Cisco Blogs

Cisco Blog > Security

The Secure Way to IPv6 – Use Your Proxy!

When asked about IPv6, many companies are aware that they must do something, but are not sure what is the best way to approach IPv6. In my talks with customers, I found that the unfamiliarity with IPv6 is one of the biggest obstacles. So, to gain experience with IPv6, there are several paths to go down, from the inside-out approach (start within an internal area and work outwards) to the outside-in (work from the internet towards the internal network). One very easy way to start with IPv6 is to use your existing proxy infrastructure. I want to show you how to do this by using the Cisco Web Security Appliance (WSA).

Read More »

Tags: , , , ,

Cisco Email Security Stays Ahead of Current Threats by Adding Stronger Snowshoe Spam Defense, AMP Enhancements, and More…

If you read the recently released Cisco Annual Security Report, you will have learned how spammers have adopted a “Snowshoe” strategy, using a large number of IP addresses with a low message volume per IP address, to send spam, preventing some spam systems from sinking the spam. This yielded a 250 percent increase in spam from January 2014 to November 2014. Or, perhaps the fact that malicious actors are using malvertising (malicious advertising) from web browser add-ons as a medium for distributing malware and unwanted applications caught your eye in the report. In order to protect against these types of emerging threats, Cisco showcases its continued thought leadership in email security to offer even greater protection and control across the attack continuum, while also providing additional flexibility for centralized management. Read More »

Tags: , , , , , , , , , , ,

Virtually There! Cisco Announces Availability of Virtual Web Security Appliance

I’m sure this has never happened to you.

You choose a web security appliance based on user count and expected traffic profiles. Then marketing rolls out a successful video campaign that goes viral and your users complain about slow internet performance.

You’re under the gun to complete your global web security initiative on time and then you receive word that three servers are stuck in customs in a country you have never heard of.

You’re moving more and more workloads onto virtual servers to match your business agility objectives when someone from the c-suite asks, “Why do you still have these security appliances? Can’t you virtualize them, too?” Read More »

Tags: , ,