Security Business Guide

advertisement
Security Business Guide
Introduction
The Internet provides rich, new opportunities for business growth and development. By utilizing
the variety of services and solutions now available on the network, companies are able to better
care for their customers, create synergies between geographically distant employees, and
establish opportunities for revenue through electronic access to a broader and more diverse
customer base.
These opportunities include such things as customer care services, inventory control, ecommerce web sites, interactive e-learning, workforce optimization, remote user access to the
network, business-to-business co-opetition, and IP telephony. Solutions such as these provide
unprecedented opportunities to reduce operating costs, improve productivity and communication,
and generate new revenue.
Unfortunately, as these opportunities continue to grow, the threat of cyber-crime means there are
serious risks involved in deploying these solutions. More than ever, it is imperative that
companies integrate security into the architecture of their network in order to mitigate such threats
and to achieve the potential for growth inherent in a networked environment be realized.
Influencing Factors For Purchasing Security
It is critical to understand the risks associated with any IBS (Internet Business Solution) strategy.
According to Meta Group Consulting, the top two concerns executives have are:
Damage to company image after a breach. There is a concern that a publicized security breach
could severely alter the public’s perception of a company. While the comparisons may be
inaccurate, many customers, vendors, and business partners may feel that something as simple
as hackers defacing a web site may indicate deeper problems related to security, and may curtail
e-business activities as a result.
Legal liabilities resulting from a breach. Companies are increasingly being held liable for
incomplete or improperly applied security solutions. Many of today’s attacks, such as Distributed
Denial of Service (DDoS) attacks compromise a network, load the systems on that network with
agent software, and then use that network to launch an attack on another. Similarly, a network
that is broken into may allow a hacker to gain unauthorized access to customer credit cards,
account or personal information, direct access to extranet partners and their networks, and more.
Finally, companies are increasingly being held liable by their shareholders when a preventable
security breach results in the loss of critical R&D d information or corporate data assets.
The challenge in addressing these and other concerns is that many executives do not understand
the problems, nor are they able to identify a solution which can adequately address these threats.
According to DataMonitor, It is expected that global business-to-business and business-toconsumer e-Commerce revenues will reach US $5.9 trillion and US $663 billion by 2005
respectively. This growth can not happen, however, without correcting security expenditures.
For example, while "e-Security breaches cause over US $15 billion damage worldwide annually",
more than 50% of businesses worldwide spend 5% or less of their IT budget on security. In many
cases, they spend less than they do on coffee and soda for their employees. And yet, according
to the FBI, 58% of companies reported that they had been broken into ten or more times in the
course of a single year!
So, what prevents companies from implementing appropriate security solutions in their network?
According to the Gartner Group, there are four key reasons why they don’t implement security.
1. Unable to quantify security threats, leading to decision paralysis. In spite of their efforts to
implement some sort of security measures, many companies find that the solutions they
implement are simply inadequate. This is often the result of two things. First, they simply do not
understand what security risks are associated with their e-business strategies, and second, they
do not have a systematic way to intelligently secure their entire network.
2. Unable to measure severity and probability of risk. Companies have little or no idea of the
costs associated with an electronic break-in. They have not quantified the value of their electronic
data, and do not understand the extent to which damage can be done should a break-in occur.
They have not adequately analyzed their e-business strategy and implementation, and used it as
a foundation for building an appropriate security policy.
3. Preconceived notions that security cost is excessive. Most executives still believe that
security problems are solved by buying and installing a box of some sort (a firewall, intrusion
detection devices, access control system, etc.) But purchasing equipment without a security
policy and implementation plan can lead to excessive costs and trial-and-error challenges. The
best solution is to first, develop an appropriate security policy, second, leverage the security
already inherent in the existing network, and third, purchase and apply network-intelligent security
solutions designed to be part of the network architecture, and which support the implementation
of new network services and solutions.
4. Preconceived notion that security will interfere with access. One of the biggest problems
companies face is that they have separated their security function from their networking solutions.
This is largely because most security devices are designed to restrict access, and are often far
slower than the network they are protecting. But by implementing high-performance devices
designed as part of the network architecture this concern becomes a non-issue.
In fact, Marcus Ranum, who was one of the inventors of the modern firewall, recently said, “We
security folks have got to stop treating security like it’s a separate problem from network
management. Error detection, intrusion detection, and link outages - these are all aspects of the
same network management problem.”
First Things First – Building A Security Policy
Bruce Schneier, one of the world’s foremost authorities on security, stated in his recent book
Secrets and Lies, that “Security is not a product; it’s a process. You can’t just add it to a system
after the fact. It’s vital to understand the real threats to a system, design a security policy
commensurate with those threats, and build in appropriate security countermeasures.”
Unfortunately, buying security products without a clear understanding of their security needs is
exactly what most companies do. There is simply little relationship between their business model
and their security implementation.
This problem can be corrected with an intelligent security policy – one which takes into account
the organization’s business strategy and which is designed to both address the actual risks such
a strategy creates, and which takes into account the entire network, both components and
services, and not just one portion of it. In a recent Meta Group Consulting report, it was found that
28% of organizations stated that some portion of their infrastructure fell out of the scope of their
security programs.
So, what goes into a security policy? There are numbers of resources designed to address this
topic in much greater detail. (for example, see RFC 2196, or NIST’s policy section and Site
Security Handbook found at http://csrc.nist.gov/policies/.)
But essentially, all security policy is based on four things:
1. A clear description of your business model. There is no sense in designing or deploying a
security solution which is not based on what your business goals are. Clearly identify your
business objectives, including the types of services and access which are necessary to
accomplish those goals.
2. A detailed understanding of the associated risks. If you plan to host a DMZ and provide ecommerce activities, for example, you need to understand all of the ways that hackers will try to
exploit those systems and services. What are the risks if the web page is defaced, or if a server is
compromised, or if a customer database is attacked? In what ways are such attacks undertaken?
Do they bypass the firewall by hiding in the permitted web traffic, or exploit vulnerabilities in
unpatched operating systems? These issues must be carefully examined and understood before
moving on to the next step. And remember, as new systems or services are added to a network,
new risks are introduced. Regular and comprehensive vulnerability assessment must be part of
this step.
3. A systematic approach to mitigating those risks. Everything in a network is a target,
including routers, switches, hosts, applications, networks, and operating systems. A security
policy must take all of these components into account if it is to be effective. Remember the three
“P’s” when implementing security solutions: People, Products, and Process. You must have
skilled technicians implementing the policy, you must use tools designed specifically to support
your e-business strategy, and you must combine this with good system administration and
review.
4. Remembering that security is a process. A security policy is not a “set and forget” solution.
Security demands regular review, analysis, and improvement if it is to provide the level of
protection that your organization requires. You may also want to consider purchasing a
vulnerability assessment tool, as well as contracting with a third-party security audit partner in
order to double-check your policy, process, and implementation, and in some circumstances to
even off-load labor-intensive security monitoring.
When developing a security policy, keep in mind the following list of “top ten” security tips,
complied by the Cisco Security Consulting Services team.
Top Ten Cyber-Security Tips:
1. Encourage or require employees to choose strong passwords. Hacker programs available
on the Internet contain tens of thousands of common passwords, which can be used to break into
unsecured computer systems. A password should have a minimum of 8 characters. They should
be non-dictionary words. They should combine upper and lower case characters. You can even
mix in a symbol, like a $. An ideal password might be something like 2B3#N3$.
2. Require new passwords every 90 days. By the time the hacker gets your password, it will
already be outdated.
3. Make sure your virus protection subscription is current. Most businesses purchase virus
protection programs from companies like Symantec, Trend Micro, or McAfee. These companies
regularly offer patches and updates to their programs to respond to new threats. Companies
should regularly check for defense improvements and be sure their subscription to virus
protection updates remains current.
4. Educate employees about attachments. Just because it's in the "in-box" doesn't mean it's
been cleared through any security mechanism. Attachments, particularly executables (and not
always with “.exe” at the end) can be dangerous, dropping off a little software code called a
Trojan Horse that corrupts your system or allows it to be infiltrated at a later time. Employees
should be educated about security basics, including the need to avoid opening attachments from
unknown sources.
5. Install a total solution. If you’re securing your own system (instead of relying upon an ISP or
web host), don't just throw a firewall at a network and call it secure. Firewalls do a great job of
securing a perimeter, but no one device will do the trick. Complete solutions should include
firewalling, host and network intrusion protection, access control servers and devices, secure
connectivity (like IPSec VPNs), applying proper filtering and ACLs to limit and manage traffic, and
secure device and policy management.
6. Assess your security posture regularly. Don't secure and run. Hackers are constantly
updating their technology. Small and medium businesses need to know how they stack up
against the most current types of attack. If you’re relying on a Web host or ISP, be sure to choose
a vendor who is security savvy. Compare their offerings to those of other companies.
7. When an employee leaves a company, remove the employee's network access
immediately. When asked to evaluate the internal security posture of networks, the Cisco
Security Consulting team finds vulnerabilities in almost every network tested. Just as you ask
departing employees to turn in their keys to the front door, you should take away their key to the
network when they leave. Disgruntled employees are the greatest threat to any systems’ security.
8. If you allow people to work at home, provide a secure, centrally managed server for
remote traffic. Telecommuting increases worker satisfaction and productivity. But it also
presents a security challenge. It makes little sense to spend $10,000 on a security system for
your Web site while you allow people to dial-in to your network unabated.
9. Update your Web server software regularly. Stay on top of security updates and patches.
These are often available for free over the Web. Make sure you're always running the latest
versions of software to stay ahead of hackers, who are certainly working to stay ahead of you.
10. Don't run any unnecessary network services. If your employees don't need Web access,
don't provide it. Disable unneeded network interfaces. If you don't need services such as NFS,
Finger, Echo or some of the other programs that are routinely provided with software suites,
make sure they're turned off. Often, a variety of services are provided by default in a program.
Exploitation of these services is one of the most common hacks seen by Cisco's customers.
Issues To Consider BEFORE Selecting A Security Solution
Once a security policy has been developed and is in place, there are a number of issues which
need to be carefully considered before implementing a solution.
Security Threats are Changing. As discussed earlier, there is a gap between the desire for
security and the failure to implement it. The primary reason behind this lies is the fact that the
sophistication of the network has outpaced the development of the products designed to protect
it.
In many cases, the security devices companies have implemented were simply designed for
older, less complicated networks than those in use today. Ten years ago, for example, when
most security devices were first conceived, networks were closed and easier to secure data. The
perimeter was easily defined, and simple security devices did an adequate job of closing security
holes since little to no network intelligence is required in order to do their job. These legacy
security solutions tend to be simple access control devices used primarily to disable common
network traffic.
But while networks have changed dramatically since that time, the vast majority of security
devices have not. The Internet has matured into the “Corporate Information Highway”, and with it
has come the Open Network of telecommuting, the connecting of branch offices, and new
