Cisco Blogs

Cisco Blog > Security

AnyConnect Makes Working From Anywhere Even More Secure

AnyConnect 4.2 adds deeper visibility and control over endpoints and network access

In our mobile, connected world more users are connecting to the corporate network with more devices from more places than ever before. In fact, analysts estimate that this year the average worker will use three personal devices for work purposes – that’s more than 15 billion mobile devices with access to enterprise networks. And the reality is that many of those devices have been compromised; 75 percent of organizations surveyed by Cisco said their mobile devices had been targeted by malware within the past 12 months.

Organizations need to provide secure access to systems and data over a mix of trusted and untrusted networks and personal and corporate-sanctioned devices. Cisco is committed to helping organizations extend security everywhere with an intelligent, seamless, and always-on connectivity experience across the proliferating scope of mobile devices.

Cisco AnyConnect Secure Mobility Client supports context-aware comprehensive security policy enforcement regardless of where the endpoint is physically located. The new Cisco AnyConnect extends security even deeper into endpoints and the network with new capabilities that provider greater visibility to protect what matters most – corporate digital assets.

Cisco AnyConnect, now version 4.2, delivers significant improvements and new features for greater endpoint visibility and control.

Read More »

Tags: , , ,

Gaining Productivity and Peace of Mind: Cisco Cloud Access Security

Cloud applications are revolutionizing the way your employees can do their work. They enable Bring-Your-Own-Device (BYOD), are inherently mobile, can be up and running in minutes, and allow users to collaborate with anyone from anywhere to get their jobs done. It’s no wonder that cloud app adoption is growing at unprecedented rates. According to Forrester, breakthrough productivity gains are expected to drive the cloud app market to reach over $130 billion by 2020. But along with these benefits, cloud apps also carry unseen dangers: data leakage, insider threats, and compliance failures. These risks stem from four challenges that IT administrators face as cloud apps become a standard tool to help employees get their jobs done.

1 – Cloud App Visibility. Because cloud apps are so fast, easy, and affordable to deploy, many IT administrators are facing a problem of Shadow IT – employees using unsanctioned apps and bypassing IT security controls. Even Line of Business heads can approve cloud apps for entire departments to use, rolling out a new tool without the IT team knowing anything about it. Shadow IT inhibits SaaS visibility; IT can’t see which apps are being used so they can’t identify risky apps and are powerless to set informed app controls.

Cisco Cloud Access Security (CAS) provides visibility by presenting a complete list of all cloud apps that employees are using. This is a major step toward solving the Shadow IT problem. But CAS goes even further, providing a risk score associated with each cloud app based on 60+ attributes that are weighted according to the risk profile of the business. A cloud app that is considered “enterprise quality” supports multiple enterprise security requirements. With a complete list of cloud apps and their associated scores, IT administrators can decide whether a cloud app should be sanctioned or should be blocked.

Read More »


Microsoft Patch Tuesday – November 2015

Microsoft’s Patch Tuesday has arrived. Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 12 bulletins addressing 53 vulnerabilities. Four bulletins are rated critical and address vulnerabilities in Edge, Internet Explorer, Windows Journal, and Windows. The remaining eight bulletins are rated important and address vulnerabilities in .NET, IPsec, Kerberos, Lync/Skype for Business, NDIS, Office, SChannel, and Winsock.

Bulletins Rated Critical

Microsoft bulletins MS15-112 through MS15-115 are rated as critical in this month’s release.

MS15-112 and MS15-113 are this month’s Internet Explorer and Edge security bulletin respectively. In total, 25 vulnerabilities are addressed with four of them specifically affecting both IE and Edge. The remaining 21 vulnerabilities only affect Internet Explorer. The majority of the vulnerabilities that are resolved in this month’s release are memory corruption defects. In addition, an ASLR bypass, an information disclosure vulnerability, and a couple of scripting engine flaws are also addressed.


Tags: , , ,

Easy-to-Use Threat Intelligence for Organizations of All Sizes: Threat Awareness Service

From credit card numbers to medical records, small and midsize organizations hold the same sensitive information as large enterprises. We often think of multinational corporations and governments as the primary targets for cybersecurity breaches, but smaller companies face the same threats. As enterprises start to spend more on security, hackers are increasingly looking to pick lower-hanging fruit by targeting smaller organizations. In recent years, more than half of known breach victims have been organizations with less than 1,000 employees, and 66% have fewer than 10,000.[1]

Without the large security budget or dedicated cybersecurity expertise of a major enterprise, smaller organizations struggle to implement threat intelligence solutions that can help them see suspicious activity occurring in their networks. These solutions are generally hard to deploy, difficult to use, and costly to obtain.

To help organizations of all sizes gain continuous visibility into suspicious activity occurring on their networks, we are introducing Cisco Threat Awareness Service, a threat intelligence service that enhances threat visibility by making security information available 24 hours a day, 7 days a week. Accessed through a web portal, this cloud-based service provides visibility into inbound and outbound network activity from the outside and highlights potential threats requiring additional attention. Cisco Threat Awareness Service requires no configuration changes, network infrastructure, or new software, so you can deploy the service quickly, easily, and cost-effectively.

Read More »

Tags: , , , , , ,

Pushing Security from Edge to Endpoint

On November 3rd, Cisco announced that we are extending our Security Everywhere strategy with new solutions and services aimed at helping our customers gain greater visibility, context, and control from the cloud to the network to the endpoint. Providing organizations more visibility means being able to see all their systems, not just Windows but Mac, mobile, virtual machines, and now Linux!

AMP for Endpoints now has a dedicated Linux connector. Attacks against datacenters are on the rise. Given that these systems contain highly sensitive customer and corporate data, and more often than not custom applications that are central to the day to day business, organizations need to have deep visibility into these attack vectors in order to prevent, detect, scope, contain, and remediate targeted attacks faster and more efficiently. At the moment, the Linux connector will be available for RHEL 6.5 and 6.6 as well as CentOS 6.4, 6.5 and 6.6. It is available to all current AMP customers with existing accounts, and will also be available to ELA v4 customers.

Edge to Endpoint Malware Analysis

A critical component of this launch is the extension of our advanced malware analysis and threat intelligence solution, AMP Threat Grid.

We have integrated AMP Threat Grid into our ASA with FirePOWER Services models, FirePOWER NGIPS appliances and the AMP for Networks solution. These are three huge integrations that can now tap into the power of the Threat Grid malware analysis engine. Why is this so big? Well, we acquired ThreatGRID in the summer of 2014. By January 2015 we had it integrated into our AMP for Endpoints products. We reached another critical milestone in the summer of 2015 by adding the AMP Threat Grid sandboxing capability to Cisco’s Email and Web Security solutions. Now, just a few months later, we are realizing the vision of providing full edge-to-endpoint sandboxing on a single platform – AMP Threat Grid. This is immensely powerful for anyone using the solution.

Read More »

Tags: , , , ,