Cisco ASA-SSM-CSC-10-K9= Manual De Usuario
All contents are Copyright © 1992–2006 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 7
Solution Overview
Cisco ASA 5500 Series Anti-X Edition for the Enterprise
Viruses and other malicious code can overwhelm your IT resources disrupting business operations and impacting
business transactions. The onslaught of spyware and unwanted Internet content can seriously impact employee
productivity and expose individuals to identity theft. Providing comprehensive malware protection and content
control, the Cisco ASA 5500 Series Anti-X Edition allows enterprises to make full use of the Internet without the risk
and costs associated with infections and threats impacting client systems. Combining enterprise-grade firewall and
high-quality malware protection, the Cisco ASA 5500 Series Anti-X Edition delivers a powerful all-in-one solution that
provides strong protection and control for business network communications, stops network threats including
viruses, worms, spyware, spam and phishing, and controls unwanted mail and Web content while reducing the
operational costs and complexity of deploying and managing multiple point solutions.
CHALLENGE
In today’s marketplace, businesses rely on the Internet for their productivity, efficiency, customer interaction, and financial success. At the
same time, the Internet has become a source of network threats from benign to severe, including viruses, spyware, phishing, and other
malicious threats. Once a teenager vandal’s playground, it has transitioned into a world of opportunity for cyber-criminals and organized
crime where the motivation is monetary where it was once driven by fame and notoriety.
Businesses strive to maximize business continuity and security, increase employee productivity and reduce network wastage, control
information theft and legal liabilities, and reduce operational expenses and management burden. Most businesses find it difficult to attain
these business goals with a steady stream of Internet threats targeting client systems. Historically, balancing business demands with security
requirements has meant adding more devices and technology—and more costs and complexity—to the network.