Cisco today announced new additions to its portfolio that bolster the fundamental components of a network security infrastructure and the delivery of cloud security services enabling businesses to collaborate with greater confidence as their employees become increasingly mobile and interactive.
Today’s announcement comes at a time when collaboration and mobility technologies are redefining how, when and where business gets done.
The new Cisco security offerings incorporate greater threat defense that help customers protect against attacks, malware and botnets – no matter where they connect and communicate.
New Product Offerings:
– Cisco Security Cloud Services:Offers a unique approach for delivering security as a service that ties together services from multiple networks and applications, bringing together the cloud and the enterprise network for secure, collaborative communications. The Cisco Security Cloud supports the recently announced Hosted Email Security Services as well as Global Correlation–a powerful new technique that powers security services integrated into Cisco’s broad range of security offerings.
– Cisco IPS Sensor Software Version 7.0:Global Correlation for intrusion prevention systems (IPS) harnesses the power of Cisco Security Intelligence Operations, a powerful threat defense ecosystem, to achieve unprecedented threat protection efficacy. Cisco turns global threat data captured from a massive footprint of security devices into dynamic updates and actionable intelligence, such as “reputation” scores, and pushes that intelligence out to a business’ network security infrastructure for protective action. By incorporating Global Correlation, Cisco IPS 7.0 is twice as effective in stopping malicious attacks, in a shorter amount of time, than traditional signature-only IPS technologies.
– Cisco ASA 5500 Series 8.2 Software:Provides end-to-end security for offices of all sizes, improving threat mitigation and enabling companies to more securely connect, communicate, and conduct business. With a new Botnet Traffic Filter for identifying infected clients, IPS availability for small offices, and increased clientless remote-access capabilities, Cisco now offers support for the widest range of platforms, operating systems, and endpoints in the industry.
– Cisco ASA Botnet Traffic Filter: The new Botnet Traffic Filter enables Cisco ASA 5500 Series appliances to accurately identify infected clients using information from Cisco Security Intelligence Operations–more than 1000 threat collection servers that receive information from more than 700,000 sensors and 500 third-party feeds. With improved threat intelligence, customers can more accurately identify infected clients and streamline their operations so that security administrators can focus on the most challenging threats.
– Cisco Remote Access and VPN Enhancements: Cisco ASA Software Release 8.2 expands remote access capabilities with next generation tunneling and session persistence through Cisco AnyConnect Essentials for corporate and mobile users, thus covering the widest range of platforms, operating systems, and endpoints in the industry. Support for the Cisco Virtual Office solution has also been added to the Cisco ASR 1000, allowing this WAN aggregation platform to also act as the head end device for CVO deployments, supporting several thousand remote clients. The Cisco ASR 1000 also now supports GET VPN taking it to the next level by delivering high- performance any-to-any secure connectivity for up to 10,000 Internet Protocol Security (IPsec) tunnels and up to 7Gbps total throughput, enabling efficient multicast replication, advance hierarchical quality of service (QoS), and remote instant-on provisioning.
– Cisco SAFE:A security reference architecture that provides prescriptive validated design guides to help organizations plan, design, and deploy security solutions across the network, such as campus offices, the Internet edge, branches and data centers. These blueprints provide defense-in-depth guidance and best practices for securing data and transactions as they traverse the network.
– Cisco Information Technology Governance, Risk Management, and Compliance (IT GRC) Security Assessment Services:Helps organizations establish a single program for reducing information security risk and the cost of compliance, by aligning business and technology strategies. The services allow businesses to balance the need for collaboration and information sharing with privacy and information control. This includes the challenge of managing disparate security and compliance programs that often lead to inefficiency, duplicated effort, coverage gaps and higher costs. It helps organizations establish a common control framework (CCF); a single, unified set of security controls that efficiently meet compliance obligations and protect organizations from threats. The service involves a comprehensive assessment of a business’ security policies and security architecture and maps them against the requirements of the common control framework to identify gaps and make prioritized recommendations for resolving those gaps.
“As collaboration trends extend communications outside company offices, businesses must re-examine how they protect their extended enterprises. While the flexibility inherent in business applications, social media, software as a service and wireless technologies is leading to widespread adoption and interactive business models, those very technologies and business models are jeopardized by threats that are just as agile,” said Hani Abdel Aziz, Cisco Egypt Country Manager.
Much of the basis for this announcement was spotlighted when Cisco Chairman and CEO John Chambers delivered a keynote at the RSA Conference entitled ‘Collaborate with Confidence,’ which expanded on these security trends and described his perspective on the heightened importance of network security in a collaborative world.
“In today’s changing world, businesses require a thought-out security strategy that accounts for the physical, virtual, mobile and global aspects of their business. Our vision for security is based on a balance of protection and enablement, which integrates security from the network through to the endpoint and the user. Security needs to capture the latest threat intelligence to mitigate shifting threats. This combination is what enables businesses to collaborate with greater confidence when engaging employees, partners and customers,” added Abdel Aziz.