Guest

Security

Threat-Centric Security

Advanced threat protection – before, during, and after an attack.

Reinventing Network Security

Turn your network into a sensor, an enforcer, and a mitigation accelerator. (45 min)

Reinventing Network Security
  • agilesecurity_infinity_loop

    Sourcefire Security Solutions

    Protect against rapidly changing attacks with next-generation network security appliances and advanced malware protection

    • 8k_sensor_stack3

      Next-Generation Network Security

      • Get the most advanced threat protection in the industry with next-generation IPS
      • Add application control and URL filtering through subscription license
      • Benefit from the first next-generation firewall to include industry-leading IPS
      • Add advanced malware protection through subscription license
      • Centrally manage hundreds of appliances with FireSIGHT Management Center
    • event_horizon

      Advanced Malware Protection

      • Integrated protection across networks, endpoints, mobile, and virtual
      • Protection from point of entry through propagation, plus post-infection remediation
      • Safe file analysis by cloud-based Sandbox to identify malicious behavior
      • Real-time cloud security intelligence for up-to-the-minute protection
      • Private cloud deployment option to comply with strict privacy mandates
    • 8k_sensor_stack_250px_v2

      FirePOWER Appliances

      • Proven industry-leading throughput, threat detection efficacy, low TCO
      • Throughput speeds from 50 Mbps up to more than 120 Gbps stackable
      • Single appliance supports any combination of network security products
      • Modularity to change the number and type of interfaces as needs evolve
    • an92517_v3

      FireSIGHT Management Center

      • Single console manages hundreds of network security appliances
      • Real-time contextual awareness facilitates response to changing conditions
      • Intelligent security automation increases security and reduces costs
      • Uses same monitoring and management controls over virtual appliances
      • Integrates with a variety of complementary third-party systems
    • hackimage_larger

      Open Source

      • Features Snort intrusion detection and prevention technology
      • Offers multiple inspection methods and an open rules format for advanced protection
      • Provides 24-hour expert threat defense by Vulnerability Research Team
      • Integrates with the FireSIGHT Management Center and Sourcefire IPS
      • Leads additional open source security projects: ClamAV, Razorback, OpenAppID
    • Compliance-Solutions

      Security Solutions

      Deploy security that works across the attack continuum – on the network, endpoint and mobile devices, virtually, and in the cloud or data center.

      • threat_analytics

        Cisco Cognitive Threat Analytics

        • Cloud-based solution accelerates detection of threats in the network
        • Discovers threats on its own; no human intervention is required
        • Focuses on symptoms, not method of attack; it looks at anomalous behavior
        • Fights threats with algorithms and machine learning; it learns and adapts
      • threat-defense

        Cisco Threat Defense Solution

        • Provides threat defense in the network interior to find the most elusive, dangerous threats
        • Helps to enable scalable, ubiquitous, and cost-effective security telemetry
        • Uses NetFlow data from existing network infrastructure
        • Simplifies error-prone and expensive manual threat investigation processes
      • Cisco-Compliance-Solution-for-PCI-DSS-2-0

        Cisco Compliance Solution for PCI DSS 2.0

        • A Cisco Validated Design, tested and documented to facilitate and improve deployments
        • Includes strategic guidance as well as tactical implementation
        • Branch, data center, and internet architectures and designs
        • Simplify the process of achieving and maintaining PCI compliance
        • Assessed by Verizon Business, a qualified security assessor
      • Cisco-Compliance-Solution-for-HIPAA-Security-Rule

        Cisco Compliance Solution for HIPAA Security Rule

        • Address HIPAA Security Rule technical requirements
        • Increase network security to protect PHI and other critical data
        • Detailed configurations and insights to improve upon your existing network
        • Get designs to satisfy HIPAA requirements, strategies to speed deployment
      • Application-Centric-Infrastructure-Security-Solutions

        Application Centric Infrastructure Security Solutions

        • Protects next-generation data centers and cloud deployments
        • Scales on demand, has programmable automation, and provides policy-based security
        • Security can be deployed for any transaction -- completely independent of the underlying topology
        • ACI management tools provide a single point of control for both network and security management
    • secure-edge-and-branch

      Secure Edge and Branch

      Protect your network by blending stateful inspection and next-generation firewall capabilities with integrated network security services - for security without compromise.

      • meraki-mx-cloud-managed-security-appliances

        Cisco Meraki MX Cloud Managed Security Appliances

        • Unified threat management (UTM) with networking, security, and application control
        • Built-in, centralized cloud management
        • Auto VPN provisions site-to-site VPN with a few simple clicks
        • Includes WAN optimization, link bonding, Layer 7 firewall, IDS, and more
      • Product Small Photo

        Cisco ASA 5500-X Series Next-Generation Firewalls

        • Blends enterprise-class stateful inspection and next-generation firewall capabilities
        • Integrates comprehensive next-generation network security services
        • Uses a proven, enterprise-class platform
        • Available in a wide range of sizes and form factors
      • ASA-CX-Architecture-small

        Cisco ASA Next-Generation Firewall Services

        • Provides end-to-end network intelligence
        • Enables granular control over applications and micro-applications
        • Benefits from proactive threat protection updated in near real-time
        • Enforces differentiated policies based on the user, device, role, and application type
      • Cisco-Intrusion-Prevention-System

        Cisco Intrusion Prevention System

        • Identifies and stops malicious traffic, worms, viruses, and application abuse
        • Delivers intelligent threat detection and protection
        • Uses reputation filtering and global inspection to prevent threats
        • Promotes business continuity and helps meet compliance needs
      • Router Security

        Integrated Security on the ISR G2

        • Delivers firewall, intrusion prevention, VPN, and content filtering
        • Promotes integrating new network security features on existing routers
        • Maximizes network security without adding hardware
        • Decreases ongoing support and manageability costs
    • secure-email-and-web

      Secure Email and Web

      Protect your organization from evolving email and web threats.

