{"id":1298,"date":"2004-03-09T00:00:00","date_gmt":"2004-03-09T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/09\/cisco-software-zeros-in-on-dos-attacks\/"},"modified":"2021-12-30T11:39:07","modified_gmt":"2021-12-30T11:39:07","slug":"cisco-software-zeros-in-on-dos-attacks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/03\/09\/cisco-software-zeros-in-on-dos-attacks\/","title":{"rendered":"Cisco Software Zeros In on DoS Attacks"},"content":{"rendered":"<p>Cisco Systems Inc., facing strong competition in both its core router and switch business and its growing security business, greatly expanded its security portfolio with the introduction of several new security devices as well as a new firewall and some security upgrades for its IOS software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new additions to Cisco&#8217;s product line come less than two months after one of the company&#8217;s main competitors, Juniper Networks Inc., paid nearly $4 billion to acquire NetScreen Technologies Inc., a maker of integrated security appliances.  The company has added a feature called the IP Source Tracker that can help administrators find the entry point through which a denial-of-service attack is coming into the network.<\/p>\n<p>The VPN 3020 can support up to 750 IPSec tunnels and 200 SSL connections and goes for $9,995.  Cisco officials said that the current trend in the industry of turning SSL VPNs into standalone products is not one they intend to follow.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,4149,1545800,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1298","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1298"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1298\/revisions"}],"predecessor-version":[{"id":3785,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1298\/revisions\/3785"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}