:not(.button):not(:focus):not(:hover){color:#333333;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_e3df7c5a12ccd55480f136e0f076b83a > .block-wrap{padding-bottom:0px;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .text-area, #double-column-block_e3df7c5a12ccd55480f136e0f076b83a .image-area, #double-column-block_e3df7c5a12ccd55480f136e0f076b83a .form-area{padding-bottom:80px;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a > .block-wrap{padding-top:0;}#double-column-block_e3df7c5a12ccd55480f136e0f076b83a .text-area, #double-column-block_e3df7c5a12ccd55480f136e0f076b83a .image-area, #double-column-block_e3df7c5a12ccd55480f136e0f076b83a .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_e3df7c5a12ccd55480f136e0f076b83a\" class=\"double-column alignwide align-items--center\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"text-area one-half first buttons-alignment--flex-start\">\n\n\t<h2 class=\"area-title h2 align-self--flex-start\">A single, correlated source of intelligence about domains, IPs, and malware files<\/h2>\n\t<div class=\"content-wrap align-self--\"><p>Join our webcast to learn how Umbrella Investigate provides the most complete view of the infrastructure used in attacks.<\/p>\n<\/div>\n\t\n\t<div id=\"_umbrella_columns_first_buttons69ec02027f404\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t#_umbrella_columns_first_buttons69ec02027f404 .button-0:not(:hover):not(:focus){color:#333333;}\t\t\t\t\t<\/style>\n\t\t\t\t\t\t\t\t<a class=\"check-link button-0  pass-query\" href=\"https:\/\/learn-umbrella.cisco.com\/webcasts\/threat-intelligence-the-new-driver-for-incident-response-3\">Watch webcast now<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\n\t\n<\/div>\n\n<div class=\"image-area one-half second bg-image\">\n\n\t<div style=\"background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/03\/25162203\/Incident-response-background-image.jpg);\"><\/div>\n\t\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce > .block-wrap{padding-bottom:50px;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce > .block-wrap{padding-top:50px;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce{background-color:#f5f5f5;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce p,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h1,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h2,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h3,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h4,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h5,#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .h6{color:#333;}@media only screen and (max-width:760px){}@media only screen and (min-width:761px){#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce > .block-wrap{padding-bottom:0px;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .text-area, #double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .image-area, #double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .form-area{padding-bottom:80px;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce > .block-wrap{padding-top:0;}#double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .text-area, #double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .image-area, #double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce .form-area{padding-top:80px;}}<\/style>\n\n<div id=\"double-column-block_b55bc938aee2dc0a5f3f5ece401f11ce\" class=\"double-column alignwide align-items--center\">\n\t<div class=\"block-wrap\">\n\n\t\t\n<div class=\"image-area one-half first bg-image\">\n\n\t<div style=\"background-image: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170341\/threat-intelligence-hp.jpg);\"><\/div>\n\t\n\t\n\t\n<\/div>\n\n<div class=\"text-area one-half second buttons-alignment--flex-start\">\n\n\t<h2 class=\"area-title h2 align-self--flex-start\">Investigate threats like you have never done before<\/h2>\n\t<div class=\"content-wrap align-self--flex-start\"><p>Everyone is talking about big data these days. Umbrella has a massive data set with an unconventional perspective because our <a href=\"http:\/\/umbrella.cisco.com\/why-umbrella\/global-network\">global network<\/a> is integrated at the internet\u2019s underlying DNS and BGP layers. We take our internet-scale flood of raw data, process it, and make it accessible via easy-to-use global patterns and correlations.<\/p>\n<p>This exclusive intelligence helps your security teams make better decisions faster. For example, it would help your security team respond appropriately if you are investigating a threat that calls home to a Russian server known to be associated with a targeted attack. We take a mathematical approach, using machine learning to train algorithms to automatically identify and block malicious domains.