Sie sind auf Seite 1von 9

Solutions Guide

Cisco Self-Defending Network: A Strategic Systems Approach


to Information Security

“Cisco’s solution delivers reliable, yet efficient security. Customers will be able to realize greater
protection of business-critical applications with less intervention from IT staff.”
—Joel Conover, Current Analysis

Each day, forward-thinking organizations reinvent how they conduct business by adopting Internet-based business models. The results?
Competitive advantage, new sources of revenue, and optimized business processes.

But Internet connectivity without appropriate security can compromise the very gains in productivity that make today’s companies more
profitable. In the past, security threats from external sources were slow-moving and easy to defend against. In today’s connected
environment, outbreaks spread across the world in a matter of minutes, and security systems must react instantly.

Increasingly, security attacks target browser-based business applications. Because these dynamic, complex custom applications may not
have antivirus signatures or regularly available application patches, one breach in security can expose assets, trigger legal liability, severely
damage customer confidence, and negatively affect profitability.

Today’s administrators grapple with the consequences of tactical, reactionary point-solution approaches to security. Point solutions
introduce complexity and inconsistency into the environment. A highly complex, inconsistent environment results in:

● Weaker security—Complexity and inconsistency introduce risk gaps

● Lower end-to-end visibility—The insight needed for effective operational management and policy control is impeded

● Security posture erosion—Organizations are unable to maintain security capability, much less improve it

● Higher total cost of ownership—Point solutions, needing complex integration, require more focus to implement, maintain, and manage
over time
● Lack of agility—Complexity impedes the organization’s ability to align policy with evolving business objectives

In some industries, such as medical and financial services, governments now regulate data privacy. Point solutions can protect data privacy
at network endpoints, but point solutions do not provide insight and visibility into all areas of the network. End-to-end security visibility
gives security managers the information they need to implement best practices all along the network and ensure compliance with
government requirements.

In today’s environment, it is imperative to align information technology (IT) processes with business objectives. Because the network
touches all parts of the business infrastructure, an integrated, networkwide security solution is uniquely positioned to help businesses meet
their objectives.

THE CISCO VISION


Cisco Systems® empowers security managers to safely deploy critical business applications and processes on integrated networks to help
them increase productivity and gain competitive advantage. These networks are integrated, resilient, and adaptable. The confidence that
comes from knowing that an organization’s business processes and information assets are secure is a critical factor in unlocking
tremendous gains in productivity and dynamic growth.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9
Other security vendors can provide point solutions to achieve a base level of security for IP networks. Such solutions frequently require
complex, costly, and time-consuming integration efforts.

Cisco® delivers advanced, integrated network security systems and services required for an organization’s mission-critical networks. Cisco
continues to add security intelligence to the network infrastructure, understanding that security is not an afterthought—it is fundamental to
business processes and, ultimately, to business success.

BUILDING THE SELF-DEFENDING NETWORK


The Cisco Self-Defending Network is a strategic systems approach to security that uses the network to identify, prevent, and adapt to
threats from internal and external sources. A Self-Defending Network simplifies the security environment through tight integration,
comprehensive security, increased end-to-end visibility, and improved total cost of ownership. All components of the network—the secure
network platform, advanced services and technologies, and operational management and policy control—play a part in securing the
networked environment.

Integration, collaboration, and adaptability are core capabilities of the Self-Defending Network and are unique to Cisco. With an
unmatched breadth and depth of offerings and security expertise, only Cisco can offer such a network-based, system approach.

● Integration of security throughout the existing infrastructure—built-in, not added on. Every element in the network acts as a point of
defense.
● Collaboration between network and security components throughout the network. Security becomes a system involving cooperation
between security-aware endpoints, network elements, and policy enforcement.
● Adaptability of the network to intelligently evolve and adapt to emerging threats. Examples include innovative behavioral methods that
automatically recognize new types of threats as they arise, mutual awareness among and between security services and network
intelligence for more proactive response, and broad recognition capabilities to address threats at multiple layers of the network.

CRITICAL COMPONENTS OF NETWORK SECURITY


The Cisco Self-Defending Network consists of five components critical to effective network security.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9
The secure network platform is the foundation for every Cisco Self-Defending Network. Upon this platform, you can layer advanced
security technologies and services when and where needed to solve your requirements for threat control and containment, confidential
communications, and secure transactions. Spanning the network from end-to-end, operational management and policy control provides the
framework for efficient security management, control, and response.

Secure Network Platform


The secure network platform is a strong, secure, flexible base from which you build your own Self-Defending Network. At Cisco, security
is considered an integral and fundamental network feature. Capabilities that were traditionally provided only by point solution overlays are
now a fundamental feature of the network infrastructure. With security embedded into the very fabric of the network, the secure network
platform provides a flexible, elegant foundation upon which you can easily add advanced security technologies and services. In this
manner, a secure network platform based on Cisco technology enables you to evolve your network organically—at predictable, planned IT
refresh cycles—and strategically—using what you have to deploy security where and when you need it the most. This approach enables
you to protect your investment, simplify your environment, and ultimately reduce the total cost of ownership as well as security.

Many traditional security point solutions such as firewalls, access control systems, network antivirus protection, intrusion prevention
systems (IPSs), IP Security (IPSec) virtual private networks (VPNs), and Secure Sockets Layer (SSL) VPNs are now fully integrated and
embedded in secure network platforms built with Cisco technology.

Threat Control and Containment


Cisco’s threat control and containment solution consists of innovative, advanced technologies that go beyond simply defending against
threats—they proactively and collaboratively control and contain them. Businesses cannot afford the downtime and loss of business
productivity caused by security breaches. The threat control and containment solution protects not only vulnerable endpoints but also
multiple points within the network infrastructure. In today’s security environment, unknown threats are as harmful as known threats. Cisco
advanced technologies continuously and proactively monitor and analyze network activity looking for anomalous behavior—potential
unknown threats. If suspicious activity is detected, Cisco technologies automatically and proactively apply security policy rules, send
alarms to security staff, and propose fixes for suspected problems.

Benefits of Cisco’s threat control and containment solution include:

● Proactive protection against known and unknown threats

● Proactive containment and distributed mitigation of infections and outbreaks

● Manageable patching and updating due to enforced endpoint compliance

● Reduced operational costs

Examples of the advanced technologies used to achieve these benefits include behavioral-based endpoint protection, distributed denial-of-
service (DDoS) attack mitigation, intrusion prevention, network antivirus protection, policy enforcement, and proactive response.

Confidential Communications
Cisco’s confidential communications solution enables your organization to take advantage of and enjoy the positive business benefits of
data, voice, video, and wireless communications, while ensuring the privacy and integrity of critical business communications over these
media. The solution consists of integrated, collaborative, and adaptive network products, technologies, and services that protect
communications while cost-effectively extending the reach of the network to a highly mobile workforce. The solution includes advanced
VPN capabilities and comprehensive solutions for secure voice and wireless communications.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9
Benefits of Cisco’s confidential communications solution include:

● Gains in productivity

● Increased flexibility for remote users

● Privacy and confidentiality of critical business communications

● Cost-effective extension of the reach of the network

Cisco’s advanced VPN capabilities include a feature that deletes confidential information from memory and hard drives—for example, at
an Internet kiosk—when users finish SSL VPN sessions. Secure voice and wireless solutions include user authentication services and
encryption products and technologies.

Secure Transactions
Today’s agile organizations rely on application-to-application transactions for business and customer-facing transactions. In many cases,
the transactional information resides on highly vulnerable custom or homegrown applications. Hackers can exploit security holes in the
custom code of these vulnerable applications and steal, intercept, change, or destroy critical application data. Cisco’s secure transactions
solution helps ensure the security and availability of vulnerable applications and the privacy of the most sensitive information residing on
them. The solution inspects and protects application transactions using Layer 4–7 inspection, encryption, policy enforcement, and
application control. In addition, the secure transactions solution helps ensure that your security complies with government-mandated
compliance requirements.

Benefits of Cisco’s secure transactions solution include:

● Legitimacy of application transactions

● Secure transactions between applications

● Application availability

● Customer privacy

● Protection of business assets from exposure

● Reduced litigation risk

Cisco’s secure transactions solution is an innovative application-layer security service that overlays the secure network platform and brings
security to the application protocol and payload level for greater, more thorough control.

Operational Management and Policy Control


Cisco’s operational management and policy control solution is a framework of integrated, collaborative, and adaptive security management
tools. Today’s security managers face a challenging task. They are responsible for security policies and enforcement in complex and
constantly changing business environments. Not only are security managers responsible for protecting business assets, many are also
responsible for reporting compliance with corporate security policies and governmental privacy regulations. Cisco’s operational
management tools support security managers in their day-to-day operations while policy control tools help security managers enforce
policy compliance.

Benefits of Cisco’s operational management and policy control solution include:

● Increased speed and accuracy of security deployment

● End-to-end visibility of security monitoring

● Rapid response to threats

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 9
● Proper workflow management

● Assistance with compliance reporting

Cisco’s powerful monitoring, analysis, and response technology simplifies security management and provides end-to-end visibility into the
information used for compliance reporting and the auditing process.

CISCO INTEGRATED SECURITY SOLUTIONS—A FAMILY OF NETWORK SECURITY OFFERINGS


Award-winning Cisco security products, delivery, support, and consulting services provide the security solutions that businesses require.

CISCO SERVICE AND SUPPORT


Cisco offers the following network security services:

The Cisco model for service and support is based on the understanding that taking advantage of the power of the Internet not only speeds
the resolution of networking issues, but also enables you to access critical information quickly, to educate your staff, and to work
proactively to improve overall network performance.

Cisco.com is the foundation of a suite of interactive networked applications that provide immediate, open access to Cisco information,
resources, and systems. Through Cisco.com, direct customers and partners have access to numerous applications, including Cisco Internet
Technical Support (ITS) applications, which deliver comprehensive technical support solutions online.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 9
To help achieve maximum network uptime, technical assistance is available around the clock from Cisco Technical Assistance Center
(TAC) networking engineers. For more information, visit:
http://www.cisco.com/tac

Cisco Advanced Services for Network Security


Cisco Advanced Services consultants hold expert-level CCIE® and CISSP certifications and have experience in planning, designing,
implementing, and optimizing large network security infrastructures for leading business enterprises and government organizations.

Plan and assess. Cisco can provide you with a comprehensive evaluation of your organization’s network security posture, including an
analysis of your overall network security architecture and incident preparedness. Delivered by security experts with extensive field
experience, the Security Posture Assessment provides a snapshot of the security state of your network by conducting a thorough evaluation
of network devices, servers, desktops, and databases. Cisco experts analyze your network security in reference to industry best practices,
identifying vulnerabilities that could threaten your business. Based on in-depth analysis, Cisco offers recommendations on how to improve
your overall security posture and prioritizes actions for remediation. The Network Security Architecture Review delivers a comprehensive
assessment of your network security architecture, identifying corrective actions to assist you in better aligning with ISO 17799, industry
best practices, and your organization’s internal security policies.

Designed to help organizations be prepared to effectively detect, report, and respond to security incidents, Cisco Advanced Services offers
a suite of incident readiness and response services, including an Incident Readiness Assessment, which analyzes an organization’s incident
management practices, operational tools and procedures, and network security infrastructure to identify actions that improve overall
incident preparedness. Cisco Advanced Services can also assess the readiness of your network to support new Self-Defending Network
solutions such as Network Admission Control (NAC), the Cisco Security Agent, and Cisco IPS software and appliances.

Design. Cisco can work with you to design a strong Self-Defending Network. Using an in-depth, architectural approach, Cisco Advanced
Services can help you develop a multilayer defense against directed attacks from hackers, viruses, and worms. The Incident Readiness
Design Development design service can be used to develop technical and procedural improvements to your incident management
technology, tools, and procedures. With this service, Cisco can recommend improvements to your existing security design, including
network topology, device placement, and connectivity. Taking into consideration all the aspects of network security—such as scalability,
performance, and manageability—Cisco can recommend protocol, policy, and feature configurations to better secure against threats.

Implement. A Self-Defending Network must be not only strategically designed, but also carefully deployed, configured, and integrated
into the network infrastructure. After your security solution design is set, Cisco engineers can support your team through implementation
tasks to help you deploy, configure, and integrate a new solution such as Cisco NAC, Cisco Security Agent, Cisco IPS software or
appliances, or Cisco Guard and Detector into your production environment. Strengthening your team’s ability to meet aggressive schedules
while minimizing costly disruptions to your infrastructure, Cisco engineers can deliver the expertise needed to implement and manage the
security solution.

