Feeds

Cisco to push threat intelligence to all devices

Adds SecureX to big and middling firewalls

High performance access to file storage

RSA 2012 Cisco plans to push security intelligence into its entire firewall line in an attempt to make its hardware a lot smarter and ease the load on IT managers.

On Tuesday, Cisco will announce the extension of its SecureX threat monitoring system into some of its largest firewalls, with the Cisco ASA CX firewall. It's also upgrading its Trustsec and Identity Service Engine (ISE) to boost the company's ability to monitor threats on the cloud and across a wide range of device types. Ultimately, the goal is to integrate the intelligence on the software side with no additional hardware.

"Long term, we're going to be taking the power of SecureX, and bringing it into the Cisco core architecture, and delivering it on everything we do - our core router and switching, but also data, voice and video. We're bringing security to all parts of the Cisco landscape," said Cisco's new senior vice president of security Christopher Young at the RSA 2012 conference in San Francisco.

Every day Cisco handles 35 per cent of the world's email via its systems, accounting for 4TB of information, he explained, and routes 30 billion website requests. This kind of information is now being analyzed and fed into Cisco's SecureX network. Cisco's CSO John Stewart said this gave the company a unique selling point.

"We've got to work together – you're not going to survive on your own. You've got to work in a community of data. Cisco's been quietly successful in protecting customers from a phenomenal data source, which is ours," Stewart said. Cisco claims the ASA CX system will be capable of identifying over a thousand individual applications such as Facebook and Google+, as well as 75,000 micro applications. For example, the system can be configured to allow access to Facebook, but not to specific applications within it.

As a first step, the company announced that SecureX will be built into the ASA 5500 Series X firewalls aimed at large and medium-sized business sector. The company declined to give any details regarding the roadmap of further roll-out plans. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.