Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Cisco Security Agent (CSA) vs Cisco Secure Access Control Server (ACS)

Posted on 2006-11-08
7
Medium Priority
?
199 Views
Last Modified: 2010-04-11
I could not find the difference between these two terminology when I did googled.

Any help for that ?

Regards
0
Comment
Question by:zillah
  • 4
  • 2
6 Comments
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17897984
Cisco Security Agent:

  This is Host Based IDS System which comes in a Server/Client model. You have a server and you install clients on all your workstations. So you get the Host based IDS System and for monitoring/deploying you can use the Server.

Cisco Secure Access Control Server:

  This is an Authentication Server which supports TACACS+ and RADIUS. It is more versatile and integrates very well with different Cisco Management Products. Dynamic downloading of ACL based on user login etc are some great features.

Cheers,
Rajesh

CSA -> http://www.cisco.com/en/US/products/sw/secursw/ps5057/index.html

CSACS -> http://www.cisco.com/en/US/products/sw/secursw/ps2086/index.html
0
 

Author Comment

by:zillah
ID: 17898155
[cut]
This is Host Based IDS System which comes in a Server/Client model. You have a server and you install clients on all your workstations. So you get the Host based IDS System and for monitoring/deploying you can use the Server.
[/cut]

Again thanks Rajesh

If I have got cisco IDS (4215) as stand alone device, within my network, is there any need to use Cisco Security Agent (Host Based IDS) ?
0
 
LVL 32

Accepted Solution

by:
rsivanandan earned 500 total points
ID: 17899102
Both serves its own purpose Zillah. For example, most of the times a *well placed* Network IDS like 4215 would suffice. But if you are running 4.x code on it you'll only get detection. But CSA is a host based IPS, it will prevent it as well.

A well organized company will have enough security configurations for the workstations (like user not being in administrator group, well maintained Group Policy etc.) In such cases NIDS is enough.

But if that is not the case, then I would recommend for CSA, since it will do a better job. If you want to try out you can I guess, just see if you like the behavior and you'll come to know.

Cheers,
Rajesh
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 32

Expert Comment

by:rsivanandan
ID: 17904111
May I know why grade B ? For this question as well as the other one (for radius). I thought I did help you to what you wanted to know, just asking.

Cheers,
Rajesh
0
 

Author Comment

by:zillah
ID: 17904189
Sorry I will try to modify it if I can
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17904356
No worries, forget it. I am wondering if I left out anything thats all.

Cheers,
Rajesh
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question