Security

Security

What Is Network Security?
"Network security" refers to any activity designed to protect the usability and integrity of your network and data. It includes both hardware and software technologies. Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
How does network security work?
Network security combines multiple layers of defenses at the edge and in the network. Each network security layer implements policies and controls. Authorized users gain access to network resources, but malicious actors are blocked from carrying out exploits and threats.
How do I benefit from network security?
Digitization has transformed our world. How we live, work, play, and learn have all changed. Every organization that wants to deliver the services that customers and employees demand must protect its network. Network security also helps you protect proprietary information from attack. Ultimately it protects your reputation.
Types of network security
Access control
Not every user should have access to your network. To keep out potential attackers, you need to recognize each user and each device. Then you can enforce your security policies. You can block noncompliant endpoint devices or give them only limited access. This process is network access control (NAC).
Antivirus and antimalware software
"Malware," short for "malicious software," includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage.

  • Protect your Endpoints
  • Protect your Network
  • Protect your Email and web Traffic

Application security
Any software you use to run your business needs to be protected, whether your IT staff builds it or whether you buy it. Unfortunately, any application may contain holes, or vulnerabilities, that attackers can use to infiltrate your network. Application security encompasses the hardware, software, and processes you use to close those holes.
Behavioral analytics
To detect abnormal network behavior, you must know what normal behavior looks like. Behavioral analytics tools automatically discern activities that deviate from the norm. Your security team can then better identify indicators of compromise that pose a potential problem and quickly remediate threats.
Data loss prevention
Organizations must make sure that their staff does not send sensitive information outside the network. Data loss prevention, or DLP, technologies can stop people from uploading, forwarding, or even printing critical information in an unsafe manner.
Email security
Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
Firewalls
Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. Cisco offers unified threat management (UTM) devices and threat-focused next-generation firewalls.
ASA 5500-X with FirePOWER Services:

  • Small business, branch office, enterprise
  • Throughput from 256mbps to 15gbps
  • Threat inspection from 125 Mbps to 30 Gbps
  • Stateful firewall, AVC, NGIPS, AMP, URL

Firepower 4100 Series:

  • Internet edge, high-performance environments
  • Firewall throughput from 20 Gbps to 60 Gbps
  • Threat inspection from 10 Gbps to 20 Gbps
  • Stateful firewall, AVC, NGIPS, AMP, URL

Firepower 2100 Series:

  • Internet edge to data centre environments
  • Firewall throughput from 1.9 Gbps to 8.5 Gbps
  • Threat inspection from 1.9 Gbps to 8.5 Gbps
  • Stateful firewall, AVC, NGIPS, AMP, URL


Firepower 9000 Series:

  • Service provider, data centre
  • Firewall throughput up to 225 Gbps
  • Threat inspection up to 90 Gbps
  • Firewall, AVC, NGIPS, AMP, URL, DDoS

Intrusion prevention systems
An intrusion prevention system (IPS) scans network traffic to actively block attacks. Cisco Next-Generation IPS (NGIPS) appliances do this by correlating huge amounts of global threat intelligence to not only block malicious activity but also track the progression of suspect files and malware across the network to prevent the spread of outbreaks and reinfection.
Mobile device security
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90 percent of IT organizations may support corporate applications on personal mobile devices. Of course, you need to control which devices can access your network. You will also need to configure their connections to keep network traffic private.
Network segmentation
Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated.

Security information and event management
SIEM products pull together the information that your security staff needs to identify and respond to threats. These products come in various forms, including physical and virtual appliances and server software.
VPN
A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. Typically, a remote-access VPN uses IPsec or Secure Sockets Layer to authenticate the communication between device and network.
Web security
A web security solution will control your staff’s web use, block web-based threats, and deny access to malicious websites. It will protect your web gateway on site or in the cloud. "Web security" also refers to the steps you take to protect your own website.



The Web Security Appliance gives you complete control over how your users access the Internet. By identifying hundreds of applications and more than 150,000 micro-applications, our appliance helps your administrators create highly granular policies.
Specific features and applications, such as chat, messaging, video, and audio can be:

  • Restricted with time and bandwidth limits
  • Blocked according to your requirements

Wireless security
Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot. To prevent an exploit from taking hold, you need products specifically designed to protect a wireless network.

Cloud Security
Cisco Cloud Security helps you adopt the cloud securely. With it, you can better manage security for the way the world works today. It protects users against threats anywhere they access the Internet, and it protects your data and applications in the cloud.
Cisco Cloudlock, a cloud access security broker, protects against compromised accounts, data breaches, and malware.
Network Security:
Cisco SSL Appliances:



Cisco SSL Appliances decrypt secure socket layer (SSL) traffic and send it to existing security and network appliances to transparently enable encrypted traffic inspection. This allows existing intrusion prevention system (IPS) appliances to identify risks normally hidden by SSL, such as regulatory compliance violations, viruses, malware, data loss, and intrusion attempts.
Router Security:
Protect your data from malware, intrusions, denial-of-service attacks, and advanced threats. Cisco routers work together to extend corporate security to your branch and defend your network. With integrated security you get protection against sophisticated threats, while maintaining outstanding performance and lowering costs.

  • Simplify Branch Management: Save time, with Physical and Virtual.
  • Visibility Analytics: Extend visibility into the branch network and gain security intelligence.
  • Respond quickly to threats: Mitigate security vulnerabilities. Protect your branch and customers where most needed.
  • Lower costs, boost performance: Use an Internet path to consume less bandwidth and improve application performance.

Cisco Security Products:

  • Advanced Malware Protection:
  • Cisco AMP for Endpoints: Protect PCs running Windows, Macs, Linux systems, Android mobile devices, and virtual environments using AMP’s lightweight connector, with no performance impact on users
  • Cisco AMP for Networks: Get deep visibility into network-level and network-edge threat activity and block advanced malware.
Protect your email and web traffic: Add AMP capabilities to email and web security appliances or to your cloud email and web security deployments.
TOP