Escolar Documentos
Profissional Documentos
Cultura Documentos
July 2018
This proposal is being provided by a Cisco authorized reseller utilizing a Cisco solution. Certain technical and other
information in this response may have been provided by Cisco; however, nothing herein shall be construed as a quotation
or offer to contract directly with Cisco. The Cisco logos, trademarks and other information provided by Cisco appear in this
response with Cisco’s permission and are proprietary and confidential information of Cisco Systems, Inc. All other
information, including any pricing information, is provided by the Cisco authorized reseller and not by Cisco, and any
relationship resulting from this response will be directly with such reseller and not Cisco.
<Insert Cisco
<<UserName>> ● <<UserPhone>> ● <<UserEmail>> Partner Logo>
Click Here
<PartnerLogo>
<clientLogo>
Template Instructions
Instructions are given in text boxes as demonstrated below.
NOTE TO USER: THIS IS BOILERPLATE CONTENT. YOU WILL NEED TO CUSTOMIZE TO FIT THE
CUSTOMER’S OBJECTIVES AND CHALLENGES. THIS DOCUMENT IS PROVIDED AS IS AND MAY NOT BE
APPROPRIATE FOR ALL SITUATIONS.
RESELLER SHALL BE RESPONSIBLE FOR THE CONTENTS OF THIS DOCUMENT.
1. Perform a manual Find and Replace on information found in << >> including the following fields in
order to populate your custom information:
<<client>>
<<PartnerName>>
<<UserName>>
<<UserPhone>>
<<UserEmail>>
<<UserFirstName>>
2. For every use of <Future Feature. Check with Cisco BU>, be sure to follow-up with the business unit
on whether to include this feature when sending to a customer.
3. Be sure to click on all URLs and verify it they are still current before sending to a customer.
4. Remove all yellow highlights from text within the document:
a. Press Ctrl + A to select all text in the document.
b. On the Home tab, in the Font group, click the arrow next to Text Highlight Color.
c. Select No Color to remove yellow highlight from all text.
5. Insert Partner Logo and Customer Logo in the Header.
6. Delete all text boxes (as appropriate) before submitting to a customer.
7. Select the Table of Contents, press F9 to update or right-click and select Update Field. Then select
one of the following options:
a. Update page numbers only
b. Update entire table
8. Note these best practices:
a. When pasting in text, it is best to select “Keep Text Only” to preserve the formatting of this
document.
b. To add cells to a table, click on the table, and under the Table Tools > Layout box (for Mac
users, select the Tables > Table Layout tab), select one of the insert row or column
options.
c. Utilize the document’s Style formats. They have been preformatted for ease of use.
9. Convert document to PDF before submitting to prevent unwanted changes.
10. Delete the Template Instructions page before submitting to a customer.
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
-i-
<PartnerLogo>
<clientLogo>
Table of Contents
CISCO FIREPOWER NEXT-GENERATION INTRUSION PREVENTION SYSTEM ................................................... 1
OVERVIEW ............................................................................................................................................................ 1
VISIBILITY ............................................................................................................................................................. 3
MANAGEMENT.......................................................................................................................................... 4
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
- ii -
<PartnerLogo>
<clientLogo>
Include extensive coverage of network protocols in order to identify a wider range of attacks
Provide contextual awareness, or information about your network environment that will help better
evaluate intrusion events and blocking decisions
Support content awareness by identifying files and file types as they traverse your network; this is very
important in malware protection
Identify both applications and users to provide granular access control and facilitate faster
investigations
Deploy various methods to address advanced threats, including the ability to identify suspicious
payloads and send it to an integrated device or cloud service to positively identify potential malicious
files
Include actionable threat intelligence on spam, phishing, botnets, malicious websites, web exploit
toolkits, and malware activity
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
-1-
<PartnerLogo>
<clientLogo>
automatically correlating threat information with the vulnerabilities of targeted assets, Cisco is able to
automatically assess each threat and prioritize which intrusion events are impactful and should be
immediately investigated by your security teams. Actionable, prioritized events are valuable in streamlining
operations.
Indications of Compromise (IoCs) provide another method of threat detection for unknown threats. Specific
events from multiple sources are correlated against the affected hosts in order to highlight hosts that are
potentially compromised, enabling your analysts to investigate before severe damage can occur.
After an attack, remediate with speed if a threat does manage to evade your first line of defense. The
proposed solution makes it possible to decrease the time it takes from when an attack has been
successful to when you know about it. It allows you to quickly understand the attack, determine the scope
of the damage, apply easy-to-use blocking techniques to contain the event, and update your rules to watch
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
-2-
<PartnerLogo>
<clientLogo>
for similar attacks. Regardless of which method is used to identify a successful unknown attack, the
proposed solution gives you the ability to track everywhere that malware has gone. Compromises that
would have gone undetected for months can be identified, scoped, contained, and remediated in days or
even hours.
9. Has the NGIPS solution received third-party validation of its security effectiveness?
Response: Cisco has achieved a recommended rating or better from NSS Labs. No other company
has the lasting security effectiveness we do.
Visibility
11. Does the solution offer granular application visibility and control?
Response: Cisco supports more than 4000 commercial application-layer and risk-based controls. For
example, you can make popular social media applications read-only to comply with regulations and to
enforce acceptable-use policies. The company is the only vendor with support for the open-source
OpenAppID initiative. It allows organizations to quickly and cost-effectively develop application
identification definitions for custom and rare applications that would otherwise be without protection. This
capability helps prevent organizations from being dependent on a vendor’s roadmap or release cycles to
meet their application security requirements.
12. Describe the network visibility that the NGIPS solution offers.
Response: Any IPS provides visibility into threats attacking your network. The proposed Cisco
Firepower NGIPS goes further to provide insights about your network with visibility into a wide array of
devices, OSs, services, applications, and users. This information is discovered passively—without agents—
and is used to build a real-time network map and host profiles. You can use this visibility to better
understand your IT environment and implement appropriate controls, enforce policy, control applications,
and harden assets. In-depth visibility strengthens your overall defense and reduces the attack plane.
This visibility allows you to detect threats and vulnerabilities and close gaps in your defenses. It considers
behavioral and reputational indicators of a given connection to help decide whether to block or allow. All of
the proposed solution’s different layers of security work together for efficient and effective protection.
13. How does this visibility protect the network during an attack?
Response: The proposed solution detects and blocks known and unknown threats as they happen. It
uses full stack visibility to defend against advanced persistent threats (APTs) and application-embedded
attacks. This includes protection against intrusion events and advanced malware attacks. Keep your
critical data and your customers’ sensitive information safe.
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
-3-
<PartnerLogo>
<clientLogo>
Management
14. How does the solution simplify network management?
Response: The proposed Cisco Firepower NGIPS identifies what’s running in your network and then
correlates that information with the vulnerability information supplied by Talos. It then uses the IPS rules
database and determines the appropriate rules required to defend your specific assets. The proposed
solution automates the provisioning and tuning of security policies and applies them consistently across
your enterprise. This leads to security tailored to your specific environment. Its automation and security
intelligence allow you to do more with less resources.
15. Does the solution offer unified management without requiring a new management
system?
Response: Yes. The proposed solution works with Cisco Firepower Management Center, which
manages not only the proposed Firepower NGIPS, but also Cisco Firepower NGFW, Cisco AMP for
Networks, Cisco Firepower Threat Defense for ISR, and virtual form factors of these solutions, all available
through <<PartnerName>>.
<<PartnerName>> ● CONFIDENTIAL
Cisco Firepower NGIPS – Partner/Reseller Version RFX Q&A
-4-