Cisco - SAFE - Capability Icons

Cisco - SAFE - Capability Icons


Access Control Using TrustSec

Access Control Using Trust Sec

Analysis/Correlation

Analysis Correlation

Analysis/Correlation.90

Analysis Correlation 90

Anomaly Detection

Anomaly Detection

Anti-Malware

Anti Malware

Anti-Spam

Anti Spam

Anti-Virus

Anti Virus

Application Visibility Control (AVC)

Application Visibility Control ( AVC)

Application Visibility Control (AVC).91

Application Visibility Control ( AVC) 91

Client Based Security

Client Based Security

Cloud Web Security

Cloud Web Security

Data Loss Prevention (DLP)

Data Loss Prevention ( DLP)

Database

Database

Distributed Denial of Service Protection

Distributed Denial of Service Protection

DNS

DNS

Email Encryption

Email Encryption

Email Security

Email Security

Fabric Switching

Fabric Switching

Firewall

Firewall

Flow Analytics

Flow Analytics

Identity Authorization

Identity Authorization

Identity Authorization Alternate

Identity Authorization Alternate

Intrusion Detection

Intrusion Detection

Intrusion Prevention

Intrusion Prevention

L2 Switching

L2 Switching

L2/L3 Network

L2 L3 Network

L2/L3 Network.64

L2 L3 Network 64

L3 Switching

L3 Switching

Load Balancer

Load Balancer

Logging/Reporting

Logging Reporting

Logging/Reporting.92

Logging Reporting 92

Malware Sandbox

Malware Sandbox

Mobile Device Management (MDM)

Mobile Device Management ( MDM)

Monitoring

Monitoring

Monitoring.93

Monitoring 93

Policy/Configuration

Policy Configuration

Policy/Configuration.94

Policy Configuration 94

Posture Assessment

Posture Assessment

Routing

Routing

Server Based Security

Server Based Security

SSL/TLS Offload

SSL TLS Offload

Threat Intelligence

Threat Intelligence

Time Synchronization

Time Synchronization

Video

Video

Virtual L2 Switching

Virtual L2 Switching

Virtual Private Network(VPN)

Virtual Private Network( VPN)

Virtualized Capabilities

Virtualized Capabilities

Virtualized Firewall

Virtualized Firewall

Voice

Voice

VPN Concentrator

VPN Concentrator

Vulnerability Management

Vulnerability Management

Vulnerability Management.95

Vulnerability Management 95

Web Application Firewall (WAF)

Web Application Firewall ( WAF)

Web Reputation/Filtering/DCS

Web Reputation Filtering DCS

Web Security

Web Security

Wireless Connection

Wireless Connection

Wireless Intrusion Detection System (WIDS)

Wireless Intrusion Detection System ( WIDS)

Wireless Intrusion Prevention System (WIPS)

Wireless Intrusion Prevention System ( WIPS)