<\/p>\n<\/div>\n\t\n\t<div id=\"_umbrella_columns_second_buttons69ec020281673\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<style>\n\t\t\t\t\t\t#_umbrella_columns_second_buttons69ec020281673 .button-0:not(:hover):not(:focus){color:#333333;}\t\t\t\t\t<\/style>\n\t\t\t\t\t\t\t\t<a class=\"check-link button-0  pass-query\" href=\"\/why-umbrella\/threat-analysis\">Learn more<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n\n\t\n\t\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n\n<style>\n\t#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 > .block-wrap{padding-top:50px;}#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16{background-color:#ffffff;}#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 p,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h1,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h2,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h3,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h4,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h5,#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 .h6{color:#333333;}#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 a:not(.button):not(:focus):not(:hover){color:#008a0b;}@media only screen and (min-width:761px){#single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16 > .block-wrap{padding-top:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_ad3b7b25ebbad6bdd0c4ae17d5a8ef16\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 1000px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--flex-start\">All you need is a Web browser<\/h2>\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t<div class=\"content-wrap align-self--flex-start\">\n\t\t\t\t\t\t\t<p>Running a security program requires collaboration between several teams of network and system admins. With <a href=\"\/products\/umbrella-investigate\">Umbrella Investigate<\/a>, there is nothing to deploy, nothing to set up, and nothing to maintain. It functions simply as a search engine to search our intelligence on domains, IPs, ASNs, and file hashes.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#single-column-block_2fb84efdd1405b4151557e4739e68a91 > .block-wrap{padding-top:25px;}#single-column-block_2fb84efdd1405b4151557e4739e68a91{background-color:#ffffff;}#single-column-block_2fb84efdd1405b4151557e4739e68a91,#single-column-block_2fb84efdd1405b4151557e4739e68a91 p,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h1,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h2,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h3,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h4,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h5,#single-column-block_2fb84efdd1405b4151557e4739e68a91 .h6{color:#333333;}#single-column-block_2fb84efdd1405b4151557e4739e68a91 a:not(.button):not(:focus):not(:hover){color:#333333;}@media only screen and (min-width:761px){#single-column-block_2fb84efdd1405b4151557e4739e68a91 > .block-wrap{padding-top:40px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_2fb84efdd1405b4151557e4739e68a91\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 1000px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--flex-start\">Intelligence in context<\/h2>\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t<div class=\"content-wrap align-self--flex-start\">\n\t\t\t\t\t\t\t<p>Which security event should your team respond to first? How does your team know which events are serious or minor? You need intelligence that provides insight into ongoing attacks, and you need the ability to investigate possible future attacks.<\/p>\n<p>That is the context we offer \u2014 Umbrella can show you whether an attack targeted your organization and what to look out for to keep it from happening again. Investigate delivers threat visibility beyond your local Internet activity, at a global level, which lets you to\u00a0identify attacks targeting your company. We surface the information in real-time, so you can search dynamically, with up-to-the-minute data.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\n\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb > .block-wrap{padding-bottom:50px;}#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb > .block-wrap{padding-top:25px;}#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb{background-color:#ffffff;}#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb p,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h1,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h2,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h3,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h4,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h5,#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb .h6{color:#333333;}#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (min-width:761px){#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb > .block-wrap{padding-bottom:80px;}#single-column-block_769fd91e93e148ccf39b6f0656bd6ccb > .block-wrap{padding-top:40px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_769fd91e93e148ccf39b6f0656bd6ccb\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 1000px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--flex-start\">Get more out of your security stack<\/h2>\n\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\t\t<div class=\"content-wrap align-self--flex-start\">\n\t\t\t\t\t\t\t<p>By adding Umbrella\u2019s global threat intelligence data as a layer in your security stack, you can be more proactive in your approach to security. Using the Umbrella Investigate API, you can view real-time data and predictive models alongside data from your other security appliances or services. We do not promise to be the end-all and be-all, but we do deliver value by finding attacks that slip through the cracks of other security solutions.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t<div class=\"buttons-wrap align-self--flex-start\">\n\t<div id=\"buttons69ec020282828\" class=\"button-area\">\n\n\t\t\n\t\t\n\t\t\t\n\t\t\t\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<a class=\"button outline button-0  pass-query\" href=\"\/products\/umbrella-investigate\">About Investigate<\/a>\n\t\t\t\n\t\t\t\n\t\t\n\t<\/div>\n\n<\/div>\n\t\t\t\n\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<style>\n\t#single-column-block_56725f55af3c6616efb13f681964f22d > .block-wrap{padding-top:50px;}#single-column-block_56725f55af3c6616efb13f681964f22d{background-color:#f5f5f5;}#single-column-block_56725f55af3c6616efb13f681964f22d,#single-column-block_56725f55af3c6616efb13f681964f22d p,#single-column-block_56725f55af3c6616efb13f681964f22d .h1,#single-column-block_56725f55af3c6616efb13f681964f22d .h2,#single-column-block_56725f55af3c6616efb13f681964f22d .h3,#single-column-block_56725f55af3c6616efb13f681964f22d .h4,#single-column-block_56725f55af3c6616efb13f681964f22d .h5,#single-column-block_56725f55af3c6616efb13f681964f22d .h6{color:#333333;}#single-column-block_56725f55af3c6616efb13f681964f22d a:not(.button):not(:focus):not(:hover){color:#007493;}@media only screen and (min-width:761px){#single-column-block_56725f55af3c6616efb13f681964f22d > .block-wrap{padding-top:80px;}}@media only screen and (min-width:1041px){}<\/style>\n\n<div id=\"single-column-block_56725f55af3c6616efb13f681964f22d\" class=\"single-column alignwide\">\n\t<div class=\"block-wrap aligncenter\">\n\t\t<div style=\"max-width: 1200px;\">\n\n\t\t\t\t\t<h2 class=\"area-title h2 align-self--center\">Additional resources<\/h2>\n\t\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<style>\n\t#resource-block-block_a602f27c3b12799d3c85a08d90af4409 > .block-wrap{padding-bottom:50px;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 > .block-wrap{padding-top:12.5px;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 {background-color:#f5f5f5;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .eyebrow-text{color:#ffffff;}@media only screen and (min-width:761px){#resource-block-block_a602f27c3b12799d3c85a08d90af4409 > .block-wrap{padding-bottom:80px;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 > .block-wrap{padding-top:20px;}}@media only screen and (min-width:1041px){#resource-block-block_a602f27c3b12799d3c85a08d90af4409,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 p,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h1,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h2,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h3,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h4,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h5,#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .h6{color:#ffffff;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 a:not(.button):not(:focus):not(:hover){color:#007493;}}<\/style>\n\n<div id=\"resource-block-block_a602f27c3b12799d3c85a08d90af4409\" class=\"resource-block alignwide\">\n\t<div class=\"block-wrap\">\n\n\t\t\n\t\t\t\n\t\t\t\t\n\t\t\t\t<style>\n\t#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-0 .bg-area{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-0 .bg-area{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170432\/Resources-blade-graphic-Investigate-Cisco-Umbrella-800x600.jpg) no-repeat scroll center top \/ cover#0d274d;}@media only screen and (min-width:1041px){#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-0{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-0{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170432\/Resources-blade-graphic-Investigate-Cisco-Umbrella-490x325.jpg) no-repeat scroll center top \/ cover#0d274d;}}<\/style>\n\n\n\n<div class=\"single-resource resource-0 has-bg\">\n\n\t<div class=\"gradient\"><\/div>\n\n\t\t\t\t\t<a href=\"https:\/\/learn-cloudsecurity.cisco.com\/umbrella-resources\/umbrella\/investigate-from-opendns\">\n\t\t\n\t\t<div class=\"flex-area\">\n\n\t\t\t\t\t\t\t<p class=\"eyebrow-text\">Datasheet<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"bg-area\"><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"headline