business-to-business strategies. These more complex, dynamically changing networks require
more sophisticated security solutions, designed specifically to support new technologies as an
intelligent addition to the architecture of the network.
In such networks there is no easily defined perimeter, and network security changes every time
someone connects to the network. Where do you place traditional security products in an open
network environment? Legacy security solutions designed for yesterday’s networks are not
sophisticated or intelligent enough to defend complex network environments being used to run
Internet Business Solutions.
Internet Business Solutions are comprised of a variety of solutions working together to
accomplish a single goal: efficient and secure e-business. Security is just one small piece of this
complex networking solution, which also includes such things as messaging, contact centers,
multimedia, voice call processing, collaboration, video on demand, content delivery, personal
productivity, policy management, SLA management, and address management. Companies who
have or who plan to implement traditional security solutions in such an environment – security
tools which are NOT network intelligent and which are NOT designed to support these new
technologies – can severely limit their ability to create a secure Internet business solution.
Such solutions simply do not provide an adequate shield against determined and increasingly
well-armed cyber-criminals. When most people read about Internet hacking incidents, they get
the impression that these are highly complex, technical attacks that require a genius to
coordinate. But the reality is that while the really smart people first come up with these highly
complex, technical attacks, they freely share the information – and the tools – required to execute
them. Such “open sharing” of hacking information and tools allows individuals with minimal
technical knowledge to duplicate complex attacks. In many instances it is simply as easy as
downloading the appropriate attack tool from the Internet and launching it against targets. A
hacker doesn’t need to know anything other than how to point-and-click to run the attack tool.
The bottom line is that it doesn’t take a genius to successfully attack systems and networks, it just
takes someone downloading attack tools. Unfortunately, there is no single security device in
existence today which can adequately protect all of the devices and services under attacks.
Limitations of Legacy Security Systems. So, as we have discussed, many of the problems
companies face in regards to inadequate security is the result of deploying security tools which
are simply not designed or equipped to protect the network, or to respond to the sophisticated
attacks being employed today.
One of the primary problems behind this is that these tools are not designed to understand or
interoperate with the network to create a layered-defense strategy, which is really the only viable
defense against the types of attacks occurring today. Additionally, the solutions available from
any given security vendor are very limited in approach and scope. They tend to build and sell only
one or two tools, such as a firewall or a VPN device, and then market these solutions as a “cureall” for all network security needs.
Unfortunately, such solutions have limited network intelligence, and cannot support most network
services or technologies. The result is two-fold. First, implementing single-box solutions tends to
leave gaping security holes in the network, since these limited solutions simply do not cover all of
the possible vulnerabilities which exist in any given segment of the network. Secondly, overconfidence in these solutions may be a major reason why companies are broken into repeatedly.
It is therefore critical to understand the drawbacks of deploying legacy security technologies in a
world quickly moving toward Intelligent Network Solutions.
One way these companies try to address at least part of this problem is to create multi-vendor
bundles of products. Unfortunately, this solution often creates more problems than the single-box
solution. First, these products still have the inherent problem of NOT providing nor supporting
intelligent networking. Next, these solutions often rely on multi-vendor kludges, resulting in a
complex maze of patches, interoperability issues, and technical support finger-pointing. Finally,
there are still numerous security issues they still cannot address and security targets they cannot
protect. In addition, cost-of-ownership for such multi-vendor solutions is prohibitive, and singlepoint management is virtually non-existent.
In short, once a customer buys into the skewed logic being used by these vendors, they find
themselves vulnerable simply because of the limited scope or poor implementation of security in
the devices being sold. These problems include being at the mercy of:

Incomplete point ‘solutions’ (limited security for a single point on the network)

One-box-fixes-all fallacy (creates over-confidence and leaves security vulnerabilities)

Legacy application of overlay security (used primarily to disable traffic)

No network intelligence (not part of the network architecture)

Kludging of technologies (no real interoperability, management, or unified support)

Complicated product updating and patches, including feature parity between vendors

Vulnerabilities inherent in the security platform (NT or UNIX OS in many cases)

Compatibility and performance issues with generic hardware platforms

Multiple vendor service and support (finger-pointing)

No support QA across the various vendors

No control or protection of the internal network
Security as part of Intelligent Networking. Companies developing intelligent network
environments are integrating many solutions into a single framework. Functions like integrated
video, voice, and data, multimedia viewing, mobility access, QOS, and e-commerce are critical to
increasing productivity and profitability. In this integrated environment security is a small, but
important component. In order for it to function properly, security needs to be part of the network
architecture.
Such security solutions must be designed with the intelligent network in mind, and support and
interoperate with rich network services. This includes security solutions which are integrated into
the network infrastructure as distributed technology, which function as both overlay and
integrated technology (leveraging the IOS intelligence), and which are designed to enrich and
enable Internet Business Solutions.
Cisco Systems is in a unique position to be able to deliver such security solutions. Because Cisco
developed most of the networking products/solutions that power the Internet, no one understands
better how they work, where they are headed in terms of development, and how to leverage the
intelligence of the network to secure your IBS strategy.
Two things we can be sure of are that networks will continue to evolve, and that criminals and
vandals will continue to exploit the network in order to commit crimes. Since security issues touch
all network components (in fact, with dynamic networks changing every time a customer,
employee, or partner becomes part of, or disconnects from your network, the network itself is the
only constant in an ever-changing environment), security should be an integral part of your
NETWORKING strategy.
Which is why we believe that the company to secure a network should be the company that
developed it. And we’ve put our money where our mouth is on this point, because Cisco Systems
is now the largest network security company in the world. Our combined security product set,
including firewalls, VPNs, access control devices, network and host intrusion protection,
professional services, training, and single-station management, as well as security inherent in
IOS itself, means we have the broadest range of security solutions helping more companies than
any other security vendor in the world.
SAFE
Now that we have identified the problem, namely more sophisticated networks = more
sophisticated attacks, and legacy security devices are not designed to address this new reality,
we will take a look at the revolutionary way in which Cisco addresses today’s security needs.
Our security solutions model is based on the SAFE documents, which a best practices guideline
for designing and implementing secure networks. Implementing SAFE is essential for the secure
implementation of new network technologies and Internet Business Strategies (IBS). In a simple,
step-by-step process, SAFE breaks a network down into its core functionalities, isolates all of the
security issues related to each of these network segments based on actual threats encountered
in today’s dynamic networks, and identifies security solutions and practices which mitigate those
threats.
Unlike any other security solution available today, SAFE starts by addressing security as a
process based on business goals, security policy, and leveraging all available resources as part
of the security strategy, rather than focusing on the features of a particular product. And because
it is modular in approach, it allows companies to omit network elements which do not apply to
their business model, prioritize the remaining segments according to their security needs, and
implement security over time as part of a cost-effective security strategy.
Key SAFE concepts include:

Security is a process, NOT a product

Security and attack mitigation should be based on a security policy

Security implementation should be applied throughout the infrastructure (not just on
specialized security devices)

Security should be cost-effective, and allow for modular deployment for scalability and
flexibility

Security requires a layered defense strategy, with multiple solutions working together to
create a seamless end-to-end security solution

Everything is a target, including Routers, Switches, Hosts, Networks (local and remote),
Applications, Operating Systems, Security Devices, Remote Users, Business Partners,
Extranets, etc.

There are two types of threats:
o
Threat from internal users – According to the FBI, 60% of attacks and 80% of
financial loss is caused by trusted network users
o
Threat from the outside – Primarily, threats to publicly addressable hosts
connected to the Internet

