From Managing Cisco Network Security

Cisco Secure Policy Manager

Network security becomes more critical to any organization that incorporates intranets, extranets, and the Internet for e-commerce solutions. The associated security risk becomes very high with most organizations configuring and deploying firewalls to improve network boundary security and Virtual Private Networks (VPNs) to protect the integrity of the network and also to establish secure business-to-business communications.

You would use Cisco Secure Policy Manager to minimize administrative costs and ensure consistent security policy on your network. This includes the ability to manage your secure network and associated services with a consolidated management system. It supports the different network requirements of your organization that are used to establish a secure connection for your intranets with multiple firewalls and VPN routers.

Cisco Secure Policy Manager Overview

With Cisco Secure Policy Manager (CSPM) you can define, distribute, enforce, and audit your entire network security policies from a central location. You can use CSPM to configure your PIX Firewalls on the boundary of your enterprise network, configure Network Address Translation (NAT), and IP Security (IPSec) based Virtual Private Networks. This allows for easy and simple deployment of your security policy to your PIX Firewalls and your VPN and builds the cornerstone of your security policy.

With CSPM s distributed architecture, using more than one policy enforcement point and its secure remote management allows you to deploy the policy in different environments. If you are administrating a large enterprise network, you can install the policy administrator (the Graphical Users Interface (GUI) used for...

Products & Services
Network Security Services
Network security services determine vulnerability of networks to outside intruders, as well as maintain anti-viral and firewall updates and usage.
Network Firewalls
Network firewalls protect computer networks against unauthorized use or attack. They permit or deny access to private network devices and applications, and represent an important part of an organization's overall security policy. Firewalls may be software applications, hardware devices (such as routers), or a combination of both. They include turnkey products that are relatively easy to install as well as complex, multi-layer installations that require the expertise of a certified network administrator. 
VPN Software
VPN software enables private communications over public computer networks and telecommunications infrastructure. Virtual private networks (VPN) provide network connectivity over long distances, and support network services such as file sharing and video conferencing.
Network Appliances
Network appliances are inexpensive personal computers (PC) or computer boards that provide Internet access and promote network security. They lack many of the features of fully-equipped PCs, however.
Security Software
Security software programs are used to restrict access to data, files and users on a computer or server.

Topics of Interest

Cisco Secure ACS To support your network s increasing amount of network devices that are used to control your network users connections to the Internet, your intranet, and specific devices, you can...

Introduction Network security has become more critical to organizations than ever before. The associated security risks have become very high, with most organizations configuring and deploying...

Summary The products discussed in this chapter can and should be used to manage your network security policy successfully. Each one has advantages, but it s important to use the correct application...

Introduction The frequency and complexity of network security-related incidences has increased dramatically in recent years. Additionally, network infrastructure and services have grown larger and...

In an age when our society relies so heavily on electronic communication, the need for information security is imperative. Given the value and confidential nature of the information that exists on...