Avatar

Gedeon Hombrebueno

Product Marketing

Endpoint Security

Gedeon Hombrebueno is a Product Marketing Manager at Cisco. He is focused on bringing to market Cisco's AMP for Endpoints - helping customers prevent, detect and respond to advanced threats.

Gedeon has extensive product marketing, product management and integrated marketing experience for enterprise solutions across Cybersecurity, DevOps and Systems Management.

Articles

January 7, 2020

SECURITY

Relentless Breach Defense Endpoint Protection Platform + Endpoint Detection and Response

As evasive and complex as today’s threats have become, it’s no wonder security professionals in organizations of all sizes are ripping out their legacy antivirus completely in favor of Endpoint Protection Platforms (EPP) and Endpoint Detection and Response (EDR) technologies. Endpoint Protection Pla…

August 16, 2019

SECURITY

Three Reasons to Upgrade Your Legacy AV/Endpoint Security

What technology do you remember the most from the ‘80s – ‘90s? Portable CD players? Floppy disks? 2G flip phones? None of these, of course, survived the digital evolution. Do you know which technology developed in that era that did survive? Legacy antivirus (AV). That’s right. While many other techn…

March 8, 2019

SECURITY

Threat Hunting for the Riskiest 1 Percent

How to hunt for threats with speed and precision “What’s our exposure?” is a question that requires an urgent and conclusive answer as soon as a potential threat is discovered. That dreaded question can come as an urgent message on Sunday when you’re with your family, as a text at the crack o…

December 18, 2018

SECURITY

Threat Hunting for the Holidays

How to stop the ‘Grinch’ from breaking your endpoint defenses You’re gearing up for the holidays. But then your phone rings – it’s your manager. He just heard the news that another malware strain is on the loose. Just like the Grinch, it is a ‘mean one,’ posing a vicious threat to the security of co…

November 11, 2018

SECURITY

Demystifying: Cryptocurrency Mining Threats

How to protect your endpoints from “creepy crypto miners” Here’s what’s creepy about cryptocurrency mining threats. It can lead to the slow death of your computers – capable of literally melting smartphones in some cases – by overworking the CPU beyond its normal capacity. It can trigger massive spi…