SAFE solutions combine market-leading security products, proven security practices, and
single-station management, while leveraging the security inherent in your existing Cisco
network infrastructure.
You can learn more about SAFE, and download FREE copies of all of the SAFE documents, by
logging onto www.cisco.com/go/safe.
Cisco Security Product Line
Cisco provides the widest range of security products and devices available from any single
vendor. These tools can be integrated into the SAFE guideline designs, and are developed
specifically to secure your intelligent networking environment. They also provide the added
protection of single-call support, integrated product management, and the Cisco assurance of
quality and vendor stability.
Cisco PIX Firewall
The Cisco PIX Firewall is a hardware appliance which manages access to the network, or
segment of the network. It is the electronic equivalent of the locked door which only allows those
with a key or access card to enter. It creates a protective layer between the network and the
outside world, and is placed at the access point between the two where it negotiates network
access and filters out unauthorized or potentially dangerous material from entering the network.
The Cisco PIX Firewall series delivers strong security in an easy-to-install, integrated
hardware/software firewall appliance that offers exceptional performance. Cisco’s world-leading
PIX Firewall family spans the entire end-user spectrum, from cost-conscious desktop firewalls for
remote users to carrier-class gigabit firewalls for the most demanding enterprise and service
provider environments.
Key Features
Security – Purpose-built firewall appliance with a proprietary, hardened operating system that
eliminates security holes.
Performance – Stateful connection-oriented firewall capable of 500,000 concurrent connections
and 1.7 Gbps of throughput
Reliability – High availability support via a redundant hot standby/failover unit that maintains
concurrent connections through automatic stateful synchronization
Virtual Private Network (VPN) – Support for both standards-based IPSec and L2TP/PPTPbased VPN services
VPN Accelerator Card – 3DES VPN throughput can scale to nearly 100 Mbps as the
encryption/decryption processes are handled by specialized coprocessors
Intrusion Detection System (IDS) – Provides intrusion protection using a set of IDS signatures
designed for firewall use for real-time intrusion monitoring, interceptions, and responses to
network misuse
Network Address Translation (NAT) and Port Address Translation (PAT) – Conceals internal
IP addresses and expands network address space
Denial-of-Service (DoS) Attack Protection – Protects the firewall, as well as internal servers
and clients, from disruptive hacker attempts to flood the network with illegitimate or trivial data
Web-Based Management via PIX Device Manager (PDM) – Allows for simple, GUI-based
configuration and usage reports
Platform Extensibility – Supports from two 10/100 Ethernet interfaces up to ten Gigabit Ethernet
interfaces
Low Cost of Ownership – Simple installation and configuration, maximum up time (MTBF of
over 60,000 hours), and straightforward management for minimal time investment combined with
impressive price/performance
Cisco IOS Firewall
The Cisco IOS Firewall enriches Cisco IOS security capabilities by integrating robust PIX firewall
functionality and intrusion detection into network devices, allowing you to add firewall protection
and functionality throughout your infrastructure. Broad implementation allows you to create zones
of defense, or “fire cells” within your network design for layered defense.
When combined with Cisco IOS IPSec VPN software and other Cisco IOS Software-based
technologies, such as L2TP tunneling and quality of service (QoS), it provides a complete,
integrated virtual private network solution.
Because it is available for a wide range of Cisco routers, it gives customers the flexibility to
choose a solution that meets their bandwidth, LAN/WAN density, and multiservice requirements,
while providing advanced security functionality
Key Features
Powerful Firewall Functionality – Using a stateful firewall process called Context-Based Access
Control (CBAC), the Cisco IOS Firewall provides secure, stateful, application-based filtering and
access management, supporting the latest networking protocols and advanced applications
Intrusion Detection System (IDS) – Provides intrusion protection services for real-time intrusion
monitoring, interceptions, and responses to network misuse
Access Control – Dynamic, per-user authentication/authorization for LAN, WAN, and VPN
clients
Management – Graphical configuration and management via the ConfigMaker Security Wizard
Virtual Private Network (VPN) Security – Provides strong perimeter security for a complete
Cisco IOS Software-based VPN solution, including IPSec, QoS, and tunneling, for a wide range
of Cisco router
Cisco Secure Intrusion Protection
With 60% of incidents and 80% of financial loss resulting from attacks occurring inside the
network perimeter, it is critical to be able to monitor traffic for suspicious activity, and respond in
real-time to malicious events or unauthorized network access. Cisco provides two powerful and
complementary IDS solutions, network and host-based, for the most comprehensive IDS solution
available on the market.
Network Intrusion Detection System (NIDS)
The Cisco Secure Intrusion Detection System delivers a family of high-performance security
surveillance solutions for both enterprise and service provider networks. Designed to address the
increased requirements for security visibility, denial-of-service (DoS) protection, anti-hacking
