RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Cisco SecureX

Product
Developers: Cisco Systems
Date of the premiere of the system: February, 2011
Last Release Date: 2020/06/17
Technology: SaaS - The software as service,  Information loss preventions are the Firewall,  cybersecurity

Content

2020: Announcement of availability of the Cisco SecureX platform

On June 17, 2020 the Cisco company announced availability since June 30, 2020 of the full-function integrated Cisco SecureX native cloud platform. The platform using which users will be able to manage information security will be included into all products of the Cisco Security portfolio. Emergence of SecureX became the answer to calls in the information security fields connected with acceleration of digital transformation and growth of number far off of the working employees.

Cisco SecureX

According to the company, security management of the organization — the complex task including accounting of business processes, tracking of the appearing threats and optimization of a situation with vendors. It is confirmed by polls of top managers. As showed the published poll of CIO Perspectives 2020, two main problems of the Chief information officer consider security and complexity. More than two thirds of respondents said that they should resolve too many issues. One of methods of fight against complexity is a consolidation of vendors. According to the report of Cisco 2020 CISO Benchmark Report, the more a variety of the vendors attracted by the organization to information security support the is longer forced idle times, more financial losses and the it is more than date leaks.

The Cisco SecureX platform intended for problem solving of information security connects the integrated Cisco portfolio to all infrastructure of information security of users. It unifies the overview, facilitates automation and strengthens protection of network, termination points, a cloud and applications. Using Cisco SecureX users will receive:

  • the unified overview. SecureX offers key metrics on transactions and threats for network, termination points, a cloud and applications. The tape SecureX interface is integrated into all technologies of information security Cisco Security;
  • automation and increase in operational efficiency. Automation of workflows for products of the Cisco Security portfolio and third parties will allow to focus on more important tasks. SecureX will also save to users not one hour of handworks thanks to automatic identification of threats using analytical data of Cisco Talos and other sources;
  • security strengthening. The technology of detection of threats SecureX gives to specialists the chance to compare analytical data from a set of various sources with the telemetry received from network, termination points, e-mail, a cloud and products of the third firms to accelerate identification of the mentioned objects and acceptance of necessary measures.

Besides, Cisco Security provided improvements for further strengthening of safety of employees:

  • gain and unification of protection of users and devices thanks to integration of information security of termination points and MFA;
  • confidence-building of users to cloud e-mail: the solution Cloud Mailbox Defense for Office365 provides a complete overview of e-mail (the entering, outgoing and internal messages) taking into account a context, protecting from such threats as a phishing, spam and programs racketeers[1].

2011: Distributed architecture of security of Cisco SecureX

Emergence of the organizations without borders significantly changed our ideas of methods, time and work location. Need of review of structure and implementation methods of information security systems resulted. This process was urged on by the new wave of mobility, virtualization and "cloud" technologies which delivered a multidimensional complex problem before IT specialists and forced them to approach in a new way implementation of rules of information security and guarantees of their observance.

To give to the companies the chance to do business without borders, Cisco offered new, widely distributed architecture of security, the managing director of firewalls, proxy systems and means of an intrusion prevention using language of higher level considering a context and capable to adapt to requirements of business. The elements of scanning of new generation used in this architecture do not depend on physical infrastructure and can be implemented in the form of devices, modules or cloud services. They are better adapted for the solution of modern problems of information security as precisely know a name, a position and access rights of each user in the organization.

The distributed architecture of security of Cisco SecureX manages firewalls, proxy systems and means of an intrusion prevention using language of higher level considering a context and capable to adapt to requirements of business. The elements of scanning of new generation used in this architecture do not depend on physical infrastructure and can be implemented in the form of devices, modules or cloud services.

The architecture of safety of new generation of Cisco SecureX includes the following components:

  • elements of the guaranteed observance of safety rules taking into account a context, independent of physical infrastructure and allowing wide distribution.
  • The modern language of determination governed taking into account a context, allowing to manage the above-stated elements.
  • The solution Cisco AnyConnect including any device at any time and in any place in a single system of the guaranteed observance of rules of information security.
  • The virtual and cloud platforms using functions of switching of virtual data processing centers Cisco.
  • Cisco Security Intelligence Operations (the cloud service considering a global context and using "smart" means of fight against threats).
  • The full-scale expanded application programming interfaces (API) allowing to connect to the solution of a management system Cisco and its partners and supplementing the general ecosystem of information security.

Notes