Security Technology
The Cisco SecureX Architecture features security embedded in the very fabric of the borderless network. Network appliances, Internet scan sensors, and client devices feed real-time data into Cisco Security Intelligence Operations (SIO). This provides global threat correlation and reputation services.
With this architecture, security policies are defined not in the simple terms of ports and addresses, but rather in a higher level, context-aware security policy language that "knows" the identity of user, his or her role in the organization, security posture, and device type. With this information, it can enable the network to grant appropriate access. Cisco security comes in a variety of forms, including:
- Virtual
- Cloud-based
- Appliance
- Modules
- Software for routers and switches
For added security, you can choose from services such as Security Intelligence Operations and IntelliShield Alerts. Professional services, such as installation, configuration, and ongoing monitoring and threat response, are also available.
Our security products include the most widely deployed firewall in the world, the Cisco Adaptive Security Appliance (ASA), as well as highly secure routers and switches, web security appliances, email security appliances, Security as a Service, end-point security, VPN clients, and a variety of other security appliances and products.
Resources
Security Architecture
- Ecosystem of Technical Partnerships for Security At-A-Glance (PDF - 163 KB)
- SecureX Files video series for end users
- Cisco's SecureX Architecture
- Lippis Report on Cisco's SecureX Architecture (PDF - 1.75 MB)
Security Technologies
Security Resources
Cisco SecureX
Learn how context aware firewalls and next generation scanning elements enhance security.
Read White PaperCisco TrustSec
Learn how TrustSec secures networks through identity based access control.
Learn MoreCase Studies
Learn how Cisco customers use our security products in their networks.
Read Case StudiesSecurity Reports
Global threats, trends and the road ahead discussed in both annual and quarterly security reports.
Read Reports