detection, and e-commerce business defenses, Cisco Secure IDS leads the market in innovative
security monitoring solutions.
The product line consists of sensing devices (high-speed security analysis appliances) and high
performance line card modules for the Cisco Catalyst 6000 series switches. These IDS sensors
analyze packets traversing the network to determine if the traffic is authorized or malicious. If the
data stream in a network exhibits unauthorized or suspicious activity, sensors can detect the
policy violation in real-time, terminate the offending session(s), and send alarms back to a central
management console.
The management console can centrally monitor the activity of multiple sensors, provides a visual
alarm display, and acts as a remote system configuration utility.
Key Features
Market-Leading Technology – Cisco IDS is a leading in the development and implementation of
innovative and award-winning IDS solutions
Sophisticated Attack Detection and Anti-Hacking Protection – Uses “intelligent” signature
strings to maximize performance and improve the ability to detect attacks
Transparent Operation – The IDS sensor ports do not have an advertisable address, which
means they cannot be detected by hackers sniffing a network segment
Scalable Sensing Performance – provides between 45 Mbps to over 1Gbps of performance
Integrated Into the Network – The Catalyst 6000 IDS Modules allow you to actually embed
security into the fabric of the network for maximum performance and security control
Active Response – Unlike other IDS tools, the Cisco IDS solution is network-intelligent. This
allows it to not only detect and alarm on attacks, but to actually respond by either dropping an
offending session, or accessing the nearest router to write an ACL to shun the attacker from
attempting to re-enter the network segment.
Host-Based Intrusion Detection System (HIDS)
Hosts and servers are the most frequently attacked devices on a network. Hackers attempt to
take advantage of the sophisticated services these devices provide, as well as the extreme
complexity of the devices themselves. This complexity makes them especially prone to human
error, and furthermore, most attempts to secure such devices result in limiting the very services
the host os designed to provide.
Cisco Host IDS, powered by Entercept, is designed to solve this problem. It provides real-time
intrusion detection, reaction, and prevention for hosts using industry-leading technology and
requiring minimal overhead on the devices on which it is installed.
The Cisco Host IDS agent installs close to the Operating System and intercepts System and API
Calls. By comparing them with known exploit behavior, it can reject them before the OS
processes them in case of malicious intent. For web servers, it provides shielding technology to
provide a protective envelope around the web server’s activities, ensuring the integrity of the
server, its applications, and files, including customers' valuable data, based on function.
Key Features
Standard Edition
Prevents Break-Ins – Access attempts, such as buffer overflow exploits, are specifically denied
Prevents Hacks – OS protection disallows hacker tools from executing
OS Protection – protects the OS from alteration, including modification of registry files, enabling
previously disabled services, etc.
Prevents Authorization Escalation – Does not allow hackers to elevate privileges in order to
gain root access to the device
Web Server Edition
In addition to all of the services provided in the Standard Edition, the Web Server Edition also
provides the following features:
Prevents Hidden Attacks – Monitors, identifies, and drops malicious HTTP traffic
Resource Protection – Prevents alteration of web server files to prevent such things as web
defacements of implanting of malicious codes, and limits resources to pre-defined usage
parameters
Cisco VPN 3000 Family
Virtual Private Networks (VPNs) are private, usually encrypted connections, or tunnels, over
public networks, such as the Internet. They are deployed to connect telecommuters, mobile
workers, branch offices, and business partners to each other, or to the corporate network. These
VPN connections allow organizations to take advantage of significant cost-savings over traditional
leased or toll dial-up lines.
The Cisco VPN 3000 Concentrator Series is a family of purpose-built, remote access virtual
private network (VPN) platforms which incorporates high availability, high performance, and
scalability with the most advanced encryption and authentication techniques available today.
The series solutions scale from small office to large organizations requiring up to 10,000
simultaneous remote users per unit. With load balancing configured, multiple units can be
clustered to enable virtually unlimited numbers of remote access users. Its unique “push policy”
design creates significant scalability, security, and management advantages as all policy is stored
centrally and pushed out to the client during tunnel creation to allow for granular policy
enforcement and modification.
Key Features
Cisco VPN 3000 Concentrators
Standards Based – Support for industry standard IPSec DES/3DES
NAT Support – Supports Cisco IPSec/NAT for VPN access through Port Address Translation
firewalls
Free VPN Client – Unlimited-use license for broad Cisco VPN Client distribution at no cost per
seat or user
Standards-Based Authentication – Supports RADIUS, SDI Tokens, and Digital Certificates
Load Balancing – Allows for multiple units to cluster as a single shared pool
Stateful IPSec Failover – Hot-swappable cards allow for single-box redundancy
Cisco VPN 3002 Hardware Client
A hardware version of the Cisco VPN Client, this tool allows for high-performance VPN
connectivity in a mixed OS or SOHO environment.
