Related Products
|
||||||
About
Experience effective firewall management made simple. Cisco Defense Orchestrator helps you consistently manage policies across Cisco firewalls and public cloud infrastructure. It is a cloud-based application that cuts through complexity to save you time and keep your organization protected against the latest threats. Centralize network security policy and device management. Reduce time spent on repetitive security management tasks by up to 90 percent. Clean up policies to close security gaps and achieve better, more consistent security. Manage security policy consistently across Cisco Adaptive Security Appliance (ASA), Cisco Firepower, Meraki MX, and Amazon Web Services (AWS) from a centralized console. Analyze policies and objects across security devices to identify errors and inconsistencies. Correct them in seconds to improve your security posture and device performance.
|
About
With the pervasiveness of mobile devices, the Internet of Things, and 5G, your network has to be ready for what’s next. BIG-IP Policy Enforcement Manager (PEM) is a policy enforcement function that gives you the network flexibility and control you need while delivering a reliable customer experience. Implement services based on subscriber level, according to plan, location, and device. In addition to recognizing who should access what and when, you’ll be able to gather data with network visibility. Create relevant plan tiers and offer new, over-the-top services based on user behavior patterns, then use BIG-IP PEM to enforce those plans and services. Ultimately, your customers need your network to be fast, reliable, and available. Through smarter traffic steering, more sophisticated policy management, and improvements in network functions, BIG-IP PEM leads to happier customers. And because happy customers are stickier customers, you’ll see reduced churn and better revenue.
|
About
Maintaining a strong security and compliance posture requires comprehensive visibility across your entire network. See how you can gain real-time visibility and control over your complex hybrid network infrastructure, policies and risk. Security Manager provides real-time visibility, control, and management for network security devices across hybrid cloud environments from a single pane of glass. Security Manager provides automated compliance assessment capabilities that help you validate configuration requirements and alert you when violations occur. Whether you need audit reports ready out-of-the-box or customizable reports tailored to your unique requirements, Security Manager reduces the time you spend configuring policies and gives you the confidence that you’re ready to meet your regulatory or internal compliance audit demands.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
IT security teams searching for a powerful Network Security Policy Management solution
|
Audience
IT departments interested in a solution to improve network performance through effective policy management
|
Audience
IT security teams
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationCisco
Founded: 1984
United States
cisco.com
|
Company InformationF5
Founded: 1996
United States
www.f5.com/products/big-ip-services/policy-enforcement-manager
|
Company InformationFireMon
Founded: 2004
United States
www.firemon.com
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
||||||
|
|
||||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
||||
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
||||||
Integrations
Amazon Web Services (AWS)
Axonius
Azure Marketplace
BackBox
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cisco Secure Firewall
Google Cloud Platform
InsightCloudSec
Microsoft Azure
|
Integrations
Amazon Web Services (AWS)
Axonius
Azure Marketplace
BackBox
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cisco Secure Firewall
Google Cloud Platform
InsightCloudSec
Microsoft Azure
|
Integrations
Amazon Web Services (AWS)
Axonius
Azure Marketplace
BackBox
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cisco Secure Firewall
Google Cloud Platform
InsightCloudSec
Microsoft Azure
|
||||
|
|
|
|