Техническая Спецификация для Cisco Cisco Security Manager 4.0

Скачать
Страница из 11
 
 
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 1 of 11 
Data Sheet 
Cisco Security Manager 4.11 
Cisco
® 
Security Manager is an integrated end-to-end solution that helps administrators 
enforce consistent access policies, rapidly troubleshoot security events, and view 
summarized reports across the deployment. 
Product Overview 
Businesses are facing ever greater challenges in their security operations. The growing number and complexity of 
technologies, combined with the reduction of IT professionals once dedicated to security management, has 
dramatically increased the potential for human error, which can lead to exposures and breaches. 
Cisco Security Manager counteracts these challenges. It provides scalable, centralized management for a wide 
range of devices. Administrators gain visibility across the network and can share highly secure information with 
other essential network services, such as compliance systems and advanced analysis systems. Designed for 
operational efficiency, Security Manager also includes a powerful suite of automated capabilities, such as health 
and performance monitoring, software image management, automatic conflict detection, and integration with 
ticketing systems. 
Security Manager supports a wide range of Cisco security devices, including the Cisco ASA 5500 Series and ASA 
5500-X Series appliances; Cisco IPS 4200, 4300, and 4500 Series Sensors; Cisco SR 500 Series Secure Routers; 
and the Cisco AnyConnect
®
 Secure Mobility Client. Cisco Security Manager 4.11 adds support for ASA 
management on the Cisco Firepower 4100
 Series Platforms. 
Several features in Security Manager make for simplified and efficient management. The following sections 
describe these features. 
Dashboard 
The manager’s dashboard (Figure 1) is a widget-based home screen that gives a bird’s-eye view of the health, 
functioning, and other major performance indicators of a network security setup. Several widgets, such as the 
Device Health Summary, Top Attackers, Top Victims, and Top Signatures, provide an excellent summary of priority 
security aspects. These widgets act as a starting point for any security readiness analysis. For example, in the 
Signatures widget, you can click the number of times a specific signature has been hit. Security Manager then 
takes you to the Event Viewer, where events corresponding to that signature can be analyzed. Similarly, you can 
click an IP address in the Top Attackers widget and look at value-added information related to that IP address. So, 
in summary, the dashboard screen is the starting point for security administrators. These dashboards can be 
personalized to suit each administrator’s needs.