Analysis Of Diferent Features And The Application Of Cisco's Securex Architecture In Secure Environment

Read Complete Research Material

Analysis Of Diferent Features And The Application Of Cisco's Securex Architecture In Secure Environment



In this study, we try to explore the concept of “Future of Network Security” in a holistic context. The main focus of the research is on “Network Security” and its relation with cloud computing. The research also analyzes many aspects of network security and tries to gauge its effect on “Cisco, SecureX, and Security architecture. Finally, the research describes various factors which are responsible for “Network Security” and tries to describe the overall effect of network security on Cisco, SecureX, and Security architecture.

Table Of Contents


Chapter 1: Introduction3

Problem Statement4




Objectives of the study7


Chapter 2: Literature Review9

Chapter 3: Methodology11

Data Collection Techniques11

Scope & Limitations12



Chapter 4: Preliminary Results And Discussion14

Long-Range Consequences14

Chapter 5: Expected outcomes of the project16

Expected Findings And Summary16


The Potential Future Of Network Security provided by Cisco's SecureX Architecture

Chapter 1: Introduction

In an increasingly mobile, borderless world, this construct is becoming significantly less relevant. To address new network and security dynamics, new security architectures need to be much more sophisticated. We need a sophisticated policy language that can be expressed in terms of who, what, where, when, and how. Security needs to be separated from the physical infrastructure underneath it. And it needs to be highly distributed so it can be deployed globally and can be available wherever and whenever the borderless enterprise touches the public Internet. Cisco has developed a bold new architecture to meet the needs of borderless networks, allowing organizations large and small to collaborate easily, and their new workforce to roam freely, with confidence (Midkiff, 2008). This architecture allows for more effective, higher-level policy creation and enforcement. Since it uses a broad array of parameters for policy, it allows for much more effective security and enables situational awareness. Instead of a great many complex firewall rules, security policy can now be based on context, such as “the VP of sales can access the global sales forecast, but if she is seeking access through a smartphone in China using a strange protocol, and meanwhile she already authenticated herself through the main campus in California two hours ago, this connection is invalid” (Spainhower et al, 2008).

Problem Statement

This sort of intelligent policy enforcement uses next-generation scanning elements that are meshed into the new Cisco® SecureX Architecture. Within this new architecture, the next-generation endpoint is able to automatically find the nearest scanning element somewhere in the virtual security fabric and to make a seamless connection. The behavior of a hacker halfway around the world is noted, that information is shared, and traffic from the hacker's servers is blocked because your network now knows that it comes from someone that it cannot trust. Policy is centrally managed, but intelligence is gathered globally, with highly distributed enforcement (Garcia-Luna-Aceves, 2005).


Network integrity is associated with cramped computer preservation: these days it is difficult to separate one from another. All of the electronic lock on the door of the hotel to the mobile and desktop components, attached to the ...
Related Ads