Overview
Cisco Secure Access
Cisco Secure Access protects your internal/private resources, user devices, and corporate reputation from malicious and unwelcome activity, safeguarding both inbound and internet-bound traffic using a suite of access and security controls.
Zero Trust Network Access to private/internal resources
To protect your private internal resources, Secure Access offers secure, granular Zero Trust Network Access to those resources.
Resource Connectors forward traffic securely to private internal resources
Resource connectors are virtual machines deployed in your AWS environment that forward remote user traffic to your applications without requiring open inbound ports in your firewall. Resource connectors simplify setting up Zero Trust Access without any need for complex network configurations.
More information
For more information about Cisco Secure Access, see https://www.cisco.com/site/us/en/products/security/secure-access/index.html For more information about Secure Access options for connecting user traffic to private resources, see https://cisco.com/go/secure-access-network-connection-methods-documentation To deploy this resource connector image, see https://www.cisco.com/go/secure-access-resource-connectors-aws-documentation
Highlights
- Zero Trust Network Access
- Easy to deploy and scale
- No complex network configurations
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Vendor refund policy
Please contact your Cisco sales team or partner for refund information.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Additional details
Usage instructions
Please see Cisco Secure Access Online User Guide for running and activating Resource Connector - https://www.cisco.com/go/secure-access-resource-connectors-aws-documentation