Broad OS Support – Works with most operating systems, including Windows, Linux, Solaris,
MAC, etc.
Auto-Upgrade – centrally distributed automated upgrades without user intervention
Full Client Technology – Employs push policy and automatic address assignment from the
central site concentrator
Cisco Secure Scanner
Regular vulnerability analysis is critical to maintaining the health of the network’s security. The
Cisco Secure Scanner conducts detailed analyses of networked systems to compile an electronic
inventory of assets, and to detect vulnerabilities associated with those assets, such as known OS
vulnerabilities, enabled services vulnerable to exploit, etc. This technology allows network
managers to identify and resolve security weaknesses before they can be exploited by intruders.
The Cisco Secure Scanner is an enterprise-class software tool offering proactive, preventative
security through superior network system identification, innovative data management, flexible
user-defined vulnerability rules, and comprehensives security reporting capabilities. It allows you
to measure security, manage risk, and eliminate security vulnerabilities – thereby enabling more
secure network environments.
Key Features
Flexible Licensing – Designed to serve the changing needs of customers, and to provide
unprecedented scanning flexibility
Easy-to-Use Interface – Allows you to quickly perform a network scan without pre-existing
knowledge of the network or security vulnerabilities
Comprehensive Scanning Engine – Can analyze and identify targeted networked systems,
including Web servers, firewalls, routers, switches, and workstations
Flexible Data Analysis and Reporting – Includes graphics-generating feature and report wizard
User-Defined Implementation – Includes scheduling, specialized profiles, and customizable
scanning rules for legacy or proprietary systems
Unique Matrix Browser and Display – Allows users to easily navigate through data
Regular Vulnerability Updates – Bi-monthly updates of signatures and rules files
Extensive Network Security Database – Provides descriptions of security problems, risk-level
ratings, repair options such as links to patches and updates, and hacker information to inform you
of how cyber-criminals can exploit found vulnerabilities
Cisco Secure Access Control Server
Before a user can gain access to a network with a password, the network must evaluate the
password to determine it is valid, and to see if there are any access limitations associated with
that password. Access control servers provide AAA services (authentication, authorization, and
accounting) by validating the user’s identity, determining which areas or information the user can
access based on stored user profiles, and keeping track of the user’s activities while connected to
the network.
Cisco Secure Access Control Server (ACS) is a highly scalable, high performance access control
device which operates as a centralized RADIUS or TACACS+ server system controlling the
authentication, authorization, and accounting of users accessing corporate resources through the
network.
Cisco Secure ACS supports access control and accounting for tradition network access, dial-up
access servers, VPNs, firewalls, voice over IP (VoIP), and wireless access.
Key Features
Ease of Use – Web-based user interface simplifies and distributes configuration
Scalability – ACS supports large environments with support for redundant servers, remote
databases, and user database backup services
Extensibility – LDAP authentication forwarding for authentication of user profiles stored in
directories from key vendors such as Netscape, Novell, Oracle, and Microsoft
Management – Windows 2000 Active Directory and NT database support consolidates Windows
username/password management, and utilizes the Windows Performance Monitor for real-time
statistics viewing
Administration – Different access levels for each administrator and ability to group network
devices to facilitate enforcement and changes of security policies
Product Flexibility – ACS can be used with most Cisco router/network access servers when
running a RADIUS or TACACS+ embedded Cisco IOS version
Third-Party Token Support – Token Server support for RSA SecurID, Axent Technologies,
Secure Computing, and CryptoCard tokens
Control – Dynamic quotas for time-of-day, network usage, number of logged sessions, and dayof-week access restrictions
Cisco IOS Solutions
IOS-based and hardware-enabled Security and IPSec VPN solutions are available for the Cisco
800, 1700, 2600, 3600, 7100, 7200, and 7400 Series routers.
Centralized Management and Support
Cisco offers a variety of security device and policy management solutions designed for SMB and
enterprise environments, managing everything from a single box to hundreds of appliance and
IOS security and VPN devices. Companies can realize significant cost-of-ownership savings
through the implementation of single-station management.
In addition, Cisco also provides its award-winning 24X7 technical support for its entire range of
security solutions. There is never any finger-point or multi-vendor confusion. Just a single number
to call, day or night, seven days a week, for comprehensive product support.
AVVID Security Partners
Cisco Systems has extended its AVVID Partner program to include security solutions. These
solutions have been extensively reviewed by Cisco and independently tested in a third-party
laboratory to ensure compatibility with Cisco products and environments. Certified products are
available in a wide variety of categories, including virus scanning, filtering, management and
reporting, identification, PKI and digital certificates, as well as other VPN and security-related
functionalities.
Download