Cisco Cisco Security Manager 4.0 Hoja De Datos
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 10
Data Sheet
Cisco Security Manager 4.7
Cisco
®
Security Manager is an integrated, end-to-end solution that helps
administrators enforce consistent access policies, rapidly troubleshoot security events,
and access summarized reports across the deployment.
and access summarized reports across the deployment.
Product Overview
Businesses are facing ever greater challenges in security operations. The growing number and complexity of
technologies, combined with the reduction of IT professionals once dedicated to security management, has
dramatically increased the potential for human error, which can lead to exposures and breaches.
Cisco Security Manager counteracts these challenges. It provides scalable, centralized management for a wide
range of devices. Administrators gain visibility across the network and can share highly secure information with
other essential network services, such as compliance systems and advanced analysis systems. Designed for
operational efficiency, Security Manager also includes a powerful suite of automated capabilities, such as health
and performance monitoring, software image management, auto-conflict detection, and integration with ticketing
systems.
Security Manager supports a wide range of Cisco security devices, including Cisco ASA 5500 Series and ASA
5500-X Series Adaptive Security Appliances; Cisco IPS 4200, 4300, and 4500 Series Sensors; Cisco SR 500
Series Secure Routers; and the Cisco AnyConnect
®
Secure Mobility Client.
Several features in Security Manager make for simplified and efficient management. The following sections
describe these features.
Dashboard
The
manager’s dashboard (Figure 1) is a widget-based home screen that gives a bird’s-eye view of the health,
functioning, and other major performance indicators of a network security setup. Several widgets, such as the
Device Health Summary, Top Attackers, Top Victims, Top Signatures, and others, provide an excellent summary of
priority security aspects that an administrator needs to be aware of. These widgets act as a starting point for any
security readiness analysis. For example, in the Signatures widget, a user can click the number of times a specific
signature has been hit, and Security Manager will take the user to the Event Viewer, where events corresponding
to that signature can be analyzed. Similarly, the administrator can click an IP address on the Top Attackers widget
and look at value-added information related to that IP address. So, in summary, the dashboard screen is the
starting point for security administrators. Additionally, these dashboards can be personalized to suit each
ad
ministrator’s needs.