Cisco Cisco Email Security Appliance X1050 Brochure
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 6
Brochure
BENEFITS
●
Faster, more comprehensive email
protection, often hours or days ahead of
the competition
the competition
●
Threat intelligence from Cisco Talos, built
on unmatched collective security analytics
●
Outbound message protection through on-
device data loss prevention (DLP), email
encryption, and optional integration with
encryption, and optional integration with
RSA’s Enterprise DLP solution
●
Lower total cost of ownership with a small
footprint, easy implementation, and
automated administration that yield
savings for the long term
automated administration that yield
savings for the long term
●
Flexibility for customers who prefer an on-
premises and cloud hybrid deployment or
who wish to transition to the cloud
gradually
who wish to transition to the cloud
gradually
Cisco Email Security: Layered Protection from
Blended Threats
Blended Threats
Email is the number one threat vector for cyber attacks. The Cisco
®
Email Security
Appliance keeps your critical business email safe and helps eliminate data leakage.
The Cisco Email Security portfolio―including the Cisco Email
Security Appliance (Figure 1), the Cisco Email Security Virtual
Appliance, and Cisco Cloud Email Security―delivers inbound
Appliance, and Cisco Cloud Email Security―delivers inbound
protection and outbound data control. It does so through advanced
threat intelligence and a layered approach to security. This approach
comprises URL categorization and reputation filtering, antispam and
antivirus filters, Outbreak Filters, and Advanced Malware Protection
(AMP).
Figure 1. Cisco Email Security Appliance
Threat-Focused Defense
Advanced Protection
Cisco Email Security is powered by the Cisco Talos Security Intelligence and Research Group (Talos), the
industry’s largest network of real-time threat intelligence, with the broadest visibility and largest footprint. Talos
industry’s largest network of real-time threat intelligence, with the broadest visibility and largest footprint. Talos
discovers where threats are hiding by pulling massive amounts of global information across multiple attack vectors
(Figure 2). This information gathering encompasses:
●
100 TB of security intelligence daily
●
1.6 million deployed security devices, including firewall, intrusion prevention system (IPS), web, and email
appliances