Operate and optimize. After your security solutions have been successfully designed and deployed, your network infrastructure must be
ready to support increased demands that arise from changing business dynamics or newly occurring threats. Cisco Services for IPS delivers
timely information, signature file updates, and comprehensive support for Cisco IPS solutions. MySDN provides up-to-date intelligence
reports about current vulnerabilities and threats. The Cisco Incident Response service is available to provide assistance by Cisco security
experts to your staff during a network attack. As network conditions change, Cisco engineers work with you to perform optimization
checks to help ensure that your network security infrastructure continues to meet performance objectives.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 9
Cisco Outsourcing Services

Cisco Managed Security Services Solutions


To enable service providers to take advantage of growing demand for secure managed services and VPN services, Cisco has many
offerings for fast and cost-efficient service introduction. Managed VPN services based on IPSec, Multiprotocol Label Switching (MPLS),
or both, permit service providers to augment existing connectivity services with remote-access and site-to-site options, and to offer valuable
services for IP telephony, e-commerce, supply chain management, and content delivery. Managed security services, such as managed
firewall and managed intrusion detection, can be bundled with other services.

Whether offering managed VPN services, managed security services, or both, you can take advantage of capabilities of the Cisco routers
and Cisco Catalyst® switches that you currently use for connectivity. By using your current investment, you minimize deployment costs
and maximize service opportunities for new revenue streams.

The Cisco Powered Network Program


Service providers that display the Cisco Powered logo have earned the right to display this mark by maintaining high levels of network
quality and by building their services with Cisco equipment—the same equipment on which virtually all Internet traffic travels today. The
services these providers offer are reliable and secure.

Cisco Channel Partners


The Cisco Security Specialization Program recognizes Cisco channel partners that have developed the skills required to sell, design, install,
and support Cisco network security solutions for customers. As Internet business solutions are rapidly adopted, Cisco security
specialization partners can meet the growing demand for critical security implementation and support services.

Cisco Training Services

Cisco Security Certifications


Using best-of-class training and exams, Cisco security certifications validate the skills and competencies of security professionals. The
Cisco CCSP™ certification for security professionals and the three focused security certifications—Cisco VPN Specialist, Cisco Firewall
Specialist, and Cisco IDS Specialist (for intrusion detection systems [IDSs])—satisfy an industry demand to provide a certification career
path in the IT security market. CCSP certification helps to ensure that your staff is successful implementing complete end-to-end security
solutions.

Security-Focused Authorized Cisco Learning Partners


Many authorized Cisco Learning Partners worldwide focus on Cisco security training, offering courses, remote labs, self-study materials,
and other resources on the latest security technologies. These include advanced Cisco PIX® security appliances, Cisco secure intrusion
detection systems, Cisco SAFE design implementation, and managing Cisco network security. A Learning Locator, course information,
exam dates, and a detailed list of security-focused partners are available at:
http://www.cisco.com/go/training.

Cisco Security Ecosystem


The security products, technologies, and services in the Cisco portfolio are fundamental elements of a successful network security solution.
A comprehensive approach to network security must address other areas as well—creating a “security ecosystem” that takes full advantage
of the benefits delivered by the Cisco product line. This ecosystem includes several important elements, such as interoperable third-party
products, implementation services, customer support, and compatible service offerings.

The Cisco Technology Developer Partner Program is a testing and comarketing program that validates the interoperability of
complementary, third-party security solutions with Cisco products. The program evolves independent products into more-effective security
solutions and offers trusted and tested security implementations for Cisco customers.

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 9
SUMMARY
Security is now a baseline architecture for all Cisco communications technologies. Whether you are deploying routers; securing the
switching infrastructure; implementing advanced productivity-enhancing technologies such as voice, video, or wireless; or protecting the
data stored throughout the organization, security is a fundamental component of every piece of the network. The Cisco Self-Defending
Network—an integrated, collaborative, and adaptive strategic systems approach—helps organizations of all sizes make the journey from
complex point solution strategies to proactive, simplified end-to-end security. The Cisco Self-Defending Network enables organizations to
implement business-driven security practices; reduce risk gaps and complexity; lower the total cost of ownership; and protect, optimize,
and grow their business.

To learn more about the Cisco Self-Defending Network and Cisco’s strategic systems approach to information security, visit:
http://www.cisco.com/go/sdn
http://www.cisco.com/go/securityconsulting

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 9
C02-332256-00 02/06

All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 9

Das könnte Ihnen auch gefallen