Articles
Cisco named a Visionary for AMP for Endpoints in Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms
Gartner has named Cisco a Visionary for AMP for Endpoints in the January 2018 Magic Quadrant for Endpoint Protection Platforms (EPP). Cisco is proud to be included in this auspicious report and honored to receive recognition from one of the most influential industry evaluations of endpoint security…
When Walls Come Down: Working Together to Protect IoT Devices
When you begin remodeling an older home you realize that some walls are there for good reasons. Others block our modern, open-floor-plan lifestyles and can come down. Years ago, factories and utilities separated their Information Technology (IT) and Operations Technology (OT) teams. The thinking was…
Highlights of Effective Security from Cisco Live Las Vegas
I’m still excited after Cisco Live Las Vegas. Cisco Security was everywhere. Our partners were enthused, our customers were engaged, and I couldn’t be more proud of our team and how we continue to deliver simpler, more effective security. I love Cisco Live. This event is unlike any other gathering a…
Cisco Firepower NGFW Delivers Unparalleled Threat Defense in NSS Labs Testing
Real-World Testing to Inform Your NGFW Buying Decision We’re excited to share with you the latest NSS Labs NGFW test results. In the most rigorous independent NGFW testing to date, Cisco outperformed eight competitors in security effectiveness, blocking 100% of evasions and surpassing four vendors b…
A Steady Drumbeat for Simple, Open and Automated
I continue to beat the drum for solutions that are simple, open, and automated because it’s something I’m passionate about and Cisco Security is deeply committed to. It’s the clear path forward to security as a force multiplier – helping you to improve your security posture with your existing resour…
Less is More – Fewer Cybersecurity Vendors Yield More Effective Security
As I’ve talked about before, many organizations have traditionally relied on a tactical approach to security: encounter a new threat, buy another box. This happened time and time again, resulting in a complex security “frankenstructure” of products. But new independent research from ESG shows that 6…
Short on Security Resources? Try These Force Multipliers
One in four organizations are exposed for six months or longer due to a lack of qualified security workers. And in Europe almost one-third of cyber security job openings remain unfilled. That’s the challenging picture reported by ISACA at this year’s RSA Conference. You’re thinking, “tell me s…
Staying Ahead of the Hack: Operationalizing Threat Intelligence to Strengthen Defenses
Many pieces of forensic evidence come into play when investigating a crime scene – analysis of fingerprints, DNA, shoe prints, videos/photos, ballistics, etc. By analyzing the data, a picture of the crime emerges, which in the case of a serial killer often includes his or her MO or method of operati…
Effective Endpoint Security – More than Meets the Eye
One of your sales people, Susan, is on the road putting some finishing touches on a presentation before a big meeting. Using the hotel Wi-Fi she does a quick search to see if there’s any relevant company or industry news she needs to know about before meeting with the client. She clicks on several w…
1