Just the facts…Sergeant Joe Friday is a LAPD detective with Dragnet.
Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security. - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc. - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.
Slide 11: SecureX Architecture Image- Cisco SecureX takes the elements outlined in the Security Architecture Model and blends them to provide an integrated and collaborative approach to securing the entire distributed network, from the data center to to most remote worker. - It starts with a trusted infrastructure of secured and tuned devices. The network is far more than plumbing, but becomes the core of both your network services and security. - The network provides real-time information for visibility into what is happening on the network, context-based information about such things as where devices are located, what resources they are attempting to access, etc. - This is the who, what, when, where and how that then allows for enhanced control of the environment so that granular security decisions to be made with precision. - This context-based information can then be used not just at the network layer, but can be shared to contribute to a variety of enforcement points, either integrated into network devices, operating as an overlay appliance, or even into the cloud. - Core to this is the ability to centrally create policy about who and what can access the network, and how resources are used, across a wide spectrum of scenarios, including time, place, device, groups, etc. - And then, take this centralized policy and push it across the entire networked environment for distributed enforcement. - This allows for consistent security implementation (including consistent access control for users, devices, and guests) across network zones, branch offices, remote workers, virtualized devices, remote workers, and cloud-based services. - APIs allow Cisco to expand our solutions with the addition of a rich ecosystem of partners that can provide critical information and services into the network, and/or gather information in order to provide granular, detailed information about what is happening. - Critical management tools and services, as well as highly trained partners specializing in network security, simplify the entire experience for customers. - The final wrapper around this is Cisco’s industry-leading global security intelligence services. By analyzing vast amounts of real-time data across a spectrum of traffic, including web, email, network, cloud, and endpoints, Cisco is able to identify and deliver critical, real-time security updates to network and security devices to protect organizations from threats as they are occurring, as well as reputation-based information in order to significantly enhance the accuracy and effectiveness of local tools analyzing network traffic.