Cisco Cisco ScanSafe Web Security Guide De Démarrage
At-A-Glance
At-a-Glance
Cloud Web Security Pillars
Comprehensive Defense
Through web filtering and web
reputation scoring, Cisco CWS controls
access to more than 50 million known
websites by applying filters from a list
of more than 75 content categories.
Our application visibility and control
features include acceptable use policy
that increases employee productivity
and compliance. These controls
cover access to web pages, individual
web parts and microapplications so
employees can access sites needed for
work. Centralized policy management
helps you enforce policies and manage
the entire solution across all branches
and users from a single centralized
location that is accessible anywhere, at
any time.
Through web filtering and web
reputation scoring, Cisco CWS controls
access to more than 50 million known
websites by applying filters from a list
of more than 75 content categories.
Our application visibility and control
features include acceptable use policy
that increases employee productivity
and compliance. These controls
cover access to web pages, individual
web parts and microapplications so
employees can access sites needed for
work. Centralized policy management
helps you enforce policies and manage
the entire solution across all branches
and users from a single centralized
location that is accessible anywhere, at
any time.
Real-time malware protection is based
on the identification of unknown,
unusual behaviors and zero-hour
outbreaks through a heuristics-
based, antimalware engine. Outbreak
intelligence runs webpage components
in a highly secure virtual emulation
to determine how each component
behaves and blocks any malware.
Roaming users are protected with
Cisco AnyConnect®, which enforces
the same security features available
with Cisco CWS in your company’s
offices. A secure mobile browser
provides protection for mobile devices.
on the identification of unknown,
unusual behaviors and zero-hour
outbreaks through a heuristics-
based, antimalware engine. Outbreak
intelligence runs webpage components
in a highly secure virtual emulation
to determine how each component
behaves and blocks any malware.
Roaming users are protected with
Cisco AnyConnect®, which enforces
the same security features available
with Cisco CWS in your company’s
offices. A secure mobile browser
provides protection for mobile devices.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-730902-03 02/16
Advanced Threat Protection
Cisco AMP and Threat Grid protects your environment across the
attack continuum: before, during, and after an attack. The file reputation
feature allows Cisco to capture a fingerprint of each file as it traverses
the customer network. These fingerprints are sent to AMP’s cloud-
based intelligence network for a reputation verdict.
Cisco AMP and Threat Grid protects your environment across the
attack continuum: before, during, and after an attack. The file reputation
feature allows Cisco to capture a fingerprint of each file as it traverses
the customer network. These fingerprints are sent to AMP’s cloud-
based intelligence network for a reputation verdict.
After an attack, using file retrospection, you can track a file’s disposition
over time after it enters your environment. If it is found to be malware,
you can discover where the file entered and where it is currently located
to mitigate future intrusions.
over time after it enters your environment. If it is found to be malware,
you can discover where the file entered and where it is currently located
to mitigate future intrusions.
Our cloud-based CTA feature helps reduce threat identification time to
minutes with its continuous efforts. CTA actively identifies symptoms
of a malware infection through behavioral analysis, anomaly detection,
and machine learning. And with the Cisco Talos Security Intelligence
Research Group, among the largest threat detection networks in the
world, leading researchers and systems continuously deliver security
intelligence to Cisco CWS based on threat tracking across networks,
endpoints, mobile devices, virtual systems, the web, and email around
the globe.
minutes with its continuous efforts. CTA actively identifies symptoms
of a malware infection through behavioral analysis, anomaly detection,
and machine learning. And with the Cisco Talos Security Intelligence
Research Group, among the largest threat detection networks in the
world, leading researchers and systems continuously deliver security
intelligence to Cisco CWS based on threat tracking across networks,
endpoints, mobile devices, virtual systems, the web, and email around
the globe.
Superior Flexibility
Cisco CWS is backed by a worldwide network and 23 data centers with
service-level agreements (SLAs) based on 99.999 percent uptime.
You can tailor visibility into your web usage with more than 10,000
customizable reports, updated every 10 minutes, and the ability to
categorize traffic by user and application traffic. Web usage data may
also be accessed quickly and with a high degree of security by a variety
of reporting and analysis tools such as security information and event
management (SIEM).
Cisco CWS is backed by a worldwide network and 23 data centers with
service-level agreements (SLAs) based on 99.999 percent uptime.
You can tailor visibility into your web usage with more than 10,000
customizable reports, updated every 10 minutes, and the ability to
categorize traffic by user and application traffic. Web usage data may
also be accessed quickly and with a high degree of security by a variety
of reporting and analysis tools such as security information and event
management (SIEM).
You can also save time and money by redirecting traffic to Cisco CWS
through existing Cisco products such as the Cisco Integrated Router
G2 and ISR 4000, Cisco Adaptive Security Appliances (ASA and ASAv)
next-generation firewalls, Cisco Web Security Appliances (WSA and
WSAV), and the Cisco AnyConnect Web Security Module. You can also
connect to Cisco CWS in a standalone deployment.
through existing Cisco products such as the Cisco Integrated Router
G2 and ISR 4000, Cisco Adaptive Security Appliances (ASA and ASAv)
next-generation firewalls, Cisco Web Security Appliances (WSA and
WSAV), and the Cisco AnyConnect Web Security Module. You can also
connect to Cisco CWS in a standalone deployment.
Next Steps
Find out more at