Feeds

Cisco pulls its security together

Promises more collaboration - and about time too...

Combat fraud and increase customer satisfaction

Cisco claims that it is finally getting its act together on security. The company has unveiled a new strategy, called Threat Control and Containment, or TCC, which it said would get its assorted security products working together more effectively.

"TCC comprises several key initiatives - more collaboration between products, more visibility into what's going on, and easier configuration," said Elad Shaviv, who heads Cisco's security business in Europe.

He added that it allows the Cisco Security Agent (CSA) on PCs to talk to its intrusion prevention systems (IPS) to minimise false-positives, for example, and it lets Cisco Security Manager deploy the same policies to all of an organisation's IPS simultaneously.

Shaviv denied that TCC was either mere semantics, or something that should have been done ages ago.

"It's more than just administrative offload," he said. "It takes more intelligence into the network, for example it includes intelligence on the IPS to set and assess risk levels. Plus we can have IPS on ISRs (Integrated Service Routers), in Catalysts and so on - they're different systems but they can now be managed and configured in common.

"We see security teams getting much closer to the business needs of the enterprise," he continued. "Security has become too complicated to just fill one need. Today you have so many borders to defend - you have to understand what you want to achieve."

He added, "Each team has its own time-lines and development schedules, and it's not that easy to get them to co-operate. That's what we're doing now."

The TCC announcement also included enhancements to Cisco's security Mitigation Analysis and Response System (MARS) and its SSL VPN. It means CSA can now require out-of-office connections to be made via a VPN, for instance.

The company said that TCC "marks the latest evolution of Cisco's Self-Defending Network - a comprehensive framework incorporating various endpoint and network security products into an integrated, collaborative and adaptive security solution for organizations of all sizes".

However, it gave no word on how soon it might get all its other security technologies - both those it has developed and the ones it's acquired - might also be brought inside its collaborative framework.

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.