Cisco Cisco Aironet 3600e Access Point Guía De Introducción
At-A-Glance
© 2013 Cisco Systems, Inc. All rights reserved.
Cisco: A Familiar Name Delivering
Maximum Protection Against
Unfamiliar Threats
Cisco is uniquely positioned to make comprehensive
cybersecurity less complicated and more practical for
government and educational institutions.
cybersecurity less complicated and more practical for
government and educational institutions.
Cisco® cybersecurity solutions and services provide
consistent control across diverse and expansive network
infrastructures. Now organizations have flexibility for
deploying security in the way that best suits their
objectives, and unmatched threat visualization, analysis,
and mitigation.
consistent control across diverse and expansive network
infrastructures. Now organizations have flexibility for
deploying security in the way that best suits their
objectives, and unmatched threat visualization, analysis,
and mitigation.
Cisco security controls are designed and deployed at
the foundation level, within and around the core network,
providing an adaptive, responsive, and architectural
approach. This means 360-degree protection that allows
institutions and agencies to discover, defend against, and
quickly remediate even the most advanced threats.
the foundation level, within and around the core network,
providing an adaptive, responsive, and architectural
approach. This means 360-degree protection that allows
institutions and agencies to discover, defend against, and
quickly remediate even the most advanced threats.
Unlike many providers that deliver point products,
capable of blocking uni-directional threats, Cisco’s
experience and presence throughout the network
infrastructure, in hardware and software from core to
edge, provides unsurpassed protection.
capable of blocking uni-directional threats, Cisco’s
experience and presence throughout the network
infrastructure, in hardware and software from core to
edge, provides unsurpassed protection.
BEFORE
Control
Enforce
Harden
DURING
Detect
Block
Defend
AFTER
Scope
Contain
Remediate
Firewall
NGIPS
Advanced Malware
Protection
NGFW
Web Security
Network Behavior
Analysis
NAC + Identity Services
Email Security
VPN
UTM
A T T A C K C O N T I N U U M
Cisco Security Products Mapped to New Security Model