Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Discover streamlined firewall management with Cisco Defense Orchestrator, which allows for seamless policy management across both Cisco firewalls and public cloud environments. This cloud-driven tool simplifies complex processes, enabling you to save time while safeguarding your organization against emerging threats. By centralizing your network security policies and device management, you can significantly reduce the hours devoted to repetitive security tasks by as much as 90 percent. Additionally, it allows you to refine your policies to eliminate security vulnerabilities and enhance overall security consistency. With the ability to manage security policies uniformly across Cisco Adaptive Security Appliance (ASA), Cisco Firepower, Meraki MX, and Amazon Web Services (AWS) from a single platform, you can easily analyze policies and configurations across various security devices. This capability not only helps to pinpoint errors and discrepancies but also enables you to rectify them in mere seconds, ultimately bolstering your security posture and improving device performance while ensuring that your infrastructure remains robust against potential threats.
Description
Centralized security management effectively connects the often-disparate IT and SOC departments, facilitating a more cohesive approach to protection and deployment strategies. By adopting this interconnected method, organizations can enhance their visibility and security, simplify their processes, and minimize repetitive tasks in security management, ultimately leading to a more robust defense and a streamlined experience for users. Utilizing visual timelines, this system allows for the identification of threat activity patterns across all user devices and organizational groups, thus closing any potential security gaps. Additionally, it reduces overall security management expenses by freeing up time and lightening the IT workload. With a single console, there's no need for constant switching; you can configure policies, oversee threat and data protection, and conduct in-depth investigations all from one central interface. This comprehensive approach provides a unified perspective on your security status through ongoing monitoring and centralized insight. Furthermore, the system is designed for seamless integration with your SOC, enhancing collaborative efforts in safeguarding your organization.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Active Directory
Apache CloudStack
AriLinc
Chronicle SOAR
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cisco Secure Firewall
Docker
Google Cloud Platform
Integrations
Amazon Web Services (AWS)
Active Directory
Apache CloudStack
AriLinc
Chronicle SOAR
Cisco Adaptive Security Appliance (ASA)
Cisco Meraki
Cisco Secure Firewall
Docker
Google Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$37.75 per user
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cisco
Founded
1984
Country
United States
Website
cisco.com
Vendor Details
Company Name
Trend Micro
Founded
1989
Country
Japan
Website
www.trendmicro.com/en_us/business/technologies/control-manager.html
Product Features
Network Security
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
Product Features
IT Security
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting