Actifio
Alcatel-Lucent Enterprise
AlgoSec
AVAYA
Contact Center Solutions
Networking Solutions
Unified Communications and Collaboration
Barracuda
BMC
Check Point
Cisco
Digital Guardian
Firetide
Forcepoint
Infortrend
All Flash Unified Storage
Storage Management Software
Storage Server
SAN Storage
High Availability Unified Storage (NAS/SAN)
Nearline Unified Storage (NAS/SAN)
NAS Storage
Expansion Enclosure / JBOD
Kodak Alaris
MacroSAN
Malwarebytes
Micro Focus Net IQ
Nuage Networks
Progress
Radware
Sangfor
Savvius
Solarwinds MSP
StorageCraft
Tackthis
All Products

Overview
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. At Cisco customers come first and an integral part of our DNA is creating long-lasting customer partnerships and working with them to identify their needs and provide solutions that support their success.
  • Security Management

    Centralized Management and Visibility

    Managing network security solutions is often challenging. Accomplishing this in the changing landscape of mobile workers, virtual data centers, and cloud computing-based services adds more complexity.

    Managing network security solutions is often challenging. Accomplishing this in the changing landscape of mobile workers, virtual data centers, and cloud computing-based services adds more complexity.

    To address these challenges, Cisco offers centralized operational tools, such as enterprise-grade Cisco Security Manager, to simplify and help you manage your entire Cisco network security deployment.

    In addition, Cisco partnered with best-in-class technology vendors to deliver Security Information and Event Management (SIEM) systems that have been pre-tested and validated with Cisco security products.

    This variety of management options give you the flexibility to choose the network security management solutions best suited to your environment and business needs.

    Explore and choose from these Cisco and partner security offerings to find the products and services that meet your requirements.
  • Cloud Security

    Protect users, data, applications, and devices wherever they are.

    Cisco Umbrella provides the first line of defense against threats on the Internet, wherever users go. CloudLock, a cloud access security broker, protects against compromised accounts, data breaches, and malware. Block threats earlier.

    • Stop malware before it reaches your network or endpoints. Reduce the time spent remediating infections.
    • 'Extend protection Remove blind spots. Protect users anywhere they go, anywhere they access the Internet.
    • Secure users, data, apps Protect users, data, and apps in the cloud against compromised accounts, malware, and data breaches.
    • Enable compliance.
    • Enable secure cloud use
    • Improve security with no impact on end-user productivity. 
  • Cisco FirePOWER next-generation intrusion prevention ...

    Threat Protection Without Compromise If you need network security appliances to support low to mid-range network throughput requirements with multi-layered threat protection and a low total cost of ownership, Cisco has the answer. Cisco FirePOWER XXXX Series Appliances deliver industry-best threat protection as the base platform for the Cisco FirePOWER next-generation intrusion prevention system (NGIPS) solution.

    The modern network is diverse, resulting in a wide variety of throughput, connectivity, and security requirements within a single organization. Data center constraints on space, power, and cooling just add to your challenges of finding the right network security device. Threat protection can be expanded with optional subscription licenses to provide Advanced Malware Protection (AMP) and application visibility and control.

    The modern network is diverse, resulting in a wide variety of throughput, connectivity, and security requirements within a single organization. Data center constraints on space, power, and cooling just add to your challenges of finding the right network security device. Threat protection can be expanded with optional subscription licenses to provide Advanced Malware Protection (AMP) and application visibility and control.

    Solid state storage
    Superior performance and reliability due to no moving parts instead of rotational media such as hard disk drives (HDDs).
    Integrated lights-out management
    Provides the ability to remotely monitor and manage systems without having to be physically near the appliance.
    LCD display and control panel
    Enables easy system configuration and access to important system information (CPU use, RAM use, IP address, etc.).
    Simple Network Management Protocol monitoring
    Monitor systems by automatically generating and sending alerts (intrusion, discovery, malware, correlation, connection events, health status change).
    Integrated recovery drive
    Recover the system to “as shipped” condition in case of a problem without the need for external drives/USB keys/downloading, etc.
    Programmable fail-open interfaces
    Flexibility of deployment models for either passive or in-line modes. Network interfaces can automatically fail-open to allow traffic to continue to pass in the event of failure or triggered event.
    Redundant power supplies
    Provides enterprise-class reliability and system uptime in case of power module failure.
  • Cisco Web Security Products

    The Cisco WSA was one of the first secure web gateways to combine leading protections to help organizations address the growing challenges of securing and controlling web traffic.

