{"id":1340,"date":"2004-10-21T00:00:00","date_gmt":"2004-10-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/cisco-boost-security-line-up-by-acquisition\/"},"modified":"2021-12-30T11:39:11","modified_gmt":"2021-12-30T11:39:11","slug":"cisco-boost-security-line-up-by-acquisition","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/21\/cisco-boost-security-line-up-by-acquisition\/","title":{"rendered":"Cisco boost security line-up by acquisition"},"content":{"rendered":"<p>Cisco Systems is making an acquisition designed to reinforce its security lineup, the company said.  The networking giant announced it will pay $74m in cash for San Francisco start-up Perfigo, a developer of network access control products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The acquisition is expected to close in the second quarter of Cisco&#8217;s fiscal year 2005, which ends in January.<\/p>\n<p>Perfigo&#8217;s CleanMachines products focus on policy analysis, compliance and access enforcement for PCs.  Its technology fits into Cisco&#8217;s Network Admission Control (NAC) program, a security architecture that combines virus scanning with network policing to keep attacks from entering the network in the first place.  Specifically, CleanMachines is pre-packaged admission control software that recognises users, their devices and roles.  It evaluates the security standing of individual PCs and scans for vulnerabilities.  Finally, it enforces policy in the network.<\/p>\n<p>Cisco said that CleanMachines has shown great customer appeal in the small to midsized business market and is widely used in educational institutions.  &#8220;This acquisition further enhances Cisco&#8217;s Self Defending Network security strategy of building and deploying proactive and advanced security into the network infrastructure,&#8221; Richard Palmer, vice-president in Cisco&#8217;s security technology group, said in a statement.<\/p>\n<p>Cisco has been pushing its NAC architecture since last year.  In June, it completed the first phase of the launch by making its IP routers NAC-ready.  It plans to add the capability to its Ethernet switches and virtual private network concentrators in 2005.<\/p>\n<p>Earlier this week, Cisco announced it is working with Microsoft, which has proposed a competing end-to-end security architecture called Network Access Protection.  The two companies have pledged to make their architectures interoperable.<\/p>\n<p>Cisco began building the NAC architecture through an acquisition last year.  In January 2003, Cisco announced it would buy Okena in order to provide technology for the &#8220;trusted agent,&#8221; which sits on users&#8217; PCs and communicates with the Cisco policy server.  Last month, it announced the acquisition of Dynamicsoft, a session initiation protocol software developer, and NetSolve, a network management start-up.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/communications\/networks\/0,39020345,39171015,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1340","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1340"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1340\/revisions"}],"predecessor-version":[{"id":3827,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1340\/revisions\/3827"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}