Cisco Cisco Web Security Appliance S690 User Guide

Page of 606
 
1-9
Cisco IronPort AsyncOS 7.7 for Web User Guide
 
Chapter 1      Getting Started with the Web Security Appliance
Third Party Contributors
Third Party Contributors
Some software included within IronPort AsyncOS is distributed under the terms, notices, and conditions 
of software license agreements of FreeBSD, Inc., Stichting Mathematisch Centrum, Corporation for 
National Research Initiatives, Inc., and other third party contributors, and all such terms and conditions 
are incorporated in IronPort license agreements.
The full text of these agreements can be found here:
https://support.ironport.com/3rdparty/AsyncOS_User_Guide-1-1.html.
Portions of the software within IronPort AsyncOS is based upon the RRDtool with the express written 
consent of Tobi Oetiker.
Portions of this document are reproduced with permission of Dell Computer Corporation. Portions of 
this document are reproduced with permission of McAfee, Inc. Portions of this document are reproduced 
with permission of Sophos Plc.
Cisco Welcomes Your Comments
The Cisco IronPort Technical Publications team is interested in improving the product documentation. 
Your comments and suggestions are always welcome. You can send comments to the following email 
address: 
contentsecuritydocs@cisco.com 
Please include the title of this book and the publication date from the title page in the subject line of your 
message.
Web Security Appliance Overview
The Web Security appliance is a robust, secure, efficient device that protects corporate networks against 
web-based malware and spyware programs that can compromise corporate security and expose 
intellectual property. The Web Security appliance includes protection for standard communication 
protocols, such as HTTP, HTTPS, FTP, and SOCKS. 
Malware (“malicious software”) is software designed to infiltrate or damage a computer system without 
the owner’s consent. It can be any kind of hostile, intrusive, or annoying software or program code. 
Web-based malware includes spyware, system monitors, adware, phishing and pharming techniques, 
keystroke (key) loggers, browser hijackers, trojan horses, and more.
Web-based malware is a rapidly growing threat, responsible for significant corporate downtime, 
productivity losses and major strains on IT resources. Additionally, companies run the risk of violating 
compliance and data privacy regulations if their networks become compromised by malware. Companies 
run the risk of expensive legal costs and exposure of intellectual property.
The best place to stop these threats from entering the network is right at the gateway. The Web Security 
appliance provides deep application content inspection, by offering a web proxy service and by 
monitoring layer 4 traffic. The Web Proxy and Layer 4 Traffic Monitor allow organizations to ensure 
breadth of coverage within their networks. The Web Security appliance provides a powerful web security 
platform to protect your organization against malware that is optimized for performance and efficacy.