    Nasty advanced threats can hide in plain sight on legitimate websites or in enticing pop-up ads. Employees or guests may put your organization at risk by clicking where they shouldn’t. Cisco Web Security Appliance (WSA), powered by Cisco Talos, protects you by automatically blocking risky sites and testing unknown sites before allowing users to link to them, helping with compliance.

    Talos Security Intelligence
    Receive fast and comprehensive web protection backed by the largest threat detection network in the world, with the broadest visibility and largest footprint, including:
    ●  100 TB of security intelligence daily
    ●  1.6 million deployed security devices, including firewall, IPS, web, and email appliances
    ●  150 million endpoints
    ●  13 billion web requests per day
    ●  35% of the world’s enterprise email traffic
    Providing a 24x7 view into global traffic activity to analyze anomalies, uncover new threats, and monitor traffic trends. Talos prevents zero-hour attacks by continually generating new rules that feed updates to the WSA every three to five minutes, enabling industry-leading threat defense hours and even days ahead of competitors.

    Cisco Web Usage Controls
    Combine traditional URL filtering with dynamic content analysis to mitigate compliance, liability, and productivity risks. Cisco’s continuously updated URL filtering database of over 50 million blocked sites provides exceptional coverage for known websites, and the Dynamic Content Analysis (DCA) engine accurately identifies 90 percent of unknown URLs in real time; it scans text, scores the text for relevancy, calculates model document proximity, and returns the closest category match. Administrators can also select specific categories for intelligent HTTPS inspection.
    Advanced Malware Protection
    Advanced Malware Protection (AMP) is an additionally licensed feature available to all Cisco WSA customers. AMP is a comprehensive malware-defeating solution that enables malware detection and blocking, continuous analysis, and retrospective alerting. It takes advantage of the vast cloud security intelligence networks of both Cisco and Sourcefire® technology. AMP augments the malware detection and blocking capabilities already offered in the Cisco WSA with enhanced file reputation capabilities, detailed file-behavior reporting, continuous file analysis, and retrospective verdict alerting. The Cisco AMP Threat Grid delivers malware protection through an on-premises appliance for organizations that have compliance or policy restrictions on submitting malware samples to the cloud. The Layer 4 Traffic Monitor continuously scans activity, detecting and blocking spyware “phone-home” communications. By tracking all network applications, the Layer 4 Traffic Monitor effectively stops malware that attempts to bypass classic web security solutions. It dynamically adds IP addresses of known malware domains to its list of malicious entities to block.
    Cognitive Threat Analytics
    Cisco Cognitive Threat Analytics is a cloud-based solution that reduces time to discovery of threats operating inside the network. It addresses gaps in perimeter-based defenses by identifying the symptoms of a malware infection or data breach using behavioral analysis and anomaly detection. Take advantage of Cisco Cognitive Threat Analytics with a simple add-on license to your Web Security solution. Reduce complexity while gaining superior protection that evolves with your changing threat landscape.
    Application Visibility and Control (AVC)
    Easily control the use of hundreds of Web 2.0 applications and 150,000+ micro-applications. Granular policy control allows administrators to permit the use of applications such as Dropbox or Facebook while blocking users from activities such as uploading documents or clicking the “Like” button. The WSA supports visibility of activity across an entire network. New: Customers can deploy customized bandwidth and time quotas per user, per group, and per policy.
    Data Loss Prevention (DLP)
    Prevent confidential data from leaving the network by creating context-based rules for basic DLP. The Cisco WSA also uses Internet Content Adaptation Protocol (ICAP) to integrate with third-party DLP solutions for deep content inspection and enforcement of DLP policies. The Cisco WSA also supports Secure ICAP to encrypt the traffic exchanged between WSA and third-party DLP solutions.
    Roaming-User Protection
    The Cisco WSA protects roaming users by integrating with the Cisco AnyConnect® Secure Mobility Client, which provides web security to remote clients by initiating a VPN tunnel that redirects traffic back to the on-premises solution. Cisco AnyConnect technology analyzes traffic in real time prior to permitting access.
    The Cisco WSA is also integrated with Cisco Identity Services Engine (ISE). With this exciting enhancement, customers can now take advantage of the power of Cisco ISE for Cisco WSA upon request. Cisco ISE integration allows admins to create policy on the Cisco WSA based on profile or membership information gathered by Cisco ISE through its single sign-on process.
    Centralized Management and Reporting
    Receive actionable insights across threats, data, and applications. The Cisco WSA provides an easy-to-use, centralized management tool to control operations, manage policies, and view reports.
    The Cisco M-Series Content Security Management Appliance provides central management and reporting across multiple appliances and multiple locations, including virtual instances.
    Cisco® Web Security Reporting Application is a reporting solution that rapidly indexes and analyzes logs produced by Cisco Web Security Appliances (WSA) and Cisco Cloud Web Security (CWS). This tool provides scalable reporting for customers with high traffic and storage needs. It allows reporting administrators to gather detailed insight into web usage and malware threats.
    Flexible Deployment
    The Cisco WSAV offers all the same features as the Cisco WSA, with the added convenience and cost savings of a virtual deployment model, including instant self-service provisioning. With a Cisco WSAV license, businesses can deploy web security virtual gateways without being connected to the Internet, by applying the license to a new Cisco WSAV virtual image file stored locally. Pristine virtual image files can be cloned, if needed, to deploy several web security gateways immediately.
    Run hardware and virtual machines in the same deployment. Small branch offices or remote locations can have the same protection the Cisco WSA provides without having to install and support hardware at that location. Custom deployment is easily managed with the Cisco M-Series Content Security Management Appliance.
  • Cisco Email Security protects

