Statements (69)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:physicist
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:Cisco_Prime_Security_Manager
|
gptkbp:analyzes |
network traffic
encrypted traffic |
gptkbp:block |
malicious traffic
|
gptkbp:deployment |
gptkb:software
on-premises in the cloud hardware appliance remote offices |
gptkbp:developed_by |
gptkb:Cisco_Systems
|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco IPS
|
gptkbp:integrates_with |
gptkb:Cisco_security_products
|
gptkbp:is_compatible_with |
industry standards
third-party tools various operating systems |
gptkbp:is_designed_for |
real-time protection
|
gptkbp:is_designed_to |
protect against threats
reduce false positives automate responses support incident management. |
gptkbp:is_effective_against |
zero-day exploits
malware attacks D Do S attacks |
gptkbp:is_integrated_with |
firewalls
SIEM systems |
gptkbp:is_part_of |
gptkb:Cisco's_security_architecture
Cisco Security Suite Cisco's integrated security approach Cisco's threat defense solution |
gptkbp:is_protected_by |
malicious activities
|
gptkbp:is_scalable |
large networks
|
gptkbp:is_used_by |
security teams
|
gptkbp:is_used_for |
monitor network performance
secure endpoints enhance threat detection protect cloud environments |
gptkbp:is_used_in |
data centers
enterprise environments hybrid environments |
gptkbp:is_used_to |
compliance reporting
secure applications protect sensitive data protect intellectual property monitor compliance |
gptkbp:managed_by |
web interface
|
gptkbp:offers |
reporting features
threat intelligence |
gptkbp:provides |
network security
incident response capabilities network segmentation alerting capabilities user activity monitoring detailed logs contextual threat analysis |
gptkbp:recognizes |
intrusions
|
gptkbp:requires |
regular updates
|
gptkbp:setting |
high availability
specific industries custom policies specific compliance requirements |
gptkbp:supports |
API integration
multi-tenancy multiple protocols real-time monitoring virtualization |
gptkbp:uses |
anomaly-based detection
signature-based detection |