Secure Network Access for Personal Mobile Devices

Get the White Paper

December 3rd, 2012

By Cisco Systems

People around the globe are enamored with smartphones and tablet computers, and feel strongly that they should be allowed to use these devices at work. By combining an architecture-based technical implementation with carefully considered business policies, organizations can create a safe and appropriate environment that blends personal and business resources. This paper discusses:

  • The growing importance of mobile devices to an efficient, productive workspace
  • The technical and business challenges of securely integrating personal devices into the enterprise network
  • Business strategies for a “bring your own device” (BYOD) environment
  • Point versus architectural network options and related products
  • The Cisco® BYOD Smart Solution

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Get the White Paper

November 26th, 2012

By Cisco Systems

Organizations that want to harness the power of the web must deal with a consequence: becoming vulnerable to web-based threats that can negatively impact data, reputation, and operations. Trends such as social networking and Bring Your Own Device (BYOD) add to the challenge of securing the safety of network traffic and increase the attack footprint. Cisco® ASA Software Release 9.0, integrated with Cisco Cloud Web Security, and powered by Cisco Security Intelligence Operations (SIO), solves the combined problems of performance and breadth of security—without affecting network complexity or business agility. This white paper explains how Cisco uses the advantages of the cloud to protect enterprises from web-based threats and to apply comprehensive policies to web content and web-application visibility within the enterprise.

Lippis Report 168: Cisco Pulls All the Pieces of Its Network Security Program into One Architecture: SecureX

March 15th, 2011

nicklippis.jpgCisco recently launched its SecureX architecture that extends perimeter-based network security to secure modern IT, recognizing the huge growth in mobile and cloud computing. SecureX is a multi-layer architecture built upon Cisco’s AnyConnect client, its global footprint in real-time threat intelligence found in SIO (Security Intelligence Operation), Cisco TrustSec, including policy servers of NAC manager and server appliances, ASA firewall and the security enforcement features of its switches and routers. SecureX is an architecture to Cisco’s network security products and service to work together in an effort to create deeper defenses and contain exploit infestation if, and when, they occur. Fundamental to SecureX is the concept of “context aware” policy across the enterprise, including remote endpoint devices, centralized policy creation with distributed security device and network enforcement. SecureX provides for innovation injection points through APIs (Application Programming Interfaces) for management and SIEM or Security Information and Event Management. In this Lippis Report Research Note, we explore SecureX with a focus on how context increases defenses and keeps IT assets safer.

Read the rest of this entry »

The Future of Network Security: Cisco’s SecureX Architecture

Get the White Paper

March 15th, 2011

By Cisco Systems

There are three major trends sweeping through the enterprise: the rapid rise of the consumerized endpoint, the onset of virtualization and cloud computing, and the growing use of high-definition video conferencing. Each of these critical technologies is transforming business—and forcing a fundamental shift in how security is developed and deployed. In this white paper, Cisco describes its SecureX architecture and how it has evolved IT security so that IT leaders can enjoy the benefits of these IT trends securely.

Lippis Report 165: Network Security in a Virtualized World

January 31st, 2011

nicklippis.jpgThere are powerful market forces changing IT delivery. IT application delivery is becoming increasingly centralized thanks to data center server virtualization plus mobile and cloud computing. Desktops are being virtualized, too, thanks to network speeds that deliver low latency and high bandwidth, creating a thin client user experience that is indistinguishable from a thick client but at lower desktop management cost. One serious implication of this concentration of IT in data centers is that a new IT security model is needed as mobility brings greater threat exposure while virtualization changes traffic patterns and the rules of security appliance placement. In this Lippis Report Research Note, we present a new model for IT security in the virtualized mobile and cloud-computing era.

Read the rest of this entry »

Lippis Report 163: A Multi-Vendor Security Management Approach via a Cisco SIEM Ecosystem

December 13th, 2010

nicklippis.jpgIn an effort to offer a multi-vendor SIEM (Security Information and Event Management) solution, Cisco is placing its SIEM product, CS-MARS, in end-of-life and in its place, offering the industry its first SIEM ecosystem. Cisco acquired MARS six years ago in December 2004. MARS provided traditional event management and security monitoring along with limited forensic capabilities and compliance reporting. But the market demanded a broader cross-vendor SIEM solution rather than a SIEM focused primarily on Cisco products. In response Cisco has launched a SIEM ecosystem to support deep event monitoring, forensics and compliance reporting across a heterogeneous enterprise network. IT has also expanded the role of its Cisco Security Manager or CSM to support policy management and troubleshooting across a wider range of Cisco products. In this Lippis Report Research Note, we examine the new distribution of security responsibilities that now stretch across Cisco CSM and its new SIEM ecosystem with an eye toward stronger defense of IT assets.

Read the rest of this entry »