Simplifies forensic investigation of unknown applications by
automatically observing all file, network, registry, and COM access
requests made by the application
Builds protective policies based on observed application
behavior
Protects all new and legacy corporate applications
Integrated with the Management Center for Cisco Security
Agents; hot-linked directly from alerts to start monitoring
applications on any system protected by a Cisco Security Agent
Reduces the cost of administering security by providing
automated, centralized analysis of security-related activity
Offers an enterprise-scalable architecture; scalable to
thousands of agents per profiler
Simplifies forensic investigation of unknown applications by
automatically observing all file, network, registry, and COM access
requests made by the application
Builds protective policies based on observed application
behavior
Protects all new and legacy corporate applications
Integrated with the Management Center for Cisco Security
Agents; hot-linked directly from alerts to start monitoring
applications on any system protected by a Cisco Security Agent
Reduces the cost of administering security by providing
automated, centralized analysis of security-related activity
Offers an enterprise-scalable architecture; scalable to
thousands of agents per profiler