<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question about Cisco ASA AIP SSM-10 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-cisco-asa-aip-ssm-10/m-p/1859804#M55783</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco IPS is able to detect and block web-server and other application level attacks. You may see web-based signatures in web category in IME/IDM interface or sort by http-related engine. You can also find their descriptions on page &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/ipshome.x?i=62"&gt;http://tools.cisco.com/security/center/ipshome.x?i=62&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Documentation says that the most applicable environment for Cisco IPS is corporate network. It was designed for using in it. It doesn't say that Cisco IPS can't protect www/db servers.&lt;/P&gt;&lt;P&gt;If your main critical task is to make web-servers and databases secure you can analyze usage of such solutions as web application firewalls or database guards. They were designed for web/db protection as a main feature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 25 Dec 2011 20:41:17 GMT</pubDate>
    <dc:creator>andrey.dugin</dc:creator>
    <dc:date>2011-12-25T20:41:17Z</dc:date>
    <item>
      <title>Question about Cisco ASA AIP SSM-10</title>
      <link>https://community.cisco.com/t5/network-security/question-about-cisco-asa-aip-ssm-10/m-p/1859803#M55782</link>
      <description>&lt;P&gt;I am a bit confused about this device and its offering. The documenation doesnt seem to be very clear. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is will this be able to detect/stop most used Cross Site Scripting, SQL injection and application level attacks? The documenation makes it sound like the SSM is meant to be used in an office network where things AntiVirus, malware detection would be most useful, not in a environemnt that consists of web and database servers.&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 12:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-cisco-asa-aip-ssm-10/m-p/1859803#M55782</guid>
      <dc:creator>overworkedasian</dc:creator>
      <dc:date>2019-03-10T12:34:20Z</dc:date>
    </item>
    <item>
      <title>Question about Cisco ASA AIP SSM-10</title>
      <link>https://community.cisco.com/t5/network-security/question-about-cisco-asa-aip-ssm-10/m-p/1859804#M55783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cisco IPS is able to detect and block web-server and other application level attacks. You may see web-based signatures in web category in IME/IDM interface or sort by http-related engine. You can also find their descriptions on page &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/security/center/ipshome.x?i=62"&gt;http://tools.cisco.com/security/center/ipshome.x?i=62&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Documentation says that the most applicable environment for Cisco IPS is corporate network. It was designed for using in it. It doesn't say that Cisco IPS can't protect www/db servers.&lt;/P&gt;&lt;P&gt;If your main critical task is to make web-servers and databases secure you can analyze usage of such solutions as web application firewalls or database guards. They were designed for web/db protection as a main feature.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 25 Dec 2011 20:41:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-cisco-asa-aip-ssm-10/m-p/1859804#M55783</guid>
      <dc:creator>andrey.dugin</dc:creator>
      <dc:date>2011-12-25T20:41:17Z</dc:date>
    </item>
  </channel>
</rss>

