Cisco Virtual Security Gateway for Cisco Nexus 1000V Series Switches

Get the White Paper

by Cisco Systems

This one page at-a-glance brief on Security and Compliance for Virtual Computing provides a snapshot view of Cisco’s new Virtual Security Gateway (VSG) for Cisco Nexus® 1000V Series Switches. VSG delivers security, compliance and trusted access for virtual data center and cloud computing environments.

Download the Virtual Security Gateway (VSG) for Cisco Nexus® 1000V Series Switches here.

Comments Off on Cisco Virtual Security Gateway for Cisco Nexus 1000V Series Switches

Posted in Cisco, Network Security, White Papers

Splunk Security Information and Event Management (SIEM) Deployment Guide

Get the White Paper

By Cisco Systems and Splunk

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment Guide
-Wants to connect Borderless Networks to a Splunk SIEM solution
-Wants to gain a general understanding of the Splunk SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

Comments Off on Splunk Security Information and Event Management (SIEM) Deployment Guide

Posted in Cisco, Network Security

Register with the Lippis Report and get instant, free access to thousands of industry white papers, case studies, presentations and podcasts.

Register Now. Existing User? Login.

RSA Security Information and Event Management (SIEM) Deployment Guide

Get the White Paper

By Cisco Systems and RSA

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment Guide
-Wants to connect Borderless Networks to a RSA SIEM solution
-Wants to gain a general understanding of the RSA SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

Comments Off on RSA Security Information and Event Management (SIEM) Deployment Guide

Posted in Cisco, Network Security

nFX Cinxi One Security Information and Event Management Deployment Guide

Get the White Paper

By Cisco Systems and nFX Cinxi One

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment -Guide
-Wants to connect Borderless Networks to a nFX Cinxi One SIEM solution
-Wants to gain a general understanding of the nFX Cinxi One SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

LogLogic Security Information and Event Management (SIEM) Deployment Guide

Get the White Paper

By Cisco Systems and LogLogic

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment Guide
-Wants to connect Borderless Networks to a LogLogic SIEM solution
-Wants to gain a general understanding of the LogLogic SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

Comments Off on LogLogic Security Information and Event Management (SIEM) Deployment Guide

Posted in Cisco, Network Security

ArcSight Security Information and Event Management (SIEM) Deployment Guide

Get the White Paper

By Cisco Systems and ArcSight

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment Guide
-Wants to connect Borderless Networks to the ArcSight SIEM solution
-Wants to gain a general understanding of the ArcSight SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

Download this deployment guide here:

Cisco Reputation Filtering: Providing New Levels of Network Security

Get the White Paper

By Cisco Systems

Today’s sophisticated, blended threats can exploit three or four different communications vehicles before they launch full-scale attacks on unprepared enterprise networks. This white paper, written for IT managers and executives, examines the new security risks for today’s borderless enterprise networks, and describes how cloud-based Cisco® Security Intelligence Operations and powerful, comprehensive reputation filtering capabilities built into Cisco security appliances and services can help you protect your network from known and unknown threats.

Find out how by downloading this paper.

Cybersecurity in Government: Determining Your Priorities for the CNCI

Get the White Paper

By Cisco Systems

The broad parameters and urgency of the Comprehensive National Cybersecurity Initiative (CNCI) require IT triage using risk management and leading technology practices. Some investments must occur earlier and more systemically than others. This white paper helps senior government staff understand the need to embed identity- and policy-based controls throughout essential infrastructure. The critical steps outlined in this paper will improve the government’s front line of defense and boost situational awareness to combat immediate threats. The same actions infuse identity, policy enforcement and intelligence-based security throughout the network, helping to strengthen the future cybersecurity environment.

Find out how by downloading this paper.

Comments Off on Cybersecurity in Government: Determining Your Priorities for the CNCI

Posted in Cisco, Network Security

Improved Network Security with IP and DNS Reputation

Get the White Paper

By HP Networking

As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Sophisticated scanning, penetrating, and obfuscating tools and techniques are more widely available now more than ever before. Worst of all, hackers are now highly motivated to penetrate networks, applications, and databases to steal information that can quickly be sold for profit using botnets and other resources
they control.

To learn how to defend IT assets and business reputation by download this paper from HP Networking.

Cisco Threat Defense for Borderless Networks

Get the White Paper

By Cisco Systems

Traditional security techniques are unable to respond to threats that can arise from anywhere. To protect today’s borderless networks, IT managers must adapt by implementing faster, smarter security measures that monitor the constantly changing global landscape. This white paper, written for IT managers and executives, examines the security risks and needs of borderless networks, details a systematic plan of action, and describes how Cisco can help implement threat defenses that will serve you today and for years to come.

Find out how by downloading this white paper

STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500

Get the White Paper

By Cisco Systems

Spanning-Tree Protocol (STP) can be easily compromised by eavesdropping in a switched corporate environment, but this vulnerability can be mitigated using L2 security features that are available on the Cisco® Catalyst® 6500. STP Man in The Middle (MiTM) attack compromises the STP “Root Bridge” election process and allows a hacker to use their PC to masquerade as a “Root Bridge,” thus controlling the flow of L2 traffic. To understand the attack, the reader must have a basic understanding of the “Root Bridge” Election process and the initial STP operations that build the loop free topology. This paper provides an overview of the STP Root Bridge Election Process, STP MiTM Attack Guide and Mitigation Techniques for STP attacks.

Find out how by downloading this white paper

IPv6 First Hop Security: Protecting Your IPv6 Access Network

Get the White Paper

By Cisco Systems

This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value of using First Hop Security (FHS) technology in mitigating these threats. An overview of the operational principle of FHS is provided together with some examples on how to enable FHS on Catalyst® 6500, 4500, and 3750 Series Switches. The target audience for this paper are network architects and network operation engineers.

Find out about FHS by downloading this Cisco whitepaper.

Annual Global Threat Report 2009

Get the White Paper

THE WORLD’S LARGEST SECURITY ANALYSIS OF REAL-WORLD WEB TRAFFIC
By Cisco Systems

The ScanSafe Global Threat Report is an analysis of more than a trillion Web requests processed in 2009 by the ScanSafe Threat Center on behalf of the company’s corporate clients in over 80 countries across five continents. Our leading position of providing security in-the-cloud provides unparalleled insight in the real-world Web threats faced by the today’s enterprise; this report represents the world’s largest security analysis of real- world Web traffic.

Download it now here.

Cisco TrustSec

Get the White Paper

By Cisco Systems

The traditional network and physical perimeter is no longer the only borderline to defend information security. Collaboration, IT consumerization, mobility, and new computing technologies are driving productivity gains while presenting renewed security requirements. There is greater pressure on IT to meet the demands of a dynamic workforce, both in terms of service delivery and security challenges. New solutions are needed to protect borderless networks and to help further improve business efficiencies in the mean time. Cisco® TrustSec is such a solution.

To find out how to protect your network with TrustSec download this white paper now