Cisco Security - An Overview


Cisco gives you the scope, scale, and capabilities to keepup with the complexity and volume of threats. Putting security above everythinghelps you innovate while keeping your assets safe. Cisco prioritizes securityin all that we do. Only with Cisco can you attain effective network security toface tomorrow's evolving threats.

SECURITY SOLUTIONS AND USE CASES

Achieve desired security outcomes, enable your IT investments, and mitigate risk from cyber attacks with Cisco.

  • Breach readiness and response

Advanced malware will evade even the best prevention. Are you ready? Cisco services and technology work together to detect, respond to,and recover from breaches.

  • Prevent breaches at every edge

While your perimeter may have eroded, Cisco can stop threats from the campus, the data center, the branch, and the cloud to keep business fast and secure.

  • Enhance Office 365 security

Use Cisco to stop the ransomware, malware, phishing, account compromises, and cloud app risks that Microsoft misses with its email and collaboration as a service.

  • Adopt a Zero Trust approach to security

Establish user-device, IoT and workload trust before granting access; establish software-defined perimeters to restrict app and segment network access; and automate adaptive policies.

  • Gain network visibility and segmentation

You already have a Cisco network. Use it to see what endpoints and IoT devices are doing on your network, control access, and contain threats.

  • Secure your data center

Protect hybrid cloud and physical workloads across container and application-centric infrastructure using software-defined segmentation and threat containment.

  • Secure your WAN

Protect users, connected devices, and application usage at all direct Internet access breakouts and all traffic across the software-defined WAN.

  • Ransomware defense for endpoints

Locky, WannaCry, Petya--what's next? Ransomware is evolving too fast for point products to keep up. Cisco's layered defenses are more effective.

Lower your cyber risk

Cisco, Apple, Allianz, and Aon are working together on a risk framework of technology and cyber insurance that strengthens security and lowers cyber risk.

  • Security Services

Security Services help you get the most from your technology investments.  The technical experts offer knowledge and capabilities to the organizations which uses the security services. They also help improve time to threat detection and response. And, by reducing complexity, you’ll improve your ability to adapt to changing business priorities.              

Cisco Security Products at a Glance

Cisco security innovations provide highly secure firewall,web, and email services while helping to enable mobility and teleworking.

Advanced Malware Protection (AMP)

Cloud Security

Email Security

Endpoint Security

Firewalls

Network Security

Network Visibility and Segmentation

Next-Generation Intrusion Prevention System (NGIPS)

Security Management

VPN and Endpoint Security Clients

Web Security

Workload Security

Advanced Malware Protection (AMP) Overview:

Advanced Malware Protection (AMP)

Cisco AMP Virtual Private Cloud Appliance

Cisco AMP for Endpoints

Cisco AMP for Networks

Cisco Threat Grid

Cisco Threat Grid

Cisco Threat Grid - Cloud

Cloud Security Overview:

Cloud Security

Cisco Cloudlock

Cisco Secure Sign-On

Cisco Umbrella

Email Security Overview:

Email Security

Cisco Content Security Management Appliance

Cisco Email Security Appliance

Cisco Registered Envelope Service

Email Encryption

Cisco Email Encryption

ZixGateway with Cisco Technology

Endpoint Security Overview:

Endpoint Security

Cisco AMP for Endpoints

Cisco AnyConnect Secure Mobility Client

Cisco Endpoint Security Analytics Built on Splunk

Cisco Meraki Cloud Managed MDM

Cisco Security Connector

Firewalls

Cisco 3000 Series Industrial Security Appliances (ISA)

Cisco Meraki Cloud Managed Security Appliances

Adaptive Security Appliances (ASA)

Cisco ASA 5500-X Series Next-Generation Firewalls

Cisco Adaptive Security Appliance (ASA) Software

Cisco Adaptive Security Virtual Appliance (ASAv)

Firewall Management

Cisco Firepower Management Center

Cisco Firepower Management Center

Cisco Security Manager

Cisco Security Manager

Next-Generation Firewalls (NGFW)

Cisco ASA 5500-X with FirePOWER Services

Cisco Firepower 9300 Series

Cisco Firepower 4100 Series

Cisco Firepower 2100 Series

Cisco Firepower 1000 Series

Network Security

Integrated Router Security

Router Security

Cisco VPN Internal Service Module for ISR G2

Integrated Threat Control

Cisco IOS Firewall

Cisco IOS Flexible Packet Matching (FPM)

Cisco IOS Intrusion Prevention System (IPS)

Cisco IOS Network Address Translation (NAT)

Cisco IOS Network Foundation Protection (NFP)

Network Visibility and Segmentation Overview 

Network Visibility and Segmentation

Cisco ISE Passive Identity Connector

Cisco Identity Services Engine

Cisco Security Analytics and Logging

Cisco Security Packet Analyzer

Cisco Stealthwatch Cloud

Cisco Stealthwatch Enterprise

Cisco Stealthwatch Enterprise

Next-Generation Intrusion Prevention System (NGIPS) Overview 

Next-Generation Intrusion Prevention System (NGIPS)

Cisco Firepower Management Center

Cisco Firepower Management Center

Security Management Overview:

Security Management

Cisco Adaptive Security Device Manager

Cisco Content Security Management Appliance

Cisco Defense Orchestrator

Cisco Firepower Management Center

Cisco Firepower Management Center

Cisco Security Manager

Cisco Security Manager

VPN and Endpoint Security Clients Overview:

VPN and Endpoint Security Clients

Cisco VPN Clients

Cisco AnyConnect Secure Mobility Client

IOS VPN

Dynamic Multipoint VPN (DMVPN)

Group Encrypted Transport VPN

Cisco IOS Easy VPN

Cisco IOS SSL VPN

VPN Management

Cisco Adaptive Security Device Manager

Cisco Security Manager

Cisco Security Manager

Web Security Overview:

Web Security

Cisco Cloud Web Security

Cisco Cognitive Threat Analytics

Cisco Content Security Management Appliance

Cisco Umbrella

Cisco Web Security

Workload Security

Cisco Tetration Analytics




By haripriya.krishnakum Krishnakumar | 17 Oct 2019 | 0 Comments