h3\">Investigate from Cisco Umbrella<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>The most complete view of the relationships and evolution of Internet domains, IP\u2026<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t<\/a>\n\t\t\n<\/div>\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<style>\n\t#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-1 .bg-area{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-1 .bg-area{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170430\/Resources-blade-graphic-holy-grail-incident-response-800x600.jpg) no-repeat scroll center top \/ cover#0d274d;}@media only screen and (min-width:1041px){#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-1{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-1{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170430\/Resources-blade-graphic-holy-grail-incident-response-490x325.jpg) no-repeat scroll center top \/ cover#0d274d;}}<\/style>\n\n\n\n<div class=\"single-resource resource-1 has-bg\">\n\n\t<div class=\"gradient\"><\/div>\n\n\t\t\t\t\t<a href=\"https:\/\/learn-cloudsecurity.cisco.com\/umbrella-resources\/umbrella\/webinar-threat-intelligence-the-new-driver-for-incident-response\">\n\t\t\n\t\t<div class=\"flex-area\">\n\n\t\t\t\t\t\t\t<p class=\"eyebrow-text\">Webcast<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"bg-area\"><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"headline h3\">Threat Intelligence: The New Driver for Incident Response<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>Find out how you can shorten your response time, and garner the information you need&#8230;<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t<\/a>\n\t\t\n<\/div>\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<style>\n\t#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-2 .bg-area{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-2 .bg-area{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170428\/Resources-blade-graphic-Demo-ODNS-Investigate-800x600.jpg) no-repeat scroll center top \/ cover#0d274d;}@media only screen and (min-width:1041px){#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-2{background-color:#0d274d;}#resource-block-block_a602f27c3b12799d3c85a08d90af4409 .resource-2{background: url(https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/02\/25170428\/Resources-blade-graphic-Demo-ODNS-Investigate-490x325.jpg) no-repeat scroll center top \/ cover#0d274d;}}<\/style>\n\n\n\n<div class=\"single-resource resource-2 has-bg\">\n\n\t<div class=\"gradient\"><\/div>\n\n\t\t\t\t\t<a href=\"\/blog\/2019\/07\/08\/new-passive-dns-enhancements-for-cisco-umbrella-investigate\">\n\t\t\n\t\t<div class=\"flex-area\">\n\n\t\t\t\t\t\t\t<p class=\"eyebrow-text\">Blog<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"bg-area\"><\/div>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"headline h3\">New Passive DNS Enhancements for Cisco Umbrella Investigate<\/p>\n\t\t\t\n\t\t\t\t\t\t\t<div class=\"description\">\n\t\t\t\t\t<p>It\u2019s no secret that security professionals today face mounting challenges&#8230;<\/p>\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\n\t\t\t\t\t<\/a>\n\t\t\n<\/div>\n\n\t\t\t\n\t\t\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":48,"featured_media":0,"parent":194,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_genesis_hide_title":true,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"umbrella-keywords":[],"coauthors":[6417],"class_list":{"0":"post-1766","1":"page","2":"type-page","3":"status-publish","5":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fast Cybersecurity Incident Response - Cisco Umbrella<\/title>\n<meta name=\"description\" content=\"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/umbrella.cisco.com\/de\/solutions\/fast-incident-response\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fast Cybersecurity Incident Response - Cisco Umbrella\" \/>\n<meta property=\"og:description\" content=\"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response\" \/>\n<meta property=\"og:site_name\" content=\"Cisco Umbrella\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CiscoUmbrella\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T20:03:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2022\/03\/22160233\/cisco-umbrella-social-share.