Cisco Cloud Web Security
Deliver Security as a Service
- Granular web use policies: Set and enforce across the entire environment for applications, websites and specific webpage content.
- Easy to integrate: With flexible network integration options, you can connect Cisco Cloud Web Security (CWS) to your existing infrastructure.
- Real-time threat intelligence: Analysis engines deliver industry-leading antimalware and zero-day threat protection from web-based attacks. Our advanced global threat telemetry network continuously updates Cisco CWS to protect against the latest threats.
- Centralized management and reporting: Increased visibility into web usage and threat information.
As a cloud-delivered web security solution, Cisco CWS offers extensive security as a service (SaaS). Deployment is simple and fast. No maintenance or upgrades are required.
With Cisco CWS, administrators can set and enforce specific web use policies across the entire environment. Users can connect Cisco CWS to their existing infrastructure with flexible network integration options. Cisco CWS controls access to websites and specific content in Web pages as well as applications. Cisco’s analysis engines deliver continual industry-leading antimalware and zero-day threat protection against web-based attacks. Our advanced global threat telemetry network continuously updates Cisco CWS against the latest threats.
Cisco Advanced Malware Protection (AMP) protects against advanced malware and tracks file disposition over time to see where malicious files travel. Cognitive Threat Analytics (CTA) scans web traffic for symptoms of an infection and addresses threats that bypass perimeter defenses. And centralized management and reporting provide increased visibility into web usage and threat information.
Advanced Threat Protection
Cisco AMP and Threat Grid protects your environment across the attack continuum: before, during, and after an attack. The file reputation feature allows Cisco to capture a fingerprint of each file as it traverses the customer network. These fingerprints are sent to AMP’s cloudbased intelligence network for a reputation verdict.
After an attack, using file retrospection, you can track a file’s disposition over time after it enters your environment. If it is found to be malware, you can discover where the file entered and where it is currently located to mitigate future intrusions.
Our cloud-based CTA feature helps reduce threat identification time to minutes with its continuous efforts. CTA actively identifies symptoms of a malware infection through behavioral analysis, anomaly detection, and machine learning. And with the Cisco Talos Security Intelligence Research Group, among the largest threat detection networks in the world, leading researchers and systems continuously deliver security intelligence to Cisco CWS based on threat tracking across networks, endpoints, mobile devices, virtual systems, the web, and email around the globe.
Cisco CWS is backed by a worldwide network and 23 data centers with service-level agreements (SLAs) based on 99.999 percent uptime. You can tailor visibility into your web usage with more than 10,000 customizable reports, updated every 10 minutes, and the ability to categorize traffic by user and application traffic. Web usage data may also be accessed quickly and with a high degree of security by a variety of reporting and analysis tools such as security information and event management (SIEM).
You can also save time and money by redirecting traffic to Cisco CWS through existing Cisco products such as the Cisco Integrated Router G2 and ISR 4000, Cisco Adaptive Security Appliances (ASA and ASAv) next-generation firewalls, Cisco Web Security Appliances (WSA and WSAV), and the Cisco AnyConnect Web Security Module. You can also connect to Cisco CWS in a standalone deployment.
Cloud Web Security Pillars
Through web filtering and web reputation scoring, Cisco CWS controls access to more than 50 million known websites by applying filters from a list of more than 75 content categories. Our application visibility and control features include acceptable use policy that increases employee productivity and compliance. These controls cover access to web pages, individual web parts and microapplications so employees can access sites needed for work. Centralized policy management helps you enforce policies and manage the entire solution across all branches and users from a single centralized location that is accessible anywhere, at any time.
Real-time malware protection is based on the identification of unknown, unusual behaviors and zero-hour outbreaks through a heuristicsbased, antimalware engine. Outbreak intelligence runs webpage components in a highly secure virtual emulation to determine how each component behaves and blocks any malware. Roaming users are protected with Cisco AnyConnect®, which enforces the same security features available with Cisco CWS in your company’s offices. A secure mobile browser provides protection for mobile devices.
