Cisco has rolled out a new Data Loss Prevention (DLP) solution starting with AsyncOS 11.0 for on premise Cisco Email Security Appliances (ESA), and Cisco's Cloud Email Security (CES). The Cisco DLP solution replaces the existing RSA DLP solution available on AsyncOS 10.0.x and earlier releases. Cisco's DLP solution allows seamless migration of all the existing DLP policies created in RSA DLP to the new Cisco DLP engine. After the upgrade, you can view or modify the migrated DLP policies from the Mail Policies > DLP Policy Manager page in the ESA's web interface. For more information, see the “Data Loss Prevention” chapter in the User Guide for AsyncOS 11.0 for Cisco Email Security Appliances.
RSA had previously announced the End of Life (EOL) for RSA Data Loss Prevention Suite. The last date of support from RSA for DLP is December 31st, 2017. Beyond December 31st, 2017, Cisco will provide Cisco customers with technical support assistance on ESA for anything relating to RSA DLP solution. However, Cisco will not support feature upgrades or bug fixes with respect to RSA's DLP solution on ESAs running 10.0.x and earlier releases.
Note: There is no support for RSA Enterprise Manager Integration in Async0S 11.0 and later. If you have DLP policies created in RSA Enterprise Manager, you must recreate those policies on your appliance after the upgrade.
In order to continue supportability for DLP on Cisco ESA, customers on AsyncOS 10.0.x or earlier releases are requested to migrate to the AsyncOS 11.0 release at your earliest opportunity.
Which Cisco Secure products include access to SecureX?
Eventually, all will. At the current time, a license to any of the Cisco products listed here grants immediate rights to use the SecureX platform:https://www.cisco.com/c/en/us/product...
We are trying to get more logging on the ASA regarding the IP phones that connect in from the outside via SSL VPN. We have a Cisco ASA 5512-X running ASA 9.12(4)2 and ASDM running 7.13(1). The remote IP phones connecting are Cisco 8845. We'...
All, Is it possible to restrict access to Site-to-Site VPN tunnels with Azure AD groups? We have 3 Site-to-Site VPN tunnels in our environment and we would like to restrict access through the use of Azure AD groups. We are using Azure MFA...
Hi,We haven't been able to set up SNMP monitoring for PRTG. We found some articles informing a diagnostic interface and\or set the platform setting policy (which is currently blank) need to be configured? Can anyone share any documentation that explains t...