Skip to main content

Cisco Capability Entities

Access Control Using TrustSec

Analysis Correlation

Anomaly Detection

Anti-Malware

Anti-Spam

Anti-Virus

Application

Application Optimization

Application Visibility Control

Block

Business Application

CASB

Client-Based Security

Cloud Web Security

Conference Bridge

Data Loss Prevention

Database

Database 2

Device Profiling

Device Trajectory

Disk Encryption

Distributed Denial of Service Protection

DNS

DNS Security

Email Encryption

Email Security

Fabric Switching

Fabric Switching 2

File Trajectory

Firewall

Flow Analytics

Host Context

Identity Authorization

Identity Authorization (alternative)

Infrastructure Redundancy

Intrusion Detection

Intrusion Prevention

L2 L3 Network

L2 L3 Network (virtual)

L2 L3 Network 2

L2 Switching

L2 Switching 2

L3 Switching

L3 Switching 2

Load Balancer

Load Balancer 2

Logging Reporting

Malware Sandbox

Micro-Segmentation

Mobile Device Manager

Monitoring

Multi-Factor Identification

Path Control

Policy Configuration

Posture Assessment

Quality of Service

Quarantine

Remediate

Routing

Routing 2

Secure Server

Server Based Security

SSL TLS Offload

Standardized System Images

Storage

Storage 2

Tagging

Threat Intelligence

Time Synchronization

User

Video

Video 2

Virtual Firewall

Virtual L2 Switching

Virtual Private Network

Virtualized Capability

Voice

Voice 2

VPN Concentrator

Vulnerability Management

Web Application Firewall

Web Reputation Filtering DCS

Web Security

Wireless Connection

Wireless Connection 2

Wireless Intrusion Detection System

Wireless Intrusion Prevention System

Wireless Rogue Detection