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CiscoUmbrella\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/fast-incident-response\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/fast-incident-response\",\"name\":\"Fast Cybersecurity Incident Response - Cisco Umbrella\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#website\"},\"datePublished\":\"2020-02-04T03:46:22+00:00\",\"dateModified\":\"2023-07-20T20:03:07+00:00\",\"description\":\"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/fast-incident-response#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/fast-incident-response\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/solutions\\\/fast-incident-response#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/umbrella.cisco.com\\\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/umbrella.cisco.com\\\/de\\\/solutions\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fast Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#website\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/\",\"name\":\"Cisco Umbrella\",\"description\":\"Enterprise network security\",\"publisher\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/umbrella.cisco.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#organization\",\"name\":\"Cisco Umbrella\",\"url\":\"https:\\\/\\\/umbrella.cisco.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cdn.umbrella.marketops.umbrella.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/25162456\\\/umbrella-logo.png\",\"contentUrl\":\"https:\\\/\\\/cdn.umbrella.marketops.umbrella.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/25162456\\\/umbrella-logo.png\",\"width\":400,\"height\":47,\"caption\":\"Cisco Umbrella\"},\"image\":{\"@id\":\"https:\\\/\\\/umbrella.cisco.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CiscoUmbrella\\\/\",\"https:\\\/\\\/x.com\\\/CiscoUmbrella\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opendns\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqZ3pD7tVVcfUj8k5MYcp0Q\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fast Cybersecurity Incident Response - Cisco Umbrella","description":"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/umbrella.cisco.com\/de\/solutions\/fast-incident-response","og_locale":"de_DE","og_type":"article","og_title":"Fast Cybersecurity Incident Response - Cisco Umbrella","og_description":"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.","og_url":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response","og_site_name":"Cisco Umbrella","article_publisher":"https:\/\/www.facebook.com\/CiscoUmbrella\/","article_modified_time":"2023-07-20T20:03:07+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2022\/03\/22160233\/cisco-umbrella-social-share.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CiscoUmbrella","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response","url":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response","name":"Fast Cybersecurity Incident Response - Cisco Umbrella","isPartOf":{"@id":"https:\/\/umbrella.cisco.com\/#website"},"datePublished":"2020-02-04T03:46:22+00:00","dateModified":"2023-07-20T20:03:07+00:00","description":"Learn how Cisco Umbrella monitors millions of real-time security events across 100 million daily users to help keep our customers ahead of future attacks.","breadcrumb":{"@id":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/umbrella.cisco.com\/solutions\/fast-incident-response#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/umbrella.cisco.com\/de"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/umbrella.cisco.com\/de\/solutions"},{"@type":"ListItem","position":3,"name":"Fast Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/umbrella.cisco.com\/#website","url":"https:\/\/umbrella.cisco.com\/","name":"Cisco Umbrella","description":"Enterprise network security","publisher":{"@id":"https:\/\/umbrella.cisco.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/umbrella.cisco.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/umbrella.cisco.com\/#organization","name":"Cisco Umbrella","url":"https:\/\/umbrella.cisco.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/umbrella.cisco.com\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/03\/25162456\/umbrella-logo.png","contentUrl":"https:\/\/cdn.umbrella.marketops.umbrella.com\/wp-content\/uploads\/2020\/03\/25162456\/umbrella-logo.png","width":400,"height":47,"caption":"Cisco Umbrella"},"image":{"@id":"https:\/\/umbrella.cisco.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CiscoUmbrella\/","https:\/\/x.com\/CiscoUmbrella","https:\/\/www.linkedin.com\/company\/opendns","https:\/\/www.youtube.com\/channel\/UCqZ3pD7tVVcfUj8k5MYcp0Q"]}]}},"_links":{"self":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/1766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/comments?post=1766"}],"version-history":[{"count":0,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/1766\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/pages\/194"}],"wp:attachment":[{"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/media?parent=1766"}],"wp:term":[{"taxonomy":"umbrella-keywords","embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/umbrella-keywords?post=1766"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/umbrella.cisco.com\/de\/wp-json\/wp\/v2\/coauthors?post=1766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}