Cisco Cisco Web Security Appliance S160 Guía Del Usuario
1-9
Cisco IronPort AsyncOS 7.7 for Web User Guide
Chapter 1 Getting Started with the Web Security Appliance
Third Party Contributors
Third Party Contributors
Some software included within IronPort AsyncOS is distributed under the terms, notices, and conditions
of software license agreements of FreeBSD, Inc., Stichting Mathematisch Centrum, Corporation for
National Research Initiatives, Inc., and other third party contributors, and all such terms and conditions
are incorporated in IronPort license agreements.
of software license agreements of FreeBSD, Inc., Stichting Mathematisch Centrum, Corporation for
National Research Initiatives, Inc., and other third party contributors, and all such terms and conditions
are incorporated in IronPort license agreements.
The full text of these agreements can be found here:
https://support.ironport.com/3rdparty/AsyncOS_User_Guide-1-1.html.
Portions of the software within IronPort AsyncOS is based upon the RRDtool with the express written
consent of Tobi Oetiker.
consent of Tobi Oetiker.
Portions of this document are reproduced with permission of Dell Computer Corporation. Portions of
this document are reproduced with permission of McAfee, Inc. Portions of this document are reproduced
with permission of Sophos Plc.
this document are reproduced with permission of McAfee, Inc. Portions of this document are reproduced
with permission of Sophos Plc.
Cisco Welcomes Your Comments
The Cisco IronPort Technical Publications team is interested in improving the product documentation.
Your comments and suggestions are always welcome. You can send comments to the following email
address:
Your comments and suggestions are always welcome. You can send comments to the following email
address:
contentsecuritydocs@cisco.com
Please include the title of this book and the publication date from the title page in the subject line of your
message.
message.
Web Security Appliance Overview
The Web Security appliance is a robust, secure, efficient device that protects corporate networks against
web-based malware and spyware programs that can compromise corporate security and expose
intellectual property. The Web Security appliance includes protection for standard communication
protocols, such as HTTP, HTTPS, FTP, and SOCKS.
web-based malware and spyware programs that can compromise corporate security and expose
intellectual property. The Web Security appliance includes protection for standard communication
protocols, such as HTTP, HTTPS, FTP, and SOCKS.
Malware (“malicious software”) is software designed to infiltrate or damage a computer system without
the owner’s consent. It can be any kind of hostile, intrusive, or annoying software or program code.
Web-based malware includes spyware, system monitors, adware, phishing and pharming techniques,
keystroke (key) loggers, browser hijackers, trojan horses, and more.
the owner’s consent. It can be any kind of hostile, intrusive, or annoying software or program code.
Web-based malware includes spyware, system monitors, adware, phishing and pharming techniques,
keystroke (key) loggers, browser hijackers, trojan horses, and more.
Web-based malware is a rapidly growing threat, responsible for significant corporate downtime,
productivity losses and major strains on IT resources. Additionally, companies run the risk of violating
compliance and data privacy regulations if their networks become compromised by malware. Companies
run the risk of expensive legal costs and exposure of intellectual property.
productivity losses and major strains on IT resources. Additionally, companies run the risk of violating
compliance and data privacy regulations if their networks become compromised by malware. Companies
run the risk of expensive legal costs and exposure of intellectual property.
The best place to stop these threats from entering the network is right at the gateway. The Web Security
appliance provides deep application content inspection, by offering a web proxy service and by
monitoring layer 4 traffic. The Web Proxy and Layer 4 Traffic Monitor allow organizations to ensure
breadth of coverage within their networks. The Web Security appliance provides a powerful web security
platform to protect your organization against malware that is optimized for performance and efficacy.
appliance provides deep application content inspection, by offering a web proxy service and by
monitoring layer 4 traffic. The Web Proxy and Layer 4 Traffic Monitor allow organizations to ensure
breadth of coverage within their networks. The Web Security appliance provides a powerful web security
platform to protect your organization against malware that is optimized for performance and efficacy.