Cisco Secure Client logo

Cisco Secure Client
Network Visibility Module (NVM)

Wouldn't it be nice to give your customers visibility into user and endpoint behavior? You can when you support Network Visibility Flow. It's what powers the Cisco Secure Client Network Visibility Module.

Enhance the data you provide to customers

Cisco Secure Client NVM collects standard flows from endpoints (e.g., laptops) along with additional context information.
Because Secure Client NVM use standards-based Netflow (IPFIX) technology you can leverage this rich data in your collector platform.

nvzFlow Protocol Background

Cisco AnyConnect 4.2MR1 added support for the Network Visibility Module (NVM). Cisco Secure Client NVM NVM leverages the Network Visibility Flow, or nvzFlow (pronounced: en-vizzy-flow) protocol to capture user and endpoint behavior both on and off premise. nvzFlow collect standard flows from endpoints along with a small set of high-value data related to each flow originating from the endpoint in a lightweight manner in standard IPFIX records. This empowers standard-based flow collection solutions to leverage this rich data to create visibility into user and endpoint behavior and as well as long term trending and analytics.

What do we mean by "Enhanced Context"?

The 5 key visibility categories conveyed by the protocol or "Enhanced Context" are:

  • User
  • Device
  • Application
  • Location
  • Destination

Community View All >

AC 3.x - Didn't Migrate

Created by: Olando Stubbs

Hi call do customer that did not migrate over to 4.x and had purchased 3.x  but has never used it, loose complete access to now migrate?  I'm not seeing the migration SKUs anymore which suggest these have been deprecated.

Created: Oct 27 2017

Last modified: Oct 27 2017

Replies: 0

Tags: 0

Does the latest version of AnyConnect provide Anti-Virus capabilities?

Created by: Deb Smith

Hello!   I thought I remembered seeing or reading release info that the recent version(s) of AnyConnect now provide built-in Anti-Virus capabilities.    However, I don't see anything about that in the data sheet.   Is this the...

Created: Aug 11 2017

Last modified: Oct 26 2017

Replies: 2

Tags: 0

Windows GPO download fails during EAP-Chaining user authentication

Created by: DANIEL CARRION

We are experiencing an issue downloading GPO at sites with slower WAN links.  It seems to happen when re-authentication occurs which temporarily drops the network connection whicj kills the download.  Does anyone know if there is a timer or...

Created: Oct 14 2017

Last modified: Oct 23 2017

Replies: 3

Tags: eap-chaining

NAM/CCP and Credential Guard in Windows 10 ?

Created by: Tue Frei Noergaard

Hi all,   Is the Custom Credential Provider used by  the Network Access Manager compatible with Credential Guard in Windows 10 and are the credentials given to this provider fully protected by Credential Guard?”
Best regards...

Created: Sep 22 2017

Last modified: Oct 22 2017

Replies: 5

Tags: 0

Anyconnect 4.4 for 2 LAN NIC

Created by: Ying Chun Gee

Hi, I am just wondering if anyconnect allow 2 LAN NIC connection in the same times.  Recently we have deployed Cisco ISE NAC for our client.  There are few desktop using 2 NICs and connect to different segment.  Any idea how can we...

Created: Aug 18 2017

Last modified: Oct 22 2017

Replies: 1

Tags: 0

Blog View All >

  • Saturday, October 28th 2017, 6:48:31 am
    Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between October 20 and October 27. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key beha...
  • Friday, October 27th 2017, 9:00:32 pm
    Due to the high-profile data breaches, cybersecurity has become a household word. Think back to just one month ago, when the data breach at Equifax exposed the personal information for 145.5 million consumers – almost half of all Americans. At Cisco, we know our customers and other business leaders ...
  • Friday, October 27th 2017, 3:27:38 am
    There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs.  Data center outages can occur from a number of factors such as such as component ...
  • Thursday, October 26th 2017, 10:32:44 pm
    Today, Talos is releasing details of three new vulnerabilities discovered within Apache OpenOffice application. The first vulnerability, TALOS-2017-0295 within OpenOffice Writer, the second TALOS-2017-0300 in the Draw application, and the third TALOS-2017-0301 discovered in the Writer application. A...
  • Thursday, October 26th 2017, 2:52:45 am
    On September 12, Gartner – the leading research and advisory company – released a competitive report on the secure web gateway (SWG) market. The report highlights the significant transformation as the traditional SWG gives way to a new platform –– the secure internet gateway (SIG). Gartner states, “...