Cisco Cisco Security Manager 4.0 Ficha De Dados
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 11
Data Sheet
Cisco Security Manager 4.9
Cisco
®
Security Manager is an integrated end-to-end solution that helps
administrators enforce consistent access policies, rapidly troubleshoot security events,
and view summarized reports across the deployment.
and view summarized reports across the deployment.
Product Overview
Businesses are facing ever greater challenges in security operations. The growing number and complexity of
technologies, combined with the reduction of IT professionals once dedicated to security management, has
dramatically increased the potential for human error, which can lead to exposures and breaches.
Cisco Security Manager counteracts these challenges. It provides scalable, centralized management for a wide
range of devices. Administrators gain visibility across the network and can share highly secure information with
other essential network services, such as compliance systems and advanced analysis systems. Designed for
operational efficiency, Security Manager also includes a powerful suite of automated capabilities, such as health
and performance monitoring, software image management, automatic conflict detection, and integration with
ticketing systems.
Security Manager supports a wide range of Cisco security devices, including Cisco ASA 5500 Series and ASA
5500-X Series appliances; Cisco IPS 4200, 4300, and 4500 Series Sensors; Cisco SR 500 Series Secure Routers;
and the Cisco AnyConnect
®
Secure Mobility Client.
Several features in Security Manager make for simplified and efficient management. The following sections
describe these features.
Dashboard
The
manager’s dashboard (Figure 1) is a widget-based home screen that gives a bird’s-eye view of the health,
functioning, and other major performance indicators of a network security setup. Several widgets, such as the
Device Health Summary, Top Attackers, Top Victims, Top Signatures, and others, provide an excellent summary of
priority security aspects that an administrator needs to be aware of. These widgets act as a starting point for any
security readiness analysis. For example, in the Signatures widget, a user can click the number of times a specific
signature has been hit, and Security Manager will take the user to the Event Viewer, where events corresponding
to that signature can be analyzed. Similarly, the administrator can click an IP address on the Top Attackers widget
and look at value-added information related to that IP address. So, in summary, the dashboard screen is the
starting point for security administrators. Additionally, these dashboards can be personalized to suit each
administrator’s needs.
administrator’s needs.