Cisco Security Manager
Encyclopedia
Cisco Security Manager is an Enterprise software
Enterprise software
Enterprise software, also known as enterprise application software , is software used in organizations, such as in a business or government, contrary to software chosen by individuals...

 management application designed to configure firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

, VPN, and Intrusion-prevention system
Intrusion-prevention system
Intrusion Prevention Systems , also known as Intrusion Detection and Prevention Systems , are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information...

 (IPS) security services on Cisco
Cisco
Cisco may refer to:Companies:*Cisco Systems, a computer networking company* Certis CISCO, corporatised entity of the former Commercial and Industrial Security Corporation in Singapore...

 network and security devices. Cisco Security Manager can be used in networks of all sizes—from small networks to large networks consisting of thousands of devices—by using policy-based management techniques.

Firewall Management: Device-agnostic, unified interface for managing firewall rules across different Cisco devices supporting the firewall feature set flexible rule specification methods for improved productivity and organization of rules; powerful toolset to identify configuration errors and optimize firewall rules

VPN Management: VPN Wizard for rapid, simple definition of site-to-site and remote access VPNs

IPS Management: Comprehensive solution for configuration management of all Cisco
Cisco
Cisco may refer to:Companies:*Cisco Systems, a computer networking company* Certis CISCO, corporatised entity of the former Commercial and Industrial Security Corporation in Singapore...

 IPS technologies and automation
Automation
Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization...

 of signature updates

Policy-based Management: Ability to define aspects of a device's configuration into a named, shareable policy, which can be re-used across multiple devices; support for policy hierarchies to allow logical structuring and maximum re-usability

Rich client Graphical User Interface
Graphical user interface
In computing, a graphical user interface is a type of user interface that allows users to interact with electronic devices with images rather than text commands. GUIs can be used in computers, hand-held devices such as MP3 players, portable media players or gaming devices, household appliances and...

:
Integrated, easy-to-use interface providing multiple views optimized around specific configuration tasks; device-centric view, map-centric view, and policy-centric view

Workflow
Workflow
A workflow consists of a sequence of connected steps. It is a depiction of a sequence of operations, declared as work of a person, a group of persons, an organization of staff, or one or more simple or complex mechanisms. Workflow may be seen as any abstraction of real work...

:
Provides an approval framework, whereby proposed configuration changes and deployments can be reviewed and approved

Role-based access control
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...

:
Integration with Cisco Secure Access Control Server (ACS) for granular, role-based access control
Role-Based Access Control
In computer systems security, role-based access control is an approach to restricting system access to authorized users. It is used by the majority of enterprises with more than 500 employees, and can be implemented via mandatory access control or discretionary access control...

 to devices and management
Management
Management in all business and organizational activities is the act of getting people together to accomplish desired goals and objectives using available resources efficiently and effectively...

functions

Flexible Deployment Options: Support for various methods of deploying configuration changes such as direct to device, to file, or using call-home based techniques

Release history

Release Date
3.0 Mar 28, 2006
3.0.1 Jun 18, 2006
3.1 Apr 20, 2007
3.1.1 Sep 24, 2007
3.2 Mar 31, 2008
3.2 SP1 May 29, 2008
3.2 SP2 June 20, 2008
3.2.1 July 23, 2008
3.2.1 SP1 Sept 05, 2008
3.2.2 Dec 13, 2008
3.2.2 SP1 Feb 16, 2009
3.2.2 SP2 Apr 22, 2009
3.3 June 30, 2009
4.0 SP1 Oct 7, 2010
4.1 March 15, 2011
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK