Skip to main content

Cisco Capability Entities

Access Control Using TrustSec​

Analysis Correlation​

Anomaly Detection​

Anti-Malware​

Anti-Spam​

Anti-Virus​

Application​

Application Optimization​

Application Visibility Control​

Block​

Business Application​

CASB​

Client-Based Security​

Cloud Web Security​

Conference Bridge​

Data Loss Prevention​

Database​

Database 2​

Device Profiling​

Device Trajectory​

Disk Encryption​

Distributed Denial of Service Protection​

DNS​

DNS Security​

Email Encryption​

Email Security​

Fabric Switching​

Fabric Switching 2​

File Trajectory​

Firewall​

Flow Analytics​

Host Context​

Identity Authorization​

Identity Authorization (alternative)​

Infrastructure Redundancy​

Intrusion Detection​

Intrusion Prevention​

L2 L3 Network​

L2 L3 Network (virtual)​

L2 L3 Network 2​

L2 Switching​

L2 Switching 2​

L3 Switching​

L3 Switching 2​

Load Balancer​

Load Balancer 2​

Logging Reporting​

Malware Sandbox​

Micro-Segmentation​

Mobile Device Manager​

Monitoring​

Multi-Factor Identification​

Path Control​

Policy Configuration​

Posture Assessment​

Quality of Service​

Quarantine​

Remediate​

Routing​

Routing 2​

Secure Server​

Server Based Security​

SSL TLS Offload​

Standardized System Images​

Storage​

Storage 2​

Tagging​

Threat Intelligence​

Time Synchronization​

User​

Video​

Video 2​

Virtual Firewall​

Virtual L2 Switching​

Virtual Private Network​

Virtualized Capability​

Voice​

Voice 2​

VPN Concentrator​

Vulnerability Management​

Web Application Firewall​

Web Reputation Filtering DCS​

Web Security​

Wireless Connection​

Wireless Connection 2​

Wireless Intrusion Detection System​

Wireless Intrusion Prevention System​

Wireless Rogue Detection​