Data Management

Trend Micro Deep Security: Similarities and Differences With Cisco CSA

Download Now Free registration required

Executive Summary

Your enterprise invested in Cisco Security Agent (CSA) because it understands the importance of a defense-in-depth strategy for protecting servers, desktop and laptop computers from threats that can bypass perimeter security. However, with the recent announcement of Cisco's End-of-Life plans for CSA, one needs to explore alternatives that will continue to defend ones systems from sophisticated, stealthy attacks. While your need for zero-day protection probably hasn't changed since one first licensed CSA, today's other important realities must factor in to your current decision. Virtualization and cloud computing are fundamentally reshaping the enterprise IT landscape by providing organizations with the ability to consolidate systems, reduce energy consumption, and deliver significant cost savings.

  • Format: PDF
  • Size: 932.1 KB