February 11, 2005 4:01 PM PST

Cisco readies security product blitz

Cisco is preparing to announce a major overhaul of its security portfolio next week, with upgrades to several of its existing products.

On Tuesday, at the RSA Conference in San Francisco, the company plans to announce the largest set of upgrades to its security products in three years, sources say.

The new enhancements should help the company catch up to leading vendors, focusing on such areas as secure socket layer virtual private networks and intrusion prevention. The upgrades should also help Cisco fulfill its promise of a "self-defending" network, beefing up security on IP telephony and other applications, while also extending network protection to the desktop. And to help corporate customers keep track of new threats, sources say, Cisco is also improving its management products.

Cisco declined to comment on the specifics of its announcements next week, but has scheduled a press briefing at the security show.

Security is an important market for Cisco. It is one of six new areas Cisco has been focusing on to help expand its overall business. So far, security has been proven to be a good investment for the company. Last quarter, revenues from security products were up 30 percent from a year earlier.

Cisco's strength in security has come not from having the best products in every category, but from having a wide breadth of offerings, analysts say. Next week's announcements should help level the playing field against the pure security vendors while cementing Cisco's dominance as a network-level security provider, they add.

"Cisco isn't known as a security company," said Zeus Kerravala, an analyst with the Yankee Group. "They sell security as part of a network strategy. But it's clear they are serious about providing more security in the network. They are definitely the security leader among networking vendors."

Nitty gritty
One of the more important upgrades to be announced next week is on Cisco's SSL VPN product, sources say. SSL VPNs allow users to remotely connect to the corporate network using a standard Web browser. Currently, Cisco's product only supports Web-based applications. The new version will allow users to access some non-Web applications, too, such as e-mail residing on a corporate mail server.

Such upgrades are an important addition to the product, since they will allow remote workers to use their Web browsers to connect to the corporate network rather than a difficult-to-manage IPsec client that must be pre-installed. SSL VPN competitors, such as Juniper Networks, through its Netscreen acquisition, and Aventail have been supporting non-Web applications in their products for some time.

Cisco has also beefed up its intrusion detection product by adding prevention software that can correlate possible symptoms of a worm or virus attack to determine whether certain traffic should be blocked. The new software will put Cisco's product on par with those from traditional security companies such as McAfee, say experts.

Cisco also plans to announce that it has added security features to its PIX Firewall that will make it more friendly to IP telephony protocols. The Cisco firewall has not been able to identify some of these protocols, leaving voice over IP traffic vulnerable to attacks.

To give customers more choice with respect to how they deploy this technology, Cisco is updating its Internetwork Operating Software (IOS) so that many of these new security features can also run on its switches and routers, sources report.

The company has also added more security features to its desktop security agent. This software is a big component of Cisco's Network Admission Control architecture, designed to prevent worms and viruses from entering the network. The security agent sits on individual workstations, identifying malicious code in communications between network software systems. When it detects a virus or worm, it denies access to the PC. Cisco has supposedly enhanced this software by adding new anti-spyware protection meant to identify and remove malicious programs before they jump from a PC to the network.

Cisco also plans to introduce a new blade that fits into its Catalyst switches to help prevent denial-of-service attacks on Web servers.

Finally, Cisco will announce improvements to its network management tools using some technology that it recently acquired from Protego. This technology, acquired in December, aggregates and correlates information about security threats, so that network managers can detect attacks.


Join the conversation!
Add your comment
Cisco's stuff is still too expensive...
...buy cheaper and get the same functionality. Propeller-head toys. It's like the insecure guy buying a Ferrari to make up for his lack of...
Posted by ordaj (338 comments )
Reply Link Flag
Cisco feature request.
Cisco keeps buying all these companies but is not doing much to update its existing product line.
Eg, there is still no | ability for the older 2948's, it annoys me to have to copy the entire running config to notepad to do a find.

I would like an advanced debug for routing protocols, if there is an OSPF announcement that dies 2 hops from the source, it would help to be able to look at the actual packet rather than combing through running configs looking for something wrong. I have seen some very touchy things take out OSPF for an entire router (rather than just the specific incorrect route).

Also, if there is a denial of service being sent over a (regular) router, all you can really see is the spike in traffic over the interface, it would be nice to have better tools (kinda like cache flow) to gather info about the type of traffic being sent to more quickly respond with an access list or route map.

Cisco's SOHO and low end networking products are in pretty sad shape when it comes to price/performance too.

My little SOHO cisco router at home has 2 10baseT ports, turning SPI cuts the throughput from my measly little cable modem in half.

Cisco still sells dual 10/100baseT routers for $1,000+, and the only way to use it is with a switch or buy additional modules for a couple extra ports.

A 2 port "router on a stick" for $1000, when the SOHO companies (Linksys) are selling 8 Port 10/100 routers with much better throughput for $80.

I am not a network engineer though, just making observations.

I just think Cisco should be more concerned with fixing its core product line and less concerned with spending billions on buzzword expansion programs.
Posted by Dachi (797 comments )
Reply Link Flag

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot



RSS Feeds

Add headlines from CNET News to your homepage or feedreader.