A wide and deep body of protection, with more than 5500 signatures
Anti-evasion technology to defend and monitor against worms, viruses, Trojans, reconnaissance attacks, spyware, botnets, undesired applications, and malware
Protocol and behavior analysis for final threat determination
Cisco Global Correlation to help identify the source of denial of service (DoS), distributed denial of service (DDoS), SYN flood, and encrypted attacks so you can block them
Specific protections for Unified Communications, WLAN, routing, and switching to help guard the Cisco infrastructure