Cisco Cyber Threat Defense for the Data Center Solution

A Cisco Validated Design

Last Updated: March 3, 2014

Introduction to Advanced Threat Defense

In today's evolving threat landscape, enterprises face sophisticated attacks like Advanced Persistent Threats (APTs) that bypass traditional perimeter security. The data center, housing critical information, requires robust defense mechanisms to detect and mitigate these internal threats.

Solution Overview

The Cisco Cyber Threat Defense Solution for the Data Center provides proactive threat detection capabilities by offering deep visibility into network traffic. It leverages Cisco networking technology and Lancope's StealthWatch System to enable security operators to understand network activity, identify suspicious patterns, and respond effectively to potential breaches.

Key Technologies and Components

This solution integrates core Cisco technologies with Lancope's advanced security monitoring tools. Key components include:

Purpose and Benefits

The primary goal is to enhance security posture within the data center by providing comprehensive visibility and context. This allows for the detection of various threats, including botnet command and control, network reconnaissance, malware spread, data loss events, and denial-of-service attacks, thereby reducing vulnerability windows and empowering security operations.

Further Information

This document serves as a Cisco Validated Design, offering guidance on the architecture, design, and implementation of the Cyber Threat Defense Solution for the Data Center. For detailed deployment and configuration, refer to the Cisco Cyber Threat Defense Solution Cisco Validated Design Guide.

Visit Cisco.com/go/designzone for more Cisco Validated Design resources.

PDF preview unavailable. Download the PDF instead.

sea ctd Acrobat Distiller 9.5.5 (Windows); modified using iText 2.1.7 by 1T3XT FrameMaker 9.0

Related Documents

Preview Oetker Daten und Informationsverarbeitung Enhances Data Center Hosting with Cisco UCS
Case study detailing how Oetker Daten und Informationsverarbeitung (OEDIV) improved IT team productivity by 30% and reduced provisioning times by 40% by implementing Cisco Unified Computing System (UCS) and Cisco Nexus switching, leading to enhanced hosting capabilities and reliability.
Preview Cisco Nexus Data Broker Configuration Guide, Release 3.1
This guide provides comprehensive instructions for configuring and managing the Cisco Nexus Data Broker software, including installation, setup, traffic aggregation, and system management. It covers various Cisco Nexus switch models and deployment modes.
Preview Cisco Nexus 3000 Series NX-OS Release Notes 7.0(3)I4(1) - Features, Bugs, and Limitations
Comprehensive release notes for Cisco Nexus 3000 and 3100 Series switches running NX-OS Release 7.0(3)I4(1). This document details new features, system requirements, hardware support, known bugs, upgrade procedures, and limitations.
Preview Configuring sFlow on Cisco NX-OS Devices
A comprehensive guide to configuring sFlow (Sampled Flow) on Cisco NX-OS network devices, covering prerequisites, guidelines, default settings, and step-by-step configuration procedures for traffic monitoring.
Preview Cisco Switch Guide: Comprehensive Overview of LAN Switching Solutions
An overview of Cisco's extensive LAN switch portfolio, detailing modular, fixed-configuration, blade, and virtual switches for campus, branch, and data center networks. Highlights scalability, intelligence, and advanced features.
Preview Cisco NX-OS SPAN Configuration Guide
A comprehensive guide to configuring Switched Port Analyzer (SPAN) sessions on Cisco NX-OS devices, covering sources, destinations, limitations, and configuration examples for various Cisco Nexus platforms.
Preview Cisco Nexus 9000 Series FPGA/EPLD Upgrade Release Notes, Release 9.2(4)
This document provides release notes for Cisco Nexus 9000 Series switches, detailing FPGA/EPLD image upgrades. It covers essential information on switch requirements, available images, download and installation procedures, and verification steps, including remediation for the Secure Boot Hardware Tampering vulnerability.
Preview Cisco Identity Services Engine (ISE) v2.6: Common Criteria Operational User Guidance
This document provides comprehensive operational user guidance and preparative procedures for Cisco Identity Services Engine (ISE) version 2.6, focusing on its Common Criteria evaluated configuration, installation, and administration for network security professionals.