Click on Frank's errors and activate switch below
Managing a Frankenstructure nightmare
The term ‘frankenstructure’ describes an infrastructure built from many disparate parts that’s become so monstrous and complex it resembles Mary Shelley’s famous creation.
Since complexity and fragmentation are possibly a security team’s biggest headache, we’ve designed our own Frankenstein monster (with a twist).
Click on Frank’s vital organs and appendages to see how with some adjustments and enhancements you can turn your infrastructure nightmare into a finely tuned machine ready to deal with whatever modern cyber criminals throw at it. (pitch forks excluded!).
The worst thing for your infrastructure to do is become so monstrous, it puts you on the back foot. You can’t grow nearly as fast as you would like when your security footing is unstable. And if you keep moving forwards without building security into the core strategy, the likelihood is that this ‘labyrinth’ feeling will never end. You will struggle to be on the ‘front foot’ and consistently held back from the things you really want your business to achieve.
Manual, time intensive and repetitive tasks are prone to error. A simple misconfiguration can leave a huge hole in the infrastructure from a security perspective. Responding to a security incident takes much longer when fixes are implemented manually on a case-by-case basis. Plus, your highly skilled people will often find themselves dragged down by repetitive tasks and become demotivated.
Powerless – Almost half of organisations in the UK reported a severe breach caused system downtime of more than 8 hours in 2017. A much higher percentage than other countries (34%) who reported similar downtime. The main culprit for unexpected downtime is when your people, processes and technology are fragmented and unconnected, resulting in a short-circuiting infrastructure.
Eyes - A lack of visibility is the root cause of almost every problem in your infrastructure. When applications and networks underperform, it’s difficult to know why unless you have key indicators to alert you. Are apps running without the right type of storage? Are threats making their way in and traversing the network undetected? All questions you need to be able to answer!
Nose – A blocked nose is no nose at all! When you have so many security alerts popping up, this severely limits your ability to pick up the scent of genuine threats. In a maze of alerts, urgent addressable issues can get lost in the fog.
Mouth – Strong communication is an essential life skill. It’s also an essential attribute for your infrastructure. If there’s a problem, and your infrastructure doesn’t tell you about it, how are you supposed to fix it? Yet many products are not designed to communicate with products from other vendors, resulting in silos of technology that cannot talk to each other and an infrastructure that cannot communicate with you effectively.
Brain – Gartner predicts that by 2020, 60% of organisations will experience a major service failure due to security incidents. Those most likely to fall victim are organisations with a distinct lack of ‘brain’ engagement – i.e you’re not aware of the specific risks you’re vulnerable to, how you would respond to a cyber attack, and what the impact of any resulting breach would be on your business and your brand reputation.
CLICK TO REBOOT..
LOADING...
ERROR: FAULT
MACHINE ACTIVATION
MACHINE ACTIVATION

Find out how!
We want to empower businesses to understand how to anticipate and respond to new threats, reduce complexity and fragmentation in their infrastructure, and adapt with agility to changing business models.
Backed by our team of talent – from former CISOs and consultants, to forensics experts and architects – you can better manage risk and compliance, control cost and achieve your strategic objectives with security woven in from the outset.
Learn more about the work of
Cisco Talos.
Cisco Talos coordinates threat protections so all products are seamlessly in sync to block threats. Once a threat is detected, Talos immediately coordinates protections across products, from web and email security to endpoint and network security, for a fast, synchronised response across our entire portfolio, with no effort needed by the end user. So you can even put your feet up – in that instance anyway!
Stamp out those threats! You can build an automated incident response to threats identified in the network via integration with security platforms using APIs. You can also achieve automated compliance by ensuring the configuration in the network always matches the security policy. With an open security framework, you can support Layer 4 through 7 security services such as intrusion detection systems (IDS) and intrusion prevention systems (IPS), and next-generation firewall services.
(click to keep reading)
Policy-driven security means you have the ability to isolate, segment & conduct forensics to ensure compliance in real-time. In other words, you can protect enterprise data, apps, users and devices.
(click to keep reading)
Find out more
We aim to be the helping hand that enables your devices to become secure, automatically. It’s all about strong provisioning and configuration, according to centrally managed policies and requirements. Security isn’t a technology problem, with a technology answer. It’s about simplifying tasks (including compliance) and accelerating threat detection and mitigation, as well as secure app deployment.
Learn about improving time to detection.
You want your business to work at maximum power capacity 24/7 – like a finely tuned machine. To do that, Cisco solutions are automated to remove the burden from teams and empower organisations with faster time to detect and respond.
See how an interconnected security approach can help you.
Mouth – Real-time notifications that you can actually action is the key to a healthy infrastructure. Cisco builds products designed to interoperate at every level of the security stack. So not only across our own portfolio, but also with products provided by others. Open platforms set the stage for an ecosystem that integrates to become vastly more powerful as products are used together.
Find out how to block more threats.
Nose – You need to develop a ‘nose’ for threats. Sniff out the ‘real’ trouble hidden within the deluge of alerts by exploiting cyber criminals’ registration and hosting tactics—specifically, the infrastructure in which they can operate. This allows security professionals to zero in on the sources of threats, and block them.
Learn more on increasing visibility across your business.
Eyes – Complete visibility into performance and behaviours throughout the business is absolutely achievable, even with the constant balancing act of users, devices, networks, applications, workloads and processes. Visibility is the logical starting point for achieving pervasive security. It’s where all your infrastructure conversations should start and end.
Brain – Engage your security brain. With the intelligent use of analytics your network can constantly learn and begin to block threats automatically. Plus, when it’s all in real time, actionable insights mean you can guide and set policy for automation and zero trust security. Think strategically about how security will help you achieve your business goals and you will be able to innovate faster with confidence.
MACHINE ACTIVATION
READY
CLICK TO GO BACK
<<<
Don't be Frank, be Secure. Click to transform your Frankenstructure
Click to interact with the infrastructure of the future.
It's alive!