Cisco VPN HelpCisco's security solutions for small to medium size businesses offer a comprehensive range of manageable security products and technologies to allow you to protect your entire network environment. Cisco's rich product line of protection and Virtual Private Network solutions features routers, switches, firewalls, intrusion detection systems, and VPN concentrators. Progent's seasoned support engineers includes veteran consultants with Cisco's CCIE and CCNP certification who can help your company to select and deploy Virtual Private Network and protection solutions that align optimally with your environment.

Virtual Private Networks
Cisco provides multiple alternatives for implementing a Virtual Private Network solution, allowing you to select the approach that most closely fits your business requirements. You can set up both remote access and site-to-site Virtual Private Networks with IOS Software, with software and AIM hardware encryption boards, or with physical units, such as a VPN concentrator, router, ASA 5500-X firewalls with Firepower, or dedicated Virtual Private Network server for dial-up functions. All Cisco VPN approaches are simple to integrate and administer and offer the flexibility to grow along with future business needs.

Products Associated with Cisco's Protection Solution
Cisco offers a full line of products designed for preventing data theft, virus and worm outbreaks, DDoS attacks, and other threats to your network. Categories and security products include:

Secure Access

  • VPN device (Cisco Virtual Private Network concentrators and clients): Dedicated hardware or software device for configuring and managing VPNs
  • Catalyst and Cisco Nexus Switch controlled: Identity-focused functions designed into switches
  • Router based: VPN support designed into routers
  • Expanded perimeter security
  • Cisco PIX or ASA Firewall appliance: Dedicated silicon or software mechanism to permit or deny connectivity to the network or applications
  • Router controlled: Firewall functions built into routers
Penetration Defense
  • Network-attached device (Cisco Security Agent): Devoted hardware or software mechanism for detecting penetrations internal to the organization's network
  • Host-based software (Cisco Security Agent): Devoted physical unit or program for finding, remediating, and reporting intrusions on hosts
  • Cisco Firewall sensor: Sensor built into a firewall to sense and document penetrations at the network perimeter
  • Cisco Catalyst sensor: Sensing capability built into a Catalyst switch to detect and report penetrations at the switch
  • Cisco Router sensor: Detector built into a switch to detect and report penetrations at the router
Identity Services
  • Access Control Server using RADIUS and TACACS authentication: Central access management mechanism for user validation, permission, and accounting from an graphical Web interface
Safe Device Management and Policy
  • Cisco Security Manager: Scalable mechanism to provision configuration and policies for Cisco firewalls, Virtual Private Networks, and Intrusion Prevention Systems

How Progent's Consultants Can Assist Your Company with Cisco Security Technology
Cisco CCIE Network Security ExpertsProgent can give you access to a Cisco Certified Internetwork Expert (CCIE) or Cisco Certified Network Professional (CCNP) to assist you to select, deploy, and support Cisco security technology. Progent's CISM and CISSP security consultants can advise you about how to build protection into your business processes. Progent can help you to create a documented security strategy to establish clear policies, install scanning and auditing software, create and install a secure connectivity infrastructure that incorporates products from a variety of vendors, offer MS ISA 2006 Server consulting services and Microsoft Forefront TMG integration, and advise you about steps to maximize the protection of your network. Progent's security expertise is available to help you configure a firewall, design safe remote connectivity to email and corporate information, and implement or troubleshoot VPNs.

Integration of Cisco and Third-party Security Technology
Progent offers expertise in firewall and VPN products from all major vendors and can help you integrate Cisco technology with additional security solutions to help you build a cost-effective network infrastructure that provides a level of security and flexibility appropriate for your business. Third-party firewall and VPN support services available from Progent include:

To find out additional information concerning Progent's professional assistance for Cisco solutions, choose a topic:

In order to contact Progent about engineering support for Cisco networking, phone 1-800-993-9400 or go to Contact Progent.

© 2002- 2018 Progent Corporation. All rights reserved.

More topics of interest: