• Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
Sunday, April 19, 2026
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io
No Result
View All Result
Converge Digest
No Result
View All Result

Home » Cisco Evolves its Security Strategy Toward Adaptive Threat Defense

Cisco Evolves its Security Strategy Toward Adaptive Threat Defense

February 14, 2005
in Uncategorized
A A

Cisco Systems announced the next phase of its Self-Defending Network security strategy. Earlier phases of its strategy focused on the need for integrated IP security and the network admission control (NAC) initiative.

This next phase, called Adaptive Threat Defense (ATD), aims to further minimize network security risks by dynamically addressing threats at multiple layers, enabling tighter control of network traffic, endpoints, users, and applications. ATD also aims to simplify architectural designs and lower operational costs by combining security features, multilayer intelligence, application protection, network-wide control and threat containment..

Key components of ATD include better coordinated threat mitigation through Anti-X defenses, Application security, and Network control and containment.

  • Anti-X defenses: Prevent and respond to network threats through a combination of traffic and content-oriented security services. Core security enforcement technologies include firewall, intrusion prevention system (IPS), anomaly detection and distributed denial-of-service (DDoS) mitigation fused with application-inspection services such as network anti-virus, anti-spyware, and URL filtering. This brings granular traffic inspection services to key network security enforcement points, thereby containing malicious traffic before it can be propagated across the network.
  • Application security: Provide advanced business-application protection through the use of application-level access controls, application inspection, and enforcement of appropriate application-use policies, web-application control, and transaction privacy.
  • Network control and containment: Network intelligence and the virtualization of security technologies provides the ability to layer sophisticated auditing and correlation capabilities to control and help protect any networked element or service such as Voice over IP (VoIP) with active management and mitigation capabilities.

http://www.cisco.com

Tags: AllPacket Systems
ShareTweetShare
Previous Post

ARRIS Reports Q4 Revenue of $129.5 million

Next Post

Intel Develops Silicon Laser

Staff

Staff

Related Posts

Blueprint: Building wholesale networks with OTN
All

Blueprint: Building wholesale networks with OTN

December 20, 2022
Huawei and Orange achieve 157 Tbps over 120km fiber link

Huawei and Orange achieve 157 Tbps over 120km fiber link

December 20, 2022
Oracle opens cloud region in Chicago
All

Oracle opens cloud region in Chicago

December 20, 2022
BT trials C-RAN in Leeds
All

BT trials C-RAN in Leeds

December 19, 2022
BT to combine Enterprise and Global units to create BT Business

BT to combine Enterprise and Global units to create BT Business

December 19, 2022
euNetworks appoints Stephanie Lynch-Habib to President

euNetworks appoints Stephanie Lynch-Habib to President

December 19, 2022
Next Post

FCC's Broadband PCS Spectrum Auction Raises Over $2 Billion

Please login to join discussion

Categories

  • 5G / 6G / Wi-Fi
  • AI Infrastructure
  • All
  • Automotive Networking
  • Blueprints
  • Clouds and Carriers
  • Data Centers
  • Enterprise
  • Explainer
  • Feature
  • Financials
  • Last Mile / Middle Mile
  • Legal / Regulatory
  • Optical
  • Quantum
  • Research
  • Security
  • Semiconductors
  • Space
  • Start-ups
  • Subsea
  • Sustainability
  • Video
  • Webinars

Archives

Tags

5G All AT&T Australia AWS Blueprint columns BroadbandWireless Broadcom China Ciena Cisco Data Centers Dell'Oro Ericsson FCC Financial Financials Huawei Infinera Intel Japan Juniper Last Mile Last Mille LTE Mergers and Acquisitions Mobile NFV Nokia Optical Packet Systems PacketVoice People Regulatory Satellite SDN Service Providers Silicon Silicon Valley StandardsWatch Storage TTP UK Verizon Wi-Fi
Converge Digest

A private dossier for networking and telecoms

Follow Us

  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

No Result
View All Result
  • Home
  • Events Calendar
  • Blueprint Guidelines
  • Privacy Policy
  • Subscribe to Daily Newsletter
  • NextGenInfra.io

© 2025 Converge Digest - A private dossier for networking and telecoms.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
Go to mobile version