© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.

Slides:



Advertisements
Similar presentations
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Advertisements

SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Migrating Customers to the Cisco ASA 5500 Series.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Security in Real Business
LittleOrange Internet Security an Endpoint Security Appliance.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Norman SecureSurf Protect your users when surfing the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 MAP Value Proposition.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
[Name / Title] [Date] Effective Threat Protection Strategies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Enterprise Network Security Accessing the WAN – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Classification 10/3/2015 Worry-Free Business Security 5.0.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Why and How to Manage your infrastructure lifecycle? David Baudrez Vertical.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Institutional affiliation Date.  Security is very important as it keeps your secret from other know.  An insecure network exposes a business to various.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introduction to IOS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Cisco ASA 5500 Series Transition and Migration Guide for Distributors
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Instructor Materials Chapter 7 Network Security
Threat Management Gateway
Firewalls.
Call AVG Antivirus Support | Fix Your PC
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Cloud Security for Endpoints
(With Hybrid Network Support)
Hosted Security.
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 The Cisco ASA 5500 Series Content Security Edition (Content Security and Control Security Services Module (CSC SSM) – Formerly Anti-X Edition) High-Quality Malware Protection Offers antivirus and antispyware based on Trend Micro’s time-tested and market- proven technology Advanced Content Control Offers URL filtering and blocking, antispam, file blocking, and content filtering Unified Security Provides everything you need for small office, remote branch office, and kiosks in a single device Enterprise-Grade Firewall Built on industry’s most trusted and deployed Cisco® PIX® Firewall technology for solid access and policy control License renewal required to receive latest threat updates and maintain full protection capabilities Supported by a new channel-directed sales process Renewal tools, templates, and reports to facilitate maximum renewal and related sales success

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 Why Renew?  Unwanted and dangerous Internet content as well as viruses, spyware, and other malware can: – Expose the enterprise to information theft and legal liability – Make individuals vulnerable to identity theft – Reduce employee productivity – Compromise corporate resources – Result in costly isolation and clean-up efforts – Waste network bandwidth and storage  Systems with expired licenses stop receiving threat updates – Rapidly become out of date Unaware of latest threats Ineffective at protecting against them – The more out-of-date, the greater the danger

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Renewal as a Sales Opportunity  Work with your customers to help them understand the need for license renewal.  Use the opportunity to: –Up-sell the Cisco® ASA 5500 Series Adaptive Security Appliance Content Security Edition components Plus licenses User upgrades Multi-year –Cross-sell other Cisco security products Cisco ASA 5500 Series Adaptive Security Appliances Cisco Intrusion Prevention Systems (Cisco IPS 4200 Series Sensors) Cisco Integrated Services Routers Cisco Security Manager Cisco Security Monitoring, Analysis, and Response System (Cisco Security MARS) And much more – refer to Cisco’s Security Product PortfolioCisco’s Security Product Portfolio –Look for potential opportunities for Trend Micro product synergies Support for Trend Micro Damage Cleanup Service (DCS) Visit

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Renewal Mechanics  Renewal process –Customer selects from orderable Cisco® renewal part numbers (various combinations of Base, Plus, user count and multi-year licenses available) –Customer places order with Cisco partner –Partner fulfills order, sends Product Authorization Key (PAK) to customer –Customer registers with Cisco Licensing using PAK number –CSC product license(s) is (are) automatically updated to new expiration date –No need to enter activation keys or codes in product itself

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Renewal Product Number Secret Decoder Ring ASA – CSC XX – XXX XX – XX Fixed: Designate product 10 for SSM-10 module 20 for SSM-20 module 50 Users 100 Users 250 Users 500 Users 750 Users 1000 Users UUser license only PPlus license only UP User and Plus licenses 1Y 1-year 2Y 2-year Example: ASA-CSC10-250UP-1Y is a renewal for: SSM-10, 250 users, and Plus licenses for one year

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 SSM-10 Renewal Product Numbers

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 SSM-20 Renewal Product Numbers