Техническая Спецификация для Cisco Cisco Security Manager 4.0

Скачать
Страница из 10
 
 
© 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 1 of 10 
Data Sheet 
Cisco Security Manager 4.7 
Cisco
®
 Security Manager is an integrated, end-to-end solution that helps 
administrators enforce consistent access policies, rapidly troubleshoot security events, 
and access summarized reports across the deployment. 
Product Overview 
Businesses are facing ever greater challenges in security operations. The growing number and complexity of 
technologies, combined with the reduction of IT professionals once dedicated to security management, has 
dramatically increased the potential for human error, which can lead to exposures and breaches. 
Cisco Security Manager counteracts these challenges. It provides scalable, centralized management for a wide 
range of devices. Administrators gain visibility across the network and can share highly secure information with 
other essential network services, such as compliance systems and advanced analysis systems. Designed for 
operational efficiency, Security Manager also includes a powerful suite of automated capabilities, such as health 
and performance monitoring, software image management, auto-conflict detection, and integration with ticketing 
systems. 
Security Manager supports a wide range of Cisco security devices, including Cisco ASA 5500 Series and ASA 
5500-X Series Adaptive Security Appliances; Cisco IPS 4200, 4300, and 4500 Series Sensors; Cisco SR 500 
Series Secure Routers; and the Cisco AnyConnect
®
 Secure Mobility Client. 
Several features in Security Manager make for simplified and efficient management. The following sections 
describe these features. 
Dashboard 
The 
manager’s dashboard (Figure 1) is a widget-based home screen that gives a bird’s-eye view of the health, 
functioning, and other major performance indicators of a network security setup. Several widgets, such as the 
Device Health Summary, Top Attackers, Top Victims, Top Signatures, and others, provide an excellent summary of 
priority security aspects that an administrator needs to be aware of. These widgets act as a starting point for any 
security readiness analysis. For example, in the Signatures widget, a user can click the number of times a specific 
signature has been hit, and Security Manager will take the user to the Event Viewer, where events corresponding 
to that signature can be analyzed. Similarly, the administrator can click an IP address on the Top Attackers widget 
and look at value-added information related to that IP address. So, in summary, the dashboard screen is the 
starting point for security administrators. Additionally, these dashboards can be personalized to suit each 
ad
ministrator’s needs.