with Cisco Secure Application reduces the risk of security exposure without compromising the delivery speed for an APM-managed application. Normally, the traditional vulnerability scanning occurs before the application is launched to production, and then continues on a monthly, or quarterly cadence. As soon as the application is deployed to production, new security gaps, and zero-day exploits make the application vulnerable despite pre-production testing. Cisco Secure Application enables continuous vulnerability assessment and protection by scanning code execution to prevent possible exploits.

Cisco Secure Application enables:

To monitor the application security, you must enable the security for the application using the Cisco Secure Application dashboard. Use the Security Events widget on the Application dashboard to navigate to the Cisco Secure Application dashboard. To view the Security Events widget within , enable your SaaS account with the subscription license for Secure Application. See License Entitlements and Restrictions.

Supported APM Agents

The Cisco Secure Application features are built into these APM Agents:

Cisco Secure Application Components

Cisco Secure Application uses the combination of the supported APM Agent, Controller, and Cisco Secure Application dashboard to monitor the security of the applications.

Cisco Secure Application Architecture

The APM Agent (Java Agent) communicates to the Cisco Secure Application service through the Controller. This is a high-level architecture of Cisco Secure Application.High-level Architecture

  1. You install the supported APM Agent and then add the Cisco Secure Application license.
  2. The APM-managed application runs and the APM Agent retrieves the data to send to the Controller.
  3. The Cisco Secure Application service retrieves the application, tiers, and nodes data from the Controller.
  4. The APM Agent communicates with the Cisco Secure Application service to check if the security is enabled for the application.
  5. If the security is enabled, then the agent downloads the configuration along with the policies from the Cisco Secure Application service.
  6. Based on the configured policies, the agent sends the security events to the Cisco Secure Application service.
  7. The service collects all the data, analyzes the application behavior, and then provides the analyzed data to the Cisco Secure Application dashboard.