Cisco - SAFE - Capability IconsAccess Control Using TrustSecAnalysis/CorrelationAnalysis/Correlation.90Anomaly DetectionAnti-MalwareAnti-SpamAnti-VirusApplication Visibility Control (AVC)Application Visibility Control (AVC).91Client Based SecurityCloud Web SecurityData Loss Prevention (DLP)DatabaseDistributed Denial of Service ProtectionDNSEmail EncryptionEmail SecurityFabric SwitchingFirewallFlow AnalyticsIdentity AuthorizationIdentity Authorization AlternateIntrusion DetectionIntrusion PreventionL2 SwitchingL2/L3 NetworkL2/L3 Network.64L3 SwitchingLoad BalancerLogging/ReportingLogging/Reporting.92Malware SandboxMobile Device Management (MDM)MonitoringMonitoring.93Policy/ConfigurationPolicy/Configuration.94Posture AssessmentRoutingServer Based SecuritySSL/TLS OffloadThreat IntelligenceTime SynchronizationVideoVirtual L2 SwitchingVirtual Private Network(VPN)Virtualized CapabilitiesVirtualized FirewallVoiceVPN ConcentratorVulnerability ManagementVulnerability Management.95Web Application Firewall (WAF)Web Reputation/Filtering/DCSWeb SecurityWireless ConnectionWireless Intrusion Detection System (WIDS)Wireless Intrusion Prevention System (WIPS) |
We use cookies to allow us to automate the access and the data entry functions of our website and to correlate online ordering information for purchases you may make while at the website (if any), tailor our website to your preferences or interests, or customize promotions or marketing. For full details read our cookie policy.