ArcSight Security Information and Event Management (SIEM) Deployment Guide

Get the White Paper

December 13th, 2010

By Cisco Systems and ArcSight

This document is for the reader who:

-Has read the Cisco Security Information and Event Management and Borderless Networks Enterprise Deployment Guide
-Wants to connect Borderless Networks to the ArcSight SIEM solution
-Wants to gain a general understanding of the ArcSight SIEM solution
-Has a level of understanding equivalent to a CCNA® certification
-Wants to solve compliance and regulatory reporting problems
-Wants to enhance network security and operations
-Wants to improve IT operational efficiency
-Wants the assurance of a validated solution

Download this deployment guide here:

Access Control Security Best Practices for the HP Wired Infrastructure

Get the White Paper

November 1st, 2010

By HP Networking

Securing your LAN network infrastructure is challenging. Factors such as cost, network instability, risk of breach and ease of implementation all play an equal part in making the right decision to retrofit an insecure, albeit functional, LAN. This white paper outlines approaches to securing the network that we, at HP, know work, in addition to providing information about what we know does not work. Getting all of the correct pieces to fit together is not so easy, so we have also provided the necessary configuration specifics to help with securing some of those devices connected to your network that you may have forgotten about, such as network printers, VoIP phones and security cameras.

Find out how by downloading this white paper:

Lippis Report 158: Next Generation Network Security for Data Center Protections

October 5th, 2010

nicklippis.jpgOne significant trend that has emerged during the current business/economic cycle is that IT projects that reduce cost are winners. This savings trend is as strong as I have experienced in my twenty-five years within the IT industry. In particular, it’s propelling data center consolidation, server virtualization and mobile computing projects. As enterprises consolidate data centers and miniaturize them with virtualization, cloud-computing providers are busy offering a new lower cost IT delivery economic model. In short, a new tier of computing has emerged were endpoint devices are mobile and applications are delivered via corporate data centers and cloud computing facilities. This new model of computing that also increases convenience and productivity is lacking in one important area; network security for both mobile endpoints and the ability of data center security appliances to keep up with application demand.

Read the rest of this entry »

Cisco Reputation Filtering: Providing New Levels of Network Security

Get the White Paper

October 5th, 2010

By Cisco Systems

Today’s sophisticated, blended threats can exploit three or four different communications vehicles before they launch full-scale attacks on unprepared enterprise networks. This white paper, written for IT managers and executives, examines the new security risks for today’s borderless enterprise networks, and describes how cloud-based Cisco® Security Intelligence Operations and powerful, comprehensive reputation filtering capabilities built into Cisco security appliances and services can help you protect your network from known and unknown threats.

Find out how by downloading this paper.

Improved Network Security with IP and DNS Reputation

Get the White Paper

August 10th, 2010

By HP Networking

As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Sophisticated scanning, penetrating, and obfuscating tools and techniques are more widely available now more than ever before. Worst of all, hackers are now highly motivated to penetrate networks, applications, and databases to steal information that can quickly be sold for profit using botnets and other resources
they control.

To learn how to defend IT assets and business reputation by download this paper from HP Networking.

Cisco Threat Defense for Borderless Networks

Get the White Paper

August 10th, 2010

By Cisco Systems

Traditional security techniques are unable to respond to threats that can arise from anywhere. To protect today’s borderless networks, IT managers must adapt by implementing faster, smarter security measures that monitor the constantly changing global landscape. This white paper, written for IT managers and executives, examines the security risks and needs of borderless networks, details a systematic plan of action, and describes how Cisco can help implement threat defenses that will serve you today and for years to come.

Find out how by downloading this white paper

STP MiTM Attack and L2 Mitigation Techniques on the Cisco Catalyst 6500

Get the White Paper

July 27th, 2010

By Cisco Systems

Spanning-Tree Protocol (STP) can be easily compromised by eavesdropping in a switched corporate environment, but this vulnerability can be mitigated using L2 security features that are available on the Cisco® Catalyst® 6500. STP Man in The Middle (MiTM) attack compromises the STP “Root Bridge” election process and allows a hacker to use their PC to masquerade as a “Root Bridge,” thus controlling the flow of L2 traffic. To understand the attack, the reader must have a basic understanding of the “Root Bridge” Election process and the initial STP operations that build the loop free topology. This paper provides an overview of the STP Root Bridge Election Process, STP MiTM Attack Guide and Mitigation Techniques for STP attacks.

Find out how by downloading this white paper

IPv6 First Hop Security: Protecting Your IPv6 Access Network

Get the White Paper

June 14th, 2010

By Cisco Systems

This paper provides a brief introduction to common security threats on IPv6 campus access networks and will explain the value of using First Hop Security (FHS) technology in mitigating these threats. An overview of the operational principle of FHS is provided together with some examples on how to enable FHS on Catalyst® 6500, 4500, and 3750 Series Switches. The target audience for this paper are network architects and network operation engineers.

Find out about FHS by downloading this Cisco whitepaper.

Lippis Report 145: Cisco Expands TrustSec for 802.1x Access Control, Policy, Identity and Encryption

April 5th, 2010

nicklippis.jpgMany IT leaders are striving to understand who is on their network and what they are doing. These are two simple questions and yet, in many cases, IT business leaders do not have a good way to answer them. And once IT leaders are able to obtain this information the question then becomes what else I can do with the data: obtain a history report, perform statistics for analysis and planning, generate compliance reports and much more. To tightly link business processes with networked applications, IT leaders need to wrap policy, identity and security around users and IT assets.

Read the rest of this entry »

Lippis Report 144: Cloud Web Security Shifts To Content And Context Threat Detection

March 22nd, 2010

nicklippis.jpgWith all the investment in IT security over the years, one would think that threats would have subsided; but they have only increased and largely increased with exploits and iframes (redirection on a reputable website to infect its visitors) up nearly by a factor of 2000 over the past two years. This has resulted in an increase in data theft Trojans over the same period by a factor of 6000, according to the 2009 ScanSafe Global Threat Report, enriching hackers and cybercriminals. What’s driving this exploit growth is that hackers and cybercriminals are automating successful techniques for mass website infection. In addition, hackers increasingly collaborate, sharing best practices to infect websites for personal gain. In short, IT and business leaders are not confronting individual hackers, but a community of cybercriminals working together to steal corporate data that is increasingly organized as a traditional business with suppliers, resellers and end users. And this community’s opportunities to attack individuals and corporations have only increased with the huge growth in mobile access and deep corporate reliance of web-based applications to automate business processes.

Read the rest of this entry »

Web 2.0wned: A history of malware on the Web

Get the White Paper

March 17th, 2010

The Web Malware Pandemic

Just as the Internet, the Web, and the information age have revolutionized our businesses and our lives, these developments have also radically changed the face of crime. Computer and Internet crime are no exception. Today, computers factor in nearly every form of crime – from crimes facilitated by computers (credit card theft, for example), to crimes, which are specifically computer-to-computer (malware, for example), and to crimes in which computers play an incidental supporting role (i.e. an illegal gambling bookie that keeps computerized records). This paper addresses one single facet of cybercrime – the manipulation of Web content and Web technologies for criminal and/or for illicit gains

Find out how to defend Web traffic from cybercrime by downloading this paper

Annual Global Threat Report 2009

Get the White Paper

March 17th, 2010

THE WORLD’S LARGEST SECURITY ANALYSIS OF REAL-WORLD WEB TRAFFIC
By Cisco Systems

The ScanSafe Global Threat Report is an analysis of more than a trillion Web requests processed in 2009 by the ScanSafe Threat Center on behalf of the company’s corporate clients in over 80 countries across five continents. Our leading position of providing security in-the-cloud provides unparalleled insight in the real-world Web threats faced by the today’s enterprise; this report represents the world’s largest security analysis of real- world Web traffic.

Download it now here.

Cisco TrustSec

Get the White Paper

March 17th, 2010

By Cisco Systems

The traditional network and physical perimeter is no longer the only borderline to defend information security. Collaboration, IT consumerization, mobility, and new computing technologies are driving productivity gains while presenting renewed security requirements. There is greater pressure on IT to meet the demands of a dynamic workforce, both in terms of service delivery and security challenges. New solutions are needed to protect borderless networks and to help further improve business efficiencies in the mean time. Cisco® TrustSec is such a solution.

To find out how to protect your network with TrustSec download this white paper now

TrustSec Architecture Expands To Incorporate 802.1x & NAC

Listen to the Podcast

March 17th, 2010

StevenSong-photoCisco’s TrustSec is architecture with its implementation spread across client software, infrastructure (Catalyst & Nexus) and policy (Access Control System and NAC appliance). Cisco has expanded TrustSec to incorporate 802.1x clients allowing IT leaders to mix and match NAC and 802.1x endpoints. TrustSec organizes and simplifies authentication and policy schema allowing administrators to configure and maintain identity-based access to IT resources while identifying and applying policy based on a user roles in the organization. TrustSec also provides encrypted links at the switch port level. Steven Song Security Business Manager in the Network Systems & Security group at Cisco Systems joins me to discuss TrustSec and how Cisco is expanding its services and importance for IT business leaders.