Features and Benefits by License:
Several licenses are available. Cloud Web Security Essentials is the base offering for new and renewing customers. Other bundles and individual options are also available. The major features of each license are described in Tables 1 through 5.
Table 1. Essentials License
|Web filtering||Control web access to more than 50 million known websites by applying filters from a list of over 75 web categories.|
|Malware scanning||Increase the catch rate with an intelligent multiscanning technology that divides web traffic into functional elements and efficiently analyzes it in real time.|
|Outbreak intelligence||Identify unknown and unusual behaviors and zero-hour outbreaks through a heuristics-based antimalware engine. Outbreak intelligence runs webpage components in a virtual emulation environment before permitting user access. Using proprietary “scanlet” engines for Java, PDF, executables, and more, outbreak intelligence opens up the individual components of a webpage to determine how each component behaves and blocks any malware.|
|Web reputation||Restrict website access based on site reputation. Analyze data such as the domain owner, the hosting server, the time created, the type of site requested, and more than 50 other distinct parameters to provide a reputation score for the site requested.1|
|Application visibility and control||Increase employee productivity by controlling access to webpages, individual web parts, or microapplications so that employees can access the sites needed for work without unnecessary distractions. Simultaneously prevent access to inappropriate content.|
|Dynamic content analysis||Defend against compliance, liability, and productivity risks by combining traditional URL filtering with real-time dynamic content analysis (DCA). The DCA engine automatically categorizes the content of an unknown URL by analyzing the content of the page itself, scoring relevancy to web categories (such as pornography, hate speech, gambling, and illegal downloads) and blocking the page if it conflicts with web security policies.|
|Centralized management and reporting||Receive actionable insight across threats, data, and applications. A powerful centralized tool controls both security operations (such as management) and network operations (such as analysis of bandwidth consumption). Administrators have access to a variety of predefined reports and can create customized dashboards and set notifications. All reports are generated and stored in the cloud, so they are delivered in seconds as opposed to hours. Reports can be also be saved and scheduled for automated delivery. These capabilities provide flexibility, offering detail down to the user level, and help enable administrators to spotlight potential issues quickly.|
|Roaming laptop user protection||Protect roaming users with the same in-house policies through Cisco AnyConnect. AnyConnect routes all roaming web traffic through an SSL tunnel directly to the closest Cisco cloud proxy and enforces the same security features that are on premises. By eliminating the need to backhaul web traffic through VPN, Cloud Web Security relieves web congestion at the headquarters, reducing bandwidth use while improving the end-user experience.|
1See “ Protect Against URL-Based Threats”
The Cloud Web Security Premium license, shown in Table 2, includes all the features from the Cloud Web Security Essentials bundle and adds AMP and Cognitive Threat Analytics.
Table 2. Premium License
|Cisco AMP (also available separately)||Protect against the latest and most advanced forms of malware with AMP’s detection and blocking, continuous analysis, and retrospective alerting. AMP uses the vast cloud security intelligence networks of both Cisco and Sourcefire (now part of Cisco). AMP augments the antimalware detection and blocking capabilities already offered in Cloud Web Security with enhanced file reputation capabilities, detailed file sandboxing, and file retrospection. The only solution with all of these capabilities, Cisco AMP tracks a file’s disposition over time inside the network perimeter. If a file is later found to be malicious, file retrospection identifies where the file entered and where it traveled to help in the remediation process.|
|Cognitive Threat Analytics (also available separately)||Reduce the time to discovery of threats operating inside the network. Cognitive Threat Analytics addresses gaps in perimeter-based defenses by identifying the symptoms of a malware infection or data breach using behavioral analysis and anomaly detection. Unlike traditional monitoring systems, it relies on advanced statistical modeling and machine learning to independently identify new threats, learn from what it sees, and adapt over time.|
Table 3. Advanced Threat Detection and A la carte Licenses
|Log extraction API||Automatically pull web-usage data quickly for highly secure analysis with an S3-compatible HTTPS API. Log data is compiled in W3C text format that can be correlated with existing data using a variety of reporting and analysis tools such as security information and event management (SIEM). Log information consisting of more than 20 attributes is typically available within 15 minutes of the event. Log extraction can be added to any existing Cloud Web Security license. It is ideal for customers with 4000 seats or more.|
|AMP||See Table 2.|
|Cognitive Threat Analytics||See Table 2.|
|Data retention||Data for blocked web requests (policy or malware blocks) is retained for one year, and allowed data is retained for 45 days. Customers can retain data for longer periods to match the terms of their subscription.|
|Advanced threat detection is an add-on license that includes Cisco AMP and Cognitive Threat Analytics (see descriptions in the tables above) and is available to customers with a current Cloud Web Security Essentials license.|
Table 4. Web Security Bundle
|Web Security bundle||The Web Security bundle comprises the Cisco Web Security Appliance and Cloud Web Security. Customers can consume Cisco Web Security across the cloud or on premises. The bundle includes:
These benefits are included with all Cloud Web Security licenses.
Talos Security and Research Group: With a 24-hour view into global traffic activity, Talos analyzes anomalies, uncovers new threats, and monitors traffic trends. Talos generates new rules and updates every 3 to 5 minutes, providing threat defense hours and even days ahead of competitors. Receive fast and comprehensive web protection backed by one of the largest threat-detection networks in the world, with the broadest visibility and largest footprint based on:
- 130 billion web requests served by Cloud Web Security per month
- 3.6 petabytes of bandwidth pumped through Cloud Web Security monthly
- 100 TB of intelligence gathered daily
- 4.9 billion antivirus and web filtering blocks per month
- 1.6 million sensors
- Support on all major operating systems and platforms
World-class support: Resolve issues rapidly with direct, 24-hour access to Cisco experts available in more than 10 JD Power award-winning security support centers. Support for Cloud Web Security software subscription includes:
- Software updates and major upgrades to keep applications performing optimally with the most current feature set
- Access to Cisco Technical Assistance Center (TAC) for fast, specialized support
- Online tools that build and expand in-house expertise and boost business agility
Industry-leading uptime: Help ensure data protection with top-tier data center facilities that deliver an SLA of 99.999 percent uptime. With automatic updates from Talos, Cloud Web Security stays current with the latest threat information. Security is always on and available, freeing your staff to focus on other priorities.
Cloud Web Security Traffic Redirection Connection Method
Cloud Web Security allows for flexible deployment options that include Cisco appliances... or not. There are many ways to redirect traffic to the Cloud Web Security web proxy. Redirection can be accomplished through the Cisco Adaptive Security Appliances (both physical and virtual), Cisco Integrated Services Routers (ISR) G2, Cisco 4000 Series Integrated Services Routers (through generic routing encapsulationover IPsec) and the Web Security Appliances (physical and virtual). These redirect traffic to Cloud Web Security for web security functions.
Next-Generation Firewall (Cisco Adaptive Security Appliances, physical and virtual): Capitalize on your Adaptive Security Appliance investments by offloading content scanning to Cisco’s cloud through Cloud Web Security. Apply acceptable-use policy to the company, groups, or individual users.
Web Security Appliance (physical and virtual): Integrate Cloud Web Security and the Web Security Appliance so that identity information can be sent to the cloud. And extend other on-premises enterprise features to Cloud Web Security customers.
Cisco ISR G2: Save bandwidth, money, and resources and improve Internet speed at the branch by intelligently redirecting Internet traffic from branch offices directly to the cloud to enforce security and control policies. Apply acceptable-use policy to all users regardless of location.
Cisco 4000 Series ISR: Get the same benefits of redirecting through the ISR G2. At the same time, you reduce maintenance costs by adopting industry-standard GRE over IPsec technology that is reliable, well understood, and mature. See Controlled Availability notification for more information
AnyConnect Secure Mobility Client: Authenticate and redirect web traffic off the corporate network whenever the end user is. Cloud Web Security uses cached user credentials and directory information when users are away from the office or connecting through a VPN, helping to ensure that the same web usage policies are applied.
Standalone deployment: Deploy a simple web security solution that does not require additional hardware. Connect to the Cloud Web Security service using existing browser settings and Proxy Auto-Configuration (PAC) or Web Proxy Auto-Discovery (WPAD) files.
Every Cloud Web Security deployment option includes directory authentication methods that enhance end-user identification, enabling administrators to apply precise filter controls at the user or group level and run detailed log reports.
All Cisco Cloud Web Security subscriptions are term-based subscriptions of 1, 3, or 5 years.
The Cisco Web Security portfolio uses tiered pricing based on the number of users, not devices. Sales and partner representatives can help to determine the correct tier for each customer deployment.
Customers can consume Cloud Web Security on a bandwidth basis by aggregating the total traffic across various deployment sites that will be directed to Cloud Web Security data centers.
Security Enterprise License Agreements
Cisco Security Enterprise Licensing Agreements (ELAs) offer simplified license management and license costs savings through a single agreement. Customers with ELA v3 can add Cloud Web Security Essentials, and customers with ELA v4 can add Cloud Web Security Premium, all at no additional cost. To learn more about Security Enterprise License Agreements, talk to your Cisco account representative.
Software Subscription Support
Every Cloud Web Security subscription also includes the following support benefits:
- Automatic application of patches, software updates, and maintenance to the Cisco cloud to keep applications and platform software current
- Access to the Cisco Technical Assistance Center (TAC) 24 hours a day, 7 days a week
- Access to an online repository of application tools, technical documents, and training
- Registered access to Cisco.com for online technical information and service request management
Cisco takes a threat-centric approach to security to protect network infrastructures and assets on the network. Our services help you take full advantage of security appliances and systems you’ve installed.
Cisco Branded Services
We’ve identified four actions that are essential for successful security deployments: assessment, integration, optimization, and management. You can take advantage of these services to implement those actions.
Cisco Security Planning and Design Service: Helps you develop and implement a robust security solution quickly and cost-effectively with:
- Technology readiness assessment
- Design development
- Implementation engineering
- Knowledge transfer
Cisco Web Security Configuration and Installation Service: Helps mitigate web security risks by installing, configuring, and testing to implement:
- Acceptable-use policy (AUP) controls
- Reputation and malware filtering
- Data security
- Application visibility and control
Cisco Security Optimization Service: Helps you evaluate and strengthen your network’s ability to prevent, detect, and mitigate threats. This service combines network security assessment, design, support, and learning activities in one comprehensive subscription package.
Cisco Managed Threat Defense: Provides dynamic real-time detection and remediation against known vulnerabilities as well as advanced persistent threats. Cisco provides the hardware, software, and expertise to deliver threat defense in a subscription-based model through a global network of security operation centers.
A wide range of valuable services from Cisco partners is available across the planning, design, implementation, and optimization lifecycle. They include the following:
Cisco Network Device Security Assessment: Helps you implement and maintain a hardened network device environment by identifying gaps in your Cisco network infrastructure security.
Smart Care Service (provided by a Cisco Certified Partner): Helps you simplify network maintenance through proactive network monitoring, assessments, software repairs, and technical support.
Cisco Product Security Incident Response Team (PSIRT): The PSIRT is a dedicated global team that manages the receipt, investigation, and public reporting of security vulnerability information related to Cisco products and networks.
Cisco Secure Development Lifecycle (SDL): This is a repeatable and measurable process designed to increase the resiliency and trustworthiness of our products.
Download the Cisco Cloud Web Security At-a-Glance (PDF).
- Pricing and product availability subject to change without notice.