    Defend your business against ransomware, phishing, and other sophisticated attacks with Advanced Malware Protection.

    Spam and malware are part of a complex email security picture that includes inbound threats and outbound risks. The all-in-one Cisco Email Security Appliance offers simple,

    Outbreak filters
    Outbreak filters defend against emerging threats and blended attacks. They can issue rules on any combination of six parameters, including file type, file name, file size, and URLs in a message. As Talos learns more about an outbreak, it can modify rules and release messages from quarantine accordingly. Outbreak filters can also rewrite URLs linked in suspicious messages. When clicked, the new URLs redirect the recipient through the Cisco Web Security proxy. The website content is then actively scanned, and outbreak filters will display a block screen to the user if the site contains malware.
    Web interaction tracking
    A fully integrated solution allows IT administrators to track the end users who click URLs that have been rewritten by the Email Security Appliance. Reports show:
    ●  Top users who clicked malicious URLs
    ●  The top malicious URLs clicked by end users
    ●  Date and time, rewrite reason, and action taken on the URLs
    The admin can also trace back to all the messages containing the particular URL.
    Outbound message control
    Email Security Appliances control outbound messages through DLP, email encryption. This control helps ensure that your most important messages comply with industry standards and are protected in transit. Additionally, outbound antispam and antivirus scanning, along with outbound rate limiting, can be used to keep compromised machines or accounts from getting your company on email blacklists. New: The Email Security Appliance now supports Secure/Multipurpose Internet Mail Extensions (S/MIME) encryption and signing in addition to Transport Layer Security (TLS).
    Forged Email Detection
    Forged Email Detection protects against spoofing attacks, which focus on executives also known as high-value targets. Forged Email Detection helps you block these customized attacks with a dedicated content filter. This feature provides detailed logs on all attempts and actions taken.
    Excellent performance
    The security appliances quickly block new inbound email viruses. Domain delivery queues keep undeliverable emails from causing a backup of critical deliveries to other domains. This solution offers an industry-leading spam catch rate greater than 99.9 percent and false positive rate of less than 1 in 1 million.
    DLP
    You can use one or more predefined policies (there are more than 100 to choose from) to help prevent confidential data from leaving the network. If you prefer, you can use parts of those predefined policies to create your own custom policies. The built-in RSA email DLP engine uses pretuned data structures along with your own optional data points such as words, phrases, dictionaries, and regular expressions to quickly create accurate policies with few false positives. The DLP engine scores violations by severity, so you can apply different levels of remediation to fit your needs.
    Low cost
    A small footprint, an easy setup, and the automated management of updates mean savings for the life of your email security solution. Cisco’s solution has one of the lowest TCOs available.
    Flexible deployment
    All Cisco email security solutions share a simple approach to implementation. The system setup wizard can handle even complex environments and will have you up and protected in just minutes, making you safer, fast. Licensing is user based, not device based, so you can apply it per user instead of per device to provide inbound as well as outbound email gateway protection at no additional cost. This capability lets you scan outbound messages with antispam and antivirus engines to fully support your business needs.
