Home > Articles > Building a Security Strategy

Building a Security Strategy

Chapter Description

Bob Vachon introduces network security-related concepts and summarizes how security policies are implemented using a lifecycle approach.

Cloud Security and Data-Loss Prevention

Adding to the complexity of securing a network is the fact that many modern network designs now incorporate cloud computing. Threats in cloud computing include the following:

  • Abuse of cloud computing
  • Account or service hijacking
  • Data loss in the cloud
  • Unsecure interfaces and application programming interfaces (APIs)
  • Malicious insiders

Administrators, because they are ultimately responsible for data residing on networks over which they have no control, must also consider the consequences if the cloud environment is not properly secured.

Two following traditional key services must now be secured in the cloud:

Securing web access

Cisco Cloud Web Security (CWS), formerly known as Cisco ScanSafe, is a cloud-based solution that provides comprehensive web security as a service (SaaS). Cisco CWS provides enhanced security for all endpoints while they access Internet websites using publicly available wireless networks including hotspots and mobile cellular networks. With Cisco CWS, administrators can set and enforce specific web use policies to control access to websites and specific content in web pages and applications as well as SaaS applications.

Cisco Web Security Appliance (WSA) is a type of firewall and threat monitoring appliance that provides secure web access, content security, and threat mitigation for web services. It also provides advanced malware protection, application visibility and control, insightful reporting, and secure mobility.

Securing email access

Cisco Email Security Appliance (ESA) is a type of firewall and threat monitoring appliance for email traffic. It provides the capability to quickly block new email-based blended attacks, to control or encrypt sensitive outbound email, control spam, and more.

5. Secure Connectivity Through VPNs | Next Section Previous Section

There are currently no related articles. Please check back later.