Guest

Design Zone for Security

SAFE

Simplify Security with SAFE

This overview of SAFE will show you how to map security capabilities to threats. (PDF – 6 MB)

Simplify Security with SAFE

Related Links

How SAFE Works

This Interactive SAFE Poster shows you how the model works to protect your network.

View Poster Order Poster

The Latest in Thought Leadership

The SAFE blog brings you best practices in network security architecture and design.

Read Blogs

Easy-to-Use Security Reference Architecture

SAFE can help you simplify your security strategy and deployment. This Cisco security reference architecture features easy-to-use visual icons that help you design a secure infrastructure for the edge, branch, data center, campus, cloud, and WAN. The framework encompasses operational domains such as management, security intelligence, compliance, segmentation, threat defense, and secure services.

SAFE solutions have been deployed, tested, and validated at Cisco and provide guidance, best practices, and configuration steps.

Why complicate your security network design? Keep it simple with SAFE.

The SAFE Key

 

The SAFE Key organizes security by using two core concepts: Places in the Network (PINs) and Secure Domains.

PINs reference examples of locations that are found in networks and the infrastructure needed to create them:

  • Data center
  • Branch
  • Campus
  • WAN
  • Internet edge
  • Cloud

Secure Domains are operational areas used to protect these locations. They are security concepts that traverse an entire network:

  • Management
  • Security intelligence
  • Compliance
  • Segmentation
  • Threat defense
  • Secure services

This reference architecture logically arranges capabilities to secure business workflows against threats.

SAFE Internet Edge Architecture Guide (PDF - 2.9 MB) Adobe PDF file

SAFE design guides have been tested, validated, and deployed at Cisco. They provide best practices, configuration steps, and more.

SAFE Edge Remote Access VPN with DDoS Design Guide (PDF - 4.6 MB)Adobe PDF file

Threat Defense (PDF - 3.7 MB) Adobe PDF file