      • web_security_100x80

        Web Security

        • Get proactive security, application visibility, and control for all users
        • Extend real-time protection and policy enforcement to remote employees
        • Use deployment flexibility to meet your business and network needs
        • Integrate with existing Cisco investments for reduced complexity
      • sma_box_100x80

        Email Security

        • Fights spam, viruses, and blended threats for organizations of all sizes
        • Enforces compliance and protects reputation and brand assets
        • Reduces downtime and simplifies administration of corporate mail systems
        • Deployed by more than 40 percent of the world's largest enterprises
    • secure-data-center-and-virtualization

      Secure Data Center and Virtualization

      Protect high-value data and data center resources with threat defense, secure virtualization, segmentation, and policy control.

      • Cisco ASA 5585-X Adaptive Security Appliance

        Cisco ASA 5585-X Next-Generation Data Center Firewall

        • Combines a proven firewall, comprehensive enterprise-class intrusion prevention, and VPN
        • Delivers eight times the performance density of competitive firewalls
        • Can be clustered for up to 300 Gbps firewall and 60 Gbps IPS throughput
        • Requires just 15 percent the power consumption of competitive firewalls
        • Integrates intrusion prevention with global correlation
        • Supports context-aware firewall capabilities
      • virtual-network_184x138

        Cisco ASA 1000V Cloud Firewall

        • Integrates with the Cisco Nexus 1000V virtual switch
        • Employs mainstream, proven Adaptive Security Appliance (ASA) technology
        • Spans and helps to secure multiple VMware ESX hosts
        • Enables consistency across physical, virtual, and cloud infrastructures
      • ciscoip_small

        Cisco IPS 4500 Series Sensors

        • Offers broad visibility into attackers, victims, and related attack information
        • Protects critical data center resources from targeted attacks and sophisticated malware
        • Promotes business continuity and helps meet compliance needs with exceptionally high attack protection
        • Automated threat management results in critical asset protection in minutes
      • Cisco-Virtual-Security-Gateway

        Cisco Virtual Security Gateway (VSG)

        • Integrates with Cisco Nexus 1000V virtual switch and hypervisors
        • Delivers security policy enforcement and visibility at a virtual machine level
        • Logically isolates applications in virtual data centers and multi-tenant environments
        • Enforces separation of duties between security and server administrators
      • Product Small Photo

        Cisco Catalyst 6500 Series/7600 Series ASA Services Module

        • Combines full-featured switching with best-in-class security
        • Places security directly into the data center backbone
        • Provides up to 16 Gbps multiprotocol throughput for 300,000 connections per second
        • Supports up to four modules in a single chassis
    • secure-access

      Secure Access

      Enhance network visibility and control with identity-aware secure access solutions.

      • ise_appliance_small

        Cisco Identity Services Engine

        • Get highly secure access with contextual identification and consistent policy management
        • Increase productivity with self-service end-user provisioning
        • Access user, device, and application-based policy controls in a single pane
      • Product Small Photo

        Network Admission Control Appliance

        • Enforces network security policies by allowing access only to trusted devices
        • Blocks access by noncompliant devices and limits damage from emerging threats and risks
        • Protects existing investments through third-party management application compatibility
        • Reduces virus, worm, and unwanted access threats by integrating with other Cisco products
      • ACS Small Photo

        Cisco Secure Access Control System

        • Controls network access based on dynamic conditions and attributes
        • Meets evolving access requirements with rule-based policies
        • Increases compliance with integrated monitoring, reporting, and troubleshooting capabilities
        • Takes advantage of built-in integration capabilities and distributed deployment
      • tw_mobility

        Cisco Virtual Office

        • Extends highly secure, and manageable network services to remote employees
        • Cost-effectively scales through standard or express versions
        • Includes Cisco and approved partner services, remote site aggregation and head-end systems
        • Delivers full IP phone, wireless, data, and video services
    • secure-mobility

      Secure Mobility

      Get more secure mobile connectivity with SSL VPN (TLS and DTLS), IPsec, IPv4, IPv6 over IPv4 tunneling, web security, and network access manager.

      • VPN-Services-for-Cisco-ASA-Series

        VPN Services for Cisco ASA Series

        • Provides remote access for up to 10,000 SSL or true IPsec connections
        • Supports functionality unavailable to a clientless, browser-based VPN connection
        • Connects users to IPv6 resources over IPv4 network tunnels
        • Facilitates creating user profiles and defining names and addresses of host
      • Cisco-AnyConnect-Secure-Mobility-Solutions

        Cisco AnyConnect Secure Mobility Solutions

        • Provides an intelligent, smooth, and reliable connectivity experience
        • Gives users a choice of how, when, and where they access their information
        • Provides remote-access connectivity that is comprehensive and preemptive
        • Enforces context-aware policy, and protection from malware
    • isc-100-80

      Physical Security

      Protect people, assets, processes, and data with Cisco Connected Safety and Security solutions.

      • am48565-100-80

        Physical Security

        • Supports video surveillance, IP cameras, access control, and incident management
        • Offers a scalable and open platform
        • Takes advantage of medianet and Internet of Things (IoT) technologies

    Follow US

    Send Your Feedback

    Tell us what you think of Cisco security products, solutions, and technologies.

    Go to Survey

    The Best of Security Newsletter

    Security Connections delivers the latest offers, new features, and products each month.

    Read Now