    The virtual appliance offers all the same features as the physical appliance, with the added convenience and cost savings of a virtual deployment model. It offers instant self-service provisioning. With a Cisco Email Security Virtual Appliance license, you can deploy email security gateways in your network without Internet connections. This license has purchased software licenses embedded in it. You can apply licenses at any time to a new virtual image file stored locally. Pristine virtual image files can be cloned if needed, giving you the ability to deploy several email security gateways immediately.
    You can run hardware and virtual email security solutions in the same deployment. So your small branch offices or remote locations can have the same protection you get at headquarters without the need to install and support hardware at those locations. You can easily manage custom deployments with the
    Cisco Content Security Management Appliance or Cisco Content Security Management Virtual Appliance.
    Solutions that fit your business
    Cisco Cloud Email Security is a comprehensive and highly reliable service with software, computing power, and support. The co-managed user interface is identical to that of the Cisco physical and virtual email security appliances. You therefore get outstanding protection with little administrative overhead and no onsite hardware to monitor and manage. Microsoft Office 365 customers can also get the same industry-leading protection with Cloud Email Security for Office 365. This solution is easy to deploy, and you can count on guaranteed reliability through multiple resilient data centers for the highest levels of service availability and data protection.
    The hybrid solution gives you advanced outbound control of sensitive messages on site while helping you take advantage of the cost-effective convenience of the cloud.
    You can also change the number of on-premises versus cloud users at any time throughout the term of your contract, assuming the total number of users does not change. This allows for deployment flexibility as your organization’s needs change.
    On-premises hardware and virtual appliances come ready to plug in. You can choose the model that works best for your environment to protect inbound and outbound messages at your gateway.
  • Cisco® ASA with FirePOWER Services

    Next-generation firewall (NGFW) designed for a new era of threat and advanced malware protection. 

    Cisco ASA with FirePOWER Services brings distinctive threat-focused next-generation security services to the Cisco ASA 5500-X Series Next-Generation Firewalls and Cisco ASA 5585-X Adaptive Security Appliance firewall products.

    • Cisco ASA is the world’s most widely deployed, enterprise-class stateful firewall with remote access VPN and advanced clustering for highly secure, high-performance access and high availability to help ensure business continuity.
    • Granular Application Visibility and Control (AVC) supports more than 3,000 application-layer and risk-based controls that can invoke tailored intrusion prevention system (IPS) threat detection policies to optimize security effectiveness.
    • The industry-leading Cisco ASA with FirePOWER next-generation IPS (NGIPS) provides highly effective threat prevention and full contextual awareness of users, infrastructure, applications, and content to detect multivector threats and automate defense response.
    • Reputation- and category-based URL filtering offers comprehensive alerting and control over suspect web traffic and enforces policies on hundreds of millions of URLs in more than 80 categories.
    • Advanced Malware Protection provides industry-leading breach detection effectiveness, a low TCO, and superior protection value that helps you discover, understand, and stop malware and emerging threats missed by other security layers.

ACA PACIFIC GROUP

STAY CONNECTED

Loading
Loading. Please wait...