2014 has been a busy and exciting year for security at Cisco! The team has worked extremely hard to provide our customers with unmatched visibility, continuous control and advanced threat protection across the entire attack continuum.
Among many things, Cisco launched the first threat-focused Next Generation Firewall: Cisco ASA with FirePOWER Services. This solution delivers integrated threat defense across the entire attack continuum by combining proven ASA firewall with Sourcefire threat and advanced malware protection (AMP) in a single device. We also announced the integration of AMP into our Cisco Web and Email Security Appliances and Cloud Services, known as AMP Everywhere.
In April, Cisco announced its Managed Threat Defense Service. Instead of worrying about assessing the best technology options, retaining the right number of security experts, and constantly staying current with the changing threat landscape, you can now partner with a trusted advisor in a simple cost-effective way.
Another highlight of 2014 was the introduction of Cisco Talos, our team of renowned threat researchers. Talos has contributed a large amount of threat information to the Cisco Collective Security Intelligence ecosystem over the past year and has been recognized for uncovering major threats and vulnerabilities in the industry such as the Kyle and Stan malvertising network.
Last but not least, in 2014 we welcomed Threatgrid and Neohapsis into the Cisco security family. Together, we are even better able to deliver leading security technologies and solutions for our customers.
With 2014 coming to an end, we pulled together a quick list to summarize some of this year’s leading security posts. Check out the list below and stay tuned for more great things to come in 2015!
Bryan Palma announces Managed Threat Defense Service, which uses machine learning algorithms and predictive analytics to detect possible threats in real-time. Suspected incidents get immediately escalated to a trained Cisco Security Investigator in one of our global Security Operations Centers, where they validate the fidelity of the incident before partnering with the customer’s team to remediate.
Levi Gundert analyzes and explores the role of DDNS in the context of cyber attack proliferation and presents the case for adding an operational play to the incident response and/or threat intelligence playbook to detect attack pre-cursors and attacks in progress.
Cisco Talos observed high levels of traffic consistent with the “RIG” exploit kit in June. The exploit kit reportedly began being advertised on criminal forums in April, which coincided with when Cisco first began blocking this traffic on April 24th.
In February, Cisco announced OpenAppID, an open, application-focused detection language and processing module for Snort that enables users to create, share, and implement application detection. OpenAppID puts control in the hands of users, allowing them to control application usage in their network environments and eliminating the risk that comes with waiting for vendors to issue updates.
NSS Labs released the final reports from its 2014 comparative NGFW testing, focusing on security effectiveness, total cost of ownership, performance and management. Classic FirePOWER appliances, such as the FirePOWER 8350 and the new Cisco ASA with FirePOWER Services, were included and scored equally well in testing, specifically in security efficacy.
Cisco Talos discusses the discovery of a new Internet Explorer zero-day exploit in this blog post. It underlines how exposed web browsers are to vulnerabilities for which a patch is yet to be released.
Introducing the Industry’s First Threat-Focused Next-Generation Firewall >> http://cs.co/2014_1
Scott Harrell announced Cisco ASA with FirePOWER Services - the industry’s first and only adaptive and threat-focused NGFW, designed to deliver on the three imperatives a NGFW must provide to protect modern enterprise networks — being visibility-driven, threat-focused, and platform-based.
Hello,after an fresh install of the new ISE Version 3.0 I have no access to the GUI. I can access to the ISE over ssh and the "show application status ise" says the application server is running, but the access to the Web-GUI from a directly connecte...
Cisco Defense Orchestrator (CDO) is a cloud-based, multi-device manager that manages security products like Adaptive Security Appliance (ASA), Firepower Threat Defense next-generation firewall, and Meraki devices, to name a few.
We make improvement...
HelloIt's all about failover.We are running a couple of FirePower 4150 appliances at two different locations. They are not in cluster mode.On top we run ASA code in Multiple Context Mode and with 20 Transparent Contexts. Active/Standby.Setup:Port-Channel ...