Cisco Protects Internal Infrastructure from Web-Based Threats

Jun 18th, 2015
Studypool Tutor
Alabama State University
Price: $25 USD

Tutor description

Cisco is working to become a borderless enterprise, where authorized employees, partners, and customers can access any service, anywhere, from any device. Cisco IT’s policy of allowing employees to use any device, including unregistered personal devices, requires an effective web security solution. For Cisco, this solution is the Cisco IronPort™ S670 Web Security Appliance (WSA), which combines signature-based malware detection with reputation filtering and inline file scanning. In just the first three months of production for Research Triangle Park, North Carolina and the East Coast, the Cisco® IronPort WSA S670s blocked more than 30 million malicious objects that signature-based detection alone would have missed. This case study describes web security requirements at Cisco, how Cisco uses the appliances, and initial results. Cisco customers can draw on Cisco IT's real-world experience to implement the Cisco IronPort WSA in their own environments.

Word Count: 2699
Showing Page: 1/7
Cisco Protects Internal Infrastructure from Web-Based ThreatsCisco IT Case Study / Security / IronPort S670 Web Security Appliance: Cisco is working to become a borderless enterprise, where authorized employees, partners, and customers can access any service, anywhere, from any device. Cisco ITs policy of allowing employees to use any device, including unregistered personal devices, requires an effective web security solution. For Cisco, this solution is the Cisco IronPort S670 Web Security Appliance (WSA), which combines signature-based malware detection with reputation filtering and inline file scanning. In just the first three months of production for Research Triangle Park, North Carolina and the East Coast, the Cisco IronPort WSA S670s blocked more than 30 million malicious objects that signature-based detection alone would have missed. This case study describes web security requirements at Cisco, how Cisco uses the appliances, and initial results. Cisco customers can draw on Cisco IT's real-world experience to implement the Cisco IronPort WSA in their own environments.ChallengeThe web is becoming the predominant exploit vector,1 and since 2008, Cisco IT has noted a significant increase in attacks originating from the web. Just browsing, without even clicking a link, is enough to get compromised, says Jeff Bollinger, senior information security investigator at Cisco. Commonly used black lists and white lists fail to block a significant portion of mal

Review from student

Studypool Student
" Solid work, thanks. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1831 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors