CISCO SYSTEMS in Industrial Control Systems Security Solutions

Cisco Systems, Inc. (Cisco) is involved in creating and selling a range of technologies in the security and networking space. It’s security product portfolio comprises unified threat management products, advanced threat security tools, and web security products. Listed below are the network-related areas that its security offerings cover:

  • Network and data center security
  • Advanced threat protection
  • Web and email security
  • Access and policy
  • Unified threat management
  • Advisory, integration, and managed services
Cisco also provides solutions that help protect ICS infrastructure vendors and offers policy enforcement, visibility for industrial protocols, and protocol normalizations. 

The company offers the following products and services in the ICS security market:

Products

  • Cisco AMP for Endpoints
  • Cisco AMP for Networks
  • NGFW
  • Cisco ASA 5506H-X with FirePOWER Services
  • Cisco Firepower 9000 Series
  • Cisco 3000 Series Industrial Security Appliances (ISA)
  • Cisco Meraki Cloud Managed Security Appliances

Services

  • Incident Response
  • Strategy, Risk, and Compliance
  • Vulnerability Management
  • Cisco Business Critical Services
  • Managed Security Services

USP : Cisco offers ICS capabilities through its IPS Industrial Signatures solution. IPS has been established as a vulnerability mitigation technique for over a decade and can protect ICS networks against threats, regardless of whether the underlying issue is in a traditional network component or specific to ICS. Cisco’s IPS Industrial Signatures solution provides rapid-response to mitigate attacks, while also maintaining the availability and integrity of critical assets.

BUYERS
VENDORS
EXPERTS
3.9
ANALYSTS
 

CISCO SYSTEMS detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Features and Functionality
2.65
2.90
1.30
Services
2.85
3.85
2.45
Pricing
0.90
0.00
2.10
Deployment
3.45
3.90
3.60
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

CISCO SYSTEMS has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    27 Participants

  • Niche Quadrant

    All-Asia-Pacific

    31 Participants

  • Niche Quadrant

    All-Europe

    34 Participants

SECTORS
REGIONS
North America Middle East and Africa Latin America Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Implementation Methodology / Risk and Thr...
    Decrease risk
    Segment devices without restructuring the network. Simply manage access to enterprise resources. Confine lateral program of threats with micro-segmentation. Show More
  • Product Maturity / Pre Deployment / Strategy consulting
    Improve agility and desired results
    Cisco Advisory Services recognize how technology can help the client to meet their business objectives. A dedicated team of advisors work with closely to address risks and compliance, improve dexterity, and give the desired reults Show More
  • Product Maturity / Pre Deployment / Design & Integration
    Cisco Validated Designs
    The advantages of consolidating application networking solutions in the data centre include: Ease of manageability because less devices are working in a consolidated data centre and Centralized storage and archival of data to meet regulatory compliance Show More
  • Product Maturity / Post Deployment / Support & Maintenance
    Cisco Smart Net Total Care
    Smart Net Total Care offers excellent technical support. Solve problems quicker, improve operational proficiency, and decrease the risk of downtime. Smart Net Total Care offers more time to concentrate on business innovation while proactively supporting infrastructure. Show More
  • Product Maturity / Development Tools / Log review tools
    Cisco Log Analyzer
    It ensures that the devices are correctly configured and monitor configuration changes. It makes sure that all router and switch connections (including those denied) and identify the source and destination devices interacting with them the most. Show More
  • Company Maturity / Partner Ecosystem
    Implementation Partners
  • Company Maturity / Partner Ecosystem
    System Integrators
  • Company Maturity / Partner Ecosystem
    Talent Availability
  • Company Maturity / Sector Footprint
    Energy and Utilities
  • Company Maturity / Sector Footprint
    Manufacturing
  • Company Maturity / Sector Footprint
    Other Industry Verticals
  • Company Maturity / Sector Footprint
    Transportation and Logistics
  • Product Maturity / Pricing
    Module Based
  • Product Maturity / Integration
    ODVA
  • Company Maturity / Geographic Footprint
    Channel Partners - Asia-Pacific
  • Company Maturity / Geographic Footprint
    Channel Partners - Europe
  • Company Maturity / Geographic Footprint
    Channel Partners - Latin America
  • Company Maturity / Geographic Footprint
    Channel Partners - Middle East and Africa
  • Company Maturity / Geographic Footprint
    Channel Partners - North America
  • Company Maturity / Geographic Footprint
    Direct Presence - Asia-Pacific
WEAKNESSES
  • Product Maturity / Pre Deployment / Regulatory compliance
    Low latency and jitter networks
    High-speed coordination and control required in low latency and jitter networks Show More
  • Product Maturity / Pre Deployment / Cyber attack simulation
    Securing Industrial Control System
    Cybersecurity requires several layers of defense to protect equipment from the vulnerabilities that hackers can exploit. Show More
  • Product Maturity / Pricing
    As a Service
  • Product Maturity / Pricing
    Outcome Based
  • Product Maturity / Pricing
    Per Node/Asset
  • Product Maturity / Pricing
    Per User
  • Product Maturity / Integration
    EDDL - Electronic Device Description Language
  • Product Maturity / Integration
    FDT – field device tool
  • Product Maturity / Post Deployment
    Education & Training
  • Product Maturity / Implementation Methodology
    Risk/VaR Simulation
  • Product Maturity / Implementation Methodology
    Software Enabled Methodology
  • Use Case Maturity
    Control system modernization / IT-OT consolidation
  • Product Maturity / Pre Deployment
    Implementation
  • Product Maturity / Development Tools
    Multi-purpose tools
  • Product Maturity / Development Tools
    Outlier analysis tools
  • Product Maturity / Development Tools
    Reverse engineering tools
  • Product Maturity / Development Tools
    System artifact review tools
  • Product Maturity / Control systems
    Distributed Control System (DCS)
  • Product Maturity / Control systems
    HMI panels
  • Product Maturity / Nuclear
    NRC -10 CFR - 73.54

Have you EVER used CISCO SYSTEMS Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Implementation Methodology
    Risk and Threat Assessment
  • Post Deployment
    Support & Maintenance
  • Common standards
    General Data Protection Regulation
  • Pre Deployment
    Strategy consulting
  • Antivirus/Malware
    Malware protection
  • Channel of Delivery
    System Integrators
  • Distributed Denial Of Service
    Deep packet inspection
  • Pre Deployment
    Design & Integration
  • Development Tools
    Network traffic anomaly detection tools
  • Identity And Access Management
    Transaction context aware

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

CISCO SYSTEMS Presence in Industrial Control Systems Security Solutions

Questions & Answers

TOP REVIEWS

Looking for Industrial Control Systems Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS